Dell Technologies MWC 2023 Exclusive Booth Tour with David Nicholson
>> And I'm here at Dell's Presence at MWC with vice president of marketing for telecom and Edge Computing, Aaron Chaisson. Aaron, how's it going? >> Doing great. How's it going today, Dave? >> It's going pretty well. Pretty excited about what you've got going here and I'm looking forward to getting the tour. You ready to take a closer look? >> Ready to do it. Let's go take a look! For us in the telecom ecosystem, it's really all about how we bring together the different players that are innovating across the industry to drive value for our CSP customers. So, it starts really, for us, at the ecosystem layer, bringing partners, bringing telecommunication providers, bringing (stutters) a bunch of different technologies together to innovate together to drive new value. So Paul, take us a little bit through what we're doing to- to develop and bring in these partnerships and develop our ecosystem. >> Uh, sure. Thank you Aaron. Uh, you know, one of the things that we've been focusing on, you know, Dell is really working with many players in the open telecom ecosystem. Network equipment providers, independent software vendors, and the communication service providers. And, you know, through our lines of business or open telecom ecosystem labs, what we want to do is bring 'em together into a community with the goal of really being able to accelerate open innovation and, uh, open solutions into the market. And that's what this community is really about, is being able to, you know, have those communications, develop those collaborations whether it's through, you know, sharing information online, having webinars dedicated to sharing Dell information, whether it's our next generation hardware portfolio we announced here at the show, our use case directory, our- how we're dealing with new service opportunities, but as well as the community to share, too, which I think is an exciting way for us to be able to, you know- what is the knowledge thing? As well as activities at other events that we have coming up. So really the key thing I think about, the- the open telecom ecosystem community, it's collaboration and accelerating the open industry forward. >> So- So Aaron, if I'm hearing this correctly you're saying that you can't just say, "Hey, we're open", and throw a bunch of parts in a box and have it work? >> No, we've got to work together to integrate these pieces to be able to deliver value, and, you know, we opened up a- (stutters) in our open ecosystem labs, we started a- a self-certification process a couple of months back. We've already had 13 partners go through that, we've got 16 more in the pipeline. Everything you see in this entire booth has been innovated and worked with partnerships from Intel to Microsoft to, uh, to (stutters) Wind River and Red Hat and others. You go all the way around the booth, everything here has partnerships at its core. And why don't we go to the next section here where we're going to be showing how we're pulling that all together in our open ecosystems labs to drive that innovation? >> So Aaron, you talked about the kinds of validation and testing that goes on, so that you can prove out an open stack to deliver the same kinds of reliability and performance and availability that we expect from a wireless network. But in the opens- in the open world, uh, what are we looking at here? >> Yeah absolutely. So one of the- one of the challenges to a very big, broad open ecosystem is the complexity of integrating, deploying, and managing these, especially at telecom scale. You're not talking about thousands of servers in one site, you're talking about one server in thousands of sites. So how do you deploy that predictable stack and then also manage that at scale? I'm going to show you two places where we're talkin' about that. So, this is actually representing an area that we've been innovating in recently around creating an integrated infrastructure and virtualization stack for the telecom industry. We've been doing this for years in IT with VxBlocks and VxRails and others. Here what you see is we got, uh, Dell hardware infrastructure, we've got, uh, an open platform for virtualization providers, in this case we've created an infrastructure block for Red Hat to be able to supply an infrastructure for core operations and Packet Cores for telecoms. On the other side of this, you can actually see what we're doing with Wind River to drive innovation around RAN and being able to simplify RAN- vRAN and O-RAN deployments. >> What does that virtualization look like? Are we talking about, uh, traditional virtual machines with OSs, or is this containerized cloud native? What does it look like? >> Yeah, it's actually both, so it can support, uh, virtual, uh-uh, software as well as containerized software, so we leverage the (indistinct) distributions for these to be able to deploy, you know, cloud native applications, be able to modernize how they're deploying these applications across the telecom network. So in this case with Red Hat, uh, (stutters) leveraging OpenShift in order to support containerized apps in your Packet Core environments. >> So what are- what are some of the kinds of things that you can do once you have infrastructure like this deployed? >> Yeah, I mean by- by partnering broadly across the ecosystem with VMware, with Red Hat, uh, with- with Wind River and with others, it gives them the ability to be able to deploy the right virtualization software in their network for the types of applications they're deploying. They might want to use Red Hat in their core, they may want to use Wind River in their RAM, they may want to use, uh, Microsoft or VMware for their- for their Edge workloads, and we allow them to be able to deploy all those, but centrally manage those with a common user interface and a common set of APIs. >> Okay, well I'm dying to understand the link between this and the Lego city that the viewers can't see, yet, but it's behind me. Let's take a look. >> So let's take a look at the Lego city that shows how we not deploy just one of these, but dozens or hundreds of these at scale across a cityscape. >> So Aaron, I know we're not in Copenhagen. What's all the Lego about? >> Yeah, so the Lego city here is to show- and, uh, really there's multiple points of Presence across an entire Metro area that we want to be able to manage if we're a telecom provider. We just talked about one infrastructure block. What if I wanted to deploy dozens of these across the city to be able to manage my network, to be able to manage, uh, uh- to be able to deploy private mobility potentially out into a customer enterprise environment, and be able to manage all of these, uh, very simply and easily from a common interface? >> So it's interesting. Now I think I understand why you are VP of marketing for both telecom and Edge. Just heard- just heard a lot about Edge and I can imagine a lot of internet of things, things, hooked up at that Edge. >> Yeah, so why don't we actually go over to another area? We're actually going to show you how one small microbrewery (stutters) in one of our cities nearby, uh, (stutters) my hometown in Massachusetts is actually using this technology to go from more of an analyzed- analog world to digitizing their business to be able to brew better beer. >> So Aaron, you bring me to a brewery. What do we have- what do we have going on here? >> Yeah, so, actually (stutters) about- about a year ago or so, I- I was able to get my team to come together finally after COVID to be able to meet each other and have a nice team event. One of those nights, we went out to dinner at a- at a brewery called "Exhibit 'A'" in Massachusetts, and they actually gave us a tour of their facilities and showed us how they actually go through the process of brewing beer. What we saw as we were going through it, interestingly, was that everything was analog. They literally had people with pen and paper walking around checking time and temperature and the process of brewing the beer, and they weren't asking for help, but we actually saw an opportunity where what we're doing to help businesses digitize what they're doing in their manufacturing floor can actually help them optimize how they build whatever product they're building, in this case it was beer. >> Hey Warren, good to meet you! What do we have goin' on? >> Yeah, it's all right. So yeah, basically what we did is we took some of their assets in the, uh, brewery that were completely manually monitored. People were literally walking around the floor with clipboards, writing down values. And we censorized the asset, in this case fermentation tanks and we measured the, uh, pressure and the temperature, which in fermentation are very key to monitor those, because if they get out of range the entire batch of beer can go bad or you don't get the consistency from batch to batch if you don't tightly monitor those. So we censorized the fermentation tank, brought that into an industrial I/O network, and then brought that into a Dell gateway which is connected 5G up to the cloud, which then that data comes to a tablet or a phone, which they, rather than being out on the floor and monitor it, can look at this data remotely at any time. >> So I'm not sure the exact date, the first time we have evidence of beer being brewed by humanity... >> Yep. >> But I know it's thousands of years ago. So it's taken that long to get to the point where someone had to come along, namely Dell, to actually digitally transform the beer business. Is this sort of proof that if you can digitally transform this, you can digitally transform anything? >> Absolutely. You name it, anything that's being manufactured, sold, uh, uh, taken care of, (stutters) any business out there that's looking to be able to be modernize and deliver better service to their customers can benefit from technologies like this. >> So we've taken a look at the ecosystem, the way that you validate architectures, we've seen an example of that kind of open architecture. Now we've seen a real world use case. Do you want to take a look a little deeper under the covers and see what's powering all of this? >> We just this week announced a new line of servers that power Edge and RAN use cases, and I want to introduce Mike to kind of take us through what we've been working on and really what the power of what this providing. >> Hey Mike, welcome to theCube. >> Oh, glad- glad to be here. So, what I'd really like to talk about are the three new XR series servers that we just announced last week and we're showing here at Mobile World Congress. They are all short depth, ruggedized, uh, very environmentally tolerant, and able to withstand, you know, high temperatures, high humidities, and really be deployed to places where traditional data center servers just can't handle, you know, due to one fact or another, whether it's depth or the temperature. And so, the first one I'd like to show you is the XR7620. This is, uh, 450 millimeters deep, it's designed for, uh, high levels of acceleration so it can support up to 2-300 watt, uh, GPUs. But what I really want to show you over here, especially for Mobile World Congress, is our new XR8000. The XR8000 is based on Intel's latest Sapphire Rapids technology, and this is- happens to be one of the first, uh, EE boost processors that is out, and basically what it is (stutters) an embedded accelerator that makes, uh, the- the processing of vRAN loads very, uh, very efficient. And so they're actually projecting a, uh, 3x improvement, uh, of processing per watt over the previous generation of processors. This particular unit is also sledded. It's very much like, uh, today's traditional baseband unit, so it's something that is designed for low TCO and easy maintenance in the field. This is the frew. When anything fails, you'll pull one out, you pop a new one in, it comes back into service, and the- the, uh, you know, your radio is- is, uh, minimally disrupted. >> Yeah, would you describe this as quantitative and qualitative in terms of the kinds of performance gains that these underlying units are delivering to us? I mean, this really kind of changes the game, doesn't it? It's not just about more, is it about different also in terms of what we can do? >> Well we are (stutters) to his point, we are able to bring in new accelerator technologies. Not only are we doing it with the Intel, uh, uh, uh, of the vRAN boost technologies, but also (stutters) we can bring it, too, but there's another booth here where we're actually working with our own accelerator cards and other accelerator cards from our partners across the industry to be able to deliver the price and performance capabilities required by a vRAN or an O-RAN deployment in the network. So it's not- it's not just the chip technology, it's the integration and the innovation we're doing with others, as well as, of course, the unique power cooling capabilities that Dell provides in our servers that really makes these the most efficient way of being able to power a network. >> Any final thoughts recapping the whole picture here? >> Yeah, I mean I would just say if anybody's, uh, i- is still here in Mobile World Congress, wants to come and learn what we're doing, I only showed you a small section of the demos we've got here. We've got 13 demos across on 8th floor here. Uh, for those of you who want to talk to us (stutters) and have meetings with us, we've got 13 meeting rooms back there, over 500 costumer partner meetings this week, we've got some whisper suites for those of you who want to come and talk to us but we're innovating on going forward. So, you know, there's a lot that we're doing, we're really excited, there's a ton of passion at this event, and, uh, we're really excited about where the industry is going and our role in it. >> 'Preciate the tour, Aaron. Thanks Mike. >> Mike: Thank you! >> Well, for theCube... Again, Dave Nicholson here. Thanks for joining us on this tour of Dell's Presence here at MWC 2023.
SUMMARY :
with vice president of marketing for it going today, Dave? to getting the tour. the industry to drive value and the communication service providers. to be able to deliver value, and availability that we one of the challenges to a to be able to deploy, you know, the ecosystem with and the Lego city that the the Lego city that shows how What's all the Lego about? Yeah, so the Lego city here is to show- think I understand why you are to be able to brew better beer. So Aaron, you bring me to and temperature and the process to batch if you don't So I'm not sure the to get to the point that's looking to be able to the way that you validate architectures, to kind of take us through and really be deployed to the industry to be able to come and talk to us but we're 'Preciate the tour, Aaron. Thanks for joining us on this
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Aaron | PERSON | 0.99+ |
Microsoft | ORGANIZATION | 0.99+ |
Dave Nicholson | PERSON | 0.99+ |
Aaron Chaisson | PERSON | 0.99+ |
Paul | PERSON | 0.99+ |
Massachusetts | LOCATION | 0.99+ |
Mike | PERSON | 0.99+ |
Copenhagen | LOCATION | 0.99+ |
Warren | PERSON | 0.99+ |
13 partners | QUANTITY | 0.99+ |
David Nicholson | PERSON | 0.99+ |
13 demos | QUANTITY | 0.99+ |
450 millimeters | QUANTITY | 0.99+ |
Dave | PERSON | 0.99+ |
Dell | ORGANIZATION | 0.99+ |
last week | DATE | 0.99+ |
two places | QUANTITY | 0.99+ |
XR7620 | COMMERCIAL_ITEM | 0.99+ |
one site | QUANTITY | 0.99+ |
XR8000 | COMMERCIAL_ITEM | 0.99+ |
dozens | QUANTITY | 0.99+ |
Lego | ORGANIZATION | 0.99+ |
8th floor | QUANTITY | 0.99+ |
Intel | ORGANIZATION | 0.99+ |
Edge | ORGANIZATION | 0.98+ |
this week | DATE | 0.98+ |
both | QUANTITY | 0.98+ |
today | DATE | 0.98+ |
first time | QUANTITY | 0.98+ |
three | QUANTITY | 0.98+ |
Wind River | ORGANIZATION | 0.98+ |
hundreds | QUANTITY | 0.98+ |
13 meeting rooms | QUANTITY | 0.98+ |
thousands of years ago | DATE | 0.97+ |
thousands of servers | QUANTITY | 0.97+ |
one | QUANTITY | 0.97+ |
Wind River | ORGANIZATION | 0.97+ |
OpenShift | TITLE | 0.97+ |
Red Hat | ORGANIZATION | 0.97+ |
Red Hat | TITLE | 0.97+ |
one server | QUANTITY | 0.96+ |
3x | QUANTITY | 0.96+ |
Red Hat | TITLE | 0.96+ |
Mobile World Congress | EVENT | 0.95+ |
One | QUANTITY | 0.94+ |
first | QUANTITY | 0.94+ |
Mobile World Congress | EVENT | 0.93+ |
16 more | QUANTITY | 0.93+ |
first one | QUANTITY | 0.92+ |
Edge | TITLE | 0.92+ |
over 500 costumer partner meetings | QUANTITY | 0.92+ |
dozens of these | QUANTITY | 0.9+ |
MWC 2023 | EVENT | 0.88+ |
thousands of sites | QUANTITY | 0.88+ |
about a year ago | DATE | 0.87+ |
Sapphire Rapids | OTHER | 0.87+ |
RAN- vRAN | TITLE | 0.87+ |
one small microbrewery | QUANTITY | 0.86+ |
Edge Computing | ORGANIZATION | 0.86+ |
Wind River | TITLE | 0.83+ |
one infrastructure block | QUANTITY | 0.82+ |
up to 2-300 watt | QUANTITY | 0.82+ |
RAN | TITLE | 0.81+ |
VMware | ORGANIZATION | 0.8+ |
Manish Singh, Dell Technologies & Doug Wolff, Dell Technologies | MWC Barcelona 2023
>> Announcer: theCUBE's live coverage is made possible by funding from Dell Technologies, creating technologies that drive human progress. (upbeat music) >> Welcome to the Fira in Barcelona, everybody. This is theCUBE's coverage of MWC 23, day one of that coverage. We have four days of wall-to-wall action going on, the place is going crazy. I'm here with Dave Nicholson, Lisa Martin is also in the house. Today's ecosystem day, and we're really excited to have Manish Singh who's the CTO of the Telecom Systems Business unit at Dell Technologies. He's joined by Doug Wolf who's the head of strategy for the Telecom Systems Business unit at Dell. Gents, welcome. What a show. I mean really the first major MWC or used to be Mobile World Congress since you guys have launched your telecom business, you kind of did that sort of in the Covid transition, but really exciting, obviously a huge, huge venue to match the huge market. So Manish, how did you guys get into this? What did you see? What was the overall thinking to get Dell into this business? >> Manish: Yeah, well, I mean just to start with you know, if you look at the telecom ecosystem today, the service providers in particular, they are looking for network transformation, driving more disaggregation into their network so that they can get better utilization of the infrastructure, but then also get more agility, more cloud native characteristics onto their, for their networks in particular. And then further on, it's important for them to really start to accelerate the pace of innovation on the networks itself, to start more supply chain diversity, that's one of the challenges that they've been having. And so there've been all these market forces that have been really getting these service providers to really start to transform the way they have built the infrastructure in the past, which was legacy monolithic architectures to more cloud native disaggregated. And from a Dell perspective, you know, that really gives us the permission to play, to really, given all the expertise on the work we have done in the IT with all the IT transformations to leverage all that expertise and bring that to the service providers and really help them in accelerating their network transformation. So that's where the journey started. We've been obviously ever since then working on expanding the product portfolio on our compute platforms to bring Teleco great compute platforms with more capabilities than we can talk about that. But then working with partners and building the ecosystem to again create this disaggregated and open ecosystem that will be more cloud native and really meet the objective that the service providers are after. >> Dave Vellante: Great, thank you. So, Doug the strategy obviously is to attack this market, as Manish said, from an open standpoint, that's sort of new territory. It's like a little bit like the wild, wild west. So maybe you could double click on what Manish was saying from a, from a strategy standpoint, yes, the Telecos need to be more flexible, they need to be more open, but they also need this reliability piece. So talk about that from a strategy standpoint of what you guys saw. >> Doug: Yeah, absolutely. As Manish mentioned, you know, Dell getting into open systems isn't something new. You know, Dell has been kind of playing in that world for years and years, but the opportunity in Telecom that came was opening of the RAN, the core network, the edge, all of these with 5G really created a wide opening for us. So we started developing products and solutions, you know, built our first Telecom grade servers for open RAN over the last year, we'll talk about those at the show. But you know, as, as Manish mentioned, an open ecosystem is new to Telecom. I've been in the Telecom business along with Manish for, you know, 25 plus years and this is a new thing that they're embarking on. So started with virtualization about five, six years ago, and now moving to cloud native architectures on the core, suddenly there's this need to have multiple parties partner really well, share specifications, and put that together for an operator to consume. And I think that's just the start of really where all the challenges are and the opportunities that we see. >> Where are we in this transition cycle? When the average consumer hears 5G, feels like it's been around for a long time because it was hyped beforehand. >> Doug: Yeah. >> If you're talking about moving to an open infrastructure model from a proprietary closed model, when is the opportunity for Dell to become part of that? Is it, are there specific sites that have already transitioned to 5G, therefore they've either made the decision to be open or not? Or are there places where the 5G transition has taken place, and they might then make a transition to open brand with 5G? Where, where are we in that cycle? What does the opportunity look like? >> I'll kind of take it from the typology of the operator, and I'm sure Manish will build on this, but if I look back on the core, started to get virtualized you know, back around 2015-16 with some of the lead operators like AT&T et cetera. So Dell has been partnering with those operators for some years. So it really, it's happening on the core, but it's moving with 5G to more of a cloud-like architecture, number one. And number two, they're going beyond just virtualizing the network. You know, they previously had used OpenStack and most of them are migrating to more of a cloud native architecture that Manish mentioned. And that is a bit different in terms of there's more software vendors in that ecosystem because the software is disaggregated also. So Dell's been playing in the core for a number of years, but we brought out new solutions we've announced at the show for the core. And the parts that are really starting that transition of maybe where the core was back in 2015 is on the RAN and on the edge in particular. >> Because NFV kind of predated the ascendancy of cloud. >> Exactly, yeah. >> Right, so it really didn't have the impact that people had hoped. And there's some, when you look back, 'cause it's not same wine, new bottle as the open systems movement, there are a lot of similarities but you know, you mentioned cloud, and cloud native, you really didn't have, back in the nineties, true engineered systems. You didn't really have AI that, you know, to speak of at the sort of volume of the data that we have. So Manish, from a CTO's perspective, how are you attacking some of those differences in bringing that to market? >> Manish: Yeah, I mean, I think you touched on some very important points there. So first of all, the duck's point, a lot of this transformation started in the core, right? And as the technology evolution progress, the opportunities opened up. It has now come into the edge and the radio access network as well, in particular with open RAN. And so when we talk about the disaggregation of the infrastructure from the software itself and an open ecosystem, this now starts to create the opportunity to accelerate innovation. And I really want to pick up on the point that you'd said on AI, for example. AI and machine learning bring a whole new set of capabilities and opportunities for these service providers to drive better optimization, better performance, better sustainability and energy efficiency on their infrastructure, on and on and on. But to really tap into these technologies, they really need to open that up to third parties implementation solutions that are coming up. And again, the end objective remains to accelerate that innovation. Now that said, all these things need to be brought together, right? And delivered and deployed in the network without any degradation in the KPIs and actually improving the performance on different vectors, right? So this is what the current state of play is. And with this aggregation I'm definitely a believer that all these new technologies, including AI, machine learning, and there's a whole area, host area of problems that can be solved and attacked and are actually getting attacked by applying AI and machine learning onto these networks. >> Open obviously is good. Nobody's ever going to, you know, argue that open is a bad thing. It's like democracy is a good thing, right? At least amongst us. And so, but, the RAN, the open RAN, has to be as reliable and performant, right, as these, closed networks. Or maybe not, maybe it doesn't have to be identical. Just has to be close enough in order for that tipping point to occur. Is that a fair summarization? What are you guys hearing from carriers in terms of their willingness to sort of put their toe in the water and, and what could we expect in terms of the maturity model of, of open RAN and adoption? >> Right, so I mean I think on, on performance that, that's a tough one. I think the operators will demand performance and you've seen experiments, you've really seen more of the Greenfield operators kind of launch. >> Okay. >> Doug: Open RAN or vRAN type solutions. >> So they're going to disrupt. >> Doug: Yeah, they're going to disrupt. >> Yeah. >> Doug: And there's flexibility in an open RAN architecture also for 5G that they, that they're interested in and I think the Brownfield operators are too, but let's say maybe the Greenfield jump first in terms of doing that from a mass deployment perspective. But I still think that it's going to be critical to meet very similar SLAs and end user performance. And, you know, I think that's where, you know, maturity of that model is what's required. I think Brownfield operators are conservative in terms of, you know, going with something they know, but the opportunities and the benefits of that architecture and building new flexible, potentially cost advantaged over time solutions, that's what the, where the real interest is going forward. >> And new services that you can introduce much more quickly. You know, the interesting thing about Dell to me, you don't compete with the carriers, the public cloud vendors though, the carriers are concerned about them sort of doing an end run on them. So you provide a potential partnership for the carriers that's non-threatening, right? 'Cause you're, you're an arms dealer, you're selling hardware and software, right? But, but how do you see that? Because we heard in the keynote today, one of the Teleco, I think it was the chairman of Telefonica said, you know, cloud guys can't do this alone. You know, they need, you know, this massive, you know, build out. And so, what do you think about that in terms of your relationship with the carriers not being threatening? I mean versus say potentially the cloud guys, who are also your partners, I understand, it's a really interesting dynamic, isn't it? >> Manish: Yeah, I mean I think, you know, I mean, the way I look at it, the carriers actually need someone like Dell who really come in who can bring in the right capabilities, the right infrastructure, but also bring in the ecosystem together and deliver a performance solution that they can deploy and that they can trust, number one. Number two, to your point on cloud, I mean, from a Dell perspective, you know, we announced our Dell Telecom Multicloud Foundation and as part of that last year in September, we announced what we call is the Dell Telecom Infrastructure Blocks. The first one we announced with Wind River, and this is, think of it as the, you know, hardware and the cashier all pre-integrated with lot of automation around it, factory integrated, you know, delivered to customers in an integrated model with all the licenses, everything. And so it starts to solve the day zero, day one, day two integration deployment and then lifecycle management for them. So to broaden the discussion, our view is it's a multicloud world, the future is multicloud where you can have different clouds which can be optimized for different workloads. So for example, while our work with Wind River initially was very focused on virtualization of the radio access network, we just announced our infrastructure block with Red Hat, which is very much targeted and optimized for core network and edge, right? So, you know, there are different workflows which will require different capabilities also. And so, you know, again, we are bringing those things to these service providers to again, bring those cloud characteristics and cloud native architecture for their network. >> And It's going to be hybrid, to your point. >> David N.: And you, just hit on something, you said cloud characteristics. >> Yeah. >> If you look at this through the lens of kind of the general world of IT, sometimes when people hear the word cloud, they immediately leap to the idea that it's a hyperscale cloud provider. In this scenario we're talking about radio towers that have intelligence living on them and physically at the base. And so the cloud characteristics that you're delivering might be living physically in these remote locations all over the place, is that correct? >> Yeah, I mean that, that's true. That will definitely happen over time. But I think, I think we've seen the hyperscalers enter, you know, public cloud providers, enter at the edge and they're dabbling maybe with private, but I think the public RAN is another further challenge. I think that maybe a little bit down the road for them. So I think that is a different characteristic that you're talking about managing the macro RAN environment. >> Manish: If I may just add one more perspective of this cloud, and I mean, again, the hyperscale cloud, right? I mean that world's been great when you can centralize a lot of compute capability and you can then start to, you know, do workload aggregation and use the infrastructure more efficient. When it comes to Telecom, it is inherently it distributed architecture where you have access, you talked about radio access, your port, and it is inherently distributed because it has to provide the coverage and capacity. And so, you know, it does require different kind of capabilities when you're going out and about, and this is where I was talking about things like, you know, we just talked, we just have been working on our bare metal orchestration, right? This is what we are bringing is a capability where you can actually have distributed infrastructure, you can deploy, you can actually manage, do lifecycle management, in a distributed multicloud form. So it does require, you know, different set of capabilities that need to be enabled. >> Some, when talking about cloud, would argue that it's always been information technology, it always will be information technology, and especially as what we might refer to as public cloud or hyperscale cloud providers, are delivering things essentially on premises. It's like, well, is that cloud? Because it feels like some of those players are going to be delivering physical infrastructure outside of their own data centers in order to address this. It seems the nature, the nature of the beast is that some of these things need to be distributed. So it seems perfectly situated for Dell. That's why you guys are both at Dell now and not working for other Telecom places, right? >> Exactly. Exactly, yes. >> It's definitely an exciting space. It's transformed, the networks are under transformation and I do think that Dell's very well positioned to, to really help the customers, the service providers in accelerating their transformation journey with an open ecosystem. >> Dave V.: You've got the brand, and the breadth, and the resources to actually attract an ecosystem. But I wonder if you could sort of take us through your strategy of ecosystem, the challenges that you've seen in developing that ecosystem and what the vision is that ultimately, what's the outcome going to be of that open ecosystem? >> Yeah, I can start. So maybe just to give you the big picture, right? I mean the big picture, is disaggregation with performance, right, TCO models to the service providers, right? And it starts at the infrastructure layer, builds on bringing these cloud capabilities, the cast layer, right? Bringing the right accelerators. All of this requires to pull the ecosystem. So give you an example on the infrastructure in a Teleco grade servers like XR8000 with Sapphire, the new intel processors that we've just announced, and an extended array of servers. These are Teleco grade, short depth, et cetera. You know, the Teleco great characteristic. Working with the partners like Marvel for bringing in the accelerators in there, that's important to again, drive the performance and optimize for the TCO. Working then with partners like Wind River, Red Hat, et cetera, to bring in the cast capabilities so you can start to see how this ecosystem starts to build up. And then very recently we announced our private 5G solution with AirSpan and Expeto on the core site. So bringing those workloads together. Similarly, we have an open RAN solution we announce with Fujitsu. So it's, it's open, it's disaggregated, but bringing all these together. And one of the last things I would say is, you know, to make all this happen and make all of these, we've also been putting together our OTEL, our open Telecom ecosystem lab, which is very much geared, really gives this open ecosystem a playground where they can come in and do all that heavy lifting, which is anyways required, to do the integration, optimization, and board. So put all these capabilities in place, but the end goal, the end vision again, is that cloud native disaggregated infrastructure that starts to innovate at the speed of software and scales at the speed of cloud. >> And this is different than the nineties. You didn't have something like OTEL back then, you know, you didn't have the developer ecosystem that you have today because on top of everything that you just said, Manish, are new workloads and new applications that are going to be developed. Doug, anything you'd add to what Manish said? >> Doug: Yeah, I mean, as Manish said, I think adding to the infrastructure layers, which are, you know, critical for us to, to help integrate, right? Because we kind of took a vertical Teleco stack and we've disaggregated it, and it's gotten a little bit more complex. So our Solutions Dell Technology infrastructure block, and our lab infrastructure with OTEL, helps put those pieces together. But without the software players in this, you know, that's what we really do, I think in OTEL. And that's just starting to grow. So integrating with those software providers with that integration is something that the operators need. So we fill a gap there in terms of either providing engineered solutions so they can readily build on or actually bringing in that software provider. And I think that's what you're going to see more from us going forward is just extending that ecosystem even further. More software players effectively. >> In thinking about O-RAN, are they, is it possible to have the low latency, the high performance, the reliability capabilities that carriers are used to and the flexibility? Or can you sort of prioritize one over the other from a go to market and rollout standpoint and optimize one, maybe get a foothold in the market? How do you see that balance? >> Manish: Oh the answer is absolutely yes you can have both We are on that journey, we are on that journey. This is where all these things I was talking about in terms of the right kind of accelerators, right kind of capabilities on the infrastructure, obviously retargeting the software, there are certain changes, et cetera that need to be done on the software itself to make it more cloud native. And then building all the surrounding capabilities around the CICD pipeline and all where it's not just day zero or day one that you're doing the cloud-like lifecycle management of this infrastructure. But the answer to your point, yes, absolutely. It's possible, the technology is there, and the ecosystem is coming together, and that's the direction. Now, are there challenges? Absolutely there are challenges, but directionally that's the direction the industry is moving to. >> Dave V.: I guess my question, Manish, is do they have to go in lockstep? Because I would argue that the public cloud when it first came out wasn't nearly as functional as what I could get from my own data center in terms of recovery, you know, backup and recovery is a perfect example and it took, you know, a decade plus to get there. But it was the flexibility, and the openness, and the developer affinity, the programmability, that attracted people. Do you see O-RAN following a similar path? Or does it, my question is does it have to have that carrier class reliability today? >> David N.: Everything on day one, does it have to have everything on day one? >> Yeah, I mean, I would say, you know, like again, the Greenfield operators I think we're, we're willing do a little bit more experimentation. I think the operators, Brownfield operators that have existing, you know, deployments, they're going to want to be closer. But I think there's room for innovation here. And clearly, you know, Manish came from, from Meta and we're, we've been very involved with TIP, we're very involved with the O-RAN alliance, and as Manish mentioned, with all those accelerators that we're working with on our infrastructure, that is a space that we're trying to help move the ball forward. So I think you're seeing deployments from mainstream operators, but it's maybe not in, you know, downtown New York deployment, they're more rural deployments. I think that's getting at, you know, kind of your question is there's maybe a little bit more flexibility there, they get to experiment with the technology and the flexibility and then I think it will start to evolve >> Dave V.: And that's where the disruption's going to come from, I think. >> David N.: Well, where was the first place you could get reliable 4K streaming of video content? It wasn't ABC, CBS, NBC. It was YouTube. >> Right. >> So is it possible that when you say Greenfield, are a lot of those going to be what we refer to as private 5G networks where someone may set up a private 5G network that has more functions and capabilities than the public network? >> That's exactly where I was going is that, you know, that that's why you're seeing us getting very active in 5G solutions that Manish mentioned with, you know, Expeto and AirSpan. There's more of those that we haven't publicly announced. So I think you'll be seeing more announcements from us, but that is really, you know, a new opportunity. And there's spectrum there also, right? I mean, there's public and private spectrum. We plan to work directly with the operators and do it in their spectrum when needed. But we also have solutions that will do it, you know, on non-public spectrum. >> So let's close out, oh go ahead. You you have something to add there? >> I'm just going to add one more point to Doug's point, right? Is if you look on the private 5G and the end customer, it's the enterprise, right? And they're, they're not a service provider. They're not a carrier. They're more used to deploying, you know, enterprise infrastructure, maintaining, managing that. So, you know, private 5G, especially with this open ecosystem and with all the open run capabilities, it naturally tends to, you know, blend itself very well to meet those requirements that the enterprise would have. >> And people should not think of private 5G as a sort of a replacement for wifi, right? It's to to deal with those, you know, intense situations that can afford the additional cost, but absolutely require the reliability and the performance and, you know, never go down type of scenario. Is that right? >> Doug: And low latencies usually, the primary characteristics, you know, for things like Industry 4.0 manufacturing requirements, those are tough SLAs. They're just, they're different than the operator SLAs for coverage and, you know, cell performance. They're now, you know, Five9 type characteristics, but on a manufacturing floor. >> That's why we don't use wifi on theCUBE to broadcast, we need a hard line. >> Yeah, but why wouldn't it replace wifi over time? I mean, you know, I still have a home phone number that's hardwired to align, but it goes to a voicemail. We don't even have handset anymore for it, yeah. >> I think, well, unless the cost can come down, but I think that wifi is flexible, it's cheap. It's, it's kind of perfect for that. >> Manish: And it's good technology. >> Dave V.: And it works great. >> David N.: For now, for now. >> Dave V.: But you wouldn't want it in those situations, and you're arguing that maybe. >> I'm saying eventually, what, put a sim in a device, I don't know, you know, but why not? >> Yeah, I mean, you know, and Dell offers, you know, from our laptop, you know, our client side, we do offer wifi, we do offer 4G and 5G solutions. And I think those, you know, it's a volume and scale issue, I think for the cost structure you're talking about. >> Manish: Come to our booth and see the connected laptop. >> Dave V.: Well let's, let's close on that. Why don't you guys talk a little bit about what you're going on at the show, I did go by the booth, you got a whole big lineup of servers. You got some, you know, cool devices going on. So give us the rundown and you know, let's end with the takeaways here. >> The simple rundown, a broad range of new powered servers, broad range addressing core, edge, RAN, optimized for those with all the different kind of acceleration capabilities. You can see that, you can see infrastructure blocks. These are with Wind River, with Red Hat. You can see OTEL, the open telecom ecosystem lab where all that playground, the integration, the real work, the real sausage makings happening. And then you will see some interesting solutions in terms of co-creation that we are doing, right? So you, you will see all of that and not to forget the connected laptops. >> Dave V.: Yeah, yeah, cool. >> Doug: Yeah and, we mentioned it before, but just to add on, I think, you know, for private 5G, you know, we've announced a few offers here at the show with partners. So with Expeto and AirSpan in particular, and I think, you know, I just want to emphasize the partnerships that we're doing. You know, we're doing some, you know, fundamental integration on infrastructure, bare metal and different options for the operators to get engineered systems. But building on that ecosystem is really, the move to cloud native is where Dell is trying to get in front of. And we're offering solutions and a much larger ecosystem to go after it. >> Dave V.: Great. Manish and Doug, thanks for coming on the program. It was great to have you, awesome discussion. >> Thank you for having us. >> Thanks for having us. >> All right, Dave Vellante for Dave Nicholson and Lisa Martin. We're seeing the disaggregation of the Teleco network into open ecosystems with integration from companies like Dell and others. Keep it right there for theCUBE's coverage of MWC 23. We'll be right back. (upbeat tech music)
SUMMARY :
that drive human progress. I mean really the first just to start with you know, of what you guys saw. for open RAN over the last year, When the average consumer hears 5G, and on the edge in particular. the ascendancy of cloud. in bringing that to market? So first of all, the duck's point, And so, but, the RAN, the open RAN, the Greenfield operators but the opportunities and the And new services that you and this is, think of it as the, you know, And It's going to be you said cloud characteristics. and physically at the base. you know, public cloud providers, So it does require, you know, the nature of the beast Exactly, yes. the service providers in and the resources to actually So maybe just to give you ecosystem that you have today something that the operators need. But the answer to your and it took, you know, a does it have to have that have existing, you know, deployments, going to come from, I think. you could get reliable 4K but that is really, you You you have something to add there? that the enterprise would have. It's to to deal with those, you know, the primary characteristics, you know, we need a hard line. I mean, you know, I still the cost can come down, Dave V.: But you wouldn't And I think those, you know, and see the connected laptop. So give us the rundown and you know, and not to forget the connected laptops. the move to cloud native is where Dell coming on the program. of the Teleco network
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Doug | PERSON | 0.99+ |
Dave Vellante | PERSON | 0.99+ |
Dave Nicholson | PERSON | 0.99+ |
Lisa Martin | PERSON | 0.99+ |
Fujitsu | ORGANIZATION | 0.99+ |
ABC | ORGANIZATION | 0.99+ |
2015 | DATE | 0.99+ |
Dell | ORGANIZATION | 0.99+ |
Doug Wolf | PERSON | 0.99+ |
OTEL | ORGANIZATION | 0.99+ |
CBS | ORGANIZATION | 0.99+ |
Manish Singh | PERSON | 0.99+ |
NBC | ORGANIZATION | 0.99+ |
Dell Technologies | ORGANIZATION | 0.99+ |
David N. | PERSON | 0.99+ |
AT&T | ORGANIZATION | 0.99+ |
Marvel | ORGANIZATION | 0.99+ |
AirSpan | ORGANIZATION | 0.99+ |
Brownfield | ORGANIZATION | 0.99+ |
Telefonica | ORGANIZATION | 0.99+ |
Greenfield | ORGANIZATION | 0.99+ |
Teleco | ORGANIZATION | 0.99+ |
Manish | ORGANIZATION | 0.99+ |
Red Hat | ORGANIZATION | 0.99+ |
Expeto | ORGANIZATION | 0.99+ |
Wind River | ORGANIZATION | 0.99+ |
YouTube | ORGANIZATION | 0.99+ |
last year | DATE | 0.99+ |
Dave V. | PERSON | 0.99+ |
Manish | PERSON | 0.99+ |
MWC 23 | EVENT | 0.99+ |
Doug Wolff | PERSON | 0.99+ |
first | QUANTITY | 0.99+ |
Dell Telecom Multicloud Foundation | ORGANIZATION | 0.99+ |
Barcelona | LOCATION | 0.99+ |
September | DATE | 0.99+ |
Mobile World Congress | EVENT | 0.99+ |
25 plus years | QUANTITY | 0.99+ |
O-RAN | ORGANIZATION | 0.99+ |
Telecos | ORGANIZATION | 0.98+ |
today | DATE | 0.98+ |
Driving Business Results with Cloud
>> If you really want to make an impact to your business, it takes more than just moving your workloads into the cloud. So-called lift and shift is fine to reduce data center footprints and associated costs, but to really drive change, you don't want to simply "pave the cow path," as the saying goes. Rather, you need to think about the operating model, and that requires more comprehensive systems thinking. In other words, how will changes in technology affect business productivity? Or, you know what? Even flip that. What changes in my business process could lower cost, cut elapse times, and accelerate time to market, increase user productivity, and lower operational risks? And what role can technology play in supporting these mandates through modernization, automation, machine intelligence, and business resilience? And that's what we're here to discuss today. Welcome to Driving Business Results with Cloud Transformation, made Possible by Dell and DXC. My name is Dave Vellante, and today we're going to zoom out and explore many aspects of cloud transformation that leading organizations are acting on today. Yeah, sure, we're going to look at optimizing infrastructure, but we'll also dig deeper into cloud considerations, governance, compliance, and security angles, as well as the impact of emerging opportunities around edge and Industry 4.0. Our focus will be on how to remove barriers and help you achieve business outcomes. And to do this, our program features the long-term partnership between Dell and DXC. And we bring to this program six experts in three separate sessions, who are working directly with top organizations in virtually every industry to achieve high impact results. We're going to start with a conversation about cloud, the cloud operating model, and transforming key aspects of your infrastructure. And then we'll look into governance, security, and business resilience. And in our third session, we'll discuss exciting transformations that are occurring in smart manufacturing and facilities innovations. So let's get right into it with our first session. Enjoy the program. (bright music) Hello, and welcome to what is sure to be an insightful conversation about getting business results with cloud transformation. My name is Dave Vellante, and I'm here with James Miller, Chief Technologist for Cloud and Infrastructure Services, and Jay Dowling, Americas Sales Lead for Cloud and Infrastructure Services, both with DXC Technology. Gentlemen, thanks for your time today. Welcome to theCube. >> Great. Thanks for having us. >> Thank you Dave. Appreciate it. >> So let's get right into it. You know, I've talked to a lot of practitioners who've said, "Look, if you really want to drop zeros, like a lot of zeros to the bottom line, you can't just lift and shift." You really got to think about modernizing, the application portfolio. You got to think about your business model, and really think about transforming your business, particularly the operating model. So my first question, Jim, is, What role does the cloud play in modernization? >> Well, there are really three aspects that the, the cloud plays in modernization. You mentioned multiple zeros. One is cost optimization, and that can be achieved through business operations, through environmental, social, and governance. Also being more efficient with your IT investments. But that's not the only aspect. There's also agility and innovation. And that can be achieved through automation and productivity, speed to market for new features and functions, improvements in the customer experience, and the capability to metabolize a great deal more data in your environment, which the end result is an improvement in releasing of new things to the field. And finally, there's resilience. And I'm not really talking about IT resilience, but more of business resilience, to be able, to be able to handle operational risk, improve your securities and controls, deal with some of the talent gap that's in the industry, and also protect your brand reputation. So modernization is really about balancing these three aspects, cost optimization, agility and innovation, and resilience. >> So, so thank you for that. So Jay, I got to ask you, in the current climate, everybody's, you know, concerned, and there's not great visibility on the macro. So, Jim mentioned cost optimization. That seems to be one of the top areas that customers are focused on. The two I hear a lot are consolidating redundant vendors and optimizing cloud costs. So that's, you know, top of mind today. I think everybody really, you know, understands the innovation and, and, and agility piece, at least at a high level, maybe realizing it is different. And then the business resilience piece is really interesting because, you know, prior to the pandemic people, you know, they had a DR strategy, but they realized, "Wow, my business might not be that resilient." So Jay, my question to you is, What are you hearing when you talk to customers? What's the priority today? >> Yeah, the priority is an often overused term of digital transformation. You know, people want to get ready for next generation environments, customer experience, making sure they're improving, you know, how they engage with their clients and what their branding is. And what we find is a lot of clients don't have the underlying infrastructure in place today to get to where they want to get to. So cloud becomes an important element of that. But, you know, with DXC's philosophy, not everything goes to, not everything necessarily needs to go to cloud to be cost optimized, for instance. In many cases, you can run applications, you know, in your own data center, or on-prem, or in other environments, in a hybrid environment, or multi-cloud environment, and, and still be very optimized from a cost spend standpoint and also put yourself in position for modernization and for be able to do the, bring the things to the business that the clients are, you know, that their clients are looking for, like the CMO and the CFO, et cetera. Trying to use IT as a lever to drive business and to drive, you know, business acceleration and drive profitability, frankly. So there's a lot of dependency on infrastructure, but there's a lot of elements to it. And, and we advocate for, you know, there's not a single answer to that. We like to evaluate clients' environments and work with them to get them to an optimal target operating model, you know, so that they can really deliver on what the promises are for their departments. >> So if, let's talk about some of the, the barriers to realizing value in, in a context of modernization. We talked about cost optimization, agility, and, and, and resilience. But there's a business angle, and there's a technical angle here. 'Cause we always talk about people, process, and technology. Technology, oftentimes, CIOs will tell us, "Well, that's the easy part. We'll figured that out," whether it's true or not. But I agree, people and process is sometimes the tough one. So Jay, why don't you start. What do you see as the barriers, particularly from a business standpoint? >> I think people need to let their guard down and be open to the ideas that are, that are out there in the market from, you know, the, the standards that are being built by, you know, best in class models. And, and there's many people that have gone on, you know, cloud journeys and been very successful with it. There's others that have set high expectations with their business leaders that haven't necessarily met the goals that they need to meet or maybe haven't met them as quickly as they promised. So there's a, you know, there's a change management aspect that you'd need to look at with the, you know, with the environments. There's a, you know, there's a skillset set environment that they need to be prepared for. Do they have the people, you know, to deliver with the, you know, with the tools and the skills and the, and the models that that they're putting themselves in place for in the future versus where they are now? There's just a lot of, you know, there's a lot of different elements. It's not just a, "This price is better," or, "This can operate better than one environment over the other." I think we like to try to look at things holistically and make sure that, you know, we're being, you know, as much of a consultative advocate for the client, for where they want to go, what their destiny is, and based on what we've learned with other clients. You know, and we can bring those best practices forward because we've worked, you know, across such a broad spectra of clients versus them being somewhat contained and sometimes can't see outside of their own, you know, their own challenges, if you would. So they need, they need advocacy to help, you know, bring them to the next level. And we like to translate that through, you know, technology advances, which, you know, Jim's really good at doing for us. >> Yeah, Jim, is, is it, is it a, is the big barrier a skills issue, you know, bench strength? Are there other considerations from your perspective? >> Well, we, we've identified a number of factors that inhibit success of, of customers. One is thinking it's only a technology change in moving to cloud when it's much broader than that. There are changes in governance, changes in process that need to take place. The other is evaluating the cloud providers on their current pricing structure and performance. And, and we see pricing and structure changing dramatically every few months between the various cloud providers. And you have to be flexible enough to, to determine which providers you want. And it may not be feasible to just have a single cloud provider in this world. The other thing is a big bang approach to transformation, "I want to move everything, and I want to move it all at once." That's not necessarily the best approach. A well thought out cloud journey and strategy and timing your investments are really important to get at maximizing your business return on the journey to the cloud. And finally, not engaging stakeholders early and continuously. You have to manage expectations in moving to cloud on what business factors will get affected, how you will achieve your cost savings, and, and how you will achieve the business impact over the journey and reporting out on that with very strict metrics to all of the stakeholders. >> You know, mentioned multi-cloud just then. We had, in January 17th, we had our Supercloud 2 event. And Supercloud is basically, it's really multi, what multi-cloud should have been, I, I like to say. So it's this creating a common experience across clouds. And you guys were talking about, you know, there's different governance, there's different security, there's different pricing. So, and, and one of the takeaways from this event in talking to customers and practitioners and technologists is, you can't go it alone. So I wonder if you could talk about your partnership strategy, what do partners bring to the table, and what is, what is DXC's, you know, unique value? >> I'd be happy to lead with that if you'd like. >> Great. >> I, you know, we've got a vast partner ecosystem at DXC, given the size and, and the history of the company. I could use several examples. One of the larger partners in my particular space is Dell Technology, right? They're a great, you know, partner for us across many different areas of the business. It's not just a storage and compute play anymore. They're, they're on the edge. They're, you know, they're, they've got intelligence in their networking devices now. And they've really brought, you know, a lot of value to us as a partner. And, you know, there, there's somebody, you could look at Dell technology as somebody that might, you know, have a victim, you know, effect because of all the hyperscale activity and all the cloud activity. But they've really taken an outstanding attitude with this and say, "Listen, not all things are destined for cloud, or not all things would operate better in a cloud environment." And they like to be part of those discussions to see how they can, you know, how we can bring a multi-cloud environment, you know, both private and public, you know, to clients. And let's look at the applications and the infrastructure and, and what's, you know, what's the best optimal running environment, you know, for us to be able to bring, you know, the greatest value to the business with speed, with security, with, you know. And, you know, the things that they want to keep closest to the business are often things that you want to kind of, you know, keep on your premise or keep in your own data center. So they're, they're an ideal model of somebody that's resourced us well, partners with us well in the market. And, and we continue to grow that relationship day in and day out with those guys. And we really appreciate, you know, their support of our strategy, and, and we like to also compliment their strategy and work, you know, work together hand in hand in front of our clients. >> Yeah, you know, Jim, Matt Baker, who's the head of strategic planning at Dell talks about, "It's not a zero sum game." And I think, you know, you're right, Jay. I think initially people felt like, "Oh wow, it's, it is a zero sum game." But it's clearly not, and this idea of of, whether you call it supercloud or ubercloud or multicloud, clearly Dell is headed in in that direction. And I, you know, look at some of their future projects. There's their narrative. I'm curious from a technology standpoint, Jim, what your role is. Is it to make it all work? Is it to, you know, end to end? I wonder if you could help, you know, us understand that. >> Help us figure this out, Jim, here. (group laughing) >> Glad to expand on that. One of my key roles is developing our product roadmap for DXC offerings. And we do that roadmap in conjunction with our partners where we can leverage the innovation that our partners bring to the table. And we often utilize engineering resources from our partners to help us jointly build those offerings that adapt to changes in the market and also adapt to many of our customers changing needs over time. So my primary role is to look at the market, talk to our customers, and work with our partners to develop a product roadmap for delivering DXC products and services to our clients so that they can get the return on investment on their technology journeys. >> You know, we've been working with these two firms for a while now. Even predates, you know, the, the name DXC and that, that transformation. I'm curious as to what's, how you would respond to, "What's unique?" You know, you hear a lot about partnerships. You guys got a lot of competition. Dell has a lot of competition. What's specifically unique about this combination? >> I think, go ahead, Jim. >> I would say our unique approach, we call it cloud right. And that, that approach is making the right investments, at the right time, and on the right platforms. And our partners play a, play a key role in that. So we, we encourage our customers to not necessarily have a cloud first approach, but a cloud right approach where they place the workloads in the environment that is best suited from a technology perspective, a business perspective, and even a security and governance perspective. And, and the right approach might include mainframe. It might include an on-premises infrastructure. It could include private cloud, public cloud, and SaaS components all integrated together to deliver that value. >> Yeah, Jay, please. >> If you were... >> That is a complicated situation for a lot of customers. Chime in here. (Jay chuckles) >> And now, if you were speaking specifically to Dell here, like they, they also walk the talk, right? They invest in DXC as a partnership. They put people on the ground that their only purpose in life is to help DXC succeed with Dell in, you know, arm in arm in front of clients. And it's not, you know, it's not a winner take all thing at all. It's really a true partnership. They, they, they've brought solution resources. We have an account CTO. We've got executive sponsorship. We do regular QBR meetings. We have regular executive touchpoint meetings. It's really important that you keep a high level of intimacy with the client, with the partners, you know, and, and the, and the GSI community. And I, I've been with several GSIs, and, and this is an exceptional example of true partnership and commitment to success with Dell technology. I'm really extremely impressed on, on the engagement level that we've had there and, you know, continue to show a lot of support, you know, both for them. You know, there's other OEM partners, of course, in the market. There's always going to be other technology solutions for certain clients, but this has been a particularly strong element for us in our partnership and in our go-to-market strategy. >> Well, I think too, just my observation, is a lot of it's about trust. You guys have both earned the trust, the kind of, over the, over the years taking your arrows, you know, of over decades. And, and you know, that just doesn't happen overnight. So guys, I appreciate it. Thanks for your time. It's all about getting cloud right, isn't it? >> That's right. (chuckles) (Dave chuckles) >> Thank you Dave. Appreciate it very much. >> Dave, thank you. >> Jay, Jim, great to have you on. Keep it right there for more action on theCube. Be right back. (upbeat guitar music) (keyboard clicks) Welcome back to the program. My name is Dave Vellante, and in this session we're going to explore one of the more interesting topics of the day. IoT for smart factories and with me are Todd Edmunds, the Global CTO of Smart Manufacturing Edge and Digital Twins at Dell Technologies. That is such a cool title. (Todd chuckles) I want to be you. And Dr. Aditi Banerjee who's the Vice President, General Manager for Aerospace Defense and Manufacturing at DXC Technology. Another really cool title. Folks, welcome to the program. Thanks for coming on. >> Thank you. >> Thanks, Dave. Great to be here. >> Nice to be here. So, Todd, let's start with you. We hear a lot about Industry 4.0, smart factories, IIoT. Can you briefly explain like what is Industry 4.0 all about, and why is it important for the manufacturing industry? >> Yeah, sure, Dave. You know, it's been around for quite a while. And it's got, it's gone by multiple different names, as you said, Industry 4.0, smart manufacturing, industrial IoT, smart factory, but it all really means the same thing. Its really applying technology to get more out of the factories and the facilities that you have to do your manufacturing. So being much more efficient, implementing really good sustainability initiatives. And so we really look at that by saying, "Okay, what are we going to do with technology to really accelerate what we've been doing for a long, long time?" So it's really not, it's not new. It's been around for a long time. What's new is that manufacturers are looking at this not as a one-off, two-off, individual use case point of view. But instead they're saying, "We really need to look at this holistically, thinking about a strategic investment in how we do this, not to just enable one or two use cases, but enable many, many use cases across the spectrum." I mean, there's tons of them out there. There's predictive maintenance, and there's OEE, overall equipment effectiveness, and there's computer vision. And all of these things are starting to percolate down to the factory floor. But it needs to be done in a little bit different way. And, and, and really, to really get those outcomes that they're looking for in smart factory, or Industry 4.0, or however you want to call it, and truly transform. Not just throw an Industry 4.0 use case out there, but to do the digital transformation that's really necessary and to be able to stay relevant for the future. You know, I heard it once said that you have three options. Either you digitally transform and stay relevant for the future, or you don't and fade into history like 52% of the companies that used to be on the Fortune 500 since 2000, right? And so really that's a key thing, and we're seeing that really, really being adopted by manufacturers all across the globe. >> Yeah so, Aditi, that's like digital transformation is almost synonymous with business transformation. So is there anything you'd add to what Todd just said? >> Absolutely. Though, I would really add that what really drives Industry 4.0 is the business transformation, what we are able to deliver in terms of improving the manufacturing KPIs and the KPIs for customer satisfaction, right? For example, improving the downtime, you know, or decreasing the maintenance cycle of the equipments, or improving the quality of products, right? So I think these are a lot of business outcomes that our customers are looking at while using Industry 4.0 and the technologies of Industry 4.0 to deliver these outcomes. >> So Aditi, I wonder if I could stay with you. And maybe this is a bit esoteric. But when I first started researching IoT and, and, and Industrial IoT 4.0, et cetera, I felt, you know, while there could be some disruptions in the ecosystem, I kind of came to the conclusion that large manufacturing firms, aerospace defense companies, the firms building out critical infrastructure, actually had kind of an incumbent advantage in a great opportunity. Of course, then I saw on TV, somebody now they're building homes with 3D printers. Its like, blows your mind. So that's pretty disruptive, but, so, but they got to continue. The incumbents have to continue to invest in the future. They're well capitalized. They're pretty good businesses, very good businesses. But there's a lot of complexities involved in kind of connecting the old house to the new addition that's being built, if you will, or this transformation that we're talking about. So my question is, How are your customers preparing for this new era? What are the key challenges that they're facing and the, the blockers, if you will? >> Yeah, I mean the customers are looking at Industry 4.0 for greenfield factories, right? That is where the investments are going directly into building the factories with the new technologies, with the new connectivities, right, for the machines. For example, industrial IoT, having the right type of data platforms to drive computational analytics and outcomes, as well as looking at edge versus cloud type of technologies, right? Those are all getting built in the greenfield factories. However, for the install-based factories, right, that is where our customers are looking at, "How do I modernize these factories? How do I connect the existing machine?" And that is where some of the challenges come in on, you know, the legacy system connectivity that they need to think about. Also, they need to start thinking about cybersecurity and operation technology security, right, because now you are connecting the factories to each other, right? So cybersecurity becomes top of mind, right? So there is definitely investment that is involved. Clients are creating roadmaps for digitizing and modernizing these factories and investments in a very strategic way, right? So perhaps they start with the innovation program, and then they look at the business case, and they scale it up, right? >> Todd, I'm glad Aditi brought up security. Because if you think about the operations technology, you know, folks, historically, they air gapped, you know, the systems. That's how they created security. That's changed. The business came in and said, "Hey, we got to, we got to connect. We got to make it intelligent." So that's, that's got to be a big challenge as well. >> It, it, it absolutely is Dave. And, and you know, you can no longer just segment that because really, to get all of those efficiencies that we talk about, that IoT and Industrial IoT and Industry 4.0 promise, you have to get data out of the factory. But then you got to put data back in the factory. So no longer is it just firewalling everything is really the answer. So you really have to have a comprehensive approach to security, but you also have to have a comprehensive approach to the cloud and what that means. And does it mean a continuum of cloud all the way down to the edge, right down to the factory? It absolutely does because no one approach has the answer to everything. The more you go to the cloud, the broader the attack surface is. So what we're seeing is a lot of our customers approaching this from a, kind of that, that hybrid, you know, "write once, run anywhere" on the factory floor down to the edge. And one of the things we're seeing, too, is to help distinguish between what is the edge, and that, and, and bridge that gap between, like Dave, you talked about IT and OT. And also help that, what Aditi talked about, is the greenfield plants versus the brownfield plants that they call it, that are the legacy ones and modernizing those. Is, it's great to kind of start to delineate. What does that mean? Where's the edge? Where's the IT and the OT? We see that from a couple of different ways. We start to think about really two edges in a manufacturing floor. We talk about an industrial edge that sits, or some people call it a far edge or a thin edge, sits way down on that plan. It consists of industrial hardened devices that do that connectivity. The hard stuff about, "How do I connect to this obsolete legacy protocol and what do I do with it?" And create that next generation of data that has context. And then we see another edge evolving above that, which is much more of a data and analytics and enterprise grade application layer that sits down in the factory itself that helps figure out where we're going to run this. Does it connect to the cloud? Do we run applications on-prem? Because a lot of times that on-prem application is, is, needs to be done because that's the only way that its going to, it's going to work because of security requirements, because of latency requirements, performance, and a lot of times cost. It's really helpful to build that multiple edge strategy because then you kind of, you consolidate all of those resources, applications, infrastructure, hardware, into a centralized location. Makes it much, much easier to really deploy and manage that security. But it also makes it easier to deploy new applications, new use cases, and become the foundation for DXC's expertise and applications that they deliver to our customers as well. >> Todd, how complex are these projects? I mean, I feel like it's kind of the, the digital equivalent of building the Hoover Dam. I mean, it, it, it's, (chuckles) it, it, so. Yeah, how long does a typical project take? I know it varies, but what, you know, what are the critical success factors in terms of delivering business value quickly? >> Yeah, that's a great question in that, in that we're, you know, like I said at the beginning, we, this is not new. Smart factory and Industry 4.0 is not new. It's been, it's, people have been trying to implement the holy grail of smart factory for a long time. And what we're seeing is a switch, a little bit of a switch, or quite a bit of a switch, to where the enterprise and the IT folks are having a much bigger say and have a lot to offer to be able to help that complexity. So instead of deploying a computer here, and a gateway there, and a server there, I mean, you go walk into any manufacturing plant and you can see servers sitting underneath someone's desk or a, or a PC in a closet somewhere running a critical production application. So we're seeing the enterprise have a much bigger say at the table, much louder voice at the table to say, "We've been doing this at enterprise all the time. We, we know how to really consolidate, bring hyper-converged applications, hyper-converged infrastructure, to really accelerate these kind of applications, really accelerate the outcomes that are needed to really drive that smart factory, and start to bring that same capabilities down into the, on the factory floor." That way, if you do it once to make it easier to implement, you can repeat that. You can scale that. You can manage it much easily. And you can then bring that all together because you have the security in one centralized location. So we're seeing manufacturers, yeah, that first use case may be fairly difficult to implement and we got to go down in and see exactly what their problems are. But when the infrastructure is done the correct way, when that, think about how you're going to run that and how are you going to optimize the engineering. Well, let's take that, what you've done in that one factory, and then set. Let's that, make that across all the factories, including the factory that we're in, but across the globe. That makes it much, much easier. You really do the hard work once and then repeat, almost like a cookie cutter. >> Got it. Thank you. Aditi, what about the skillsets available to apply these, to these projects? You got to have knowledge of digital, AI, data, integration. Is there a talent shortage to get all this stuff done? >> Yeah, I mean definitely, a lot. Different types of skillsets are needed from a traditional manufacturing skillset, right? Of course, the basic knowledge of manufacturing is, is important. But the, the digital skillset sets like, you know, IoT, having a skillset in different protocols for connecting the machines, right, that experience that comes with it, data and analytics, security, augmented virtual reality programming. You know, again, looking at robotics and the digital twin. So you know, it's a lot more connectivity software, data driven skillsets that are needed to smart factory to life at scale. And, you know, lots of firms are, you know, recruiting these types of skill, resources with these skillsets to, you know, accelerate their smart factory implementation, as well as consulting firms like DXC Technology and others. We, we, we recruit. We, we train our talent to, to provide these services. >> Got it. Aditi, I wonder if we could stay on you. Let's talk about the partnership between DXC and Dell. What are you doing specifically to simplify the move to Industry 4.0 for customers? What solutions are you offering? How are you working together, Dell and DXC, to, to bring these to market? >> Yeah, Dell and DXC have a very strong partnership. You know, and we work very closely together to, to create solutions, to create strategies, and how we, we are going to jointly help our clients, right? So areas that we have worked closely together is edge compute, right, how that impacts the smart factory. So we have worked pretty closely in that area. We're also looked at vision technologies, you know. How do we use that at the edge to improve the quality of products, right? So we have several areas that we collaborate in. And our approach is that we, we want to bring solutions to our client, and as well as help them scale those solutions with the right infrastructure, the right talent, and the right level of security. So we bring a comprehensive solution to our clients. >> So, Todd, last question, kind of similar but different. You know, why Dell DXC? Pitch me. What's different about this partnership? You know, where do you, are you confident that, you know, you're going to be, deliver the best value to, to customers? >> Absolutely. Great question. You know, there's no shortage of bespoke solutions that are out there. There's hundreds of people that can come in and do individual use cases and do these things. And just, and, and, and that's, that's where it ends. What Dell and DXC Technology together bring to the table is, we do the optimization, the optimization of the engineering of those previously bespoke solutions upfront, together, right? The power of our scalables, enterprise-grade, structured, you know, industry standard infrastructure, as well as our expertise in delivering package solutions that really accelerate with DXC's expertise and reputation as a global, trusted, trusted advisor. Be able to really scale and repeat those solutions that DXC is so really, really good at. And, and Dell's infrastructure, and our, what, 30,000 people across the globe that are really, really good at that, at that scalable infrastructure, to be able to repeat. And then it really lessens the risk that our customers have and really accelerates those solutions. So it's again, not just one individual solutions, it's all of the solutions that not just drive use cases, but drive outcomes with those solutions. >> Yeah, the, you're right, the partnership has gone, I mean, I first encountered it back in, I think it was 2010, May of 2010, we had you, you guys both on theCube. I think you were talking about converged infrastructure. And I had a customer on, and it was, actually a manufacturing customer, was quite interesting. And back then it was, "How do we kind of replicate what's coming in the cloud?" And, and you guys have obviously taken it into the digital world. Really want to thank you for your time today. Great conversation, and love to have you back. >> Thank you so much. >> Absolutely. >> It was a pleasure speaking with you. >> I agree. >> All right, keep it right there for more discussions that educate and inspire on theCube. (bright music) Welcome back to the program and we're going to dig into the number one topic on the minds of every technology organization. That's cybersecurity. You know, survey data from ETR, our data partner, shows that among CIOs and IT decision makers, cybersecurity continues to rank as the number one technology priority to be addressed in the coming year. That's ahead of even cloud migration and analytics. And with me to discuss this critical topic area are Jim Shook, who's the Global Director of Cybersecurity and Compliance Practice at Dell Technologies, and he's joined by Andrew Gonzalez, who focuses on Cloud and Infrastructure consulting at DXC Technology. Gents, welcome. Good to have you. >> Thanks Dave. Great to be here. >> Thank you. >> Jim, let's start with you. What are you seeing from the front lines in terms of the attack surface, and, and how are customers responding these days? >> It's always up and down and back and forth. The bad actors are smart. They adapt to everything that we do. So we're seeing more and more kind of living off the land. They're not necessarily deploying malware. Makes it harder to find what they're doing. And I think though, Dave, we've, we've adapted, and this whole notion of cyber resilience really helps our customers figure this out. And the idea there goes beyond cybersecurity, it's, "Let's protect as much as possible, so we keep the bad actors out as much as we can. But then, let's have the ability to adapt to and recover to the extent that the bad actors are successful." So we're recognizing that we can't be perfect a hundred percent of the time against a hundred percent of the bad actors. Let's keep out what we can, but then recognize and have that ability to recover when necessary. >> Yeah, thank you. So Andrew, you know, I like what Jim was saying about living off the land, of course, meaning using your own tooling against you, kind of hiding in plain sight, if you will. But, and, and as Jim is saying, you, you can't be perfect. But, so given that, what's your perspective on what good cybersecurity hygiene looks like? >> Yeah, so you have to understand what your crown jewel data looks like, what a good copy of a recoverable asset looks like. When you look at an attack, if it were to occur, right, how you get that copy of data back into production. And not only that, but what that golden image actually entails. So, whether it's networking, storage, some copy of a source code, intellectual property, maybe CMBD data, or an active directory, or DNS dump, right? Understanding what your data actually entails so that you can protect it and that you can build out your recovery plan for it. >> So, and where's that live? Where's that gold copy? You put on a yellow sticky? No, it's got to be, (chuckles) you got to be somewhere safe, right? So you have to think about that chain as well, right? >> Absolutely. Yeah. You, so, a lot of folks have not gone through the exercise of identifying what that golden copy looks like. Everyone has a DR scenario, everyone has a DR strategy, but actually identifying what that golden crown jewel data, let's call it, actually entails is one aspect of it. And then where to put it, how to protect it, how to make it immutable and isolated, that's the other portion of it. >> You know, if I go back to sort of earlier part of last decade, you know, cybersecurity was kind of a checkoff item. And as you got toward the middle part of the decade, and I'd say clearly by 2016, it, security became a boardroom issue. It was on the agenda, you know, every quarter at the board meetings. So compliance is no longer the driver, is, is my point. The driver is business risk, real loss of reputation or data, you know, it's, or money, et cetera. What are the business implications of not having your cyber house in order today? >> They're extreme, Dave. I mean the, you know, the bad actors are good at what they do. These losses by organizations, tens, hundreds of millions into the billions sometimes, plus the reputational damage that's difficult to, to really measure. There haven't been a lot of organizations that have actually been put out of business by an attack, at least not directly on, if they're larger organizations. But that's also on the table, too. So you can't just rely on, "Oh we need to do, you know, A, B and C because our regulators require it." You need to look at what the actual risk is to the business, and then come up with a strategy from there. >> You know, Jim, staying with you, one of the most common targets we hear of attackers is to go after the backup corpus. So how should customers think about protecting themselves from that tactic? >> Well, Dave, you hit on it before, right? Everybody's had the backup and DR strategies for a long time going back to requirements that we had in place for physical disaster or human error. And that's a great starting point for resilience capability. But that's all it is, is a starting point. Because the bad actors will, they also understand that you have those capabilities, and, and they've adapted to that. In every sophisticated attack that we see, the backup is a target. The bad actors want to take it out, or corrupt it, or do something else to that backup so that it's not available to you. That's not to say they're always successful, and it's still a good control to have in place because maybe it will survive. But you have to plan beyond that. So the capabilities that we talk about with resilience, let's harden that backup infrastructure. You've already got it in place. Let's use the capabilities that are there like immutability and other controls to make it more difficult for the bad actors to get to. But then as Andrew said, that gold copy, that critical systems, you need to protect that in something that's more secure, which commonly we, we might say a cyber vault. Although, there's a lot of different capabilities for cyber vaulting, some far better than others, and that's some of the things that we focus on. >> You know, it's interesting, but I've talked to a lot of CIOs about this, is prior to the pandemic, they, you know, had their, as you're pointing out, Jim, they had their DR strategy in place, but they felt like they weren't business resilient. And they realized that when we had the forced march to digital. So Andrew, are there solutions out there to help with this problem? Do you guys have an answer to this? >> Yeah, absolutely. So I'm glad you brought up resiliency. We, we take a position that to be cyber resilient, it includes operational resiliency. It includes understanding at the C level what the implication of an attack means, as we stated, and then, how to recover back into production. When you look at protecting that data, not only do you want to put it into what we call a vault, which is a Dell technology that is an offline immutable copy of your crown jewel data, but also how to recover it in real time. So DXC offers a, I don't want to call it a turnkey solution since we architect these specific to each client needs, right, when we look at what client data entails, their recovery point, objectives, recovery time objectives, what we call quality of the restoration. But when we architect these out, we look at not only how to protect the data, but how to alert and monitor for attacks in real time, how to understand what we should do when a breach is in progress, putting together with our security operations centers, a forensic and recovery plan and a runbook for the client, and then being able to cleanse and remediate so that we can get that data back into production. These are all services that DXC offers in conjunction with the Dell solution to protect, and recover, and keep bad actors out. And if we can't keep them out to ensure that we are back into production in short order. >> You know, this, this discussion we've been having about DR kind of versus resilience, and, and you were just talking about RPO and RTO. I mean, it used to be that a lot of firms wouldn't even test their recovery 'cause it was too risky. Or, you know, maybe they tested it on, you know, July 4th or something like that. But, but it, I'm inferring that's changed. I wonder if we could, you know, double click on recovery? How hard is it to, to, to test that recovery, and, and how quickly are you seeing organizations recover from attacks? >> So it depends, right, on the industry vertical, what kind of data. Again, a financial services client compared to a manufacturing client are going to be two separate conversations. We've seen it as quickly as being able to recover in six hours, in 12 hours. In some instances we have the grace period of a day to a couple of days. We do offer the ability to run scenarios once a quarter where we can stand up in our systems the production data that we are protecting to ensure that we have a good recoverable copy. But it depends on the client. >> I really like the emphasis here, Dave, that you're raising and that Andrew's talking about. It's not on the technology of how the data gets protected. It's focused on the recovery. That's all that we want to do. And so the solution with DXC really focuses on generating that recovery for customers. I think where people get a little bit twisted up on their testing capability is, you have to think about different scenarios. So there are scenarios where the attack might be small. It might be limited to a database or an application. It might be really broadly based like the NotPetya attacks from a few years ago. The regulatory environment, we call those attacks severe but plausible. So you can't necessarily test everything with the infrastructure, but you can test some things with the infrastructure. Others, you might sit around on a tabletop exercise or walk through what that looks like to really get that, that recovery kind of muscle, muscle memory so that people know what to do when those things occur. But the key to it, as Andrew said before, have to focus down, "What are those critical applications? What do we need, what's most important? What has to come back first?" And that really will go a long way towards having the right recovery points and recovery times from a cyber disaster. >> Yeah, makes sense. Understanding the value of that data is going to inform you how to, how to respond and how to prioritize. Andrew, one of the things that we hear a lot on theCube, especially lately, is around, you know, IOT, IIOT, Industry 4.0, the whole OT security piece of it. And the problem being that, you know, traditionally, operations technologies have been air gapped, often by design. But as businesses, increasingly they're driving initiatives like Industry 4.0, and they're connecting these OT systems to IT systems. They're, you know, driving efficiency, preventative maintenance, et cetera. So a lot of data flowing through the pipes, if you will. What are you seeing in terms of the threats to critical infrastructure and how should customers think about addressing these issues? >> Yeah, so bad actors, you know, can come in many forms. We've seen instances of social engineering. We've seen, you know, a USB stick dropped in a warehouse. That data that is flowing through the IoT device is as sensitive now as your core mainframe infrastructure data. So when you look at it from a protection standpoint, conceptually, it's not dissimilar from what we've been been talking about where you want to understand, again, what the most critical data is. Looking at IoT data and applications is no different than your core systems now, right? Depending on what your, your business is, right? So when, when we're looking at protecting these, yes, we want firewalls, yes, we want air gap solutions, yes, we want front end protection, but we're looking at it from a resiliency perspective. Putting that data, understanding what what data entails to put in the vault from an IoT perspective is just as critical as as it is for your core systems. >> Jim, anything you can add to this topic? >> Yeah, I think you hit on the, the key points there. Everything is interconnected. So even in the days where maybe people thought the OT systems weren't online, oftentimes the IT systems are talking to them, or controlling them, SCADA systems, or perhaps supporting them. Think back to the pipeline attack of last year. All the public testimony was that the OT systems didn't get attacked directly. But there was uncertainty around that, and the IT systems hadn't been secured. So that caused the OT systems to have to shut down. It certainly is a different recovery when you're shutting them down on your own versus being attacked, but the outcome was the same that the business couldn't operate. So you really have to take all of those into account. And I think that does go back to exactly what Andrew's saying, understanding your critical business services, and then the applications and data and other components that support those and drive those, and making sure those are protected. You understand them, you have the ability to recover them if necessary. >> So guys, I mean, you made the point. I mean, you're right. The adversary is highly capable. They're motivated 'cause the ROI is so, it's so lucrative. It's like this never ending battle that cybersecurity pros, you know, go through. It really is kind of frontline sort of technical heroes, if you will. And so, but sometimes it just feels daunting. Why are you optimistic about the future of, of cyber from the good guy's perspective? >> I think we're coming at the problem the right way, Dave. So that, that focus, I'm so pleased with the idea that we are planning that the systems aren't going to be hundred percent capable every single time, and let's figure that out, right? That's, that's real world stuff. So just as the bad actors continue to adapt and expand, so do we. And I think the differences there, the common criminals, it's getting harder and harder for them. The more sophisticated ones, they're tough to beat all the time. And of course, you've raised the question of some nation states and other activities. But there's a lot more information sharing. There's a lot more focus from the business side of the house and not just the IT side of the house that we need to figure these things out. >> Yeah, to, to add to that, I think furthering education for the client base is important. You, you brought up a point earlier. It used to be a boardroom conversation due to compliance reasons. Now, as we have been in the market for a while, we continue to mature the offerings. It's further education for not only the business itself, but for the IT systems and how they interconnect, and working together so that these systems can be protected and continue to be evolved and continue to be protected through multiple frameworks as opposed to seeing it as another check the box item that the board has to adhere to. >> All right, guys, we got to go. Thank you so much. Great conversation on a, on a really important topic. Keep up the good work. Appreciate it. >> Thanks Dan. >> Thank you. >> All right, and thank you for watching. Stay tuned for more excellent discussions around the partnership between Dell Technologies and DXC Technology. We're talking about solving real world problems, how this partnership has evolved over time, really meeting the changing enterprise landscape challenges. Keep it right there. (bright music) Okay, we hope you enjoyed the program and learned some things about cloud transformation and modernizing your business that will inspire you to action. Now if you want to learn more, go to the Dell DXC partner page shown here, or click on the URL in the description. Thanks for watching everybody and on behalf of our supporters, Dell and DXC, good luck. And as always, get in touch if we can be of any assistance. (bright music)
SUMMARY :
and help you achieve business outcomes. Thanks for having us. You really got to think about modernizing, in releasing of new things to the field. So Jay, my question to you is, and to drive, you know, the barriers to realizing value to deliver with the, you know, on the journey to the cloud. you know, unique value? I'd be happy to lead to kind of, you know, keep on your premise And I think, you know, you're right, Jay. Help us figure this out, Jim, here. that our partners bring to the table. Even predates, you know, the, the name DXC And, and the right approach Chime in here. the partners, you know, And, and you know, that just That's right. Thank you Dave. Jay, Jim, great to have you on. Great to be here. Nice to be here. that you have to do your manufacturing. add to what Todd just said? the downtime, you know, and the, the blockers, if you will? that they need to think about. they air gapped, you know, the systems. on the factory floor down to the edge. I know it varies, but what, you know, in that we're, you know, You got to have knowledge of So you know, it's a lot to simplify the move and the right level of security. that, you know, you're going to be, it's all of the solutions love to have you back. to be addressed in the coming year. What are you seeing from the front lines and have that ability to So Andrew, you know, I and that you can build out how to make it immutable and isolated, of last decade, you know, "Oh we need to do, you know, A, B and C to go after the backup corpus. for the bad actors to get to. they, you know, had their, and then being able to on, you know, July 4th We do offer the ability to But the key to it, as Andrew said before, to inform you how to, how to We've seen, you know, a USB So that caused the OT you know, go through. and not just the IT side of the house that the board has to adhere to. Thank you so much. that will inspire you to action.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Jim | PERSON | 0.99+ |
Andrew Gonzalez | PERSON | 0.99+ |
Andrew | PERSON | 0.99+ |
Dave | PERSON | 0.99+ |
Dave Vellante | PERSON | 0.99+ |
Jim Shook | PERSON | 0.99+ |
James Miller | PERSON | 0.99+ |
Jay Dowling | PERSON | 0.99+ |
Todd Edmunds | PERSON | 0.99+ |
Jay | PERSON | 0.99+ |
Matt Baker | PERSON | 0.99+ |
2010 | DATE | 0.99+ |
Aditi Banerjee | PERSON | 0.99+ |
Dell | ORGANIZATION | 0.99+ |
six hours | QUANTITY | 0.99+ |
one | QUANTITY | 0.99+ |
DXC | ORGANIZATION | 0.99+ |
Todd | PERSON | 0.99+ |
January 17th | DATE | 0.99+ |
first session | QUANTITY | 0.99+ |
July 4th | DATE | 0.99+ |
12 hours | QUANTITY | 0.99+ |
2016 | DATE | 0.99+ |
third session | QUANTITY | 0.99+ |
52% | QUANTITY | 0.99+ |
last year | DATE | 0.99+ |
six experts | QUANTITY | 0.99+ |
DXC Technology | ORGANIZATION | 0.99+ |
two | QUANTITY | 0.99+ |
tens | QUANTITY | 0.99+ |
ubercloud | ORGANIZATION | 0.99+ |
Aditi | PERSON | 0.99+ |
first question | QUANTITY | 0.99+ |
May of 2010 | DATE | 0.99+ |
The Future of Multicloud Data Protection is Here FULL EPISODE V1
>> Prior to the pandemic, organizations were largely optimized for efficiency as the best path to bottom line profits. Many CIOs tell theCUBE privately that they were caught off guard by the degree to which their businesses required greater resiliency beyond their somewhat cumbersome disaster recovery processes. And the lack of that business resilience has actually cost firms because they were unable to respond to changing market forces. And certainly, we've seen this dynamic with supply chain challenges. And there's a little doubt we're also seeing it in the area of cybersecurity generally, and data recovery specifically. Over the past 30 plus months, the rapid adoption of cloud to support remote workers and build in business resilience had the unintended consequences of expanding attack vectors, which brought an escalation of risk from cybercrime. While security in the public cloud is certainly world class, the result of multicloud has brought with it multiple shared responsibility models, multiple ways of implementing security policies across clouds and on-prem. And at the end of the day, more, not less, . But there's a positive side to this story. The good news is that public policy, industry collaboration and technology innovation is moving fast to accelerate data protection and cybersecurity strategies with a focus on modernizing infrastructure, securing the digital supply chain, and very importantly, simplifying the integration of data protection and cybersecurity. Today, there's heightened awareness that the world of data protection is not only an adjacency to, but is becoming a fundamental component of cybersecurity strategies. In particular, in order to build more resilience into a business, data protection people, technologies and processes must be more tightly coordinated with security operations. Hello, and welcome to "The Future of Multicloud Data Protection" made possible by Dell in collaboration with theCUBE. My name is Dave Vellante and I'll be your host today. In this segment, we welcome into theCUBE two senior executives from Dell who will share details on new technology announcements that directly address these challenges. Jeff Boudreau is the President and General Manager of Dell's Infrastructure Solutions Group, ISG, and he's going to share his perspectives on the market and the challenges he's hearing from customers. And we're going to ask Jeff to double click on the messages that Dell is putting into the marketplace and give us his detailed point of view on what it means for customers. Now, Jeff is going to be joined by Travis Vigil. Travis is the Senior Vice-President of Product Management for ISG at Dell Technologies, and he's going to give us details on the products that are being announced today and go into the hard news. Now, we're also going to challenge our guests to explain why Dell's approach is unique and different in the marketplace. Thanks for being with us. Let's get right into it. (upbeat music) We're here with Jeff Boudreau and Travis Vigil, and we're going to dig into the details about Dell's big data protection announcement. Guys, good to see you. Thanks for coming in. >> Good to see you. Thank you for having us. >> You're very welcome. Alright, let's start off Jeff, with the high level. You know, I'd like to talk about the customer, what challenges they're facing? You're talking to customers all the time. What are they telling you? >> Sure, as you know, we spend a lot of time with our customers, specifically listening, learning, understanding their use cases, their pain points within their specific environments. They tell us a lot. No surprise to any of us that data is a key theme that they talk about. It's one of their most important assets. They need to extract more value from that data to fuel their business models, their innovation engines, their competitive edge. So, they need to make sure that that data is accessible, it's secure and its recoverable, especially in today's world with the increased cyber attacks. >> Okay, so maybe we could get into some of those challenges. I mean, when you talk about things like data sprawl, what do you mean by that? What should people know? >> Sure, so for those big three themes, I'd say, you have data sprawl, which is the big one, which is all about the massive amounts of data. It's the growth of that data, which is growing at unprecedented rates. It's the gravity of that data and the reality of the multicloud sprawl. So stuff is just everywhere, right? Which increases that surface as attack space for cyber criminals. >> And by gravity, you mean the data's there and people don't want to move it. >> It's everywhere, right? And so when it lands someplace, think Edge, Core or Cloud, it's there. And it's something we have to help our customers with. >> Okay, so it's nuanced 'cause complexity has other layers. What are those layers? >> Sure. When we talk to our customers, they tell us complexity is one of their big themes. And specifically it's around data complexity. We talked about that growth and gravity of the data. We talk about multicloud complexity and we talk about multicloud sprawl. So multiple vendors, multiple contracts, multiple tool chains, and none of those work together in this multicloud world. Then that drives their security complexity. So, we talk about that increased attack surface. But this really drives a lot of operational complexity for their teams. Think about we're lacking consistency through everything. So people, process, tools, all that stuff, which is really wasting time and money for our customers. >> So, how does that affect the cyber strategies and the, I mean, I've often said the Cisco, now they have this shared responsibility model. They have to do that across multiple clouds. Every cloud has its own security policies and frameworks and syntax. So, maybe you could double click on your perspective on that. >> Sure. I'd say the big challenge customers have seen, it's really inadequate cyber resiliency and specifically, they're feeling very exposed. And today as the world with cyber attacks being more and more sophisticated, if something goes wrong, it is a real challenge for them to get back up and running quickly. And that's why this is such a big topic for CEOs and businesses around the world. You know, it's funny. I said this in my open. I think that prior to the pandemic businesses were optimized for efficiency, and now they're like, "Wow, we have to actually put some headroom into the system to be more resilient." You know, are you hearing that? >> Yeah, we absolutely are. I mean, the customers really, they're asking us for help, right? It's one of the big things we're learning and hearing from them. And it's really about three things. One's about simplifying IT. Two, it's really helping them to extract more value from their data. And then the third big piece is ensuring their data is protected and recoverable regardless of where it is going back to that data gravity and that very, you know, the multicloud world. Just recently, I don't know if you've seen it, but the Global Data Protected, excuse me, the Global Data Protection Index. >> GDPI. >> Yes. Jesus. >> Not to be confused with GDPR. >> Actually, that was released today and confirms everything we just talked about around customer challenges. But also it highlights at an importance of having a very cyber, a robust cyber resilient data protection strategy. >> Yeah, I haven't seen the latest, but I want to dig into it. I think this, I've done this many, many years in a row. I'd like to look at the time series and see how things have changed. All right. At a high level, Jeff, can you kind of address why Dell, from your point of view is best suited? >> Sure. So, we believe there's a better way or a better approach on how to handle this. We think Dell is uniquely positioned to help our customers as a one stop shop, if you will, for that cyber resilient multicloud data protection solution and needs. We take a modern, a simple and resilient approach. >> What does that mean? What do you mean by modern? >> Sure. So modern, we talk about our software defined architecture. Right? It's really designed to meet the needs not only of today, but really into the future. And we protect data across any cloud and any workload. So, we have a proven track record doing this today. We have more than 1,700 customers that trust us to protect more than 14 exabytes of their data in the cloud today. >> Okay, so you said modern, simple and resilient. What do you mean by simple? >> Sure. We want to provide simplicity everywhere, going back to helping with the complexity challenge. And that's from deployment to consumption, to management and support. So, our offers will deploy in minutes. They are easy to operate and use, and we support flexible consumption models for whatever the customer may desire. So, traditional subscription or as a service. >> And when you talk about resilient, I mean, I put forth that premise, but it's hard because people say, "Well, that's going to cost us more. Well, it may, but you're going to also reduce your risk." So, what's your point of view on resilience? >> Yeah, I think it's something all customers need. So, we're going to be providing a comprehensive and resilient portfolio of cyber solutions that are secure by design. And we have some unique capabilities and a combination of things like built in immutability, physical and logical isolation. We have intelligence built in with AI part recovery. And just one, I guess fun fact for everybody is we have, our cyber vault is the only solution in the industry that is endorsed by Sheltered Harbor that meets all the needs of the financial sector. >> So it's interesting when you think about the NIST framework for cybersecurity. It's all about about layers. You're sort of bringing that now to data protection. >> Jeff: Correct. Yeah. >> All right. In a minute, we're going to come back with Travis and dig into the news. We're going to take a short break. Keep it right there. (upbeat music) (upbeat adventurous music) Okay, we're back with Jeff and Travis Vigil to dig deeper into the news. Guys, again, good to see you. Travis, if you could, maybe you, before we get into the news, can you set the business context for us? What's going on out there? >> Yeah. Thanks for that question, Dave. To set a little bit of the context, when you look at the data protection market, Dell has been a leader in providing solutions to customers for going on nearly two decades now. We have tens of thousands of people using our appliances. We have multiple thousands of people using our latest modern, simple PowerProtect Data Manager Software. And as Jeff mentioned, we have, 1,700 customers protecting 14 exabytes of data in the public clouds today. And that foundation gives us a unique vantage point. We talked to a lot of customers and they're really telling us three things. They want simple solutions. They want us to help them modernize. And they want us to add as the highest priority, maintain that high degree of resiliency that they expect from our data protection solutions. So, that's the backdrop to the news today. And as we go through the news, I think you'll agree that each of these announcements deliver on those pillars. And in particular, today we're announcing the PowerProtect Data Manager Appliance. We are announcing PowerProtect Cyber Recovery Enhancements, and we are announcing enhancements to our APEX Data Storage Services. >> Okay, so three pieces. Let's dig to that. It's interesting, appliance, everybody wants software, but then you talk to customers and they're like, "Well, we actually want appliances because we just want to put it in and it works." >> Travis: (laughs) Right. >> It performs great. So, what do we need to know about the appliance? What's the news there? >> Well, you know, part of the reason I gave you some of those stats to begin with is that we have this strong foundation of experience, but also intellectual property components that we've taken that have been battle tested in the market. And we've put them together in a new simple, integrated appliance that really combines the best of the target appliance capabilities we have with that modern, simple software. And we've integrated it from the, you know, sort of taking all of those pieces, putting them together in a simple, easy to use and easy to scale interface for customers. >> So, the premise that I've been putting forth for months now, probably well over a year, is that data protection is becoming an extension of your cybersecurity strategies. So, I'm interested in your perspective on cyber recovery. Your specific news that you have there. >> Yeah, you know, we are in addition to simplifying things via the appliance, we are providing solutions for customers no matter where they're deploying. And cyber recovery, especially when it comes to cloud deployments, is an increasing area of interest and deployment that we see with our customers. So, what we're announcing today is that we're expanding our cyber recovery services to be available in Google Cloud. With this announcement, it means we're available in all three of the major clouds and it really provides customers the flexibility to secure their data no matter if they're running on-premises, in Acolo, at the Edge, in the public cloud. And the other nice thing about this announcement is that you have the ability to use Google Cloud as a cyber recovery vault that really allows customers to isolate critical data and they can recover that critical data from the vault back to on-premises or from that vault back to running their cyber protection or their data protection solutions in the public cloud. >> I always invoke my favorite Matt Baker here. "It's not a zero sum game", but this is a perfect example where there's opportunities for a company like Dell to partner with the public cloud provider. You've got capabilities that don't exist there. You've got the on-prem capabilities. We could talk about Edge all day, but that's a different topic. Okay, so my other question Travis, is how does this all fit into APEX? We hear a lot about APEX as a service. It's sort of the new hot thing. What's happening there? What's the news around APEX? >> Yeah, we've seen incredible momentum with our APEX solutions since we introduced data protection options into them earlier this year. And we're really building on that momentum with this announcement being providing solutions that allow customers to consume flexibly. And so, what we're announcing specifically is that we're expanding APEX Data Storage Services to include a data protection option. And it's like with all APEX offers, it's a pay-as-you-go solution. Really streamlines the process of customers purchasing, deploying, maintaining and managing their backup software. All a customer really needs to do is specify their base capacity. They specify their performance tier. They tell us do they want a one year term or a three year term and we take it from there. We get them up and running so they can start deploying and consuming flexibly. And as with many of our APEX solutions, it's a simple user experience all exposed through a unified APEX Console. >> Okay, so it's, you're keeping it simple, like I think large, medium, small. You know, we hear a lot about T-shirt sizes. I'm a big fan of that 'cause you guys should be smart enough to figure out, you know, based on my workload, what I need. How different is this? I wonder if you guys could address this. Jeff, maybe you can start. >> Sure, I'll start and then- >> Pitch me. >> You know, Travis, you jump in when I screw up here. >> Awesome. >> So, first I'd say we offer innovative multicloud data protection solutions. We provide that deliver performance, efficiency and scale that our customers demand and require. We support as Travis said, all the major public clouds. We have a broad ecosystem of workload support and I guess the great news is we're up to 80% more cost effective than any of the competition. >> Dave: 80%? >> 80% >> Hey, that's a big number. All right, Travis, what's your point of view on this? >> Yeah, I think number one, end-to-end data protection. We are that one stop shop that I talked about, whether it's a simplified appliance, whether it's deployed in the cloud, whether it's at the Edge, whether it's integrated appliances, target appliances, software. We have solutions that span the gamut as a service. I mentioned the APEX Solution as well. So really, we can provide solutions that help support customers and protect them, any workload, any cloud, anywhere that data lives. Edge, Core to Cloud. The other thing that we hear as a big differentiator for Dell, and Jeff touched on on this a little bit earlier, is our Intelligent Cyber Resiliency. We have a unique combination in the market where we can offer immutability or protection against deletion as sort of that first line of defense. But we can also offer a second level of defense, which is isolation, talking about data vaults or cyber vaults and cyber recovery. And more importantly, the intelligence that goes around that vault. It can look at detecting cyber attacks. It can help customers speed time to recovery. And really provides AI and ML to help early diagnosis of a cyber attack and fast recovery should a cyber attack occur. And if you look at customer adoption of that solution, specifically in the cloud, we have over 1300 customers utilizing PowerProtect Cyber Recovery. >> So, I think it's fair to say that your portfolio has obviously been a big differentiator. Whenever I talk to your finance team, Michael Dell, et cetera, that end-to-end capability, that your ability to manage throughout the supply chain. We actually just did an event recently with you guys where you went into what you're doing to make infrastructure trusted. And so my take on that is you, in a lot of respects, you're shifting the client's burden to your R&D. now they have a lot of work to do, so it's not like they can go home and just relax. But that's a key part of the partnership that I see. Jeff, I wonder if you could give us the final thoughts. >> Sure. Dell has a long history of being a trusted partner within IT, right? So, we have unmatched capabilities. Going back to your point, we have the broadest portfolio. We're a leader in every category that we participate in. We have a broad deep breadth of portfolio. We have scale. We have innovation that is just unmatched. Within data protection itself, we are the trusted market leader. No if, ands or buts. We're number one for both data protection software in appliances per IDC and we were just named for the 17th consecutive time the leader in the Gartner Magic Quadrant. So, bottom line is customers can count on Dell. >> Yeah, and I think again, we're seeing the evolution of data protection. It's not like the last 10 years. It's really becoming an adjacency and really, a key component of your cyber strategy. I think those two parts of the organization are coming together. So guys, really appreciate your time. Thanks for coming. >> Thank you, sir. >> Dave. >> Travis, good to see you. All right, in a moment I'm going to come right back and summarize what we learned today, what actions you can take for your business. You're watching "The Future of Multicloud Data Protection" made possible by Dell in collaboration with theCUBE, your leader in enterprise and emerging tech coverage. Right back. >> Advertiser: In our data-driven world, protecting data has never been more critical. To guard against everything from cyber incidents to unplanned outages, you need a cyber resilient multicloud data protection strategy. >> It's not a matter of if you're going to get hacked, it's a matter of when. And I want to know that I can recover and continue to recover each day. >> It is important to have a cyber security and a cyber resiliency plan in place because the threat of cyber attack are imminent. >> Advertiser: PowerProtect Data Manager from Dell Technologies helps deliver the data protection and security confidence you would expect from a trusted partner and market leader. >> We chose PowerProtect Data Manager because we've been a strategic partner with Dell Technologies for roughly 20 years now. Our partnership with Dell Technologies has provided us with the ability to scale and grow as we've transitioned from 10 billion in assets to 20 billion. >> Advertiser: With PowerProtect Data Manager, you can enjoy exceptional ease of use to increase your efficiency and reduce costs. >> I'd installed it by myself, learn it by myself. It was very intuitive. >> While restoring your machine with PowerProtect Data Manager is fast, we can fully manage PowerProtect through the center. We can recover a whole machine in seconds. >> Instructor: Data Manager offers innovation such as transparent snapshots to simplify virtual machine backups, and it goes beyond backup and restore to provide valuable insights into protected data, workloads and VMs. >> In our previous environment, it would take anywhere from three to six hours a night to do a single backup of each VM. Now, we're backing up hourly and it takes two to three seconds with the transparent snapshots. >> Advertiser: With PowerProtect's Data Manager, you get the peace of mind knowing that your data is safe and available whenever you need it. >> Data is extremely important. We can't afford to lose any data. We need things just to work. >> Advertiser: Start your journey to modern data protection with Dell PowerProtect's Data Manager. Visit dell.com/powerprotectdatamanager >> We put forth the premise in our introduction that the worlds of data protection in cybersecurity must be more integrated. We said that data recovery strategies have to be built into security practices and procedures and by default, this should include modern hardware and software. Now, in addition to reviewing some of the challenges that customers face, which have been pretty well documented, we heard about new products that Dell Technologies is bringing to the marketplace that specifically address these customer concerns. And there were three that we talked about today. First, the PowerProtect Data Manager Appliance, which is an integrated system taking advantage of Dell's history in data protection, but adding new capabilities. And I want to come back to that in a moment. Second is Dell's PowerProtect Cyber Recovery for Google Cloud platform. This rounds out the big three public cloud providers for Dell, which joins AWS and Azure support. Now finally, Dell has made its target backup appliances available in APEX. You might recall, earlier this year we saw the introduction from Dell of APEX Backup Services and then in May at Dell Technologies World, we heard about the introduction of APEX Cyber Recovery Services. And today, Dell is making its most popular backup appliances available in APEX. Now, I want to come back to the PowerProtect Data Manager Appliance because it's a new integrated appliance and I asked Dell off camera, "Really what is so special about these new systems and what's really different from the competition?" Because look, everyone offers some kind of integrated appliance. So, I heard a number of items. Dell talked about simplicity and efficiency and containers and Kubernetes. So, I kind of kept pushing and got to what I think is the heart of the matter in two really important areas. One is simplicity. Dell claims that customers can deploy the system in half the time relative to the competition. So, we're talking minutes to deploy, and of course that's going to lead to much simpler management. And the second real difference I heard was backup and restore performance for VMware workloads. In particular, Dell has developed transparent snapshot capabilities to fundamentally change the way VMs are protected, which leads to faster backup and restores with less impact on virtual infrastructure. Dell believes this new development is unique in the market and claims that in its benchmarks, the new appliance was able to back up 500 virtual machines in 47% less time compared to a leading competitor. Now, this is based on Dell benchmarks, so hopefully these are things that you can explore in more detail with Dell to see if and how they apply to your business. So if you want more information, go to the Data Protection Page at dell.com. You can find that at dell.com/dataprotection. And all the content here and other videos are available on demand at theCUBE.net. Check out our series on the blueprint for trusted infrastructure, it's related and has some additional information. And go to siliconangle.com for all the news and analysis related to these and other announcements. This is Dave Vellante. Thanks for watching "The Future of Multicloud Protection" made possible by Dell, in collaboration with theCUBE, your leader in enterprise and emerging tech coverage. (upbeat music)
SUMMARY :
by the degree to which their businesses Good to see you. You know, I'd like to So, they need to make sure I mean, when you talk about and the reality of the multicloud sprawl. mean the data's there to help our customers with. Okay, so it's nuanced 'cause and gravity of the data. They have to do that into the system to be more resilient." and that very, you know, and confirms everything we just talked I'd like to look at the time series on how to handle this. in the cloud today. Okay, so you said modern, And that's from deployment to consumption, to also reduce your risk." that meets all the needs that now to data protection. Yeah. and dig into the news. So, that's the backdrop to the news today. Let's dig to that. What's the news there? and easy to scale interface for customers. So, the premise that that critical data from the to partner with the public cloud provider. that allow customers to consume flexibly. I'm a big fan of that 'cause you guys You know, Travis, you and I guess the great news is we're up your point of view on this? I mentioned the APEX Solution as well. to say that your portfolio Going back to your point, we of the organization Travis, good to see you. to unplanned outages, you and continue to recover each day. It is important to and security confidence you would expect from 10 billion in assets to 20 billion. to increase your efficiency I'd installed it by we can fully manage to simplify virtual machine backups, from three to six hours a and available whenever you need it. We need things just to work. journey to modern data protection and of course that's going to
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Dave Vellante | PERSON | 0.99+ |
Travis | PERSON | 0.99+ |
Jeff | PERSON | 0.99+ |
Jeff Boudreau | PERSON | 0.99+ |
Dell | ORGANIZATION | 0.99+ |
Cisco | ORGANIZATION | 0.99+ |
Matt Baker | PERSON | 0.99+ |
Dave | PERSON | 0.99+ |
10 billion | QUANTITY | 0.99+ |
47% | QUANTITY | 0.99+ |
Dell Technologies | ORGANIZATION | 0.99+ |
20 billion | QUANTITY | 0.99+ |
two | QUANTITY | 0.99+ |
Jeff Boudreau | PERSON | 0.99+ |
three | QUANTITY | 0.99+ |
Sheltered Harbor | ORGANIZATION | 0.99+ |
Dell Technologies | ORGANIZATION | 0.99+ |
AWS | ORGANIZATION | 0.99+ |
one year | QUANTITY | 0.99+ |
second | QUANTITY | 0.99+ |
May | DATE | 0.99+ |
Second | QUANTITY | 0.99+ |
ISG | ORGANIZATION | 0.99+ |
Michael Dell | PERSON | 0.99+ |
First | QUANTITY | 0.99+ |
more than 1,700 customers | QUANTITY | 0.99+ |
Travis Vigil | PERSON | 0.99+ |
three year | QUANTITY | 0.99+ |
both | QUANTITY | 0.99+ |
more than 14 exabytes | QUANTITY | 0.99+ |
two parts | QUANTITY | 0.99+ |
80% | QUANTITY | 0.99+ |
three seconds | QUANTITY | 0.99+ |
The Future of Multicloud Protection | TITLE | 0.99+ |
three pieces | QUANTITY | 0.99+ |
one | QUANTITY | 0.99+ |
each day | QUANTITY | 0.99+ |
each | QUANTITY | 0.99+ |
today | DATE | 0.99+ |
Two | QUANTITY | 0.99+ |
second level | QUANTITY | 0.99+ |
One | QUANTITY | 0.99+ |
over 1300 customers | QUANTITY | 0.99+ |
two senior executives | QUANTITY | 0.98+ |
dell.com/powerprotectdatamanager | OTHER | 0.98+ |
Gartner | ORGANIZATION | 0.98+ |
Jeff Boudreau, Dell Technology Summit
>>Welcome back to the Cube's exclusive coverage of the Dell Technology Summit. I'm Dave Ante. We're going inside with Dell Execs to extract the signal from the noise. And right now we're gonna dig into customer requirements in a data intensive world and how cross cloud complexities get resolved from a product development perspective and how the ecosystem fits in to that mosaic to close the gaps and accelerate innovation. And with me now as friend of the cube, Jeff Boudreau, he's the president of the Infrastructure Solutions Group, ISG at Dell Technologies. Jeff, always good to see you. Welcome. >>You too. Thank you for having me. It's great to see you. And thanks for having me back on the cube. I'm thrilled to be here. Yeah, >>It's our pleasure. Okay, so let's talk about what you're observing from customers today. You know, we talk all the time about operating in a data driven multi-cloud world, blah, blah, blah, blah. But what does that all mean to you when you have to translate that noise into products that solve specific customer problems, Jeff? >>Sure. Hey, great question. And everything always starts with our customers. They're our motivation, They're top of mind, everything we do. My leadership team and I spend a lot of time with our customers. We're listening, we're learning, we're really understanding their pain points, and we want to get their feedback in regards to our solutions, both turn and future offerings, really ensure that we're aligned to meeting their business objectives. I would say from these conversations, I'd say customers are telling us several things. First, it's all about data. So no surprise going back to your opening. And second, it's about the multi-cloud world. And I'd say the big thing coming from all of this is that both of those are driving a ton of complexity for our customers. And I'll unpack that just a bit, which is first the data. As we all know, data is growing at unprecedented rates with more than 90% of the world's data being produced in the last two years alone. >>And you can just think of that in its everywhere, right? And so as it is, the IT world shifts towards distributed compute to support that data growth and that data gravity to really extract more value from that data in real time environments become inherently more and more hybrid and more and more multi-cloud. Which leads me to the second key point that I've been hearing from our customers, which it's a multi-cloud world, not new news. Customers by default have multiple clouds running across multiple locations. That's OnPrem and off, it's running at the edge and it's serving a variety of different needs. Unfortunately, for most of our CU customers, multicloud actually added to their complexity. As we've discussed, it's been a lot more of multi-cloud by default versus multicloud by design. If you really think about our customers, I mean, I, I, I'm talking to 'EM all the time. >>You think about the data complexity, that's the growth and the gravity. You think about their infrastructure complexity shifting from central to decentralized it, you think about multi-cloud complexity. So you have these walled gardens, if you will. So you have multiple vendors and you have these multiple contracts that all creates operational complexity for their teams around their processes of their tools. And then you think about the security complexity that that drives with the, just the increased tax service and the list goes on. So what are we seeing for our customers? They, what they really want from, also what they're asking us for is simplicity, not complexity. The mediacy, not latency. They're asking for open and align versus I'd say siloed and closed. And they're looking for a lot more agility and not rigidity in what we do. So they really wanna simplify everything. They're looking for a simpler IT in a more agile it, and they want more control of their data, right? >>And so, and they want to extract more of the value to enrich their business or their customer engagements, which all sounds pretty obvious and we've probably all heard it a bunch, but it's really hard to achieve. And that's where I believe, and we believe as Dell, that we, it creates a big opportunity for us to really help our customers as that great simplifier of it. We're already doing this today. Just a couple quick examples. First is Salesforce. We've supported recently, we've supported their global expansion with a multi-cloud solution to help them drive their business growth. Our solution delivered a reliable and consistent IT experience will go back to that complexity. And it was across a very distributed environment, including more than 60 data centers, 230 countries in hundreds of thousands of customers. It really provided Salesforce with the flexibility of placing workloads and data in an environment based on the right service level. >>Objective things like cost complexity or even security compliance considerations. The second customer A is a big new knowing little Patriot fan. And Dan, Dave, I know you are as well. Oh yeah, this one's near, near and data to my heart, it's the craft group. We just created a platform to span all their businesses that created more, I'd say data driven, immersive, secure experience, which is allowing them to capture data at the edge and use it for real time insights for things like cyber resiliency, but also like safety of the facilities. And as being a PA patron fan like I am, did they truly are meeting us where we are in our seats on their mobile devices and also in the parking lot. So just keep that in mind next time you're there. The bottom line, everything we're doing is really to make it simpler for our customers and to help them get the most of their data. I'd say we're gonna do this, is it through a multi-cloud by design approach, which we've talked a lot about with you and and others at Dell Tech world earlier this >>Year, right? And we had Salesforce on, actually at Dell Tech Group. The craft group is interesting because, you know, when you get to the stadium, you know, everybody's trying to get, get, get out to the internet and, and, but then the experience is so much better if you can actually, you know, deal with that edge. So I wanna talk about complexity though. You got data, you got, you know, the, the edge, you got multiple clouds, you got a different operating model across security model, different. So a lot of times in this industry we solve complexity with more complexity and it's like a bandaid. So I wanna, I wanna talk to, to how you're innovating around simplicity in ISG to address this complexity and what this means for Dell's long term strategy. >>Sure, I'd love to. So first I, I'd like to state the obvious, which are our investments in our innovations really focused on advancing, you know, our, our our customers needs, right? So we are really, our investments are gonna be targeted. We, we believe customers can have the most value. And some of that's gonna be around how we create strategic partnerships as well. Connecting to what we just spoke about. Much of the complexity of customers have or experiencing is the orchestration and management of all the data in all these different places. And customers, you know, they must be able to quickly deploy and operate across cloud environments. They need to increase their developer productivity, really enabling those developers that do what they do best, which is creating more value for their customers than for their businesses. Our innovation efforts are really focused on addressing this by delivering an open and modern IT architecture that allows customers to run and manage any workload in any cloud anywhere. >>Data lives we're focused on, also focused on consumption based solutions, which allow for a greater degree of simplicity and flexibility, which they're really asking for as well. The foundation for this is our software defined common storage layer. That common storage layer, You can think about this, Dave, as our ias if you will. It underpins our data access in mobility across all data types of locations. So you can think private, public, telecom, colo, edge, and it's delivered in a secure, holistic, and consistent cloud experience through Apex. We are making a ton of progress to let you, just to be, just to be clear, we made headway in things like Project Alpine, which you're very well aware of. This is our storage as a service. We announced us back in in January, which brings our unique software IP from our flagship storage platform to all the major public clouds. >>Really delivering the best of both worlds, allowing our customers to take advantage of Dell's enterprise class data services and storage software, such as performance at scale, resiliency, efficiency and security. But in addition to that, we're leveraging the breadth of the public cloud services, right? They're on demand scaling capabilities and access to analytical services. So in addition, we're really, we're, we're on our way to win at the edge as well with Project Frontier, which reduces complexity at the edge by creating an open and secure software platform to help our customers simplify their edge operations, optimize their edge environments and investments, secure that edge environment as well. I believe you're gonna be discussing Project Frontier here with Sam Broco in the very near future. So I won't give up more, too many more details there. And lastly, we're also scaling Apex, which, you know, well shifting from our vision, really shifting from vision to reality and introducing several new Apex service offerings, which are coming to market over the next month or so. And the intent is really supporting our customers on there as a service transitions by modernize the con consumption experience and providing that flexible as a service model. Ultimately, we're trying to help our customers achieve that multi-cloud by design to really simplify it in a, unlock the power of their data. >>So some good examples there. I I like to talk about the super Cloud as you, you know, you're building on top of the, you know, hyperscale infrastructure and you got Apex is your cloud, the common storage layer, you call it your ISAs. And that's, that's a ingredient in what we call the super cloud out to the edge. You have to have a common platform there and one of the hallmarks of a cloud company. And as you become a cloud company, everybody's a cloud company ecosystem becomes really, really important in terms of product development and, and innovation. Matt Baker always loves to stress it's not a zero sum game. And, and I think Super Cloud recognizes that, that there's value to be built on top of other clouds and, and, and of course on top of your infrastructure so that your ecosystem can add value. So what role does the ecosystem play there? >>For me, it's, it's pretty clear. It's, it's, it's critical. I can't say that enough above the having an open ecosystem. Think about everything we just discussed, and I agree with your super cloud analogy. I agree with what Matt Baker had said to you, I would assert no one company can actually address all the pain points and all the issues and challenges that customers are having on their own, not one. I think customers really want and deserve an open technology ecosystem, one that works together. So not these close stacks that discourage this interoperability or stifles innovation and productivity of our, of each of our teams. We Dell, I guess, have a long history of supporting open ecosystems that really put customers first. And to be clear, we're gonna be at the center of the multi-cloud ecosystem and we're working with partners today to make that a reality. >>I mean, just think of what we're doing with VMware. We continue to build on our first investment alliances with them in August at their VMware explorer, which I know you were at. We announced several joint engineering initiatives to really help customers more easily manage and gain value from their data in their infrastructure. For multi-cloud specifically, we strength our relationship with VMware and know with Tansu as part of that. In addition, just a few weeks ago we announced our partnership with Red Hat to simplify our multicloud deployments for managing containerized workloads. I'd say, and using your analogy, I could think of that as our multicloud platform. So that's kind of our PAs layer, if you will. And as you're aware, we have a very longstanding and strategic partnership with Microsoft and I'd say stay tuned. There's a lot more to come with them and also others in this multi-cloud space. >>Shifting a bit to some of the growth engines that my team's responsible for the edge, right? As you think about data being everywhere, we've established partnerships for the Edge as well with folks like PTC and Litmus for the manufacturing edge, but also folks like Deep North for the retail edge analytics in data management, using your Supercloud analogy data, the sa right? This is our SAS layer. We've announced that we're collaborating, partnering with folks like Snowflake and, and there's other data management companies as well to really simplify data access and accelerate those data insights. And then given customers choice of where they'd like to have their IT and their infrastructure, we've we're expanding our colo partnerships as well with folks like Equinox and, and they're allowing us to broaden our availability of Apex, providing customers the flexibility to take advantage of those as a service offerings wherever it's delivered and where they can get the most value. So those are just some you can hear from me. I think it's critical not only for, for us, I think it's critical for our customers. I think it's been critical, critical for the entire, you know, industry as a whole to really have that open technology ecosystem as we work with our customers on our multi-cloud solutions really to meet their needs. We'll continue to collaborate with whoever customers choose and you know, and who they want us to do business with. So I'd say a lot more coming in that space. >>So it's been an interesting three years for you, just, just over three years now since you've been made the president of the IS isg. And so you had to dig in and it was obviously strange time around the world, but, but you really had to look at, okay, how do we modernize the platform? How do we make it, you know, cloud first? You've mentioned the Edge, we're expanding. So what are the big takeaways? What do you want customers and our audience to understand? Just some closing thoughts and if you could summarize. >>Sure. So I'd say first, you know, we discuss, we're working in a very fast paced, ever changing market with massive amounts of data that needs to be managed. It's very complex and our customers need help with that complexity. I believe that Dell Technologies is uniquely positioned to help as their multi-cloud champion. No one else can solve the breadth and depth of the challenges like we can. And we're gonna help our customers move forward when they basically moving from a multi-cloud by default, as we've discussed before, to multicloud by design. And I'm really excited for the opportunity to work with our customers to help them expand that ecosystem as they truly realize the future of it and, and what they're trying to accomplish. >>Jeff, thanks so much. Really appreciate your time. Always a pleasure. Go pats and we'll see you on the blog. >>Thanks Dave. >>All right, you're watching Exclusive Inside Insights from Dell Technology Summit on the cube, your leader in enterprise and emerging tech coverage.
SUMMARY :
how the ecosystem fits in to that mosaic to close the gaps and accelerate And thanks for having me back on the cube. But what does that all mean to you when you have to translate And I'd say the big thing coming from all of this is that both of those are driving And you can just think of that in its everywhere, right? from central to decentralized it, you think about multi-cloud complexity. And so, and they want to extract more of the value to enrich their business or their customer engagements, And Dan, Dave, I know you are as well. So a lot of times in this industry we solve complexity with more complexity So first I, I'd like to state the obvious, which are our investments in So you can think private, public, So in addition, we're really, we're, we're on our way to win at the edge as well with And as you become a cloud company, I can't say that enough above the having We continue to build on our first investment alliances with I think it's been critical, critical for the entire, you around the world, but, but you really had to look at, okay, how do we modernize the platform? And I'm really excited for the opportunity to work with our customers to help them expand that ecosystem as Go pats and we'll see you All right, you're watching Exclusive Inside Insights from Dell Technology Summit on the cube,
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Jeff Boudreau | PERSON | 0.99+ |
Dave | PERSON | 0.99+ |
Jeff | PERSON | 0.99+ |
Matt Baker | PERSON | 0.99+ |
Dan | PERSON | 0.99+ |
Equinox | ORGANIZATION | 0.99+ |
August | DATE | 0.99+ |
January | DATE | 0.99+ |
Microsoft | ORGANIZATION | 0.99+ |
Dave Ante | PERSON | 0.99+ |
Dell | ORGANIZATION | 0.99+ |
Red Hat | ORGANIZATION | 0.99+ |
First | QUANTITY | 0.99+ |
VMware | ORGANIZATION | 0.99+ |
Sam Broco | PERSON | 0.99+ |
PTC | ORGANIZATION | 0.99+ |
second | QUANTITY | 0.99+ |
Dell Technologies | ORGANIZATION | 0.99+ |
three years | QUANTITY | 0.99+ |
Dell Technologies | ORGANIZATION | 0.99+ |
Infrastructure Solutions Group | ORGANIZATION | 0.99+ |
230 countries | QUANTITY | 0.99+ |
more than 60 data centers | QUANTITY | 0.99+ |
more than 90% | QUANTITY | 0.99+ |
first | QUANTITY | 0.99+ |
both | QUANTITY | 0.99+ |
Tansu | ORGANIZATION | 0.98+ |
Litmus | ORGANIZATION | 0.98+ |
over three years | QUANTITY | 0.98+ |
Dell Technology Summit | EVENT | 0.98+ |
Dell Tech Group | ORGANIZATION | 0.98+ |
Apex | ORGANIZATION | 0.98+ |
today | DATE | 0.97+ |
both worlds | QUANTITY | 0.97+ |
Dell Tech | ORGANIZATION | 0.97+ |
Deep North | ORGANIZATION | 0.95+ |
one | QUANTITY | 0.94+ |
ISG | ORGANIZATION | 0.93+ |
second key point | QUANTITY | 0.93+ |
Project Frontier | ORGANIZATION | 0.93+ |
IS | ORGANIZATION | 0.93+ |
second customer | QUANTITY | 0.92+ |
each | QUANTITY | 0.9+ |
next month | DATE | 0.89+ |
first investment alliances | QUANTITY | 0.87+ |
Snowflake | ORGANIZATION | 0.86+ |
few weeks ago | DATE | 0.86+ |
Salesforce | ORGANIZATION | 0.82+ |
Edge | ORGANIZATION | 0.81+ |
hundreds of thousands of customers | QUANTITY | 0.75+ |
Project Alpine | ORGANIZATION | 0.73+ |
couple | QUANTITY | 0.71+ |
last two years | DATE | 0.7+ |
Patriot | ORGANIZATION | 0.67+ |
Super | TITLE | 0.66+ |
super Cloud | TITLE | 0.64+ |
multicloud | ORGANIZATION | 0.6+ |
Apex | TITLE | 0.59+ |
Supercloud | ORGANIZATION | 0.57+ |
super cloud | TITLE | 0.56+ |
Cloud | ORGANIZATION | 0.51+ |
Execs | COMMERCIAL_ITEM | 0.43+ |
Tom Sweet, Dell Technology Summit
>>As we said in our analysis of Dell's future, the transformation of Dell into Dell emc and now Dell Technologies has been one of the most remarkable stories in the history of the technology industry. After years of successfully integrated EMC and becoming VMware's number one distribution channel, the metamorphosis of Dell com culminated in the spin out of VMware from Dell and a massive wealth creation milestone pending, of course the Broadcom acquisition of VMware. So where's that leave Dell and what does the future look like for this technology powerhouse? Hello and welcome to the Cube's exclusive coverage of Dell Technology Summit 2022. My name is Dave Ante and I'll be hosting the program today in conjunction with the Dell Tech Summit. We'll hear from four of Dell senior executives. Tom Sweet is the CFO of Dell. Technologies's gonna share his views of the company's position and opportunities and answer the question, why is Dell good long term investment? >>Then we'll hear from Jeff Boudreau, who's the president of Dell's ISG business unit, who's gonna talk about the product angle and specifically how Dell is thinking about solving the multi-cloud challenge. And then Sam GrowCo is the senior vice President of marketing. He's gonna come in the program and give us the update on Apex, which is Dell's as a service offering and a new edge platform called Project Frontier. By the way, it's also Cybersecurity Awareness Month, and we're gonna see if Sam has any stories there. And finally, for a company that's nearly 40 years old, Dell has some pretty forward thinking philosophies when it comes to its culture and workforce. And we're gonna speak with Jen Savira, who's Dell's chief Human Resource officer about hybrid work and how Dell is thinking about the future of work. We're gonna geek out all day and talk multi-cloud and edge and latency, but first, let's talk wallet. Tom Sweet cfo, and one of Dell's key business architects. Welcome back to the >>David, It's good to see you and good to be back with you. So thanks for having me. >>Yeah, you bet. So Tom, it's been a pretty incredible past 18 months. Not only the pandemic and all that craziness, but the VMware spin, you had to give up your gross margin. Pinky as kidding. And, and of course the macro environment. I'm so sick of talking about the macro, but putting that aside for a moment, what's really remarkable is that for a company at your size, you've had some success at the top line, which I think surprised a lot of people. What are your reflections on the last 18 to 24 months? >>Well, Dave, it's been an incredible, not only last 18 months, but the whole transformation journey. If you think all the way back maybe to the LBO and forward from there, but, you know, stepping into the last 18 months, it's, you know, I, I think I remember talking with you and saying, Hey, you know, the scenario planning we did at the beginning of this pandemic journey was, you know, 30 different scenarios roughly, and none of which sort of panned out the way it actually did, which was a pretty incredible growth story as we think about how we helped customers, you know, drive workforce productivity, enable their business model during the all remote work environment. That was the pandemic created. And couple that with the, you know, the, the rise then in the infrastructure spin as we got towards the tail end of the, of the pandemic coupled with, you know, the spin out of VMware, which culminated last November, as you know, as we completed that, which unlocked a pathway back to investment grade within unlocked, quite frankly, shareholder value, capital allocation frameworks. It's really been a remarkable, you know, 18, 24 months. It's, it's never dull at Dell Technologies, Let me put it that way. >>Well, well, I was impressed with you, Tom, before the leverage buyout and then what I've seen you guys navigate through is, is, is truly amazing. Well, let's talk about the challenging macro. I mean, I've been through a lot of downturns, but I've never seen anything quite like this with fed tightening and you're combating inflation, you got this recession looming, there's a bear market you got, but you got zero unemployment, you're rising wages, strong dollar, and it's very confusing. But it spending is, you know, it's somewhat softer, but it's still not bad. How are you seeing customers behave? How is Dell responding? >>Yeah, look, if you think about the markets we play in Dave, and we should start there as a grounding, you know, the, the total market, the core market that we think about is roughly 700 and, you know, $50 billion or so. If you think about our core IT services capability, you couple that with some of the, the growth initiatives that we're driving and the adjacent markets that that, that brings in, you're roughly talking a 1.4 to $1.5 trillion market opportunity, total addressable market. And so from, from that perspective, we're extraordinarily bullish on where are we in the journey as we continue to grow and expand. You know, we have, we're number one share in just about every category that we plan, but yet when you look at that, you know, number one share in some of these, you know, our highest share position may be, you know, low thirties and maybe in the high end of storage you're at the upper end of thirties or 40%. >>But the opportunity there to continue to expand the core and, and continue to take share and outperform the market is truly extraordinary. So, so you step back and think about that, then you say, okay, what have we seen over the last number of months and quarters? It's been, you know, really great performance through the pandemic as, as you highlighted, we actually had a really strong first half of the year of our fiscal year 23 with revenue up 12% operating income up 12% for the first half. You know, what we talked about as you, if you might recall in our second quarter earnings, was the fact that we were starting to see softness. We had seen it in the consumer PC space, which is not a big area of focus for us in the sense of our, our total revenue stream, But we started to see commercial PC soften and we were starting to see server demand soften a bit and storage demand was, was holding quite frankly. >>And so we gave a a framework around guidance for the rest of the year as a result of what we were seeing. You know, the macro environment as you highlight it continues to be challenging. You know, you, if you look at inflation rates and the efforts by central banks across the globe to with through interest rate rise to press down and, and constrain growth and push down inflation, you couple that with supply chain challenges that continue principle, particularly in the ISG space. And then you couple that with the Ukraine war and the energy crisis that that's created. And particularly in Europe, it's a pretty dynamic environment. And, but I'm confident, you know, I'm confident in the long term, but I do think that there is, you know, that there's navigation that we're going to have to do over the coming number of quarters, who knows quite how long, you know, to, to make sure the business is properly positioned and, you know, we've got a great portfolio and you're gonna talk to some of the team LA later on as you think your way through some of the solution capabilities we're driving what we're seeing around technology trends. >>So the opportunities there, there's some short term navigation that we're gonna need to do just to make sure that we address some of the, you know, some of the environmental things that we're seeing right >>Now. Yeah. And as a global company, of course you're converting current local currencies back to appreciated dollars. That's, that's, that's another headwind. But as you say, I mean, that's math and you're navigating it. And again, I've seen a lot of downturns, but you know, the best companies not only weather the storm, but they invest in ways they that allow them to cut out, come out the other side stronger. So I wanna talk about that longer term opportunity, the relationship between the core, the the business growth. You mentioned the tam, I mean, even, even as a lower margin business, if, if you can penetrate that big of a tam, you could still throw off a lot of cash and you've got other levers to turn in potentially acquisitions and software. And, but so ultimately what gives you confidence in Dell's future? How should we think about Dell's future? >>Yeah, look, I, I think it comes down to we are extraordinarily excited about the opportunity over the long term digital transformation continues. I I, I am on numerous customer and CIO calls every week. Customers are continuing to invest in digital transformation in infrastructure to enable their business model. Yes, maybe it's gonna slow or, or pause or maybe they're not gonna invest quite at the same rate over the next number of quarters, but over the long term the needs are there. You look at what we're doing around the, the growth opportunities that we see, not only in our core space where we continue to invest, but also in the, what we call the strategic adjacencies. Things like 5G and modern telecom infrastructure as our, the telecom providers across the globe open up their, what a cl previous been closed ecosystems, you know, to open architecture. You think about, you know, what we're doing around the edge and the distribution now that we're seeing of compute and storage back to the edge given data gravity and latency matters. >>And so we're pretty bullish on the opportunity in front of us, you know, yes, we will, We're continuing to invest. And you Jeff Boudreau talk about that I think later on in the program. So I'm excited about the opportunities and you look at our cash flow generation capability, you know, we are in, in, in normal times a, a cash flow generation machine and we'll continue to do so. You know, we've got a negative, you know, CCC in terms of, you know, how do we think about efficiency of working capital? And we look at our, you know, our capital allocation strategy, which has now returned, you know, somewhere in near 60% of our free cash flow back to shareholders. And so, you know, there's lots to, lots of reasons to think about why this, you know, we are a great sort of, I think, value creation opportunity in a over the long term that the long term trends are with us, and I expect them to continue to be so, >>Yeah, and you guys, you, you, you do what you say you're gonna do. I mean, I said in my, in my other piece that I did recently, I think you guys put 46 billion on the, on the, on the balance sheet in terms of debt. That's down to I think 16 billion in the core, which that's quite remarking. That gives you some other opportunities. Give us your, your closing thoughts. I mean, you kind of just addressed why Dell is a good long term play, but I'll give you an opportunity to bring us home. >>Hey, Dave. Yeah, look, I, I just think if you look at the gr the market opportunity, the size and scale of Dell and how we think about the competitive advantages that we have, we com you know, if you look at, say we're a hundred billion revenue company, which we were a year, you know, last year, that as we reported roughly 60, 65 billion of that in the client and in PC space, roughly, you know, 35 to 40 billion in the ISG or infrastructure space, those markets are gonna continue the opportunity to grow, share, grow at a premium to the market, drive, cash flow, drive, share, gain is clearly there. You couple that with, you know, what we think the opportunity is in these adjacent markets, whether it's telecom, the edge, what we're thinking around data services, data management, you know, we, and you cut, you put that together with the long term trends around, you know, data creation and digital transformation. We are extraordinarily well positioned. We have the largest direct selling organization in, in the technology space. We have the largest supply chain, our services footprint, you know, well positioned in my mind to take advantage of the opportunities as we move forward. >>Well, Tom, really appreciate you taking the time to speak with us. Good to see you again. >>Nice seeing you. Thanks Dave. >>All right. You're watching the Cube's exclusive behind the scenes coverage of Dell Technology Summit 2022. In a moment, I'll be back with Jeff Boudreau. He's the president of Dell's ISG Infrastructure Solutions Group. He's responsible for all the important enterprise business at Dell and we're excited to get his thoughts, keep it right there.
SUMMARY :
Dell Technologies has been one of the most remarkable stories in the history of the technology industry. He's gonna come in the program and give us the update on Apex, which is Dell's as a service offering and David, It's good to see you and good to be back with you. all that craziness, but the VMware spin, you had to give up your gross margin. stepping into the last 18 months, it's, you know, I, I think I remember talking with you and But it spending is, you know, it's somewhat softer, but it's still not bad. grounding, you know, the, the total market, the core market that we think about is roughly It's been, you know, really great performance through the pandemic as, You know, the macro environment as you highlight it continues to be challenging. And again, I've seen a lot of downturns, but you know, the best companies not only weather the storm, You think about, you know, what we're doing around the edge and the distribution you know, our capital allocation strategy, which has now returned, you know, somewhere in near Yeah, and you guys, you, you, you do what you say you're gonna do. the edge, what we're thinking around data services, data management, you know, Well, Tom, really appreciate you taking the time to speak with us. Nice seeing you. He's responsible for all the important enterprise business at Dell and we're excited to get his thoughts,
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Jeff Boudreau | PERSON | 0.99+ |
David | PERSON | 0.99+ |
Tom | PERSON | 0.99+ |
Dave | PERSON | 0.99+ |
Jen Savira | PERSON | 0.99+ |
Tom Sweet | PERSON | 0.99+ |
$50 billion | QUANTITY | 0.99+ |
35 | QUANTITY | 0.99+ |
Sam | PERSON | 0.99+ |
40% | QUANTITY | 0.99+ |
16 billion | QUANTITY | 0.99+ |
Dell | ORGANIZATION | 0.99+ |
VMware | ORGANIZATION | 0.99+ |
46 billion | QUANTITY | 0.99+ |
Dave Ante | PERSON | 0.99+ |
ISG Infrastructure Solutions Group | ORGANIZATION | 0.99+ |
1.4 | QUANTITY | 0.99+ |
Europe | LOCATION | 0.99+ |
last year | DATE | 0.99+ |
Sam GrowCo | PERSON | 0.99+ |
last November | DATE | 0.99+ |
18 | QUANTITY | 0.99+ |
Dell Technologies | ORGANIZATION | 0.99+ |
first half | QUANTITY | 0.99+ |
Dell Tech Summit | EVENT | 0.98+ |
40 billion | QUANTITY | 0.98+ |
four | QUANTITY | 0.98+ |
24 months | QUANTITY | 0.98+ |
fiscal year 23 | DATE | 0.98+ |
Dell Technology Summit 2022 | EVENT | 0.98+ |
30 different scenarios | QUANTITY | 0.97+ |
$1.5 trillion | QUANTITY | 0.97+ |
nearly 40 years old | QUANTITY | 0.97+ |
60, 65 billion | QUANTITY | 0.97+ |
Broadcom | ORGANIZATION | 0.97+ |
thirties | QUANTITY | 0.96+ |
first | QUANTITY | 0.95+ |
700 | QUANTITY | 0.95+ |
today | DATE | 0.95+ |
12% | QUANTITY | 0.94+ |
Dell Technology Summit | EVENT | 0.94+ |
Cybersecurity Awareness Month | EVENT | 0.93+ |
pandemic | EVENT | 0.92+ |
one | QUANTITY | 0.9+ |
near 60% | QUANTITY | 0.88+ |
Cube | PERSON | 0.87+ |
Ukraine war | EVENT | 0.87+ |
Apex | ORGANIZATION | 0.87+ |
second quarter | DATE | 0.87+ |
zero unemployment | QUANTITY | 0.86+ |
Technologies | ORGANIZATION | 0.84+ |
past 18 months | DATE | 0.84+ |
EMC | ORGANIZATION | 0.83+ |
LA | LOCATION | 0.83+ |
last 18 months | DATE | 0.8+ |
ISG | ORGANIZATION | 0.79+ |
Dell com | ORGANIZATION | 0.76+ |
hundred billion | QUANTITY | 0.74+ |
Breaking Analysis: Analyst Take on Dell
(upbeat music) >> The transformation of Dell into Dell EMC, and now Dell Technologies, has been one of the most remarkable stories in the history of the enterprise technology industry. The company has gone from a Wall Street darling rocketship PC company, to a middling enterprise player, forced to go private, to a debt-laden powerhouse that controlled one of the most valuable assets in enterprise tech, i.e., VMware. And now is a $100 billion dollar giant with a low-margin business, a strong balance sheet, and the broadest hardware portfolio in the industry. The financial magic that Dell went through would make anyone's head spin. The last lever of the Dell EMC deal was detailed in Michael Dell's book "Play Nice But Win," in a captivating chapter called "Harry You and the Bolt from the Blue." Michael Dell described how he and his colleagues came up with the final straw of how to finance the deal. If you haven't read it, you should. And of course, after years of successfully integrating EMC and becoming VMware's number-one distribution channel, all of this culminated in the spin-out of VMware from Dell, and a massive wealth-creation milestone, pending, of course, the Broadcom acquisition of VMware. So where's that leave Dell, and what does the future look like for this technology powerhouse? Hello, and welcome to theCUBE's exclusive coverage of Dell Technologies Summit 2022. My name is Dave Vellante, and I'll be hosting the program. Now, today in conjunction with the Dell Tech Summit, we're going to hear from four of Dell's senior executives. Tom Sweet, who's the CFO of Dell Technologies. He's going to share his views on the company's position and opportunities going forward. He's going to answer the question, why is Dell a good long-term investment? Then we'll hear from Jeff Boudreau, who's the President of Dell's ISG business. That unit is the largest profit driver of Dell. He's going to talk about the product angle, and specifically, how Dell is thinking about solving the multi-cloud challenge. And then Sam Grocott, who's the Senior Vice President of Marketing, will come on the program and give us the update on APEX, which is Dell's as-a-Service offering, and then the new edge platform called Project Frontier. Now, it's also Cybersecurity Awareness Month, that we're going to see if Sam has, you know, anything to say about that. Then finally, for a company that's nearly 40 years old, Dell actually has some pretty forward-thinking philosophies when it comes to its culture and workforce. And we're going to speak with Jenn Saavedra, who's Dell's Chief Human Resource Officer, about hybrid work, and how Dell is thinking about the future of work. However, before we get into all this, I want to share our independent perspectives on the company, and some research that we'll introduce to frame the program. Now, as you know, we love data here at theCUBE, and one of our partners, ETR, has what we believe is the best spending intentions data for enterprise tech. So here's a graphic that shows ETR's proprietary Net Score methodology on the vertical axis, that's a measure of spending velocity, and on the x-axis is overlap or pervasiveness in the data sample. This is a cut for just the server, the storage, and the client sectors within the ETR taxonomy. So you can see Dell's CSG products, laptops in particular, are dominant on both the x and the y dimensions. CSG is the Client Solutions Group, and accounts for nearly 60% of Dell's revenue, and about half of its operating income. And then the arrow signifies that dot that represents Dell's ISG business, that we're going to talk to Jeff Boudreau about. That's the Infrastructure Solutions Group. Now, ISG accounts for the bulk of the remainder of Dell's business, and it is its, as I said, its most profitable from a margin standpoint. It comprises the EMC storage business, as well as the Dell server business, and Dell's networking portfolio. And as a note, we didn't include networking in that cut. Had we done so, Cisco would've dominated the graphic. And frankly, Dell's networking business isn't industry leading in the same way that PCs, servers, and storage are. And as you can see, the data confirms the leadership position Dell has in its client side, its server, and its storage sectors. But the nuance is, look at that red dotted line at 40% on the vertical axis. That represents a highly elevated Net Score, and every company in the sector is below that line. Now, we should mention that we also filtered the data for those companies with more than a hundred mentions in the survey, but the point remains the same. This is a mature business that generally is lower margin. Storage is the exception, but cloud has put pressure on margins even in that business, in addition to the server space. The last point on this graphic is, we put a box around VMware, and it's prominently present on both the x and y dimensions. VMware participates with purely software-defined high-margin offerings in these spaces, and it gives you a sense of what might have been, had Dell chosen to hold onto that asset or spin it into the company. But let's face it, the alternatives for Michael Dell were just too attractive, and it's unlikely that a spin-in would've unlocked the value in the way a spin-out did, at least not in the near future. So let's take a look at the snapshot of Dell's financials, to give you a sense of where the company stands today. Dell is a company with over $100 billion dollars in revenue. Last quarter, it did more than 26 billion in revenue, and grew at a quite amazing 9% rate, for a company that size. But because it's a hardware company, primarily, its margins are low, with operating income 10% of revenue, and at 21% gross margin. With VMware on Dell's income statement before the spin, its gross margins were in the low 30s. Now, Dell only spends about 2% of revenue on R&D, but because it's so big, it's still a lot of money. And you can see it is cash-flow positive. Dell's free cash flow over the trailing 12-month period is 3.7 billion, but that's only 3.5% of trailing 12-month revenue. Dell's APEX, and of course its hardware maintenance business, is recurring revenue, and that is only about 5 billion in revenue, and it's growing at 8% annually. Now, having said that, it's the equivalent of ServiceNow's total revenue. Of course, ServiceNow has 23% operating margin and 16% free cash-flow margin, and more than $5 billion in cash on the balance sheet, and an $85 billion market cap. That's what software will do for you. Now Dell, like most companies, is staring at a challenging macro environment, with FX headwinds, inflation, et cetera. You've heard the story. And hence it's conservative, and contracting revenue guidance. But the balance sheet transformation has been quite amazing, thanks to VMware's cash flow. Michael Dell and his partners from Silver Lake et al., they put up around $4 billion of their own cash to buy EMC for 67 billion, and of course got VMware in the process. Most of that financing was debt that Dell put on its balance sheet to do the transaction, to the tune of $46 billion it added to the balance sheet debt. Now, Dell's debt, the core debt, net of its financing operation, is now down to 16 billion, and it has $7 billion in cash on the balance sheet. So a dramatic delta from just a few years ago. So, pretty good picture. But Dell, a $100 billion company, is still only valued at 28 billion, or around 26 cents on the revenue dollar. HPE's revenue multiple is around 60 cents on the revenue dollar. HP Inc., Dell's laptop and PC competitor, is around 45 cents. IBM's revenue multiple is almost two times. By the way, IBM has more than $50 billion in debt thanks to the Red Hat acquisition. And Cisco has a revenue multiple that's over 3x, about 3.3x currently. So is Dell undervalued? Well, based on these comparisons with its peers, I'd say yes, and no. Dell's performance, relative to its peers in the market, is very strong. It's winning, and has an extremely adept go-to-market machine, but its lack of software content and its margin profile leads one to believe that if it can continue to pull some valuation levers while entering new markets, it can get its valuation well above where it is today. So what are some of those levers, and what might that look like, going forward? Despite the fact that Dell doesn't have a huge software revenue component since spinning out VMware, and it doesn't own a cloud, it plays in virtually every part of the hardware market. And it can provide infrastructure for pretty much any application in any use case, in pretty much any industry, in pretty much any geography in the world. And it can serve those customers. So its size is an advantage. However, the history for hardware-heavy companies that try to get bigger has some notable failures, namely HP, which had to split into two businesses, HP Inc. and HPE, and IBM, which has had an abysmal decade from a performance standpoint, and has had to shrink to grow again, and obviously do a massive $34 billion acquisition of Red Hat. So why will Dell do any better than these two? Well, it has a fantastic supply chain. It's a founder-led company, which makes a cultural difference, in our view. And it's actually comfortable with a low-margin software-light business model. Most certainly, IBM wasn't comfortable with that, and didn't have these characteristics, and HP was kind of just incomprehensible at the end. So Dell in my opinion, has a much better chance of doing well at 100 billion or over, but we'll see how it navigates through the current headwinds as it's guiding down. APEX is essentially Dell's version of the cloud. Now, remember, Dell got started late. HPE is further along from a model standpoint with GreenLake, but Dell has a larger portfolio, so they're going to try to play on that advantage. But at the end of the day, these as-a-Service offerings are simply ways to bring a utility model to existing customers, and generate recurring revenue. And that's a good thing, because customers will be loyal to an incumbent if it can deliver as-a-Service and reduce risk for customers. But the real opportunity lies ahead. Specifically, Dell is embracing the cloud model. It took a while, but they're on board. As Matt Baker, Dell's Senior Vice President of Corporate Strategy, likes to say, it's not a zero-sum game. What he means by that is, just because Dell doesn't own its own cloud, it doesn't mean Dell can't build value on top of hyperscale clouds. What we call supercloud. And that's Dell's strategy, to take advantage of public cloud capex, and connect on-prem to the cloud, create a unified experience across clouds, and out to the edge. That's ambitious, and technically it's nontrivial. But listen to Dell's Vice Chairman and Co-COO, Jeff Clarke, explain this vision. Please play the clip. >> You said also, technology and business models are tied together, and an enabler. >> That's right. >> If you believe that, then you have to believe that it's a business operating system that they want. They want to leverage whatever they can, and at the end of the day, they have to differentiate what they do. >> Well, that's exactly right. If I take that and what Dave was saying, and I summarize it the following way: if we can take these cloud assets and capabilities, combine them in an orchestrated way to deliver a distributed platform, game over. >> Eh, pretty interesting, right? John Furrier called it a "business operating system." Essentially, I think of it sometimes as a cloud operating system, or cloud operating environment, to drive new business value on top of the hyperscale capex. Now, is it really game over, as Jeff Clarke said, if Dell can do that? Uh, (sucks in breath) I'd say if it had that today, it might be game over for the competition, but this vision will take years to play out. And of course, it's got to be funded. And that's going to take time, and in this industry, it tends to move, companies tend to move in lockstep. So, as often is the case, it's going to come down to execution and Dell's ability to enter new markets that are ideally, at least from my perspective, higher margin. Data management, extending data protection into cybersecurity as an adjacency, and of course, edge and telco/5G opportunities. All there for the taking. I mean, look, even if Dell doesn't go after more higher-margin software content, it can thrive with a lower-margin model just by penetrating new markets and throwing off cash from those markets. But by keeping close to customers, and maybe through tuck-in acquisitions, it might be able to find the next nugget beyond today's cloud and on-prem models. And the last thing I'll call out is ecosystem. I say here, "Ecosystem, ecosystem, ecosystem," because a defining characteristic of a cloud player is ecosystem, and if APEX is Dell's cloud, it has the opportunity to expand that ecosystem dramatically. This is one of the company's biggest opportunities and challenges at the same time, in my view. It's just scratching the surface on its partner ecosystem. And its ecosystem today is both reseller heavy and tech partner heavy. And that's not a bad thing, but it's starting to evolve more rapidly. The Snowflake deal is an example of up-the-stack evolution, but I'd like to see much more out of that Snowflake relationship, and more relationships like that. Specifically, I'd like to see more momentum with data and database. And if we live in a data-heavy world, which we do, where the data and the database and data management offerings, you know, coexist and are super important to customers, I'd like to see that inside of APEX. I'd like to see that data play beyond storage, which is really where it is today, in its early days. The point is, with Dell's go-to-market advantage, which company wouldn't treat Dell like the on-prem, hybrid, edge, supercloud player that I want to partner with to drive more business? You'd be crazy not to. But Dell has a lot on its plate, and we'd like to see some serious acceleration on the ecosystem front. In other words, Dell as both a selling partner and a business enabler with its platform, its programmable Infrastructure-as-a-Service. And that is a moving target that will rapidly evolve. And of course, we'll be here watching and reporting. So thanks for watching this preview of Dell Technologies Summit 2022. I'm Dave Vellante, we hope you enjoy the rest of the program. (upbeat music)
SUMMARY :
and of course got VMware in the process. and an enabler. and at the end of the day, and I summarize it the following way: and are super important to customers,
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Jeff Boudreau | PERSON | 0.99+ |
Dave Vellante | PERSON | 0.99+ |
IBM | ORGANIZATION | 0.99+ |
Dave | PERSON | 0.99+ |
Jeff Clarke | PERSON | 0.99+ |
Sam Grocott | PERSON | 0.99+ |
Tom Sweet | PERSON | 0.99+ |
Jenn Saavedra | PERSON | 0.99+ |
Matt Baker | PERSON | 0.99+ |
HP | ORGANIZATION | 0.99+ |
HPE | ORGANIZATION | 0.99+ |
Cisco | ORGANIZATION | 0.99+ |
Michael Dell | PERSON | 0.99+ |
Dell | ORGANIZATION | 0.99+ |
$85 billion | QUANTITY | 0.99+ |
VMware | ORGANIZATION | 0.99+ |
$34 billion | QUANTITY | 0.99+ |
21% | QUANTITY | 0.99+ |
3.7 billion | QUANTITY | 0.99+ |
$7 billion | QUANTITY | 0.99+ |
HP Inc. | ORGANIZATION | 0.99+ |
Last quarter | DATE | 0.99+ |
10% | QUANTITY | 0.99+ |
100 billion | QUANTITY | 0.99+ |
$100 billion | QUANTITY | 0.99+ |
Sam | PERSON | 0.99+ |
John Furrier | PERSON | 0.99+ |
Harry You and the Bolt from the Blue | TITLE | 0.99+ |
8% | QUANTITY | 0.99+ |
more than $50 billion | QUANTITY | 0.99+ |
23% | QUANTITY | 0.99+ |
28 billion | QUANTITY | 0.99+ |
40% | QUANTITY | 0.99+ |
16% | QUANTITY | 0.99+ |
67 billion | QUANTITY | 0.99+ |
more than $5 billion | QUANTITY | 0.99+ |
Red Hat | ORGANIZATION | 0.99+ |
$46 billion | QUANTITY | 0.99+ |
12-month | QUANTITY | 0.99+ |
more than 26 billion | QUANTITY | 0.99+ |
Play Nice But Win | TITLE | 0.99+ |
3.5% | QUANTITY | 0.99+ |
Michael Dell | PERSON | 0.99+ |
Dell Technologies | ORGANIZATION | 0.99+ |
Dell Technology Summit
>>As we said in our analysis of Dell's future, the transformation of Dell into Dell emc and now Dell Technologies has been one of the most remarkable stories in the history of the technology industry. After years of successfully integrated EMC and becoming VMware's number one distribution channel, the metamorphosis of Dell com culminated in the spin out of VMware from Dell and a massive wealth creation milestone pending, of course the Broadcom acquisition of VMware. So where's that leave Dell and what does the future look like for this technology powerhouse? Hello and welcome to the Cube's exclusive coverage of Dell Technology Summit 2022. My name is Dave Ante and I'll be hosting the program today In conjunction with the Dell Tech Summit. We'll hear from four of Dell's senior executives. Tom Sweet is the CFO of Dell Technologies. He's gonna share his views of the company's position and opportunities and answer the question, why is Dell good long term investment? >>Then we'll hear from Jeff Boudreau was the president of Dell's ISG business unit. He's gonna talk about the product angle and specifically how Dell is thinking about solving the multi-cloud challenge. And then Sam Grow Cot is the senior vice president of marketing's gonna come in the program and give us the update on Apex, which is Dell's as a service offering and a new edge platform called Project Frontier. By the way, it's also Cybersecurity Awareness Month, and we're gonna see if Sam has any stories there. And finally, for a company that's nearly 40 years old, Dell has some pretty forward thinking philosophies when it comes to its culture and workforce. And we're gonna speak with Jen Savira, who's Dell's chief Human Resource officer about hybrid work and how Dell is thinking about the future of work. We're gonna geek out all day and talk multi-cloud and edge and latency, but first, let's talk wallet. Tom Sweet cfo, and one of Dell's key business architects. Welcome back to the cube, >>Dave, it's good to see you and good to be back with you. So thanks for having me, Jay. >>Yeah, you bet. Tom. It's been a pretty incredible past 18 months. Not only the pandemic and all that craziness, but the VMware spin, you had to give up your gross margin binky as kidding, and, and of course the macro environment. I'm so sick of talking about the macro, but putting that aside for a moment, what's really remarkable is that for a company at your size, you've had some success at the top line, which I think surprised a lot of people. What are your reflections on the last 18 to 24 months? >>Well, Dave, it's been an incredible, not only last 18 months, but the whole transformation journey. If you think all the way back maybe to the LBO and forward from there, but, you know, stepping into the last 18 months, it's, you know, I, I think I remember talking with you and saying, Hey, you know, this scenario planning we did at the beginning of this pandemic journey was, you know, 30 different scenarios roughly, and none of which sort of panned out the way it actually did, which was a pretty incredible growth story as we think about how we helped customers, you know, drive workforce productivity, enabled their business model during the all remote work environment. That was the pandemic created. And couple that with the, you know, the, the rise then and the infrastructure spin as we got towards the tail end of the, of the pandemic coupled with, you know, the spin out of VMware, which culminated last November, as you know, as we completed that, which unlocked a pathway back to investment grade within unlocked, quite frankly shareholder value, capital allocation frameworks. It's really been a remarkable, you know, 18, 24 months. It's, it's never dull at Dell Technologies. Lemme put it that way. >>Well, well, I was impressed with you, Tom, before the leverage buyout and then what I've seen you guys navigate through is, is, is truly amazing. Well, let's talk about the challenging macro. I mean, I've been through a lot of downturns, but I've never seen anything quite like this with fed tightening and you're combating inflation, you got this recession looming, there's a bear market you got, but you got zero unemployment, you're rising wages, strong dollar, and it's very confusing. But it spending is, you know, it's somewhat softer, but it's still not bad. How are you seeing customers behave? How is Dell responding? >>Yeah, look, if you think about the markets we play in Dave, and we should start there as a grounding, you know, the, the total market, the core market that we think about is roughly 700 and, you know, 50 billion or so. If you think about our core IT services capability, you couple that with some of the, the growth initiatives that we're driving and the adjacent markets that that, that brings in, you're roughly talking a 1.4 to $1.5 trillion market opportunity, total addressable market. And so from from that perspective, we're extraordinarily bullish on where are we in the journey as we continue to grow and expand. You know, we have, we're number one share in just about every category that we plan, but yet when you look at that, you know, number one share in some of these, you know, our highest share position may be, you know, low thirties and maybe in the high end of storage you're at the upper end of thirties or 40%. >>But the opportunity there to continue to expand the core and, and continue to take share and outperform the market is truly extraordinary. So, so you step back and think about that, then you say, okay, what have we seen over the last number of months and quarters? It's been, you know, really great performance through the pandemic as, as you highlighted, we actually had a really strong first half of the year of our fiscal year 23 with revenue up 12% operating income up 12% for the first half. You know, what we talked about as you, if you might recall in our second quarter earnings, was the fact that we were starting to see softness. We had seen it in the consumer PC space, which is not a big area of focus for us in the sense of our, our total revenue stream, but we started to see commercial PC soften and we were starting to see server demand soften a bit and storage demand was, was holding quite frankly. >>And so we gave a a framework around guidance for the rest of the year as a, of what we were seeing. You know, the macro environment as you highlight it continues to be challenging. You know, if you look at inflation rates and the efforts by central banks across the globe to with through interest rate rise to press down and, and constrain growth and push down inflation, you couple that with supply chain challenges that continue principle, particularly in the ISG space. And then you couple that with the Ukraine war and the, and the energy crisis that that's created. And particularly in Europe, it's a pretty dynamic environment. And, but I'm confident, you know, I'm confident in the long term, but I do think that there is, you know, that there's navigation that we're going to have to do over the coming number of quarters, who knows quite how long, you know, to, to make sure the business is properly positioned and, you know, we've got a great portfolio and you're gonna talk to some of the team LA later on as you think your way through some of the solution capabilities we're driving what we're seeing around technology trends. >>So the opportunities there, there's some short term navigation that we're gonna need to do just to make sure that we address some of the, you know, some of the environmental things that we're seeing right >>Now. Yeah. And as a global company, of course you're converting local currencies back to appreciated dollars. That's, that's, that's another headwind. But as you say, I mean, that's math and you're navigating it. And again, I've seen a lot of downturns, but you know, the best companies not only weather the storm, but they invest in ways they that allow them to cut out, come out the other side stronger. So I wanna talk about that longer term opportunity, the relationship between the core, the the business growth. You mentioned the tam, I mean, even as a lower margin business, if, if you can penetrate that big of a tam, you could still throw off a lot of cash and you've got other levers to turn in potentially acquisitions and software. And, but so ultimately what gives you confidence in Dell's future? How should we think about Dell's future? >>Yeah, look, I, I think it comes down to we are extraordinarily excited about the opportunity over the long term digital transformation continues. I I am on numerous customer and CIO calls every week. Customers are continuing to invest in digital transformation and infrastructure to enable their business model. Yes, maybe it's gonna slow or, or pause or maybe they're not gonna invest quite at the same rate over the next number of quarters, but over the long term the needs are there. You look at what we're doing around the, the growth opportunities that we see, not only in our core space where we continue to invest, but also in the, what we call the strategic adjacencies. Things like 5G and modern telecom infrastructure as our, the telecom providers across the globe open up their, what a cl previous been closed ecosystems, you know, to open architecture. You think about, you know, what we're doing around the edge and the distribution now that we're seeing of compute and storage back to the edge given data gravity and latency matters. >>And so we're pretty bullish on the opportunity in front of us, you know, yes, we will and we're continuing to invest and you know, Jeff Boudreau talk about that I think later on in the program. So I'm excited about the opportunities and you look at our cash flow generation capability, you know, we are in, in, in normal times a, a cash flow generation machine and we'll continue to do so, You know, we've got a negative, you know, CCC in terms of, you know, how do we think about efficiency of working capital? And we look at our, you know, our capital allocation strategy, which has now returned, you know, somewhere in near 60% of our free cash flow back to shareholders. And so, you know, there's lots to, lots of reasons to think about why this, you know, we are a great sort of, I think value creation opportunity and a over the long term that the long term trends are with us, and I expect them to continue to be so, >>Yeah, and you guys, you, you, you do what you say you're gonna do. I mean, I said in my, in my other piece that I did recently, I think you guys put 46 billion on the, on the, on the balance sheet in terms of debt. That's down to I think 16 billion in the core, which that's quite remarking and that gives you some other opportunities. Give us your, your closing thoughts. I mean, you kind of just addressed why Dell is a good long term play, but I'll give you an opportunity to bring us home. >>Hey, Dave. Yeah, look, I, I just think if you look at the good, the market opportunity, the size and scale of Dell and how we think about the competitive advantages that we have, we com you know, if you look at, say we're a hundred billion revenue company, which we were a year, you know, last year, that as we reported roughly 60, 65 billion of that in the client, in in PC space, roughly, you know, 35 to 40 billion in the ISG or infrastructure space, those markets are gonna continue the opportunity to grow, share, grow at a premium to the market, drive, cash flow, drive, share gain is clearly there. You couple that with, you know, what we think the opportunity is in these adjacent markets, whether it's telecom, the edge, what we're thinking around data services, data management, you know, we, and you cut, you put that together with the long term trends around, you know, data creation and digital transformation. We are extraordinarily well positioned. We have the largest direct selling organization in in the technology space. We have the largest supply chain, our services footprint, you know, well positioned in my mind to take advantage of the opportunities as we move forward. >>Well Tom, really appreciate you taking the time to speak with us. Good to see you again. >>Nice seeing you. Thanks Dave. >>All right. You're watching the Cubes exclusive behind the scenes coverage of Dell Technology Summit 2022. In a moment, I'll be back with Jeff Boudreau. He's the president of Dell's ISG Infrastructure Solutions Group. He's responsible for all the important enterprise business at Dell, and we're excited to get his thoughts, keep it right there. >>Welcome back to the cube's exclusive coverage of the Dell Technology Summit. I'm Dave Ante and we're going inside with Dell execs to extract the signal from the noise. And right now we're gonna dig into customer requirements in a data intensive world and how cross cloud complexities get resolved from a product development perspective and how the ecosystem fits in to that mosaic to close the gaps and accelerate innovation. And with me now as friend of the cube, Jeff Boudreau, he's the president of the Infrastructure Solutions Group, ISG at Dell Technologies. Jeff, always good to see you. Welcome. >>You too. Thank you for having me. It's great to see you and thanks for having me back on the cube. I'm thrilled to be here. >>Yeah, it's our pleasure. Okay, so let's talk about what you're observing from customers today. You know, we talk all the time about operating in a data driven multi-cloud world, blah, blah, blah, blah. But what does that all mean to you when you have to translate that noise into products that solve specific customer problems, Jeff? >>Sure. Hey, great question. And everything always starts with our customers. There are motivation, they're top of mind, everything we do, my leadership team and I spend a lot of time with our customers. We're listening, we're learning, we're really understanding their pain points, and we wanna get their feedback in regards to our solutions, both turn and future offerings, really ensure that we're aligned to meeting their business objectives. I would say from these conversations, I'd say customers are telling us several things. First, it's all about data for no surprise going back to your opening. And second, it's about the multi-cloud world. And I'd say the big thing coming from all of this is that both of those are driving a ton of complexity for our customers. And I'll unpack that just a bit, which is first the data. As we all know, data is growing at unprecedented rates with more than 90% of the world's data being produced in the last two years alone. >>And you can just think of that in it's everywhere, right? And so as it as the IT world shifts towards distributed compute to support that data growth and that data gravity to really extract more value from that data in real time environments become inherently more and more hybrid and more and more multi-cloud. Which leads me to the second key point that I've been hearing from our customers, which it's a multi-cloud world, not new news. Customers by default have multiple clouds running across multiple locations that's on-prem and off-prem, it's running at the edge and it's serving a variety of different needs. Unfortunately, for most of our CU customers, multi-cloud is actually added to their complexity. As we've discussed. It's been a lot more of multi-cloud by default versus multi-cloud by design. And if you really think about our customers, I mean, I, I, I've talking to 'EM all the time, you think about the data complexity, that's the growth and the gravity. >>You think about their infrastructure complexity shifting from central to decentralized it, you think about multi-cloud complexity. So you have these walled gardens, if you will. So you have multiple vendors and you have these multiple contracts that all creates operational complexity for their teams around their processes of their tools. And then you think about security complexity that that dries with the, just the increased tax service and the list goes on. So what are we seeing for our customers? They, what they really want from us, and what they're asking us for is simplicity, not complexity. The immediacy, not latency. They're asking for open and aligned versus I'd say siloed and closed. And they're looking for a lot more agility and not rigidity in what we do. So they really wanna simplify everything. They're looking for a simpler IT and a more agile it. And they want more control of their data, right? >>And so, and they want to extract more of the value to enrich their business or their customer engagements, which all sounds pretty obvious and we've probably all heard it a bunch, but it's really hard to achieve. And that's where I believe, and we believe as Dell that we, it creates a big opportunity for us to really help our customers as that great simplifier of it. We're already doing this today on just a couple quick examples. First is Salesforce. We've supported recently, we've supported their global expansion with a multi-cloud solution to help them drive their business growth. Our solution delivered a reliable and consistent IT experience. We go back to that complexity and it was across a very distributed environment, including more than 60 data centers, 230 countries and hundreds of thousands of customers. It really provided Salesforce with the flexibility of placing workloads and data in an environment based on the right service level. >>Objective things like cost complexity or even security compliance considerations. The second customer A is a big New England Patriot fan. And Dan, Dave, I know you are as well. Oh yeah, this one's near, near data to my heart, it's the craft group. We just created a platform to span all the businesses that create more, I'd say data driven, immersive, secure experience, which is allowing them to capture data at the edge and use it for real time insights for things like cyber resiliency, but also like safety of the facilities. And as being a PA fan like I am, did they truly are meeting us where we are in our seats on their mobile devices and also in the parking lot. So just keep that in mind next time you're there. The bottom line, everything we're doing is really to make it simpler for our customers and to help them get the most of their data. I'd say we're gonna do this, is it through a multi-cloud by design approach, which we talked a lot about with you and and others at Dell Tech world earlier this year, >>Right? And we had Salesforce on, actually at Dell Tech group. The craft group is interesting because, you know, when you get to the stadium, you know, everybody's trying to get, get, get out to the internet and, and, but then the experience is so much better if you can actually, you know, deal with that edge. So I wanna talk about complexity though. You got data, you got, you know, the, the edge, you got multiple clouds, you got a different operating model across security model, different. So a lot of times in this industry we solve complexity with more complexity and it's like a bandaid. So I wanna, I wanna talk to, to how you're innovating around simplicity in ISG to address this complexity and what this means for Dell's long term strategy. >>Sure, I'd love to. So first I, I'd like to state the obvious, which are our investments in our innovations really focused on advancing, you know, our, our our customers needs, right? So we are really, our investments are gonna be targeted. We, we believe customers can have the most value. And some of that's gonna be around how we create strategic partnerships as well connected to what we just spoke about. Much of the complexity of customers have or experiencing is in the orchestration and management of all the data in all these different places and customers, you know, they must be able to quickly deploy and operate across cloud environments. They need to increase their developer productivity, really enabling those developers that do what they do best, which is creating more value for their customers than for their businesses. Our innovation efforts are really focused on addressing this by delivering an open and modern IT architecture that allows customers to run and manage any workload in any cloud anywhere. >>Data lives we're focused on, also focused on consumption based solutions, which allow for a greater degree of simplicity and flexibility, which they're really asking for as well. The foundation for this is our software to define common storage layer, that common storage layer. You can think about this Dave, as our ias if you will. It underpins our data access in mobility across all data types and locations. So you can think private, public, telecom, colo, edge, and it's delivered in a secure, holistic, and consistent cloud experience through Apex. We are making a ton of progress to let you just to be, just to be clear, we've made headway in things like Project Alpine, which you're very well aware of. This is our storage as a service. We announce this back in in January, which brings our unique software IP from our flagship storage platform to all the major public clouds. >>Really delivering the best of both worlds, allowing our customers to take advantage of Dell's enterprise class data services and storage software, such as performance at scale, resiliency, efficiency and security. But in addition to that, we're leveraging the breadth of the public cloud services, right? They're on demand scaling capabilities and access to analytical services. So in addition, we're really, we're, we're on our way to win at the edge as well with Project Frontier, which reduces complexity at the edge by creating an open and secure software platform to help our customers simplify their edge operations, optimize their edge environments and investments, secure that edge environment as well. I believe you're gonna be discussing Project Frontier here with Sam Gro Crop, the very near future. So I won't give up too many more details there. And lastly, we're also scaling Apex, which, oh, well, shifting from our vision, really shifting from vision to reality and introducing several new Apex service offerings, which are coming to market over the next month or so. And the intent is really supporting our customers on their as a service transitions by modernize the consumption experience and providing that flexible as a service model. Ultimately, we're trying to help our customers achieve that multi-cloud by design to really simplify it and unlock the power of their data. >>So some good examples there. I I like to talk about the super Cloud as you, you know, you're building on top of the, you know, hyperscale infrastructure and you got Apex is your cloud, the common storage layer, you call it your is. And that's, that's a ingredient in what we call the super cloud out to the edge. You have to have a common platform there and one of the hallmarks of a cloud company. And as you become a cloud company, everybody's a cloud company ecosystem becomes really, really important in terms of product development and, and innovation. Matt Baker always loves to stress it's not a zero zero sum game. And, and I think Super Cloud recognizes that, that there's value to be built on top of other clouds and, and, and of course on top of your infrastructure so that your ecosystem can add value. So what role does the ecosystem play there? >>For me, it's, it's pretty clear. It's, it's, it's critical. I can't say that enough above the having an open ecosystem. Think about everything we just discussed, and I agree with your super cloud analogy. I agree with what Matt Baker had said to you, I would certain no one company can actually address all the pain points and all the issues and challenges our customers are having on their own, not one. I think customers really want and deserve an open technology ecosystem, one that works together. So not these close stacks that discourages interoperability or stifles innovation and productivity of our, of each of our teams. We del I guess have a long history of supporting open ecosystems that really put customers first. And to be clear, we're gonna be at the center of the multi-cloud ecosystem and we're working with partners today to make that a reality. >>I mean, just think of what we're doing with VMware. We continue to build on our first and best alliances with them in August at their VMware explorer, which I know you were at, we announced several joint engineering initiatives to really help customers more easily manage and gain value from their data and their infrastructure. For multi-cloud specifically, we strength our relationship with VMware and with Tansu as part of that. In addition, just a few weeks ago we announced our partnership with Red Hat to simplify our multi-cloud deployments for managing containerized workloads. I'd say, and using your analogy, I could think of that as our multicloud platform. So that's kind of our PAs layer, if you will. And as you're aware, we have a very long standing and strategic partnership with Microsoft and I'd say stay tuned. There's a lot more to come with them and also others in this multicloud space. >>Shifting a bit to some of the growth engines that my team's responsible for the edge, right? As you think about data being everywhere, we've established partnerships for the Edge as well with folks like PTC and Litmus for the manufacturing edge, but also folks like Deep North for the retail edge analytics and data management. Using your Supercloud analogy, Dave the sa, right? This is our Sasa, we've announced that we're collaborating, partnering with folks like Snowflake and, and there's other data management companies as well to really simplify data access and accelerate those data insights. And then given customers choice of where they'd like to have their IT and their infrastructure, we've we're expanding our colo partnerships as well with folks like eex and, and they're allowing us to broaden our availability of Apex, providing customers the flexibility to take advantage of those as a service offerings wherever it's delivered and where they can get the most value. So those are just some you can hear from me. I think it's critical not only for, for us, I think it's critical for our customers. I think it's been critical, critical for the entire, you know, industry as a whole to really have that open technology ecosystem as we work with our customers on our multi-cloud solutions really to meet their needs. We'll continue to collaborate with whoever customers choose and you know, and who they want us to do business with. So I'd say a lot more coming in that space. >>So it's been an interesting three years for you, just, just over three years now since you've been made the president of the IS isg. And so you had to dig in and, and it was obviously a strange time around the world, but, but you really had to look at, okay, how do we modernize the platform? How do we make it, you know, cloud first, You've mentioned the edge, we're expanding. So what are the big takeaways? What do you want customers and our audience to understand? Just some closing thoughts and if you could summarize. >>Sure. So I'd say first, you know, we discussed we're working in a very fast paced, ever-changing market with massive amounts of data that needs to be managed. It's very complex and our customers need help with that complexity. I believe that Dell Technologies is uniquely positioned to help as their multicloud champion. No one else can solve the breadth and depth of the challenges like we can. And we're gonna help our customers move forward when they basically moving from a multi-cloud by default, as we've discussed before, to multicloud by design. And I'm really excited for the opportunity to work with our customers to help them expand that ecosystem as they truly realize the future of it and, and what they're trying to accomplish. >>Jeff, thanks so much. Really appreciate your time. Always a pleasure. Go pats and we'll see you on the blog. >>Thanks Dave. >>All right, you're watching exclusive insight insights from Dell Technology Summit on the cube, your leader in enterprise and emerging tech coverage. >>Hello everyone, this is Dave Lanta and you're watching the Cubes coverage of the Dell Technology Summit 2022 with exclusive behind the scenes interviews featuring Dell executive perspectives. And right now we're gonna explore Apex, which is Dell's as a service offering Dell's multi-cloud and edge strategies and the momentum around those. And we have news around Project Frontier, which is Dell's vision for its edge platform. And there's so much happening here. And don't forget it's cyber security Awareness month. Sam Grot is here, he's the senior vice president of marketing at Dell Technologies. Sam, always great to see you. How you doing? >>Always great to be here, Dave. >>All right, let's look at cloud. Everybody's talking about cloud Apex, multi-cloud, what's the update? How's it going? Where's the innovation and focal points of the strategy? >>Yeah, yeah. Look Dave, if you think back over the course of this year, you've really heard, heard us pivot as a company and discussing more and more about how multi-cloud is becoming a reality for our customers today. And when we listen and talk with our customers, they really describe multi-cloud challenges and a few key threads. One, the complexity is growing very, very quickly. Two, they're having a harder time controlling how their users are accessing the various different clouds. And then of course, finally the cloud costs are growing unchecked as well. So we, we like to describe this phenomenon as multi-cloud by design. We're essentially, organizations are waking up and seeing cloud sprawl around their organization every day. And this is creating more and more of those challenges. So of course at Dell we've got a strong point of view that you don't need to build multicloud by by default, rather it's multicloud by design where you're very intentional in how you do multicloud. >>And how we deliver multicloud by design is through apex. Apex is our modern cloud and our modern consumption experience. So when you think about the innovation as well, Dave, like we've been on a pretty quick track record here in that, you know, the beginning of this year we introduced brand new Apex backup services that provides that SAS based backup service. We've introduced or announced project outline, which is bringing our storage software, intellectual property from on-prem and putting it and running it natively in the public cloud. We've also introduced new Apex cyber recovery services that is simplifying how customers protect against cyber attacks. They can run an Amazon Azure, aw, I'm sorry, Amazon, aws, Azure or Google. And then, you know, we are really focused on this multi-cloud ecosystem. We announce key partnerships with SaaS providers such as Snowflake, where you can now access our information or our data from on-prem through the Snow Snowflake cloud. >>Or if needed, we can actually move the data to the Snowflake cloud if required. So we're continuing to build out that ecosystem SaaS providers. And then finally I would say, you know, we made a big strategic announcement just recently with Red Hat, where we're not only delivering new Apex container services, but we announce the strategic partnership to build jointly engineered solutions to address hybrid and multi-cloud solutions going forward. You know, VMware is gonna always continue to be a key partner of ours at the la at the recent VMware explorer we announced new Tansu integration. So, So Dave, I, I think in a nutshell we've been innovating at a very, very fast pace. We think there is a better way to do multi-cloud and that's multi-cloud by design. >>Yeah, we heard that at Dell Technologies world. First time I had heard that multi-cloud by design versus sort of default, which is great Alpine, which is sort of our, what we called super cloud in the making. And then of course the ecosystem is critical for any cloud company. VMware of course, you know, top partner, but the Snowflake announcement was very interesting Red Hat. So seeing that expand, now let's go out to the edge. How's it going with the edge expansion? There's gotta be new speaking of ecosystem, the edge is like a whole different, you know, OT type, that's right, ecosystem, that's telcos what and what's this new frontier platform all about? >>Yeah, yeah. So we've talked a lot about cloud and multi clouds, we've talked about private and hybrid cloud, we've talked about public clouds, clouds and cos, telcos, et cetera. There's really been one key piece of our multi-cloud and technology strategy that we haven't spent a lot of time on. And that's the edge. And we do see that as that next frontier for our customers to really gain that competitive advantage that is created from their data and get closer to the point of creation where the data lives. And that's at the edge. We see the edge infrastructure space growing very, very quickly. We see upwards of 300% year of year growth in terms of amount of data being created at the edge. That's almost 3000 exabytes of data by 2026. So just incredible growth. And the edge is not really new for Dell. We've been at it for over 20 years of delivering edge solutions. >>81% of the Fortune 100 companies in the US use Dell solutions today at the Edge. And we are the number one OEM provider of Edge solutions with over 44,000 customers across over 40 industries and things like manufacturing, retail, edge healthcare, and more. So Dave, while we've been at it for a long time, we have such a, a deep understanding of how our customers are using Edge solutions. Say the bottom line is the game has gotta change. With that growth that we talked about, the new use cases that are emerging, we've got to un unlock this new frontier for customers to take advantage of the edge. And that's why we are announcing and revealing Project Frontier. And Project Frontier in its most simplest form, is a software platform that's gonna help customers and organizations really radically simplify their edge deployments by automating their edge operations. You know, with Project Frontier organizations are really gonna be able to manage, OP, and operate their edge infrastructure and applications securely, efficiently and at scale. >>Okay, so it is, first of all, I like the name, it is software, it's a software architecture. So presumably a lot of API capabilities. That's right. Integration's. Is there hardware involved? >>Yeah, so of course you'll run it on Dell infrastructure. We'll be able to do both infrastructure orchestration, orchestration through the platform, but as well as application orchestration. And you know, really there's, there's a handful of key drivers that have been really pushing our customers to take on and look at building a better way to do the edge with Project Frontier. And I think I would just highlight a handful of 'em, you know, freedom of choice. We definitely see this as an open ecosystem out there, even more so at the Edge than any other part of the IT stack. You know, being able to provide that freedom of choice for software applications or I O T frameworks, operational technology or OT for any of their edge use cases, that's really, really important. Another key area that we're helping to solve with Project Frontier is, you know, being able to expect zero trust security across all their edge applications from design to deployment, you know, and of course backed by an end and secure supply chain is really, really important to customers. >>And then getting that greater efficiency and reliability of operations with the centralized management through Project Frontier and Zero Touch deployments. You know, one of the biggest challenges, especially when you get out to the far, far reach of the frontier is really IT resources and being able to have the IT expertise and we built in an enormous amount of automation helps streamline the edge deployments where you might be deploying a single edge solution, which is highly unlikely or hundreds or thousands, which is becoming more and more likely. So Dave, we do think Project Frontier is the right edge platform for customers to build their edge applications on now and certain, excuse me, certainly, and into the future. >>Yeah. Sam, no truck rolls. I like it. And you, you mentioned, you mentioned Zero trust. So we have Mother's Day, we have Father's Day. The kids always ask When's kids' day? And we of course we say every day is kids' day and every day should be cybersecurity awareness day. So, but we have cybersecurity awareness month. What does it mean for Dell? What are you hearing from customers and, and how are you responding? >>Yeah, yeah. No, there isn't a more prevalent pop of mind conversation, whether it's the boardroom or the IT departments or every company is really have been forced to reckon with the cybersecurity and ransom secure issues out there. You know, every decision in IT department makes impacts your security profile. Those decisions can certainly, positively, hopefully impact it, but also can negatively impact it as well. So data security is, is really not a new area of focus for Dell. It's been an area that we've been focused on for a long time, but there are really three core elements to cyber security and data security as we go forward. The first is really setting the foundation of trust is really, really important across any IT system. And having the right supply chain and the right partner to partner with to deliver that is kind of the foundation in step one. >>Second, you need to of course go with technology that is trustworthy. It doesn't mean you are putting it together correctly. It means that you're essentially assembling the right piece parts together. That, that coexist together in the right way. You know, to truly change that landscape of the attackers out there that are gonna potentially create risk for your environment. We are definitely pushing and helping to embrace the zero trust principles and architectures that are out there. So finally, while when you think about security, it certainly is not absolute all correct. Security architectures assume that, you know, there are going to be challenges, there are going to be pain points, but you've gotta be able to plan for recovery. And I think that's the holistic approach that we're taking with Dell. >>Well, and I think too, it's obviously security is a complicated situation now with cloud you've got, you know, shared responsibility models, you've got that a multi-cloud, you've got that across clouds, you're asking developers to do more. So I think the, the key takeaway is as a security pro, I'm looking for my technology partner through their r and d and their, you mentioned supply chain processes to take that off my plate so I can go plug holes elsewhere. Okay, Sam, put a bow on Dell Technology Summit for us and give us your closing thoughts. >>Yeah, look, I I think we're at a transformative point in it. You know, customers are moving more and more quickly to multi-cloud environments. They're looking to consume it in different ways, such as as a service, a lot of customers edge is new and an untapped opportunity for them to get closer to their customers and to their data. And of course there's more and more cyber threats out there every day. You know, our customers when we talk with them, they really want simple, consistent infrastructure options that are built on an open ecosystem that allows them to accomplish their goals quickly and successfully. And look, I think at Dell we've got the right strategy, we've got the right portfolio, we are the trusted partner of choice, help them lead, lead their, their future transformations into the future. So Dave, look, I think it's, it's absolutely one of the most exciting times in it and I can't wait to see where it goes from here. >>Sam, always fun catching up with you. Appreciate your time. >>Thanks Dave. >>All right. A Dell tech world in Vegas this past year, one of the most interesting conversations I personally had was around hybrid work and the future of work and the protocols associated with that and the mindset of, you know, the younger generation. And that conversation was with Jen Savira and we're gonna speak to Jen about this and other people and culture topics. Keep it right there. You're watching the cube's exclusive coverage of Dell Technology Summit 2022. Okay, we're back with Jen Vera, who's the chief human resource officer of Dell, and we're gonna discuss people, culture and hybrid work and leadership in the post isolation economy. Jen, the conversations that we had at Dell Tech World this past May around the new work environment were some of the most interesting and engaging that I had personally. So I'm really eager to, to get the update. It's great to see you again. Thanks for coming on the cube. >>Thanks for having me Dave. There's been a lot of change in just a short amount of time, so I'm excited to, to share some of our learnings >>With you. I, I mean, I bet there has, I mean, post pandemic companies, they're trying, everybody's trying to figure out the return to work and, and what it looks like. You know, last May there was really a theme of flexibility, but depending, we talked about, well, millennial or not young old, and it's just really was mixed, but, so how have you approached the topic? What, what are your policies? What's changed since we last talked? You know, what's working, you know, what's still being worked? What would you recommend to other companies to over to you? >>Yeah, well, you know, this isn't a topic that's necessarily new to Dell technology. So we've been doing hybrid before. Hybrid was a thing. So for over a decade we've been doing what we called connected workplace. So we have kind of a, a history and we have some great learnings from that. Although things did change for the entire world. You know, March of 2020, we went from kind of this hybrid to everybody being remote for a while. But what we wanted to do is, we're such a data driven company, there's so many headlines out there, you know, about all these things that people think could happen will happen, but there wasn't a lot of data behind it. So we took a step back and we asked our team members, How do you think we're doing? And we asked very kind of strong language because we've been doing this for a while. >>We asked them, Do you think we're leading in the world of hybrid in 86% of our team members said that we were, which is great, but we always know there's nuance right behind that macro level. So we, we asked 'em a lot of different questions and we just went on this kind of myth busting journey and we decided to test some of those things. We're hearing about Culture Willow Road or new team members will have trouble being connected or millennials will be different. And we really just collected a lot of data, asked our team members what their experience is. And what we have found is really, you don't have to be together in the office all the time to have a strong culture, a sense of connection, to be productive and to have it really healthy business. >>Well, I like that you were data driven around it in the data business here. So, but, but there is a lot of debate around your culture and how it suffers in a hybrid environment, how remote workers won't get, you know, promoted. And so I'm curious, you know, and I've, and I've seen some like-minded companies like Dell say, Hey, we, we want you guys to work the way you wanna work. But then they've, I've seen them adjust and say, Well yeah, but we also want you to know in the office be so we can collaborate a little bit more. So what are you seeing at Dell and, and, and how do you maintain that cultural advantage that you're alluding to in this kind of strange, new ever changing world? >>Yeah, well I think, look, one approach doesn't fit all. So I don't think that the approach that works for Dell Technologies isn't necessarily the approach that works for every company. It works with our strategy and culture. It is really important that we listen to our team members and that we support them through this journey. You know, they tell us time and time again, one of the most special things about our culture is that we provide flexibility and choice. So we're not a mandate culture. We really want to make sure that our team members know that we want them to be their best and do their best. And not every individual role has the same requirements. Not every individual person has the same needs. And so we really wanna meet them where they are so that they can be productive. They feel connected to the team and to the company and engaged and inspired. >>So, you know, for, for us, it really does make sense to go forward with this. And so we haven't, we haven't taken a step back. We've been doing hybrid, we'll continue to do hybrid, but just like if you, you know, we talk about not being a mandate. I think the companies that say nobody will come in or you have to come in three days a week, all of that feels more limiting. And so what we really say is, work out with your team, work out with your role, workout with your leader, what really makes the most sense to drive things forward. >>I >>You were, so >>That's what we, you were talking before about myths and you know, I wanna talk about team member performance cuz there's a lot of people believe that if, if you're not in the office, you have disadvantages, people in the office have the advantage cuz they get FaceTime. Is is that a myth? You know, is there some truth to that? What, what do you think about that? >>Well, for us, you know, we look, again, we just looked at the data. So we said we don't wanna create a have and have not culture that you're talking about. We really wanna have an inclusive culture. We wanna be outcome driven, we're meritocracy. But we went and we looked at the data. So pre pandemic, we looked at things like performance, we looked at rewards and recognition, we looked at attrition rates, we looked at sentiment, Do you feel like your leader is inspiring? And we found no meaningful differences in any of that or in engagement between those who worked fully remote, fully in the office or some combination between. So our data would bust that myth and say, it doesn't, you don't have to be in an office and be seen to get ahead. We have equitable opportunity. Now, having said that, you always have to be watching that data. And that's something that we'll continue to do and make sure that we are creating equal opportunity regardless of where you work. >>And it's personal too, I think, I think some people can be really productive at home. I happen to be one that I'm way more productive in the office cause the dogs aren't barking. I have less distractions. And so I think we think, and, and I think the takeaway that in just in talking to, to, to you Jen and, and folks at Dell is, you know, whatever works for you, we're we're gonna, we're gonna support. So I I wanted to switch gears a little bit, talk about leadership and, and very specifically empathic leadership has been said to be, have a big impact on attracting talent, retaining talent, but, but it's hard to have empathy sometimes. And I know I saw some stats in a recent Dell study. It was like two thirds the people felt like their organization underestimates the people requirements. And I, I ask myself, I'm like, what am I missing? I hope, you know, with our folks, so especially as it relates to, to transformation programs. So how can human resource practitioners support business leaders generally, specifically as it relates to leading with empathy? >>I think empathy's always been important. You have to develop trust. You can have the best strategy in the world, right? But if you don't feel like your leader understands who you are, appreciates the the value that you bring to the company, then you're not gonna get very far. So I think empathetic leadership has always been part of the foundation of a trusting, strong relationship between a leader and a team member. But if I think we look back on the last two years, and I imagine it'll be even more so as we go forward, empathetic leadership will be even more important. There's so much going on in the world, politically, socially, economically, that taking that time to say you want your team members to see you as credible, that you and confident that you can take us forward, but also that, you know, and understand me as a human being. >>And that to me is really what it's about. And I think with regard to transformation that you brought up, I think one of the things we forget about is leaders. We've probably been thinking about a decision or transformation for months or weeks and we're ready to go execute, we're ready to go operationalize that thing. And so sometimes when we get to that point, because we've been talking about it for so long, we send out the email, we have the all hands and we just say we're ready to go. But our team members haven't always been on that journey for those months that we have. And so I think that empathetic moment to say, Okay, not everybody is on a change curve where I am. Let's take a pause, let me put myself in their shoes and really think about how we bring everybody along. >>You know, Jen, in the spirit of myth busting, I mean I'm one of those people who felt like that a business is gonna have a hard time, harder time fostering this culture of collaboration and innovation post isolation economy as they, they could pre covid. But you know, I noticed there's a, there's an announcement today that came across my desk, I think it's from Newsweek. Yes. And, and it's the list of top hundred companies recognized for employee motivation satisfaction. And it was really interesting because you, you always see, oh, we're the top 10 or the top hundred, But this says as a survey of 1.4 million employees from companies ranging from 50 to 10,000 employees. And it recognizes the companies that put respect, caring, and appreciation for their employees at the center of their business model. And they doing so have earned the loyalty and respect of the people who work for them. >>Number one on the list is Dell sap. So congratulations SAP was number two. I mean, there really isn't any other tech company on there, certainly no large tech companies on there. So I always see these lists, they go, Yeah, okay, that's cool, top a hundred, whatever. But top one in, in, in an industry where there's only two in the top is, is pretty impressive. And how does that relate to fostering my earlier skepticism of a culture of collaboration? So first of all, congratulations, you know, how'd you do it? And how are you succeeding in, in this new world? >>Well thanks. It does feel great to be number one, but you know, it doesn't happen by accident. And I think while most companies have a, a culture and a spouse values, we have ours called the culture code. But it's really been very important to us that it's not just a poster on the wall or or words on paper. And so we embed our culture code into all of our HR practices, that whole ecosystem from recognition of rewards to performance evaluation, to interviewing, to development. We build it into everything. So it really reflects who we are and you experience it every day. And then to make sure that we're not, you know, fooling ourselves, we ask all of our employees, do you feel like the behaviors you see and the experience you have every day reflects the culture code? And 94% of our team members say that, in fact it does. So I think that that's really been kind of the secret to our success. If you, if you listen to Michael Dell, he'll always say, you know, the most special thing about Dell is our culture and our people. And that comes through being very thoughtful and deliberate to preserve and protect and continue to focus on our culture. >>Don't you think too that repetition and, well first of all, belief in that cultural philosophy is, is important. And then kind of repeating, like you said, Yeah, it's not just a poster in the wall, but I remember like, you know, when we're kids, your parents tell you, okay, power positive thinking, do one to others as others, you know, you have others do it to you. Don't make the say you're gonna do some dumb things but don't do the same dumb things twice and you sort of fluff it up. But then as you mature you say, Wow, actually those were, >>They might have had a >>Were instilled in me and now I'm bringing them forward and, you know, paying it forward. But, but so i, it, it, my, I guess my, my point is, and it's kind of a point observation, but I'll turn it into a question, is isn't isn't consistency and belief in your values really, really important? >>I couldn't agree with you more, right? I think that's one of those things that we talk about it all the time and as an HR professional, you know, it's not the HR people just talking about our culture, it's our business leaders, it's our ceo, it's our COOs ev, it's our partners. We share our culture code with our partners and our vendors and our suppliers and, and everybody, this is important. We say when you interact with anybody at Dell Technologies, you should expect that this is the experience that you're gonna get. And so it is something that we talk about that we embed in, into everything that we do. And I think it's, it's really important that you don't just think it's a one and done cuz that's not how things really, really work >>Well. And it's a culture of respect, you know, high performance, high expectations, accountability at having followed the company and worked with the company for many, many years. You always respect the dignity of your partners and your people. So really appreciate your time Jen. Again, congratulations on being number one. >>Thank you so much. >>You're very welcome. Okay. You've been watching a special presentation of the cube inside Dell Technology Summit 2022. Remember, these episodes are all available on demand@thecube.net and you can check out s silicon angle.com for all the news and analysis. And don't forget to check out wikibon.com each week for a new episode of breaking analysis. This is Dave Valante, thanks for watching and we'll see you next time.
SUMMARY :
My name is Dave Ante and I'll be hosting the program today In conjunction with the And we're gonna speak with Jen Savira, Dave, it's good to see you and good to be back with you. all that craziness, but the VMware spin, you had to give up your gross margin binky as the spin out of VMware, which culminated last November, as you know, But it spending is, you know, it's somewhat softer, but it's still not bad. category that we plan, but yet when you look at that, you know, number one share in some of these, So, so you step back and think about that, then you say, okay, what have we seen over the last number of months You know, the macro environment as you highlight it continues to be challenging. And again, I've seen a lot of downturns, but you know, the best companies not only weather the storm, You think about, you know, And so, you know, in my other piece that I did recently, I think you guys put 46 billion the edge, what we're thinking around data services, data management, you know, Good to see you again. Nice seeing you. He's responsible for all the important enterprise business at Dell, and we're excited to get his thoughts, how the ecosystem fits in to that mosaic to close the gaps and accelerate It's great to see you and thanks for having me back on the cube. But what does that all mean to you when you have to translate And I'd say the big thing coming from all of this is that both of those are driving And if you really think about our customers, I mean, I, I, I've talking to 'EM all the time, you think about the data complexity, And then you think about security complexity that that dries And that's where I believe, and we believe as Dell that we, it creates a big opportunity for us to really help And Dan, Dave, I know you are as well. you know, when you get to the stadium, you know, everybody's trying to get, get, get out to the internet all the data in all these different places and customers, you know, to let you just to be, just to be clear, we've made headway in things like Project Alpine, And the intent is really supporting And as you become And to be clear, So that's kind of our PAs layer, if you will. We'll continue to collaborate with whoever customers choose and you know, How do we make it, you know, cloud first, You've mentioned the edge, we're expanding. the opportunity to work with our customers to help them expand that ecosystem as they truly realize the Go pats and we'll see you All right, you're watching exclusive insight insights from Dell Technology Summit on the cube, And right now we're gonna explore Apex, which is Dell's as a service offering Where's the innovation and focal points of the strategy? So of course at Dell we've got a strong point of view that you don't need to build multicloud So when you think about you know, we made a big strategic announcement just recently with Red Hat, There's gotta be new speaking of ecosystem, the edge is like a whole different, you know, And that's the edge. And we are the number one OEM provider of Edge solutions with over 44,000 Okay, so it is, first of all, I like the name, it is software, And I think I would just highlight a handful of 'em, you know, freedom of choice. the edge deployments where you might be deploying a single edge solution, and, and how are you responding? And having the right supply chain and the right partner you know, there are going to be challenges, there are going to be pain points, but you've gotta be able to plan got, you know, shared responsibility models, you've got that a multi-cloud, you've got that across clouds, And look, I think at Dell we've got the right Sam, always fun catching up with you. with that and the mindset of, you know, the younger generation. There's been a lot of change in just a short amount of time, You know, what's working, you know, what's still being worked? So we took a step back and we asked our team members, How do you think we're doing? And what we have found is really, you don't have to be together in the office we want you guys to work the way you wanna work. And so we really wanna you know, we talk about not being a mandate. That's what we, you were talking before about myths and you know, I wanna talk about team member performance cuz Well, for us, you know, we look, again, we just looked at the data. I hope, you know, with our folks, socially, economically, that taking that time to say you want your team members And I think with regard to transformation that you But you know, So first of all, congratulations, you know, how'd you do it? And then to make sure that we're not, you know, fooling ourselves, it's not just a poster in the wall, but I remember like, you know, when we're kids, your parents tell you, Were instilled in me and now I'm bringing them forward and, you know, paying it forward. the time and as an HR professional, you know, it's not the HR people just talking the dignity of your partners and your people. And don't forget to check out wikibon.com each
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Jeff Boudreau | PERSON | 0.99+ |
Dave Valante | PERSON | 0.99+ |
Dave | PERSON | 0.99+ |
Dave Lanta | PERSON | 0.99+ |
Jeff | PERSON | 0.99+ |
Jen Savira | PERSON | 0.99+ |
Tom | PERSON | 0.99+ |
Tom Sweet | PERSON | 0.99+ |
Dan | PERSON | 0.99+ |
Sam | PERSON | 0.99+ |
Michael Dell | PERSON | 0.99+ |
Amazon | ORGANIZATION | 0.99+ |
Matt Baker | PERSON | 0.99+ |
Sam Grot | PERSON | 0.99+ |
35 | QUANTITY | 0.99+ |
Jen Vera | PERSON | 0.99+ |
March of 2020 | DATE | 0.99+ |
Microsoft | ORGANIZATION | 0.99+ |
Jay | PERSON | 0.99+ |
VMware | ORGANIZATION | 0.99+ |
Jen | PERSON | 0.99+ |
16 billion | QUANTITY | 0.99+ |
August | DATE | 0.99+ |
40% | QUANTITY | 0.99+ |
Dave Ante | PERSON | 0.99+ |
Vegas | LOCATION | 0.99+ |
Dell | ORGANIZATION | 0.99+ |
46 billion | QUANTITY | 0.99+ |
January | DATE | 0.99+ |
ORGANIZATION | 0.99+ | |
86% | QUANTITY | 0.99+ |
2026 | DATE | 0.99+ |
50 billion | QUANTITY | 0.99+ |
Red Hat | ORGANIZATION | 0.99+ |
ISG Infrastructure Solutions Group | ORGANIZATION | 0.99+ |
US | LOCATION | 0.99+ |
three years | QUANTITY | 0.99+ |
demand@thecube.net | OTHER | 0.99+ |
Sam Grow Cot | PERSON | 0.99+ |
50 | QUANTITY | 0.99+ |
Sam Gro Crop | PERSON | 0.99+ |
Jeff Boudreau, Dell Technologies| | Dell Technologies Summit 2022
>>Welcome back to the Cube's exclusive coverage of the Dell Technology Summit. I'm Dave Ante. We're going inside with Dell Execs to extract the signal from the noise. And right now we're gonna dig into customer requirements in a data intensive world and how cross cloud complexities get resolved from a product development perspective and how the ecosystem fits in to that mosaic to close the gaps and accelerate innovation. And with me now is friend of the Cube, Jeff Boudreau. He's the president of the Infrastructure Solutions Group, ISG at Dell Technologies. Jeff, always good to see you. Welcome. >>You too. Thank you for having me. It's great to see you and thanks for having me back on the key. I'm thrilled to be here. >>Yeah, it's our pleasure. Okay, so let's talk about what you're observing from customers today. You know, we talk all the time about operating in a data driven multi-cloud world, blah, blah, blah, blah. But what does that all mean to you when you have to translate that noise into products that solve specific customer problems, Jeff? >>Sure. Hey, great question. And everything always starts with our customers. They're our motivation. They're top of mind in everything we do. My leadership team and I spend a lot of time with our customers. We're listening, we're learning, we're really understanding their pain points, and we wanna get their feedback in regards to our solutions. Both turn and future offerings really ensured that we're aligned to meeting their business objectives. I would say from these conversations, I'd say customers are telling us several things. First, it's all about data for no surprise going back to your opening. And second, it's about the multi-cloud world. And I'd say the big thing coming from all of this is that both of those is driving a ton of complexity for our customers. And I'll unpack that just a bit, which is first the data. As we all know, data is growing at unprecedented rates with more than 90% of the world's data being produced in the last two years alone. >>And you can just think of that in its everywhere, right? And so as it is, the IT world shifts towards distributed compute to support that data growth and that data gravity to really extract more value from that data in real time environments become inherently more and more hybrid and more and more multi-cloud. Which leads me to the second key point that I've been hearing from our customers, which it's a multi-cloud world, not new news. Customers by default have multiple clouds running across multiple locations. That's on-prem and off, it's running at the edge and it's serving a variety of different needs. Unfortunately, for most of our CU customers, multicloud actually added to their complexity. As we've discussed, it's been a lot more of multicloud by default versus multicloud by design. Really think about customers, I I, I'm talking to 'EM all the time. You think about the data complexity, that's the growth in the graph. >>You think about their infrastructure complexity, shifting from central to decentralized it, you think of a multi-cloud complexity. So you have these walled gardens, if you will. So you have multiple vendors and you have these multiple contracts that all creates operational complexity for their teams around their processes of their tools. And then you think about the security complexity that that drives with the, just the increased tax service and the list goes on. So what are we seeing for our customers? They, what they really want from, also what they're asking us for is simplicity, not complexity. The immediacy, not latency. They're asking for open and align versus I'd say siloed and closed. And they're looking for a lot more agility and not rigidity in what we do. So they really wanna simplify everything. They're looking for a simpler IT in a more agile it, and they want more control of their data, right? >>And so, and they want to extract more of the value to enrich their business or their customer engagements, which all sounds pretty obvious and we've probably all heard it a bunch, but it's really hard to achieve. And that's where I believe, and we believe as Dell that we, it creates a big opportunity for us to really help our customers as that great simplifier of it. We're already doing this today on just a couple quick examples. First is Salesforce. We've supported recently, we've supported their global expansion with a multi-cloud solution to help them drive their business growth. Our solution delivered a reliable and consistent IT experience. We go back to that complexity and it was across a very distributed environment, including more than 60 data centers, 230 countries in hundreds of thousands of customers. It really provided Salesforce with the flexibility of placing workloads and data in an environment based on the right service level. >>Objective things like cost complexity or even security compliance considerations. The second customer A is a big New England Patriot fan. And Dan, Dave, I know you are as well. Oh yeah, this one's near, near data, my heart, it's the craft group. We just created a platform to span all their businesses that created more, I'd say data driven, immersive, secure experience, which is allowing them to capture data at the edge and use it for realtime insights for things like cyber resiliency, but also like safety of the facilities. And as being a pare fan like I am Dave, they truly are meeting us where we are in, in our seats on their mobile devices and also in the parking lot. So just keep that in mind next time you're there. But bottom line, everything we're doing is really to make it simpler for our customers and to help them get the most of their data. I'd say we're gonna do this, is it through a multi-cloud by design approach, which we talked a lot about with you and and others at Dell Tech world earlier this year, >>Right? And we had Salesforce on, actually at Dell Tech Group. The craft group is interesting because, you know, when you get to the stadium, you know, everybody's trying to get, get, get out to the internet and, and, but then the experience is so much better if you can actually, you know, deal with that edge. So I wanna talk about complexity though. You got data, you got, you know, the, the edge, you got multiple clouds, you got a different operating model across security models, different. So a lot of times in this industry we solve complexity with more complexity and it's like a bandaid. So I wanna, I wanna talk to, to how you're innovating around simplicity in ISG to address this complexity and what this means for Dell's long term strategy. >>Sure, I'd love to. So first I, I'd like to state the obvious, which are our investments in our innovations really focused on advancing, you know, our, our our customers needs, right? So we are really, our investments are gonna be targeted. We, we believe customers can have the most value. And some of that's gonna be around how we create strategic partnerships as well connected to what we just spoke about. Much of the complexity of customers have or experiencing is in the orchestration and management of all the data in all these different places and customers, you know, they must be able to quickly deploy and operate across cloud environments. They need to increase their developer productivity, really enabling those developers that do what they do best, which is creating more value for their customers than for their businesses. Our innovation efforts are really focused on addressing this by delivering an open and modern IT architecture that allows customers to run and manage any workload in any cloud anywhere. >>Data lives we're focused on, also focused on consumption based solutions, which allow for a greater degree of simplicity and flexibility, which they're really asking for as well. The foundation for this is our software defined common storage layer. That common storage layer, You can think about this, Dave, as our ias if you will. It underpins our data access in mobility across all data types of locations. So you can think private, public, telecom, colo, edge, and it's delivered in a secure, holistic, and consistent cloud experience through Apex. We are making a ton of progress to let you, just to be, just to be clear, we made headway in things like Project Alpine, which you're very well aware of. This is our storage as a service. We announce us back in, in January, which brings our unique software IP from our flagship storage platform to all the major public clouds, really delivering the best of both world, allowing our customers to take advantage of Dell's enterprise class data services and storage software, such as performance at scale, resiliency, efficiency and security. >>But in addition to that, we're leveraging the breadth of the public cloud services, right? They're on demand scaling capabilities and access to analytical services. So in addition, we're really, we're on our way to win at the edge as well with Project Frontier, which reduces complexity at the edge by creating an open and secure software platform to help our customers simplify their edge operations, optimize their edge environments and investments, secure that edge environment as well. I believe you're gonna be discussing Cru in Frontier here with Sam Broco in the very near future. So I won't give up more, too many more details there. And lastly, we're also scaling Apex, which, you know, well shifting from our vision, really shifting from vision to reality and introducing several new Apex service offerings, which are coming to market over the next month or so. And the intent is really supporting our customers on their as a service transitions by modernize the consumption experience and providing that flexible as a service model. Ultimately, we're trying to help our customers achieve that multicloud by design to really simplify it and unlock the power of their data. >>So some good examples there. I I like to talk about the super Cloud as you, you know, you're building on top of the, you know, hyperscale infrastructure and you got Apex is your cloud, the common storage layer, you call it your ISAs. And that's, that's a ingredient in what we call the super cloud out to the edge. You have to have a common platform there and one of the hallmarks of a cloud company. And as you become a cloud company, everybody's a cloud company ecosystem becomes really, really important in terms of product development and, and innovation. Matt Baker always loves to stress it's not a zero sum game. And, and I think Super Cloud recognizes that, that there's value to be built on top of other clouds and, and, and of course on top of your infrastructure so that your ecosystem can add value. So what role does the ecosystem play there? >>For me, it's, it's pretty clear. It's, it's, it's critical. I can't say that enough above the having an open ecosystem. Think about everything we just discussed, and I agree with your super cloud analogy. I agree with what Matt Baker had said to you, I would certain no one company can actually address all the pain points and all the issues and challenges our customers are having on their own. Not one. I think customers really want and deserve an open technology ecosystem, one that works together. So not these close stacks that discourages interoperability or stifles innovation and productivity of each of our teams. We del I guess, have a long history of supporting open ecosystems that really put customers first. And to be clear, we're gonna be at the center of the multi-cloud ecosystem and we're working with partners today to make that a reality. I mean, just think of what we're doing with VMware. >>We continue to build on our first and best alliances with them in August at their VMware explorer, which I know you were at. We announced several joint engineering initiatives to really help customers more easily manage and gain value from their data and their infrastructure. For multi-cloud. Specifically, we strength our relationship with VMware and know with Tansu as part of that. In addition, just a few weeks ago we announced our partnership with Red Hat to simplify our multicloud deployments for managing containerized workloads. I'd say, and using your analogy, I could think of that as our multicloud platform. So that's kind of our PAs layer, if you will. And as you're aware, we have a very long standing and strategic partnership with Microsoft and I'd say stay tuned. There's a lot more to come with them and also others in this multi-cloud space. Shifting a bit to some of the growth engines that my team's responsible for the edge, right? >>As you think about data being everywhere, we've established partnerships for the Edge as well with folks like PTC and Litmus for the manufacturing edge, but also folks like Deep North for the retail edge analytics in data management, using your Supercloud analogy, Dave the sa, right? This is our SAS layer. We've announced that we're collaborating, partnering with folks like Snowflake and, and there's other data management companies as well to really simplify data access and accelerate those data insights. And then given customers choice of where they'd like to have their IT and their infrastructure, we've we're expanding our colo partnerships as well with folks like Equinox and, and they're allowing us to broaden our availability of Apex, providing customers the flexibility, take advantage of those as a service offerings wherever it's delivered and where they can get the most value. So those are just some you can hear from me. I think it's critical not only for, for us, I think it's critical for our customers. I think it's been critical, critical for the entire, you know, industry as a whole to really have that open technology ecosystem as we work with our customers on our multi-cloud solutions really to meet their needs. We'll continue to collaborate with whoever customers choose and you know, and who they want us to do business with. So I'd say a lot more coming in that space. >>So it's been an interesting three years for you, just, just over three years now since you've been made the president of the I isg. And so you had to dig in and it was obviously strange time around the world, but, but you really had to look at, okay, how do we mo modernize the platform? How do we make it, you know, cloud first? You've mentioned the edge, we're expanding. So what are the big takeaways? What do you want customers and our audience to understand? Just some closing thoughts and if you could summarize. >>Sure. So I'd say first, you know, we've discussed, we're working in a very fast paced, ever changing market with massive amounts of data that needs to be managed. It's very complex and our customers need help with that complexity. I believe that Dell Technologies is uniquely positioned to help as their multi-cloud champion. No one else can solve the breadth and depth of the challenges like we can. And we're gonna help our customers move forward when they basically moving from a multicloud by default, as we've discussed before, to multicloud by design. And I'm really excited for the opportunity to work with our customers to help them expand that ecosystem as they truly realize the future of it and, and what they're trying to accomplish. >>Jeff, thanks so much. Really appreciate your time. Always a pleasure. Go pats and we'll see you on the blog. >>Thanks Dave. >>All right, you're watching exclusive insights from Dell Technology Summit on the cube, your leader in enterprise and emerging tech coverage.
SUMMARY :
how the ecosystem fits in to that mosaic to close the gaps and accelerate It's great to see you and thanks for having me back on the key. But what does that all mean to you when you have to translate And I'd say the big thing coming from all of this is that both of those is driving And you can just think of that in its everywhere, right? And then you think about the security complexity that that drives We go back to that complexity and which we talked a lot about with you and and others at Dell Tech world earlier this year, you know, when you get to the stadium, you know, everybody's trying to get, get, get out to the internet of all the data in all these different places and customers, you know, So you can think private, public, And lastly, we're also scaling Apex, which, you know, well shifting from our vision, really shifting from vision to reality And as you become And to be clear, We continue to build on our first and best alliances with them in August at We'll continue to collaborate with whoever customers choose and you know, around the world, but, but you really had to look at, okay, how do we mo modernize the platform? And I'm really excited for the opportunity to work with our customers to help them expand that ecosystem as Go pats and we'll see you All right, you're watching exclusive insights from Dell Technology Summit on the cube,
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Jeff Boudreau | PERSON | 0.99+ |
Dan | PERSON | 0.99+ |
Jeff | PERSON | 0.99+ |
Matt Baker | PERSON | 0.99+ |
Dave | PERSON | 0.99+ |
Microsoft | ORGANIZATION | 0.99+ |
August | DATE | 0.99+ |
Equinox | ORGANIZATION | 0.99+ |
Dell | ORGANIZATION | 0.99+ |
Dave Ante | PERSON | 0.99+ |
January | DATE | 0.99+ |
First | QUANTITY | 0.99+ |
Sam Broco | PERSON | 0.99+ |
Dell Technologies | ORGANIZATION | 0.99+ |
three years | QUANTITY | 0.99+ |
second | QUANTITY | 0.99+ |
Dell Technologies | ORGANIZATION | 0.99+ |
Infrastructure Solutions Group | ORGANIZATION | 0.99+ |
first | QUANTITY | 0.99+ |
VMware | ORGANIZATION | 0.99+ |
Red Hat | ORGANIZATION | 0.99+ |
PTC | ORGANIZATION | 0.99+ |
230 countries | QUANTITY | 0.99+ |
Dell Tech Group | ORGANIZATION | 0.99+ |
Both | QUANTITY | 0.99+ |
more than 90% | QUANTITY | 0.99+ |
more than 60 data centers | QUANTITY | 0.99+ |
both | QUANTITY | 0.99+ |
Deep North | ORGANIZATION | 0.98+ |
Dell Technology Summit | EVENT | 0.98+ |
over three years | QUANTITY | 0.98+ |
Dell Tech | ORGANIZATION | 0.98+ |
Litmus | ORGANIZATION | 0.97+ |
Tansu | ORGANIZATION | 0.97+ |
today | DATE | 0.97+ |
each | QUANTITY | 0.97+ |
Project Alpine | ORGANIZATION | 0.96+ |
Frontier | ORGANIZATION | 0.96+ |
Dell Technologies Summit | EVENT | 0.96+ |
ISG | ORGANIZATION | 0.95+ |
second key point | QUANTITY | 0.95+ |
Apex | ORGANIZATION | 0.95+ |
next month | DATE | 0.95+ |
earlier this year | DATE | 0.94+ |
I isg | ORGANIZATION | 0.92+ |
Edge | ORGANIZATION | 0.92+ |
Salesforce | ORGANIZATION | 0.9+ |
Snowflake | ORGANIZATION | 0.9+ |
one | QUANTITY | 0.87+ |
hundreds of thousands | QUANTITY | 0.85+ |
both world | QUANTITY | 0.85+ |
few weeks ago | DATE | 0.83+ |
New England Patriot | ORGANIZATION | 0.81+ |
couple | QUANTITY | 0.8+ |
Project Frontier | ORGANIZATION | 0.8+ |
second customer | QUANTITY | 0.8+ |
Apex | TITLE | 0.77+ |
last two years | DATE | 0.76+ |
multicloud | ORGANIZATION | 0.75+ |
super Cloud | TITLE | 0.67+ |
Super Cloud | TITLE | 0.63+ |
customers | QUANTITY | 0.61+ |
2022 | DATE | 0.58+ |
VMware explorer | TITLE | 0.58+ |
Supercloud | ORGANIZATION | 0.56+ |
Cube | ORGANIZATION | 0.55+ |
Cube | COMMERCIAL_ITEM | 0.51+ |
Execs | COMMERCIAL_ITEM | 0.39+ |
Tom Sweet | Dell Technologies Summit
(upbeat music) >> As we said in our analysis of Dell's future, the transformation of Dell into Dell EMC and now Dell Technologies has been one of the most remarkable stories in the history of the technology industry. After years of successfully integrated EMC and becoming VMware's number one distribution channel, the metamorphosis of Dell culminated in the spin out of VMware from Dell and a massive wealth creation milestone pending of course the Broadcom acquisition of VMware. So where's that leave Dell and what does the future look like for this technology powerhouse? Hello, and welcome to theCUBE's exclusive coverage of Dell Technologies Summit 2022. My name is Dave Vellante and I'll be hosting the program. Today, in conjunction with the Dell Tech Summit, we'll hear from four of Dell senior executives. Tom Sweet is the CFO of Dell Technologies. He's going to share his views of the company's position and opportunities and answer the question why is Dell a good long term investment? Then we'll hear from Jeff Boudreau, who's the president of Dell's ISG business unit. He's going to talk about the product angle and specifically how Dell is thinking about solving the multi-cloud challenge. And then Sam Groccot is the senior vice President of marketing. He's going to come in the program and give us the update on Apex, which is Dell's as-a-service offering. And a new edge platform called Project Frontier. By the way, it's also Cybersecurity Awareness Month and we're going to see if Sam has any stories there. And finally, for a company that's nearly 40 years old, Dell has some pretty forward thinking philosophies when it comes to its culture and workforce. And we're going to speak with Jen Saavedra who's Dell's Chief Human Resource officer about hybrid work and how Dell is thinking about the future of work. We're going to geek out all day and talk multi-cloud and Edge and latency, but first, let's talk wallet. Tom Sweet, CFO, and one of Dell's key business architects. Welcome back to "theCUBE." >> Dave, it's good to see you and good to be back with you, so thanks for having me today. >> Yeah, you bet. Tom, it's been a pretty incredible past 18 months. Not only the pandemic and all that craziness, but the VMware spin. You had to give up your gross margin pinky, just kidding, and of course the macro environment. I'm so sick of talking about the macro. But putting that aside for a moment what's really remarkable is that for a company of your size, you've had some success at the top line which I think surprised a lot of people. What are your reflections on the last 18 to 24 months? >> Well Dave, it's been an incredible, not only last 18 months, but the whole transformation journey if you think all the way back maybe to the LBO and forward from there. But stepping into the last 18 months, it's, I think I remember talking with you and saying, "Hey, the scenario planning we did at the beginning of this pandemic journey was 30 different scenarios roughly, and none of which sort of panned out the way it actually did," which was a pretty incredible growth story. As we think about how we helped customers, drive workforce productivity, enable their business model during the all remote work environment that was the pandemic created. And couple that with the rise then and the infrastructure spin as we got towards the tail end of the pandemic coupled with the spin out of VMware, which culminated last November as we completed that, which unlocked a pathway back to investment grade, which then unlocked, quite frankly shareholder value, capital allocation frameworks. It's really been a remarkable 18, 24 months. It's, it's never dull at Dell Technologies. Let me put it that way. >> Well, I was impressed with you Tom before the leverage buyout and then what I've seen you guys navigate through is truly amazing. Well, let's talk about the challenging macro. I mean, I've been through a lot of downturns but I've never seen anything quite like this with Fed tightening, and you're combating inflation, you got this recession looming. There's a bear market. You got, but you got zero unemployment, you're rising wages, strong dollar, and it's very confusing. But IT spending is, it's somewhat softer, but it's still not bad. How are you seeing customers behave? How is Dell responding? >> Yeah look, if you think about the markets we play in Dave, we should start there as a grounding. The total market, the core market that we think about is roughly $750 billion or so, if you think about our core IT services capability. If you couple that with some of the growth initiatives that we're driving and the adjacent markets that that that brings in, you're roughly talking a 1.4 to $1.5 trillion market opportunity total addressable market. And so from that perspective we're extraordinarily bullish on where are we in the journey as we continue to grow and expand. We have, we're number one share in just about every category that we plan, but yet when you look at that, number one share in some of these, our highest share position may be low 30s and maybe in the high end of storage or at the upper end of 30s or 40%. But the opportunity there to continue to expand the core and continue to take share and outperform the market is truly extraordinary. So if you step back and think about that, then you say, okay, what have we seen over the last number of months and quarters? It's been really great performance through the pandemic as you highlighted. We actually had a really strong first half of the year of our fiscal year '23 with revenue up 12% operating income, up 12% for the first half. What we talked about if you might recall in our second quarter earnings was the fact that we were starting to see softness. We had seen it in the consumer PC space, which is not a big area of focus for us in the sense of our total revenue stream. But we started to see commercial PC soften and we were starting to see server demand soften a bit and storage demand was holding quite frankly. And so we gave a framework around guidance for the rest of the year as a result of what we were seeing. The macro environment as you highlighted continues to be challenging. If you look at inflation rates and the efforts by central banks across the globe through interest rate rise to press down and constrain growth and push down inflation, you couple that with supply chain challenges that continue particularly in the ISG space. And then you couple that with the Ukraine war and the energy crisis that that's created. And particularly in Europe, it's a pretty dynamic environment. But I'm confident, I'm confident in the long term. But I do think that there is, there's navigation that we're going to have to do over the coming number of quarters. Who knows quite how long. To make sure the business is properly positioned and we've got a great portfolio and you're going to talk to some of the team later on as you think your way through some of the solution capabilities we're driving, what we're seeing around technology trends. So the opportunity is there. There's some short term navigation that we're going to need to do just to make sure that we address some of the environmental things that we're seeing right now. >> Yeah, and as a global company of course you're converting local currencies back to appreciated dollars. That's another headwind. But as you say, I mean, that's math and you're navigating it. And again, I've seen a lot of downturns, but the best companies not only weather their storm, but they invest in ways they that allow them to come out the other side stronger. So I want to talk about that longer term opportunity the relationship between the core, the the business growth. You mentioned the TAM. I mean, even as a lower margin business, if you can penetrate that big of a TAM, you could still throw off a lot of cash and you've got other levers to turn in potentially acquisitions and software. But so ultimately what gives you confidence in Dell's future? How should we think about Dell's future? >> Yeah look, I think it comes down to we are extraordinarily excited about the opportunity over the long term. Digital transformation continues. I am on numerous customer and CIO conference calls every week. Customers are continuing to invest in digital transformation, in infrastructure, to enable their business model. Yes, maybe it's going to slow or pause, or maybe they're not going to invest quite at the same rate over the next number of quarters but over the long term the needs are there. You look at what we're doing around the growth opportunities that we see, not only in our core space where we continue to invest, but also in the, what we call the strategic adjacencies. Things like 5G and modern telecom infrastructure as our, the telecom providers across the globe open up their what previous been closed ecosystems to open architecture. You think about, what we're doing around the EDGE and the distribution now that we're seeing of compute and storage back to the edge given data, gravity, and latency matters. And so we're pretty bullish on the opportunity in front of us. Yes, we will, and we're continuing to invest. And you hear Jeff Boudreau talk about that I think later on in the program. So I'm excited about the opportunities and you look at our cash flow generation capability, we are in in normal times a cash flow generation machine and we'll continue to do so. We've got a negative CCC in terms of how do we think about efficiency of working capital? And we look at our capital allocation strategy which has now returned somewhere in near 60% of our free cash flow back to shareholders. And so, there's lots to, lots of reasons to think about why this, we are a great sort of, I think value creation opportunity in a over the long term. That the long term trends are with us and I expect them to continue to be so. >> Yeah, and you guys, you do what you say you're going to do. I mean, I said in my other piece that I did recently, I think you guys put $46 billion on the balance sheet in terms of debt. That's down to I think 16 billion in the core which that's quite remarking. That gives you some other opportunities. Give us your closing thoughts. I mean, you kind of just addressed why Dell is a good long term play, but I'll give you an opportunity to bring us home. >> Hey Dave, yeah look, I just think if you look at the grid, the market opportunity, the size and scale of Dell and how we think about the competitive advantages that we have, we can, if you look at say we're a hundred billion dollar revenue company which we were last year as we reported. Roughly 60, 65 billion of that in the client in PC space, roughly 35 to 40 billion in the ISG or infrastructure space. Those markets are going to continue. The opportunity to grow share, grow at a premium to the market, drive cash flow, drive share gain is clearly there. And couple that with what we think the opportunity is in these adjacent markets, whether it's telecom, the EDGE, what we're thinking around data services, data management, we, and you put that together with the long term trends around data creation and digital transformation. We are extraordinarily well positioned. We have the largest direct selling organization in the technology space. We have the largest supply chain. Our services footprint. Well positioned in my mind to take advantage of the opportunities as we move forward. >> Well Tom I really appreciate you taking the time to speak with us. Good to see you again. >> Nice seeing you. Thanks Dave. >> All right, you're watching theCUBE's exclusive behind the scenes coverage of Dell Technology Summit 2022. In a moment, I'll be back with Jeff Boudreau. He's the president of Dell's ISG Infrastructure Solutions Group. He's responsible for all the important enterprise business at Dell, and we're excited to get his thoughts. Keep it right there. (upbeat music)
SUMMARY :
and opportunities and answer the question and good to be back with you, and of course the macro environment. and the infrastructure spin the challenging macro. and maybe in the high end of but the best companies not and the distribution now 16 billion in the core of the opportunities as we move forward. Good to see you again. He's the president
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Jeff Boudreau | PERSON | 0.99+ |
Dave Vellante | PERSON | 0.99+ |
Jen Saavedra | PERSON | 0.99+ |
Tom | PERSON | 0.99+ |
Sam Groccot | PERSON | 0.99+ |
Tom Sweet | PERSON | 0.99+ |
Sam | PERSON | 0.99+ |
Dave | PERSON | 0.99+ |
$46 billion | QUANTITY | 0.99+ |
1.4 | QUANTITY | 0.99+ |
Dell | ORGANIZATION | 0.99+ |
16 billion | QUANTITY | 0.99+ |
ISG Infrastructure Solutions Group | ORGANIZATION | 0.99+ |
Europe | LOCATION | 0.99+ |
VMware | ORGANIZATION | 0.99+ |
last November | DATE | 0.99+ |
40% | QUANTITY | 0.99+ |
18 | QUANTITY | 0.99+ |
last year | DATE | 0.99+ |
Today | DATE | 0.99+ |
Dell Technologies | ORGANIZATION | 0.99+ |
today | DATE | 0.99+ |
30 different scenarios | QUANTITY | 0.99+ |
Dell Tech Summit | EVENT | 0.98+ |
four | QUANTITY | 0.98+ |
fiscal year '23 | DATE | 0.98+ |
40 billion | QUANTITY | 0.97+ |
30s | QUANTITY | 0.97+ |
first half | QUANTITY | 0.96+ |
35 | QUANTITY | 0.96+ |
nearly 40 years old | QUANTITY | 0.96+ |
$1.5 trillion | QUANTITY | 0.96+ |
Dell Technology Summit 2022 | EVENT | 0.96+ |
lion | QUANTITY | 0.95+ |
EMC | ORGANIZATION | 0.95+ |
pandemic | EVENT | 0.95+ |
one | QUANTITY | 0.94+ |
Dell Technologies Summit | EVENT | 0.94+ |
first | QUANTITY | 0.94+ |
Dell Technologies Summit 2022 | EVENT | 0.93+ |
Dell EMC | ORGANIZATION | 0.93+ |
near 60% | QUANTITY | 0.91+ |
zero unemployment | QUANTITY | 0.91+ |
24 months | QUANTITY | 0.9+ |
60, 65 billion | QUANTITY | 0.9+ |
Apex | ORGANIZATION | 0.89+ |
Broadcom | ORGANIZATION | 0.89+ |
Ukraine war | EVENT | 0.87+ |
Cybersecurity Awareness Month | EVENT | 0.86+ |
12% | QUANTITY | 0.86+ |
ISG | ORGANIZATION | 0.84+ |
hundred billion dollar | QUANTITY | 0.83+ |
TAM | ORGANIZATION | 0.81+ |
last 18 months | DATE | 0.8+ |
$750 bil | QUANTITY | 0.79+ |
past 18 months | DATE | 0.78+ |
DTS Tom Sweet
(upbeat music) >> As we said in our analysis of Dell's future, the transformation of Dell into Dell EMC and now Dell Technologies has been one of the most remarkable stories in the history of the technology industry. After years of successfully integrated EMC and becoming VMware's number one distribution channel, the metamorphosis of Dell culminated in the spin out of VMware from Dell and a massive wealth creation milestone pending of course the Broadcom acquisition of VMware. So, where's that leave Dell and what does the future look like for this technology powerhouse? Hello and welcome to the Cube's exclusive coverage of Dell Technologies Summit 2022. My name is Dave Vellante, and I'll be hosting the program. Today in conjunction with the Dell Tech Summit. We'll hear from four of Dell senior executives. Tom Sweet is the CFO of Dell Technologies. He's going to share his views of the company's position and opportunities and answer the question, why is Dell a good long term investment? Then we'll hear from Jeff Boudreau, who's the president of Dell's ISG business unit, who's going to talk about the product angle and specifically how Dell is thinking about solving the multi-cloud challenge. And then Sam Grocott is the Senior Vice President of Marketing is going to come in the program and give us the update on APEX which is Dell's as-a-service offering and a new edge platform called Project Frontier. By the way, it's also Cybersecurity Awareness Month, and we're going to see if Sam has any stories there. And finally, for a company that's nearly 40 years old, Dell has some pretty forward thinking philosophies when it comes to its culture and workforce. And we're going to speak with Jen Saavedra, who's Dell's chief Human Resource officer about hybrid work and how Dell is thinking about the future of work. We're going to geek out all day and talk multi-cloud and edge and latency, but first, let's talk wallet. Tom Sweet CFO, and one of Dell's key business architects. Welcome back to The Cube. >> Dave, it's good to see you and good to be back with you. So, thanks for having me today. >> Yeah, you bet. Tom, it's been a pretty incredible past 18 months. Not only the pandemic and all that craziness but the VMware spin. You had to give up your gross margin binky just kidding, and of course the macro environment. I'm so sick of talking about the macro but putting that aside for a moment, what's really remarkable is that for a company at your size you've had some success at the top line which I think surprised a lot of people. What are your reflections on the last 18 to 24 months? >> Well, Dave, it's been an incredible, not only last 18 months but the whole transformation journey. If you think all the way back maybe to the LBO and forward from there, but, you know stepping into the last 18 months, it's, you know, I think I remember talking with you and saying, Hey you know, the scenario planning we did at the beginning of this pandemic journey was, you know 30 different scenarios roughly, and none of which sort of panned out the way it actually did which was a pretty incredible growth story as we think about how we helped customers, you know drive workforce productivity, enable their business model during the all remote work environment, that was the pandemic created. And couple that with the, you know, the rise then in the infrastructure spin as we got towards the tail end of the, of the pandemic coupled with, you know, the spin out of VMware, which culminated last November, as you know as we completed that, which unlocked a pathway back to investment grade, we still unlocked, quite frankly shareholder value, capital allocation frameworks. It's really been a remarkable, you know, 18, 24 months. It's never dull at Dell Technologies Let me put it that way. >> Well, well, I was impressed with you, Tom before the leverage buyout and then what I've seen you guys navigate through is truly amazing. Well, let's talk about the challenging macro. I mean, I've been through a lot of downturns, but I've never seen anything quite like this with fed tightening and you combating inflation, you got this recession looming, there's a bear market you got but you got zero unemployment you're rising wages, strong dollar, and it's very confusing. But IT spending is, you know, it's somewhat softer, but it's still not bad. How are you seeing customers behave? How is Dell responding? >> Yeah, look, if you think about the markets we play in Dave and we should start there as a grounding, you know, the total market, the core market that we think about is roughly 700 and, you know, $50 billion or so if you think about our core IT services capability. You couple that with some of the growth initiatives that we're driving and the adjacent markets that that brings in, you're roughly talking a 1.4 to $1.5 trillion market opportunity total addressable market. And so from, from that perspective we're extraordinarily bullish on where are we in the journey as we continue to grow and expand. You know, we have, we're number one share in just about every category that we plan but yet when you look at that, you know number one share in some of these, you know our highest share position may be, you know low 30s and maybe in the high end of storage you're at the upper end of 30 or 40%. But the opportunity there to continue to expand the core and continue to take share and outperform the market is truly extraordinary. So, if you step back and think about that, then you say, okay, what have we seen over the last number of months and quarters? It's been, you know, really great performance through the pandemic as, as you highlighted. We actually had a really strong first half of the year of our fiscal year 23 with revenue up 12% operating income up 12% for the first half. You know, what we talked about is you, if you might recall in our second quarter earnings was the fact that we were starting to see softness. We had seen it in the consumer PC space which is not a big area of focus for us in the sense of our, our total revenue stream. But we started to see commercial PC soften, and we were starting to see server demand soften a bit and storage demand was, was holding quite frankly. And so, we gave a a framework around guidance for the rest of the year as a result of what we were seeing. You know, the macro environment as you highlight it continues to be challenging. You know, if you look at inflation rates and the efforts by central banks across the globe to with through interest rate rise to press down and and constrain growth and push down inflation, you couple that with supply chain challenges that continue particularly in the ISG space. And then you couple that with the Ukraine war and the energy crisis that that's created. And particularly in Europe it's a pretty dynamic environment. And, but I'm confident, you know, I'm confident in the long term, but I do think that there is, you know that there's navigation that we're going to have to do over the coming number of quarters who knows quite how long, you know, to make sure the business is properly positioned then. You know we've got a great portfolio and you're going to talk to some of the team later on as you think your way through some of the solution capabilities we're driving what we're seeing around technology trends. So the opportunities there, there's some short term navigation that we're going to need to do just to make sure that we address some of the, you know, some of the environmental things that we're seeing right now. >> Yeah and as a global company, of course you're converting local currencies back to appreciated dollars. That's, that's, that's another headwind. But as you say, I mean that's math and you're navigating it. And again, I've seen a lot of downturns, but you know the best companies not only weather their storm, but they invest in ways they that allow them to cut out come out the other side stronger. So, I want to talk about that longer term opportunity, the relationship between the core, the business growth. You mentioned the TAM, I mean, even as a lower margin business, if you can penetrate that big of a TAM, you could still throw off a lot of cash and you've got other levers to turn in potentially acquisitions and software but so ultimately what gives you confidence in Dell's future? How should we think about Dell's future? >> Yeah, look, I think it comes down to, we are extraordinarily excited about the opportunity over the long term, digital transformation continues. I am on numerous customer and CIO conference calls every week. Customers are continuing to invest in digital transformation in infrastructure to enable their business model. Yes, maybe it's going to slow or, or pause or maybe they're not going to invest quite at the same rate over the next number of quarters but over the long term the needs are there. You look at what we're doing around the growth opportunities that we see, not only in our core space where we continue to invest but also in the, what we call the strategic adjacencies. Things like 5G and modern telecom infrastructure as our the telecom providers across the globe open up their what previous been closed ecosystems, you know to open architecture. You think about, you know, what we're doing around the edge and the distribution now that we're seeing of compute and storage back to the edge given data gravity and latency matters. And so we're pretty bullish on the opportunity in front of us. You know, yes, we will, we're continuing to invest. And you'll hear Jeff Boudreau talk about that I think later on in the program. So, I'm excited about the opportunities and you look at our cash flow generation capability, you know, we are in normal times a cash flow generation machine and we'll continue to do so. You know, we've got a negative, you know CCC in terms of, you know how do we think about efficiency of working capital? And we look at our, you know our capital allocation strategy which has now returned, you know, somewhere in near 60% of our free cash flow back to shareholders. And so, you know, there's lots to, lots of reasons to think about why this, you know, we are a great sort of, I think value creation opportunity in a over the long term that the long term trends are with us and I expect them to continue to be so. >> Yeah, and you guys, you do what you say you're going to do. I mean, I said in my, in my other piece that I did recently, I think you guys put 46 billion dollars on the balance sheet in terms of debt. That's down to I think 16 billion in the core which that's quite remarking. That gives you some other opportunities. Give us your, your closing thoughts. I mean, you kind of just addressed why Dell is a good long term play but I'll give you an opportunity to bring us home. >> Hey, Dave yeah look, I just think if you look at the grin, the market opportunity the size and scale of Dell and how we think about the competitive advantages that we have, we come you know, if you look at, say we're a hundred billion dollar revenue company which we were year, you know, last year that as we reported, roughly 60, 65 billion of that in the client in PC space, roughly, you know, 35 to 40 billion in the ISG or infrastructure space, those markets are going to continue. The opportunity to grow share, grow at a premium to the market, drive cash flow, drive share gain is clearly there. You couple that with, you know what we think the opportunity is in these adjacent markets, whether it's telecom, the edge, what we're thinking around data services, data management you know, we, and you've cut, you put that together with the long term trends around, you know data creation and digital transformation. We are extraordinarily well positioned. We have the largest direct selling organization in the technology space. We have the largest supply chain, our services footprint you know, well positioned in my mind to take advantage of the opportunities as we move forward. >> Well, Tom really appreciate you taking the time to speak with us. Good to see you again. >> Nice seeing you. Thanks Dave. >> All right. You're watching The Cube's exclusive behind the scenes coverage of Dell Technology Summit 2022. In a moment, I'll be back with Jeff Boudreau. He's the president of Dell's ISG Infrastructure Solutions Group. He's responsible for all the important enterprise business at Dell and we're excited to get his thoughts. Keep it right there. (upbeat jingle)
SUMMARY :
and opportunities and answer the question, Dave, it's good to see you and of course the macro environment. in the infrastructure spin as and then what I've seen you guys navigate But the opportunity there to continue of downturns, but you know that the long term trends are with us Yeah, and you guys, of that in the client in PC space, Good to see you again. Nice seeing you. He's the president of Dell's ISG
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Dave Vellante | PERSON | 0.99+ |
Jeff Boudreau | PERSON | 0.99+ |
Jen Saavedra | PERSON | 0.99+ |
Jeff Boudreau | PERSON | 0.99+ |
Tom | PERSON | 0.99+ |
Tom Sweet | PERSON | 0.99+ |
Dave | PERSON | 0.99+ |
Sam Grocott | PERSON | 0.99+ |
35 | QUANTITY | 0.99+ |
$50 billion | QUANTITY | 0.99+ |
Sam | PERSON | 0.99+ |
Europe | LOCATION | 0.99+ |
Dell | ORGANIZATION | 0.99+ |
40% | QUANTITY | 0.99+ |
16 billion | QUANTITY | 0.99+ |
1.4 | QUANTITY | 0.99+ |
VMware | ORGANIZATION | 0.99+ |
30 | QUANTITY | 0.99+ |
18 | QUANTITY | 0.99+ |
last year | DATE | 0.99+ |
last November | DATE | 0.99+ |
today | DATE | 0.99+ |
ISG Infrastructure Solutions Group | ORGANIZATION | 0.99+ |
Dell Technologies | ORGANIZATION | 0.99+ |
60, 65 billion | QUANTITY | 0.99+ |
40 billion | QUANTITY | 0.99+ |
Dell Tech Summit | EVENT | 0.98+ |
24 months | QUANTITY | 0.98+ |
four | QUANTITY | 0.98+ |
46 billion dollars | QUANTITY | 0.98+ |
Today | DATE | 0.98+ |
30 different scenarios | QUANTITY | 0.98+ |
fiscal year 23 | DATE | 0.97+ |
$1.5 trillion | QUANTITY | 0.97+ |
second quarter | DATE | 0.97+ |
first half | QUANTITY | 0.97+ |
nearly 40 years old | QUANTITY | 0.96+ |
Dell Technologies Summit 2022 | EVENT | 0.96+ |
first | QUANTITY | 0.95+ |
700 | QUANTITY | 0.95+ |
EMC | ORGANIZATION | 0.94+ |
Dell EMC | ORGANIZATION | 0.93+ |
pandemic | EVENT | 0.92+ |
one | QUANTITY | 0.92+ |
TAM | ORGANIZATION | 0.91+ |
CCC | ORGANIZATION | 0.9+ |
Broadcom | ORGANIZATION | 0.9+ |
Dell Technology Summit 2022 | EVENT | 0.9+ |
The Cube | TITLE | 0.89+ |
APEX | ORGANIZATION | 0.86+ |
Ukraine war | EVENT | 0.83+ |
12% | QUANTITY | 0.83+ |
last 18 months | DATE | 0.81+ |
past 18 months | DATE | 0.81+ |
30s | QUANTITY | 0.81+ |
hundred billion dollar | QUANTITY | 0.8+ |
LBO | ORGANIZATION | 0.78+ |
ISG | ORGANIZATION | 0.76+ |
Senior | PERSON | 0.76+ |
DV trusted Infrastructure part 2 Open
>>The cybersecurity landscape continues to be one characterized by a series of point tools designed to do a very specific job, often pretty well, but the mosaic of tooling is grown over the years causing complexity in driving up costs and increasing exposures. So the game of Whackamole continues. Moreover, the way organizations approach security is changing quite dramatically. The cloud, while offering so many advantages, has also created new complexities. The shared responsibility model redefines what the cloud provider secures, for example, the S three bucket and what the customer is responsible for, eg properly configuring the bucket. You know, this is all well and good, but because virtually no organization of any size can go all in on a single cloud, that shared responsibility model now spans multiple clouds and with different protocols. Now, that of course includes on-prem and edge deployments, making things even more complex. Moreover, the DevOps team is being asked to be the point of execution to implement many aspects of an organization's security strategy. >>This extends to securing the runtime, the platform, and even now containers, which can end up anywhere. There's a real need for consolidation in the security industry, and that's part of the answer. We've seen this both in terms of mergers and acquisitions as well as platform plays that cover more and more ground. But the diversity of alternatives and infrastructure implementations continues to boggle the mind with more and more entry points for the attackers. This includes sophisticated supply chain attacks that make it even more difficult to understand how to secure components of a system and how secure those components actually are. The number one challenge CISOs face in today's complex world is lack of talent to address these challenges, and I'm not saying that SecOps pros are now talented. They are. There just aren't enough of them to go around, and the adversary is also talented and very creative, and there are more and more of them every day. >>Now, one of the very important roles that a technology vendor can play is to take mundane infrastructure security tasks off the plates of SEC off teams. Specifically, we're talking about shifting much of the heavy lifting around securing servers, storage, networking, and other infrastructure and their components onto the technology vendor via r and d and other best practices like supply chain management. And that's what we're here to talk about. Welcome to the second part in our series, A Blueprint for Trusted Infrastructure Made Possible by Dell Technologies and produced by the Cube. My name is Dave Ante, and I'm your host now. Previously, we looked at what trusted infrastructure means >>And the role that storage and data protection play in the equation. In this part two of the series, we explore the changing nature of technology infrastructure, how the industry generally in Dell specifically, are adapting to these changes and what is being done to proactively address threats that are increasingly stressing security teams. Now today, we continue the discussion and look more deeply into servers networking and hyper-converged infrastructure to better understand the critical aspects of how one company Dell is securing these elements so that devs SEC op teams can focus on the myriad new attack vectors and challenges that they faced. First up is Deepak rang Garage Power Edge security product manager at Dell Technologies, and after that we're gonna bring on Mahesh Naar oim, who was a consultant in the networking product management area at Dell. And finally, we're closed with Jerome West, who is the product management security lead for HCI hyperconverged infrastructure and converged infrastructure at Dell. Thanks for joining us today. We're thrilled to have you here and hope you enjoy the program.
SUMMARY :
provider secures, for example, the S three bucket and what the customer is responsible But the diversity of alternatives and infrastructure implementations continues to Now, one of the very important roles that a technology vendor can play is to take how the industry generally in Dell specifically, are adapting to
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Jerome West | PERSON | 0.99+ |
Dell | ORGANIZATION | 0.99+ |
First | QUANTITY | 0.99+ |
Dave Ante | PERSON | 0.99+ |
today | DATE | 0.99+ |
second part | QUANTITY | 0.99+ |
Dell Technologies | ORGANIZATION | 0.99+ |
Mahesh Naar oim | PERSON | 0.99+ |
one | QUANTITY | 0.98+ |
Deepak | PERSON | 0.98+ |
both | QUANTITY | 0.98+ |
part 2 | OTHER | 0.97+ |
A Blueprint for Trusted Infrastructure Made Possible | TITLE | 0.95+ |
HCI | ORGANIZATION | 0.95+ |
single cloud | QUANTITY | 0.94+ |
Cube | ORGANIZATION | 0.9+ |
Whackamole | TITLE | 0.89+ |
one company | QUANTITY | 0.85+ |
Power Edge | ORGANIZATION | 0.7+ |
part two | QUANTITY | 0.65+ |
DevOps | ORGANIZATION | 0.6+ |
SecOps | TITLE | 0.6+ |
point | QUANTITY | 0.54+ |
Deepak Rangaraj, Dell technologies
>>The cybersecurity landscape continues to be one characterized by a series of point tools designed to do a very specific job, often pretty well, but the mosaic of tooling is grown over the years causing complexity in driving up costs and increasing exposures. So the game of Whackamole continues. Moreover, the way organizations approach security is changing quite dramatically. The cloud, while offering so many advantages, has also created new complexities. The shared responsibility model redefines what the cloud provider secures, for example, the S three bucket and what the customer is responsible for eg properly configuring the bucket. You know, this is all well and good, but because virtually no organization of any size can go all in on a single cloud, that shared responsibility model now spans multiple clouds and with different protocols. Now that of course includes on-prem and edge deployments, making things even more complex. Moreover, the DevOps team is being asked to be the point of execution to implement many aspects of an organization's security strategy. >>This extends to securing the runtime, the platform, and even now containers which can end up anywhere. There's a real need for consolidation in the security industry, and that's part of the answer. We've seen this both in terms of mergers and acquisitions as well as platform plays that cover more and more ground. But the diversity of alternatives and infrastructure implementations continues to boggle the mind with more and more entry points for the attackers. This includes sophisticated supply chain attacks that make it even more difficult to understand how to secure components of a system and how secure those components actually are. The number one challenge CISOs face in today's complex world is lack of talent to address these challenges. And I'm not saying that SecOps pros are not talented. They are. There just aren't enough of them to go around and the adversary is also talented and very creative and there are more and more of them every day. >>Now, one of the very important roles that a technology vendor can play is to take mundane infrastructure security tasks off the plates of SEC off teams. Specifically we're talking about shifting much of the heavy lifting around securing servers, storage, networking, and other infrastructure and their components onto the technology vendor via r and d and other best practices like supply chain management. And that's what we're here to talk about. Welcome to the second part in our series, A Blueprint for Trusted Infrastructure Made Possible by Dell Technologies and produced by the Cube. My name is Dave Ante and I'm your host now. Previously we looked at what trusted infrastructure means and the role that storage and data protection play in the equation. In this part two of the series, we explore the changing nature of technology infrastructure, how the industry generally in Dell specifically, are adapting to these changes and what is being done to proactively address threats that are increasingly stressing security teams. >>Now today, we continue the discussion and look more deeply into servers networking and hyper-converged infrastructure to better understand the critical aspects of how one company Dell is securing these elements so that dev sec op teams can focus on the myriad new attack vectors and challenges that they faced. First up is Deepak rang Garage Power Edge security product manager at Dell Technologies. And after that we're gonna bring on Mahesh Nagar oim, who was consultant in the networking product management area at Dell. And finally, we're close with Jerome West, who is the product management security lead for HCI hyperconverged infrastructure and converged infrastructure at Dell. Thanks for joining us today. We're thrilled to have you here and hope you enjoy the program. Deepak Arage shoes powered security product manager at Dell Technologies. Deepak, great to have you on the program. Thank you. >>Thank you for having me. >>So we're going through the infrastructure stack and in part one of this series we looked at the landscape overall and how cyber has changed and specifically how Dell thinks about data protection in, in security in a manner that both secures infrastructure and minimizes organizational friction. We also hit on the storage part of the portfolio. So now we want to dig into servers. So my first question is, what are the critical aspects of securing server infrastructure that our audience should be aware of? >>Sure. So if you look at compute in general, right, it has rapidly evolved over the past couple of years, especially with trends toward software defined data centers and with also organizations having to deal with hybrid environments where they have private clouds, public cloud locations, remote offices, and also remote workers. So on top of this, there's also an increase in the complexity of the supply chain itself, right? There are companies who are dealing with hundreds of suppliers as part of their supply chain. So all of this complexity provides a lot of opportunity for attackers because it's expanding the threat surface of what can be attacked, and attacks are becoming more frequent, more severe and more sophisticated. And this has also triggered around in the regulatory and mandates around the security needs. >>And these regulations are not just in the government sector, right? So it extends to critical infrastructure and eventually it also get into the private sector. In addition to this, organizations are also looking at their own internal compliance mandates. And this could be based on the industry in which they're operating in, or it could be their own security postures. And this is the landscape in which servers they're operating today. And given that servers are the foundational blocks of the data center, it becomes extremely important to protect them. And given how complex the modern server platforms are, it's also extremely difficult and it takes a lot of effort. And this means protecting everything from the supply chain to the manufacturing and then eventually the assuring the hardware and software integrity of the platforms and also the operations. And there are very few companies that go to the lens that Dell does in order to secure the server. We truly believe in the notion and the security mentality that, you know, security should enable our customers to go focus on their business and proactively innovate on their business and it should not be a burden to them. And we heavily invest to make that possible for our customers. >>So this is really important because the premise that I set up at the beginning of this was really that I, as of security pro, I'm not a security pro, but if I were, I wouldn't want to be doing all this infrastructure stuff because I now have all these new things I gotta deal with. I want a company like Dell who has the resources to build that security in to deal with the supply chain to ensure the providence, et cetera. So I'm glad you you, you hit on that, but so given what you just said, what does cybersecurity resilience mean from a server perspective? For example, are there specific principles that Dell adheres to that are non-negotiable? Let's say, how does Dell ensure that its customers can trust your server infrastructure? >>Yeah, like when, when it comes to security at Dell, right? It's ingrained in our product, so that's the best way to put it. And security is nonnegotiable, right? It's never an afterthought where we come up with a design and then later on figure out how to go make it secure, right? Our security development life cycle, the products are being designed to counter these threats right from the big. And in addition to that, we are also testing and evaluating these products continuously to identify vulnerabilities. We also have external third party audits which supplement this process. And in addition to this, Dell makes the commitment that we will rapidly respond to any mitigations and vulnerability, any vulnerabilities and exposures found out in the field and provide mitigations and patches for in attacking manner. So this security principle is also built into our server life cycle, right? Every phase of it. >>So we want our products to provide cutting edge capabilities when it comes to security. So as part of that, we are constantly evaluating what our security model is done. We are building on it and continuously improving it. So till a few years ago, our model was primarily based on the N framework of protect, detect and rigor. And it's still aligns really well to that framework, but over the past couple of years we have seen how computers evolved, how the threads have evolved, and we have also seen the regulatory trends and we recognize the fact that the best security strategy for the modern world is a zero trust approach. And so now when we are building our infrastructure and tools and offerings for customers, first and foremost, they're cyber resilient, right? What we mean by that is they're capable of anticipating threats, withstanding attacks and rapidly recurring from attacks and also adapting to the adverse conditions in which they're deployed. The process of designing these capabilities and identifying these capabilities however, is done through the zero press framework. And that's very important because now we are also anticipating how our customers will end up using these capabilities at there and to enable their own zero trust IT environments and IT zero trusts deployments. We have completely adapted our security approach to make it easier for customers to work with us no matter where they are in their journey towards zero trust option. >>So thank you for that. You mentioned the, this framework, you talked about zero trust. When I think about n I think as well about layered approaches. And when I think about zero trust, I think about if you, if you don't have access to it, you're not getting access, you've gotta earn that, that access and you've got layers and then you still assume that bad guys are gonna get in. So you've gotta detect that and you've gotta response. So server infrastructure security is so fundamental. So my question is, what is Dell providing specifically to, for example, detect anomalies and breaches from unauthorized activity? How do you enable fast and easy or facile recovery from malicious incidents? >>Right? What is that is exactly right, right? Breachers are bound to happen. And given how complex our current environment is, it's extremely distributed and extremely connected, right? Data and users are no longer contained with an offices where we can set up a perimeter firewall and say, Yeah, everything within that is good. We can trust everything within it. That's no longer true. The best approach to protect data and infrastructure in the current world is to use a zero trust approach, which uses the principles. Nothing is ever trusted, right? Nothing is trusted implicitly. You're constantly verifying every single user, every single device, and every single access in your system at every single level of your ID environment. And this is the principles that we use on power Edge, right? But with an increased focus on providing granular controls and checks based on the principles of these privileged access. >>So the idea is that service first and foremost need to make sure that the threats never enter and they're rejected at the point of entry. But we recognize breaches are going to occur and if they do, they need to be minimized such that the sphere of damage cost by attacker is minimized. So they're not able to move from one part of the network to something else laterally or escalate their privileges and cause more damage, right? So the impact radius for instance, has to be radius. And this is done through features like automated detection capabilities and automation, automated remediation capabilities. So some examples are as part of our end to end boot resilience process, we have what they call a system lockdown, right? We can lock down the configuration of the system and lock on the form versions and all changes to the system. And we have capabilities which automatically detect any drift from that lockdown configuration and we can figure out if the drift was caused to authorized changes or unauthorized changes. >>And if it is an unauthorize change can log it, generate security alerts, and we even have capabilities to automatically roll the firm where, and always versions back to a known good version and also the configurations, right? And this becomes extremely important because as part of zero trust, we need to respond to these things at machine speed and we cannot do it at a human speed. And having these automated capabilities is a big deal when achieving that zero trust strategy. And in addition to this, we also have chassis inclusion detection where if the chassis, the box, the several box is opened up, it logs alerts, and you can figure out even later if there's an AC power cycle, you can go look at the logs to see that the box is opened up and figure out if there was a, like a known authorized access or some malicious actor opening and chain something in your system. >>Great, thank you for that lot. Lot of detail and and appreciate that. I want to go somewhere else now cuz Dell has a renowned supply chain reputation. So what about securing the, the supply chain and the server bill of materials? What does Dell specifically do to track the providence of components it uses in its systems so that when the systems arrive, a customer can be a hundred percent certain that that system hasn't been compromised, >>Right? And we've talked about how complex the modern supply chain is, right? And that's no different for service. We have hundreds of confidence on the server and a lot of these form where in order to be configured and run and this former competence could be coming from third parties suppliers. So now the complexity that we are dealing with like was the end to end approach. And that's where Dell pays a lot of attention into assuring the security approach approaching. And it starts all the way from sourcing competence, right? And then through the design and then even the manufacturing process where we are wetting the personnel leather factories and wetting the factories itself. And the factories also have physical controls, physical security controls built into them and even shipping, right? We have GPS tagging of packages. So all of this is built to ensure supply chain security. >>But a critical aspect of this is also making sure that the systems which are built in the factories are delivered to the customers without any changes or any tapper. And we have a feature called the secure component verification, which is capable of doing this. What the feature does this, when the system gets built in a factory, it generates an inventory of all the competence in the system and it creates a cryptographic certificate based on the signatures presented to this by the competence. And this certificate is stored separately and sent to the customers separately from the system itself. So once the customers receive the system at their end, they can run out to, it generates an inventory of the competence on the system at their end and then compare it to the golden certificate to make sure nothing was changed. And if any changes are detected, we can figure out if there's an authorized change or unauthorize change. >>Again, authorized changes could be like, you know, upgrades to the drives or memory and ized changes could be any sort of temper. So that's the supply chain aspect of it. And bill of metal use is also an important aspect to galing security, right? And we provide a software bill of materials, which is basically a list of ingredients of all the software pieces in the platform. So what it allows our customers to do is quickly take a look at all the different pieces and compare it to the vulnerability database and see if any of the vulner, which have been discovered out in the wild affected platform. So that's a quick way of figuring out if the platform has any known vulnerabilities and it has not been patched. >>Excellent. That's really good. My last question is, I wonder if you, you know, give us the sort of summary from your perspective, what are the key strengths of Dell server portfolio from a security standpoint? I'm really interested in, you know, the uniqueness and the strong suit that Dell brings to the table, >>Right? Yeah. We have talked enough about the complexity of the environment and how zero risk is necessary for the modern ID environment, right? And this is integral to Dell powered service. And as part of that like you know, security starts with the supply chain. We already talked about the second component verification, which is a beneath feature that Dell platforms have. And on top of it we also have a silicon place platform mode of trust. So this is a key which is programmed into the silicon on the black service during manufacturing and can never be changed after. And this immutable key is what forms the anchor for creating the chain of trust that is used to verify everything in the platform from the hardware and software integrity to the boot, all pieces of it, right? In addition to that, we also have a host of data protection features. >>Whether it is protecting data at risk in news or inflight, we have self encrypting drives, which provides scalable and flexible encryption options. And this couple with external key management provides really good protection for your data address. External key management is important because you know, somebody could physically steam the server, walk away, but then the keys are not stored on the server, it stood separately. So that provides your action layer of security. And we also have dual layer encryption where you can compliment the hardware encryption on the secure encrypted drives with software level encryption. Inion to this we have identity and access management features like multifactor authentication, single sign on roles, scope and time based access controls, all of which are critical to enable that granular control and checks for zero trust approach. So I would say like, you know, if you look at the Dell feature set, it's pretty comprehensive and we also have the flexibility built in to meet the needs of all customers no matter where they fall in the spectrum of, you know, risk tolerance and security sensitivity. And we also have the capabilities to meet all the regulatory requirements and compliance requirements. So in a nutshell, I would say that, you know, Dell Power Service cyber resident infrastructure helps accelerate zero tested option for customers. >>Got it. So you've really thought this through all the various things that that you would do to sort of make sure that your server infrastructure is secure, not compromised, that your supply chain is secure so that your customers can focus on some of the other things that they have to worry about, which are numerous. Thanks Deepak, appreciate you coming on the cube and participating in the program. >>Thank you for having >>You're welcome. In a moment I'll be back to dig into the networking portion of the infrastructure. Stay with us for more coverage of a blueprint for trusted infrastructure and collaboration with Dell Technologies on the cube. Your leader in enterprise and emerging tech coverage.
SUMMARY :
So the game of Whackamole continues. But the diversity of alternatives and infrastructure implementations continues to how the industry generally in Dell specifically, are adapting to Deepak, great to have you on the program. We also hit on the storage part of the portfolio. So all of this complexity provides a lot of opportunity for attackers because it's expanding of the data center, it becomes extremely important to protect them. in to deal with the supply chain to ensure the providence, et cetera. And in addition to that, we are also testing and evaluating how the threads have evolved, and we have also seen the regulatory trends and And when I think about zero trust, I think about if And this is the principles that we use on power Edge, part of our end to end boot resilience process, we have what they call a system And in addition to this, we also have chassis inclusion detection where if What does Dell specifically do to track the So now the complexity that we are dealing with like was And this certificate is stored separately and sent to the customers So that's the supply chain aspect of it. the uniqueness and the strong suit that Dell brings to the table, from the hardware and software integrity to the boot, all pieces of it, And we also have dual layer encryption where you of the other things that they have to worry about, which are numerous. In a moment I'll be back to dig into the networking portion of the infrastructure.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Deepak | PERSON | 0.99+ |
Dell | ORGANIZATION | 0.99+ |
Jerome West | PERSON | 0.99+ |
Deepak Rangaraj | PERSON | 0.99+ |
Dave Ante | PERSON | 0.99+ |
second part | QUANTITY | 0.99+ |
First | QUANTITY | 0.99+ |
first question | QUANTITY | 0.99+ |
Deepak Arage | PERSON | 0.99+ |
Dell Technologies | ORGANIZATION | 0.99+ |
second component | QUANTITY | 0.99+ |
A Blueprint for Trusted Infrastructure Made Possible | TITLE | 0.99+ |
today | DATE | 0.99+ |
one | QUANTITY | 0.99+ |
Dell Technologies | ORGANIZATION | 0.98+ |
both | QUANTITY | 0.98+ |
hundreds | QUANTITY | 0.98+ |
hundred percent | QUANTITY | 0.98+ |
Mahesh Nagar | PERSON | 0.98+ |
zero trust | QUANTITY | 0.98+ |
single cloud | QUANTITY | 0.96+ |
every single device | QUANTITY | 0.94+ |
one part | QUANTITY | 0.94+ |
first | QUANTITY | 0.94+ |
every single access | QUANTITY | 0.92+ |
every single user | QUANTITY | 0.92+ |
Cube | ORGANIZATION | 0.92+ |
zero risk | QUANTITY | 0.9+ |
Whackamole | TITLE | 0.88+ |
zero | QUANTITY | 0.82+ |
past couple of years | DATE | 0.81+ |
a few years ago | DATE | 0.76+ |
every single level | QUANTITY | 0.74+ |
single | QUANTITY | 0.68+ |
Power | COMMERCIAL_ITEM | 0.66+ |
part one | OTHER | 0.65+ |
HCI | ORGANIZATION | 0.61+ |
SecOps | TITLE | 0.58+ |
confidence | QUANTITY | 0.57+ |
SEC | ORGANIZATION | 0.55+ |
part two | QUANTITY | 0.54+ |
suppliers | QUANTITY | 0.54+ |
point | QUANTITY | 0.53+ |
DevOps | ORGANIZATION | 0.52+ |
Blueprint for Trusted Insfrastructure Episode 2 Full Episode 10-4 V2
>>The cybersecurity landscape continues to be one characterized by a series of point tools designed to do a very specific job, often pretty well, but the mosaic of tooling is grown over the years causing complexity in driving up costs and increasing exposures. So the game of Whackamole continues. Moreover, the way organizations approach security is changing quite dramatically. The cloud, while offering so many advantages, has also created new complexities. The shared responsibility model redefines what the cloud provider secures, for example, the S three bucket and what the customer is responsible for eg properly configuring the bucket. You know, this is all well and good, but because virtually no organization of any size can go all in on a single cloud, that shared responsibility model now spans multiple clouds and with different protocols. Now that of course includes on-prem and edge deployments, making things even more complex. Moreover, the DevOps team is being asked to be the point of execution to implement many aspects of an organization's security strategy. >>This extends to securing the runtime, the platform, and even now containers which can end up anywhere. There's a real need for consolidation in the security industry, and that's part of the answer. We've seen this both in terms of mergers and acquisitions as well as platform plays that cover more and more ground. But the diversity of alternatives and infrastructure implementations continues to boggle the mind with more and more entry points for the attackers. This includes sophisticated supply chain attacks that make it even more difficult to understand how to secure components of a system and how secure those components actually are. The number one challenge CISOs face in today's complex world is lack of talent to address these challenges. And I'm not saying that SecOps pros are not talented, They are. There just aren't enough of them to go around and the adversary is also talented and very creative, and there are more and more of them every day. >>Now, one of the very important roles that a technology vendor can play is to take mundane infrastructure security tasks off the plates of SEC off teams. Specifically we're talking about shifting much of the heavy lifting around securing servers, storage, networking, and other infrastructure and their components onto the technology vendor via r and d and other best practices like supply chain management. And that's what we're here to talk about. Welcome to the second part in our series, A Blueprint for Trusted Infrastructure Made Possible by Dell Technologies and produced by the Cube. My name is Dave Ante and I'm your host now. Previously we looked at what trusted infrastructure means and the role that storage and data protection play in the equation. In this part two of the series, we explore the changing nature of technology infrastructure, how the industry generally in Dell specifically, are adapting to these changes and what is being done to proactively address threats that are increasingly stressing security teams. >>Now today, we continue the discussion and look more deeply into servers networking and hyper-converged infrastructure to better understand the critical aspects of how one company Dell is securing these elements so that dev sec op teams can focus on the myriad new attack vectors and challenges that they faced. First up is Deepak rang Garage Power Edge security product manager at Dell Technologies. And after that we're gonna bring on Mahesh Nagar oim, who was consultant in the networking product management area at Dell. And finally, we're close with Jerome West, who is the product management security lead for HCI hyperconverged infrastructure and converged infrastructure at Dell. Thanks for joining us today. We're thrilled to have you here and hope you enjoy the program. Deepak Arage shoes powered security product manager at Dell Technologies. Deepak, great to have you on the program. Thank you. >>Thank you for having me. >>So we're going through the infrastructure stack and in part one of this series we looked at the landscape overall and how cyber has changed and specifically how Dell thinks about data protection in, in security in a manner that both secures infrastructure and minimizes organizational friction. We also hit on the storage part of the portfolio. So now we want to dig into servers. So my first question is, what are the critical aspects of securing server infrastructure that our audience should be aware of? >>Sure. So if you look at compute in general, right, it has rapidly evolved over the past couple of years, especially with trends toward software defined data centers and with also organizations having to deal with hybrid environments where they have private clouds, public cloud locations, remote offices, and also remote workers. So on top of this, there's also an increase in the complexity of the supply chain itself, right? There are companies who are dealing with hundreds of suppliers as part of their supply chain. So all of this complexity provides a lot of opportunity for attackers because it's expanding the threat surface of what can be attacked, and attacks are becoming more frequent, more severe and more sophisticated. And this has also triggered around in the regulatory and mandates around the security needs. >>And these regulations are not just in the government sector, right? So it extends to critical infrastructure and eventually it also get into the private sector. In addition to this, organizations are also looking at their own internal compliance mandates. And this could be based on the industry in which they're operating in, or it could be their own security postures. And this is the landscape in which servers they're operating today. And given that servers are the foundational blocks of the data center, it becomes extremely important to protect them. And given how complex the modern server platforms are, it's also extremely difficult and it takes a lot of effort. And this means protecting everything from the supply chain to the manufacturing and then eventually the assuring the hardware and software integrity of the platforms and also the operations. And there are very few companies that go to the lens that Dell does in order to secure the server. We truly believe in the notion and the security mentality that, you know, security should enable our customers to go focus on their business and proactively innovate on their business and it should not be a burden to them. And we heavily invest to make that possible for our customers. >>So this is really important because the premise that I set up at the beginning of this was really that I, as of security pro, I'm not a security pro, but if I were, I wouldn't want to be doing all this infrastructure stuff because I now have all these new things I gotta deal with. I want a company like Dell who has the resources to build that security in to deal with the supply chain to ensure the providence, et cetera. So I'm glad you you, you hit on that, but so given what you just said, what does cybersecurity resilience mean from a server perspective? For example, are there specific principles that Dell adheres to that are non-negotiable? Let's say, how does Dell ensure that its customers can trust your server infrastructure? >>Yeah, like when, when it comes to security at Dell, right? It's ingrained in our product, so that's the best way to put it. And security is nonnegotiable, right? It's never an afterthought where we come up with a design and then later on figure out how to go make it secure, right? Our security development life cycle, the products are being designed to counter these threats right from the big. And in addition to that, we are also testing and evaluating these products continuously to identify vulnerabilities. We also have external third party audits which supplement this process. And in addition to this, Dell makes the commitment that we will rapidly respond to any mitigations and vulnerability, any vulnerabilities and exposures found out in the field and provide mitigations and patches for in attacking manner. So this security principle is also built into our server life cycle, right? Every phase of it. >>So we want our products to provide cutting edge capabilities when it comes to security. So as part of that, we are constantly evaluating what our security model is done. We are building on it and continuously improving it. So till a few years ago, our model was primarily based on the N framework of protect, detect and rigor. And it's still aligns really well to that framework, but over the past couple of years, we have seen how computers evolved, how the threads have evolved, and we have also seen the regulatory trends and we recognize the fact that the best security strategy for the modern world is a zero trust approach. And so now when we are building our infrastructure and tools and offerings for customers, first and foremost, they're cyber resilient, right? What we mean by that is they're capable of anticipating threats, withstanding attacks and rapidly recurring from attacks and also adapting to the adverse conditions in which they're deployed. The process of designing these capabilities and identifying these capabilities however, is done through the zero press framework. And that's very important because now we are also anticipating how our customers will end up using these capabilities at there and to enable their own zero trust IT environments and IT zero trusts deployments. We have completely adapted our security approach to make it easier for customers to work with us no matter where they are in their journey towards zero trust option. >>So thank you for that. You mentioned the, this framework, you talked about zero trust. When I think about n I think as well about layered approaches. And when I think about zero trust, I think about if you, if you don't have access to it, you're not getting access, you've gotta earn that, that access and you've got layers and then you still assume that bad guys are gonna get in. So you've gotta detect that and you've gotta response. So server infrastructure security is so fundamental. So my question is, what is Dell providing specifically to, for example, detect anomalies and breaches from unauthorized activity? How do you enable fast and easy or facile recovery from malicious incidents, >>Right? What is that is exactly right, right? Breachers are bound to happen and given how complex our current environment is, it's extremely distributed and extremely connected, right? Data and users are no longer contained with an offices where we can set up a perimeter firewall and say, Yeah, everything within that is good. We can trust everything within it. That's no longer true. The best approach to protect data and infrastructure in the current world is to use a zero trust approach, which uses the principles. Nothing is ever trusted, right? Nothing is trusted implicitly. You're constantly verifying every single user, every single device, and every single access in your system at every single level of your ID environment. And this is the principles that we use on power Edge, right? But with an increased focus on providing granular controls and checks based on the principles of these privileged access. >>So the idea is that service first and foremost need to make sure that the threats never enter and they're rejected at the point of entry, but we recognize breaches are going to occur and if they do, they need to be minimized such that the sphere of damage cost by attacker is minimized so they're not able to move from one part of the network to something else laterally or escalate their privileges and cause more damage, right? So the impact radius for instance, has to be radius. And this is done through features like automated detection capabilities and automation, automated remediation capabilities. So some examples are as part of our end to end boot resilience process, we have what they call a system lockdown, right? We can lock down the configuration of the system and lock on the form versions and all changes to the system. And we have capabilities which automatically detect any drift from that lockdown configuration and we can figure out if the drift was caused to authorized changes or unauthorized changes. >>And if it is an unauthorize change can log it, generate security alerts, and we even have capabilities to automatically roll the firm where, and always versions back to a known good version and also the configurations, right? And this becomes extremely important because as part of zero trust, we need to respond to these things at machine speed and we cannot do it at a human speed. And having these automated capabilities is a big deal when achieving that zero trust strategy. And in addition to this, we also have chassis inclusion detection where if the chassis, the box, the several box is opened up, it logs alerts, and you can figure out even later if there's an AC power cycle, you can go look at the logs to see that the box is opened up and figure out if there was a, like a known authorized access or some malicious actor opening and chain something in your system. >>Great, thank you for that lot. Lot of detail and and appreciate that. I want to go somewhere else now cuz Dell has a renowned supply chain reputation. So what about securing the, the supply chain and the server bill of materials? What does Dell specifically do to track the providence of components it uses in its systems so that when the systems arrive, a customer can be a hundred percent certain that that system hasn't been compromised, >>Right? And we've talked about how complex the modern supply chain is, right? And that's no different for service. We have hundreds of confidence on the server and a lot of these form where in order to be configured and run and this former competence could be coming from third parties suppliers. So now the complexity that we are dealing with like was the end to end approach and that's where Dell pays a lot of attention into assuring the security approach approaching and it starts all the way from sourcing competence, right? And then through the design and then even the manufacturing process where we are wetting the personnel leather factories and wetting the factories itself. And the factories also have physical controls, physical security controls built into them and even shipping, right? We have GPS tagging of packages. So all of this is built to ensure supply chain security. >>But a critical aspect of this is also making sure that the systems which are built in the factories are delivered to the customers without any changes or any tapper. And we have a feature called the secure component verification, which is capable of doing this. What the feature does this, when the system gets built in a factory, it generates an inventory of all the competence in the system and it creates a cryptographic certificate based on the signatures presented to this by the competence. And this certificate is stored separately and sent to the customers separately from the system itself. So once the customers receive the system at their end, they can run out to, it generates an inventory of the competence on the system at their end and then compare it to the golden certificate to make sure nothing was changed. And if any changes are detected, we can figure out if there's an authorized change or unauthorize change. >>Again, authorized changes could be like, you know, upgrades to the drives or memory and ized changes could be any sort of temper. So that's the supply chain aspect of it and bill of metal use is also an important aspect to galing security, right? And we provide a software bill of materials, which is basically a list of ingredients of all the software pieces in the platform. So what it allows our customers to do is quickly take a look at all the different pieces and compare it to the vulnerability database and see if any of the vulner which have been discovered out in the wild affected platform. So that's a quick way of figuring out if the platform has any known vulnerabilities and it has not been patched. >>Excellent. That's really good. My last question is, I wonder if you, you know, give us the sort of summary from your perspective, what are the key strengths of Dell server portfolio from a security standpoint? I'm really interested in, you know, the uniqueness and the strong suit that Dell brings to the table, >>Right? Yeah. We have talked enough about the complexity of the environment and how zero risk is necessary for the modern ID environment, right? And this is integral to Dell powered service. And as part of that like you know, security starts with the supply chain. We already talked about the second component verification, which is a beneath feature that Dell platforms have. And on top of it we also have a silicon place platform mode of trust. So this is a key which is programmed into the silicon on the black service during manufacturing and can never be changed after. And this immutable key is what forms the anchor for creating the chain of trust that is used to verify everything in the platform from the hardware and software integrity to the boot, all pieces of it, right? In addition to that, we also have a host of data protection features. >>Whether it is protecting data at risk in news or inflight, we have self encrypting drives which provides scalable and flexible encryption options. And this couple with external key management provides really good protection for your data address. External key management is important because you know, somebody could physically steam the server walk away, but then the keys are not stored on the server, it stood separately. So that provides your action layer of security. And we also have dual layer encryption where you can compliment the hardware encryption on the secure encrypted drives with software level encryption. Inion to this we have identity and access management features like multifactor authentication, single sign on roles, scope and time based access controls, all of which are critical to enable that granular control and checks for zero trust approach. So I would say like, you know, if you look at the Dell feature set, it's pretty comprehensive and we also have the flexibility built in to meet the needs of all customers no matter where they fall in the spectrum of, you know, risk tolerance and security sensitivity. And we also have the capabilities to meet all the regulatory requirements and compliance requirements. So in a nutshell, I would say that you know, Dell Power Service cyber resident infrastructure helps accelerate zero tested option for customers. >>Got it. So you've really thought this through all the various things that that you would do to sort of make sure that your server infrastructure is secure, not compromised, that your supply chain is secure so that your customers can focus on some of the other things that they have to worry about, which are numerous. Thanks Deepak, appreciate you coming on the cube and participating in the program. >>Thank you for having >>You're welcome. In a moment I'll be back to dig into the networking portion of the infrastructure. Stay with us for more coverage of a blueprint for trusted infrastructure and collaboration with Dell Technologies on the cube, your leader in enterprise and emerging tech coverage. We're back with a blueprint for trusted infrastructure and partnership with Dell Technologies in the cube. And we're here with Mahesh Nager, who is a consultant in the area of networking product management at Dell Technologies. Mahesh, welcome, good to see you. >>Hey, good morning Dell's, nice to meet, meet to you as well. >>Hey, so we've been digging into all the parts of the infrastructure stack and now we're gonna look at the all important networking components. Mahesh, when we think about networking in today's environment, we think about the core data center and we're connecting out to various locations including the cloud and both the near and the far edge. So the question is from Dell's perspective, what's unique and challenging about securing network infrastructure that we should know about? >>Yeah, so few years ago IT security and an enterprise was primarily putting a wrapper around data center out because it was constrained to an infrastructure owned and operated by the enterprise for the most part. So putting a rapid around it like a parameter or a firewall was a sufficient response because you could basically control the environment and data small enough control today with the distributed data, intelligent software, different systems, multi-cloud environment and asset service delivery, you know, the infrastructure for the modern era changes the way to secure the network infrastructure In today's, you know, data driven world, it operates everywhere and data has created and accessed everywhere so far from, you know, the centralized monolithic data centers of the past. The biggest challenge is how do we build the network infrastructure of the modern era that are intelligent with automation enabling maximum flexibility and business agility without any compromise on the security. We believe that in this data era, the security transformation must accompany digital transformation. >>Yeah, that's very good. You talked about a couple of things there. Data by its very nature is distributed. There is no perimeter anymore, so you can't just, as you say, put a rapper around it. I like the way you phrase that. So when you think about cyber security resilience from a networking perspective, how do you define that? In other words, what are the basic principles that you adhere to when thinking about securing network infrastructure for your customers? >>So our belief is that cybersecurity and cybersecurity resilience, they need to be holistic, they need to be integrated, scalable, one that span the entire enterprise and with a co and objective and policy implementation. So cybersecurity needs to span across all the devices and running across any application, whether the application resets on the cloud or anywhere else in the infrastructure. From a networking standpoint, what does it mean? It's again, the same principles, right? You know, in order to prevent the threat actors from accessing changing best destroy or stealing sensitive data, this definition holds good for networking as well. So if you look at it from a networking perspective, it's the ability to protect from and withstand attacks on the networking systems as we continue to evolve. This will also include the ability to adapt and recover from these attacks, which is what cyber resilience aspect is all about. So cybersecurity best practices, as you know, is continuously changing the landscape primarily because the cyber threats also continue to evolve. >>Yeah, got it. So I like that. So it's gotta be integrated, it's gotta be scalable, it's gotta be comprehensive, comprehensive and adaptable. You're saying it can't be static, >>Right? Right. So I think, you know, you had a second part of a question, you know, that says what do we, you know, what are the basic principles? You know, when you think about securing network infrastructure, when you're looking at securing the network infrastructure, it revolves around core security capability of the devices that form the network. And what are these security capabilities? These are access control, software integrity and vulnerability response. When you look at access control, it's to ensure that only the authenticated users are able to access the platform and they're able to access only the kind of the assets that they're authorized to based on their user level. Now accessing a network platform like a switch or a rotor for example, is typically used for say, configuration and management of the networking switch. So user access is based on say roles for that matter in a role based access control, whether you are a security admin or a network admin or a storage admin. >>And it's imperative that logging is enable because any of the change to the configuration is actually logged and monitored as that. Talking about software's integrity, it's the ability to ensure that the software that's running on the system has not been compromised. And, and you know, this is important because it could actually, you know, get hold of the system and you know, you could get UND desire results in terms of say validation of the images. It's, it needs to be done through say digital signature. So, so it's important that when you're talking about say, software integrity, a, you are ensuring that the platform is not compromised, you know, is not compromised and be that any upgrades, you know, that happens to the platform is happening through say validated signature. >>Okay. And now, now you've now, so there's access control, software integrity, and I think you, you've got a third element which is i I think response, but please continue. >>Yeah, so you know, the third one is about civil notability. So we follow the same process that's been followed by the rest of the products within the Dell product family. That's to report or identify, you know, any kind of a vulnerability that's being addressed by the Dell product security incident response team. So the networking portfolio is no different, you know, it follows the same process for identification for tri and for resolution of these vulnerabilities. And these are addressed either through patches or through new reasons via networking software. >>Yeah, got it. Okay. So I mean, you didn't say zero trust, but when you were talking about access control, you're really talking about access to only those assets that people are authorized to access. I know zero trust sometimes is a buzzword, but, but you I think gave it, you know, some clarity there. Software integrity, it's about assurance validation, your digital signature you mentioned and, and that there's been no compromise. And then how you respond to incidents in a standard way that can fit into a security framework. So outstanding description, thank you for that. But then the next question is, how does Dell networking fit into the construct of what we've been talking about Dell trusted infrastructure? >>Okay, so networking is the key element in the Dell trusted infrastructure. It provides the interconnect between the service and the storage world. And you know, it's part of any data center configuration for a trusted infrastructure. The network needs to have access control in place where only the authorized nels are able to make change to the network configuration and logging off any of those changes is also done through the logging capabilities. Additionally, we should also ensure that the configuration should provide network isolation between say the management network and the data traffic network because they need to be separate and distinct from each other. And furthermore, even if you look at the data traffic network and now you have things like segmentation isolated segments and via VRF or, or some micro segmentation via partners, this allows various level of security for each of those segments. So it's important you know, that, that the network infrastructure has the ability, you know, to provide all this, this services from a Dell networking security perspective, right? >>You know, there are multiple layer of defense, you know, both at the edge and in the network in this hardware and in the software and essentially, you know, a set of rules and a configuration that's designed to sort of protect the integrity, confidentiality, and accessibility of the network assets. So each network security layer, it implements policies and controls as I said, you know, including send network segmentation. We do have capabilities sources, centralized management automation and capability and scalability for that matter. Now you add all of these things, you know, with the open networking standards or software, different principles and you essentially, you know, reach to the point where you know, you're looking at zero trust network access, which is essentially sort of a building block for increased cloud adoption. If you look at say that you know the different pillars of a zero trust architecture, you know, if you look at the device aspect, you know, we do have support for security for example, we do have say trust platform in a trusted platform models tpms on certain offer products and you know, the physical security know plain, simple old one love port enable from a user trust perspective, we know it's all done via access control days via role based access control and say capability in order to provide say remote authentication or things like say sticky Mac or Mac learning limit and so on. >>If you look at say a transport and decision trust layer, these are essentially, you know, how do you access, you know, this switch, you know, is it by plain hotel net or is it like secure ssh, right? And you know, when a host communicates, you know, to the switch, we do have things like self-signed or is certificate authority based certification. And one of the important aspect is, you know, in terms of, you know, the routing protocol, the routing protocol, say for example BGP for example, we do have the capability to support MD five authentication between the b g peers so that there is no, you know, manages attack, you know, to the network where the routing table is compromised. And the other aspect is about second control plane is here, you know, you know, it's, it's typical that if you don't have a control plane here, you know, it could be flooded and you know, you know, the switch could be compromised by city denial service attacks. >>From an application test perspective, as I mentioned, you know, we do have, you know, the application specific security rules where you could actually define, you know, the specific security rules based on the specific applications, you know, that are running within the system. And I did talk about, say the digital signature and the cryptographic check that we do for authentication and for, I mean rather for the authenticity and the validation of, you know, of the image and the BS and so on and so forth. Finally, you know, the data trust, we are looking at, you know, the network separation, you know, the network separation could happen or VRF plain old wheel Ls, you know, which can bring about sales multi 10 aspects. We talk about some microsegmentation as it applies to nsx for example. The other aspect is, you know, we do have, with our own smart fabric services that's enabled in a fabric, we have a concept of c cluster security. So all of this, you know, the different pillars, they sort of make up for the zero trust infrastructure for the networking assets of an infrastructure. >>Yeah. So thank you for that. There's a, there's a lot to unpack there. You know, one of the premise, the premise really of this, this, this, this segment that we're setting up in this series is really that everything you just mentioned, or a lot of things you just mentioned used to be the responsibility of the security team. And, and the premise that we're putting forth is that because security teams are so stretched thin, you, you gotta shift the vendor community. Dell specifically is shifting a lot of those tasks to their own r and d and taking care of a lot of that. So, cuz scop teams got a lot of other stuff to, to worry about. So my question relates to things like automation, which can help and scalability, what about those topics as it relates to networking infrastructure? >>Okay, our >>Portfolio, it enables state of the automation software, you know, that enables simplifying of the design. So for example, we do have, you know, you know the fabric design center, you know, a tool that automates the design of the fabric and you know, from a deployment and you know, the management of the network infrastructure that are simplicities, you know, using like Ansible s for Sonic for example are, you know, for a better sit and tell story. You know, we do have smart fabric services that can automate the entire fabric, you know, for a storage solution or for, you know, for one of the workloads for example. Now we do help reduce the complexity by closely integrating the management of the physical and the virtual networking infrastructure. And again, you know, we have those capabilities using Sonic or Smart Traffic services. If you look at Sonic for example, right? >>It delivers automated intent based secure containerized network and it has the ability to provide some network visibility and Avan has and, and all of these things are actually valid, you know, for a modern networking infrastructure. So now if you look at Sonic, you know, it's, you know, the usage of those tools, you know, that are available, you know, within the Sonic no is not restricted, you know, just to the data center infrastructure is, it's a unified no, you know, that's well applicable beyond the data center, you know, right up to the edge. Now if you look at our north from a smart traffic OS 10 perspective, you know, as I mentioned, we do have smart traffic services which essentially, you know, simplifies the deployment day zero, I mean rather day one, day two deployment expansion plans and the lifecycle management of our conversion infrastructure and hyper and hyper conversion infrastructure solutions. And finally, in order to enable say, zero touch deployment, we do have, you know, a VP solution with our SD van capability. So these are, you know, ways by which we bring down the complexity by, you know, enhancing the automation capability using, you know, a singular loss that can expand from a data center now right to the edge. >>Great, thank you for that. Last question real quick, just pitch me, what can you summarize from your point of view, what's the strength of the Dell networking portfolio? >>Okay, so from a Dell networking portfolio, we support capabilities at multiple layers. As I mentioned, we're talking about the physical security for examples, say disabling of the unused interface. Sticky Mac and trusted platform modules are the things that to go after. And when you're talking about say secure boot for example, it delivers the authenticity and the integrity of the OS 10 images at the startup. And Secure Boot also protects the startup configuration so that, you know, the startup configuration file is not compromised. And Secure port also enables the workload of prediction, for example, that is at another aspect of software image integrity validation, you know, wherein the image is data for the digital signature, you know, prior to any upgrade process. And if you are looking at secure access control, we do have things like role based access control, SSH to the switches, control plane access control that pre do tags and say access control from multifactor authentication. >>We do have various tech ads for entry control to the network and things like CSE and PRV support, you know, from a federal perspective we do have say logging wherein, you know, any event, any auditing capabilities can be possible by say looking at the clog service, you know, which are pretty much in our transmitter from the devices overts for example, and last we talked about say network segment, you know, say network separation and you know, these, you know, separation, you know, ensures that are, that is, you know, a contained say segment, you know, for a specific purpose or for the specific zone and, you know, just can be implemented by a, a micro segmentation, you know, just a plain old wheel or using virtual route of framework VR for example. >>A lot there. I mean I think frankly, you know, my takeaway is you guys do the heavy lifting in a very complicated topic. So thank you so much for, for coming on the cube and explaining that in in quite some depth. Really appreciate it. >>Thank you indeed. >>Oh, you're very welcome. Okay, in a moment I'll be back to dig into the hyper-converged infrastructure part of the portfolio and look at how when you enter the world of software defined where you're controlling servers and storage and networks via software led system, you could be sure that your infrastructure is trusted and secure. You're watching a blueprint for trusted infrastructure made possible by Dell Technologies and collaboration with the cube, your leader in enterprise and emerging tech coverage, your own west product management security lead at for HCI at Dell Technologies hyper-converged infrastructure. Jerome, welcome. >>Thank you Dave. >>Hey Jerome, in this series of blueprint for trusted infrastructure, we've been digging into the different parts of the infrastructure stack, including storage servers and networking, and now we want to cover hyperconverged infrastructure. So my first question is, what's unique about HCI that presents specific security challenges? What do we need to know? >>So what's unique about hyper-converge infrastructure is the breadth of the security challenge. We can't simply focus on a single type of IT system. So like a server or storage system or a virtualization piece of software, software. I mean HCI is all of those things. So luckily we have excellent partners like VMware, Microsoft, and internal partners like the Dell Power Edge team, the Dell storage team, the Dell networking team, and on and on. These partnerships in these collaborations are what make us successful from a security standpoint. So let me give you an example to illustrate. In the recent past we're seeing growing scope and sophistication in supply chain attacks. This mean an attacker is going to attack your software supply chain upstream so that hopefully a piece of code, malicious code that wasn't identified early in the software supply chain is distributed like a large player, like a VMware or Microsoft or a Dell. So to confront this kind of sophisticated hard to defeat problem, we need short term solutions and we need long term solutions as well. >>So for the short term solution, the obvious thing to do is to patch the vulnerability. The complexity is for our HCI portfolio. We build our software on VMware, so we would have to consume a patch that VMware would produce and provide it to our customers in a timely manner. Luckily VX rail's engineering team has co engineered a release process with VMware that significantly shortens our development life cycle so that VMware would produce a patch and within 14 days we will integrate our own code with the VMware release we will have tested and validated the update and we will give an update to our customers within 14 days of that VMware release. That as a result of this kind of rapid development process, VHA had over 40 releases of software updates last year for a longer term solution. We're partnering with VMware and others to develop a software bill of materials. We work with VMware to consume their software manifest, including their upstream vendors and their open source providers to have a comprehensive list of software components. Then we aren't caught off guard by an unforeseen vulnerability and we're more able to easily detect where the software problem lies so that we can quickly address it. So these are the kind of relationships and solutions that we can co engineer with effective collaborations with our, with our partners. >>Great, thank you for that. That description. So if I had to define what cybersecurity resilience means to HCI or converged infrastructure, and to me my takeaway was you gotta have a short term instant patch solution and then you gotta do an integration in a very short time, you know, two weeks to then have that integration done. And then longer term you have to have a software bill of materials so that you can ensure the providence of all the components help us. Is that a right way to think about cybersecurity resilience? Do you have, you know, a additives to that definition? >>I do. I really think that's site cybersecurity and resilience for hci because like I said, it has sort of unprecedented breadth across our portfolio. It's not a single thing, it's a bit of everything. So really the strength or the secret sauce is to combine all the solutions that our partner develops while integrating them with our own layer. So let me, let me give you an example. So hci, it's a, basically taking a software abstraction of hardware functionality and implementing it into something called the virtualized layer. It's basically the virtual virtualizing hardware functionality, like say a storage controller, you could implement it in hardware, but for hci, for example, in our VX rail portfolio, we, our Vxl product, we integrated it into a product called vsan, which is provided by our partner VMware. So that portfolio of strength is still, you know, through our, through our partnerships. >>So what we do, we integrate these, these security functionality and features in into our product. So our partnership grows to our ecosystem through products like VMware, products like nsx, Horizon, Carbon Black and vSphere. All of them integrate seamlessly with VMware and we also leverage VMware's software, part software partnerships on top of that. So for example, VX supports multifactor authentication through vSphere integration with something called Active Directory Federation services for adfs. So there's a lot of providers that support adfs including Microsoft Azure. So now we can support a wide array of identity providers such as Off Zero or I mentioned Azure or Active Directory through that partnership. So we can leverage all of our partners partnerships as well. So there's sort of a second layer. So being able to secure all of that, that provides a lot of options and flexibility for our customers. So basically to summarize my my answer, we consume all of the security advantages of our partners, but we also expand on them to make a product that is comprehensively secured at multiple layers from the hardware layer that's provided by Dell through Power Edge to the hyper-converged software that we build ourselves to the virtualization layer that we get through our partnerships with Microsoft and VMware. >>Great, I mean that's super helpful. You've mentioned nsx, Horizon, Carbon Black, all the, you know, the VMware component OTH zero, which the developers are gonna love. You got Azure identity, so it's really an ecosystem. So you may have actually answered my next question, but I'm gonna ask it anyway cuz you've got this software defined environment and you're managing servers and networking and storage with this software led approach, how do you ensure that the entire system is secure end to end? >>That's a really great question. So the, the answer is we do testing and validation as part of the engineering process. It's not just bolted on at the end. So when we do, for example, VxRail is the market's only co engineered solution with VMware, other vendors sell VMware as a hyper converged solution, but we actually include security as part of the co-engineering process with VMware. So it's considered when VMware builds their code and their process dovetails with ours because we have a secure development life cycle, which other products might talk about in their discussions with you that we integrate into our engineering life cycle. So because we follow the same framework, all of the, all of the codes should interoperate from a security standpoint. And so when we do our final validation testing when we do a software release, we're already halfway there in ensuring that all these features will give the customers what we promised. >>That's great. All right, let's, let's close pitch me, what would you say is the strong suit summarize the, the strengths of the Dell hyper-converged infrastructure and converged infrastructure portfolio specifically from a security perspective? Jerome? >>So I talked about how hyper hyper-converged infrastructure simplifies security management because basically you're gonna take all of these features that are abstracted in in hardware, they're now abstracted in the virtualization layer. Now you can manage them from a single point of view, whether it would be, say, you know, in for VX rail would be b be center, for example. So by abstracting all this, you make it very easy to manage security and highly flexible because now you don't have limitations around a single vendor. You have a multiple array of choices and partnerships to select. So I would say that is the, the key to making it to hci. Now, what makes Dell the market leader in HCI is not only do we have that functionality, but we also make it exceptionally useful to you because it's co engineered, it's not bolted on. So I gave the example of spo, I gave the example of how we, we modify our software release process with VMware to make it very responsive. >>A couple of other features that we have specific just to HCI are digitally signed LCM updates. This is an example of a feature that we have that's only exclusive to Dell that's not done through a partnership. So we digitally signed our software updates so the user can be sure that the, the update that they're installing into their system is an authentic and unmodified product. So we give it a Dell signature that's invalidated prior to installation. So not only do we consume the features that others develop in a seamless and fully validated way, but we also bolt on our own a specific HCI security features that work with all the other partnerships and give the user an exceptional security experience. So for, for example, the benefit to the customer is you don't have to create a complicated security framework that's hard for your users to use and it's hard for your system administrators to manage it all comes in a package. So it, it can be all managed through vCenter, for example, or, and then the specific hyper, hyper-converged functions can be managed through VxRail manager or through STDC manager. So there's very few pains of glass that the, the administrator or user ever has to worry about. It's all self contained and manageable. >>That makes a lot of sense. So you've got your own infrastructure, you're applying your best practices to that, like the digital signatures, you've got your ecosystem, you're doing co-engineering with the ecosystems, delivering security in a package, minimizing the complexity at the infrastructure level. The reason Jerome, this is so important is because SecOps teams, you know, they gotta deal with cloud security, they gotta deal with multiple clouds. Now they have their shared responsibility model going across multiple cl. They got all this other stuff that they have to worry, they gotta secure the containers and the run time and and, and, and, and the platform and so forth. So they're being asked to do other things. If they have to worry about all the things that you just mentioned, they'll never get, you know, the, the securities is gonna get worse. So what my takeaway is, you're removing that infrastructure piece and saying, Okay guys, you now can focus on those other things that is not necessarily Dell's, you know, domain, but you, you know, you can work with other partners to and your own teams to really nail that. Is that a fair summary? >>I think that is a fair summary because absolutely the worst thing you can do from a security perspective is provide a feature that's so unusable that the administrator disables it or other key security features. So when I work with my partners to define, to define and develop a new security feature, the thing I keep foremost in mind is, will this be something our users want to use and our administrators want to administer? Because if it's not, if it's something that's too difficult or onerous or complex, then I try to find ways to make it more user friendly and practical. And this is a challenge sometimes because we are, our products operate in highly regulated environments and sometimes they have to have certain rules and certain configurations that aren't the most user friendly or management friendly. So I, I put a lot of effort into thinking about how can we make this feature useful while still complying with all the regulations that we have to comply with. And by the way, we're very successful in a highly regulated space. We sell a lot of VxRail, for example, into the Department of Defense and banks and, and other highly regulated environments and we're very successful there. >>Excellent. Okay, Jerome, thanks. We're gonna leave it there for now. I'd love to have you back to talk about the progress that you're making down the road. Things always, you know, advance in the tech industry and so would appreciate that. >>I would look forward to it. Thank you very much, Dave. >>You're really welcome. In a moment I'll be back to summarize the program and offer some resources that can help you on your journey to secure your enterprise infrastructure. I wanna thank our guests for their contributions in helping us understand how investments by a company like Dell can both reduce the need for dev sec up teams to worry about some of the more fundamental security issues around infrastructure and have greater confidence in the quality providence and data protection designed in to core infrastructure like servers, storage, networking, and hyper-converged systems. You know, at the end of the day, whether your workloads are in the cloud, on prem or at the edge, you are responsible for your own security. But vendor r and d and vendor process must play an important role in easing the burden faced by security devs and operation teams. And on behalf of the cube production content and social teams as well as Dell Technologies, we want to thank you for watching a blueprint for trusted infrastructure. Remember part one of this series as well as all the videos associated with this program and of course today's program are available on demand@thecube.net with additional coverage@siliconangle.com. And you can go to dell.com/security solutions dell.com/security solutions to learn more about Dell's approach to securing infrastructure. And there's tons of additional resources that can help you on your journey. This is Dave Valante for the Cube, your leader in enterprise and emerging tech coverage. We'll see you next time.
SUMMARY :
So the game of Whackamole continues. But the diversity of alternatives and infrastructure implementations continues to how the industry generally in Dell specifically, are adapting to We're thrilled to have you here and hope you enjoy the program. We also hit on the storage part of the portfolio. So all of this complexity provides a lot of opportunity for attackers because it's expanding and the security mentality that, you know, security should enable our customers to go focus So I'm glad you you, you hit on that, but so given what you just said, what And in addition to this, Dell makes the commitment that we will rapidly how the threads have evolved, and we have also seen the regulatory trends and So thank you for that. And this is the principles that we use on power Edge, So the idea is that service first and foremost the chassis, the box, the several box is opened up, it logs alerts, and you can figure Great, thank you for that lot. So now the complexity that we are dealing with like was So once the customers receive the system at their end, do is quickly take a look at all the different pieces and compare it to the vulnerability you know, give us the sort of summary from your perspective, what are the key strengths of And as part of that like you know, security starts with the supply chain. And we also have dual layer encryption where you of the other things that they have to worry about, which are numerous. Technologies on the cube, your leader in enterprise and emerging tech coverage. So the question is from Dell's perspective, what's unique and to secure the network infrastructure In today's, you know, data driven world, it operates I like the way you phrase that. So if you look at it from a networking perspective, it's the ability to protect So I like that. kind of the assets that they're authorized to based on their user level. And it's imperative that logging is enable because any of the change to and I think you, you've got a third element which is i I think response, So the networking portfolio is no different, you know, it follows the same process for identification for tri and And then how you respond to incidents in a standard way has the ability, you know, to provide all this, this services from a Dell networking security You know, there are multiple layer of defense, you know, both at the edge and in the network in And one of the important aspect is, you know, in terms of, you know, the routing protocol, the specific security rules based on the specific applications, you know, that are running within the system. really that everything you just mentioned, or a lot of things you just mentioned used to be the responsibility design of the fabric and you know, from a deployment and you know, the management of the network and all of these things are actually valid, you know, for a modern networking infrastructure. just pitch me, what can you summarize from your point of view, is data for the digital signature, you know, prior to any upgrade process. can be possible by say looking at the clog service, you know, I mean I think frankly, you know, my takeaway is you of the portfolio and look at how when you enter the world of software defined where you're controlling different parts of the infrastructure stack, including storage servers this kind of sophisticated hard to defeat problem, we need short term So for the short term solution, the obvious thing to do is to patch bill of materials so that you can ensure the providence of all the components help So really the strength or the secret sauce is to combine all the So our partnership grows to our ecosystem through products like VMware, you know, the VMware component OTH zero, which the developers are gonna love. life cycle, which other products might talk about in their discussions with you that we integrate into All right, let's, let's close pitch me, what would you say is the strong suit summarize So I gave the example of spo, I gave the example of how So for, for example, the benefit to the customer is you The reason Jerome, this is so important is because SecOps teams, you know, they gotta deal with cloud security, And by the way, we're very successful in a highly regulated space. I'd love to have you back to talk about the progress that you're making down the Thank you very much, Dave. in the quality providence and data protection designed in to core infrastructure like
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Jerome | PERSON | 0.99+ |
Dave | PERSON | 0.99+ |
Microsoft | ORGANIZATION | 0.99+ |
Dave Valante | PERSON | 0.99+ |
Deepak | PERSON | 0.99+ |
Dell Technologies | ORGANIZATION | 0.99+ |
Mahesh Nager | PERSON | 0.99+ |
Dell | ORGANIZATION | 0.99+ |
Jerome West | PERSON | 0.99+ |
Mahesh | PERSON | 0.99+ |
Dell Technologies | ORGANIZATION | 0.99+ |
demand@thecube.net | OTHER | 0.99+ |
Department of Defense | ORGANIZATION | 0.99+ |
Dave Ante | PERSON | 0.99+ |
second part | QUANTITY | 0.99+ |
first question | QUANTITY | 0.99+ |
VX rail | ORGANIZATION | 0.99+ |
First | QUANTITY | 0.99+ |
two weeks | QUANTITY | 0.99+ |
last year | DATE | 0.99+ |
Deepak Arage | PERSON | 0.99+ |
14 days | QUANTITY | 0.99+ |
second component | QUANTITY | 0.99+ |
second layer | QUANTITY | 0.99+ |
one | QUANTITY | 0.99+ |
today | DATE | 0.99+ |
A Blueprint for Trusted Infrastructure Made Possible | TITLE | 0.99+ |
hundreds | QUANTITY | 0.99+ |
one part | QUANTITY | 0.99+ |
both | QUANTITY | 0.98+ |
VMware | ORGANIZATION | 0.98+ |
VHA | ORGANIZATION | 0.98+ |
coverage@siliconangle.com | OTHER | 0.98+ |
hundred percent | QUANTITY | 0.98+ |
each | QUANTITY | 0.98+ |
vSphere | TITLE | 0.98+ |
dell.com/security | OTHER | 0.98+ |
DV trusted Infrastructure part 2 close
>> Whenever you're ready. >> Okay, I'm Dave, in five, four, three. I want to thank our guests for their contributions in helping us understand how investments by a company like Dell can both reduce the need for DevSecOp teams to worry about some of the more fundamental security issues around infrastructure, and have greater confidence in the quality, provenance and data protection designed in to core infrastructure like servers, storage, networking, and hyperconverged systems. At the end of the day, whether your workloads are in the cloud, on prem or at the edge, you are responsible for your own security but vendor R&D and vendor process must play an important role in easing the burden faced by security, devs and operation teams. And on behalf of theCUBE production, content and social teams, as well as Dell Technologies, we want to thank you for watching A Blueprint for Trusted Infrastructure. Remember, part one of this series, as well as all the videos associated with this program and of course, today's program are available on demand at thecube.net with additional coverage at siliconangle.com. And you can go to dell.com/securitysolutions, dell.com/dell.com/securitysolutions to learn more about Dell's approach to securing infrastructure and there's tons of additional resources that can help you on your journey. This is Dave Vellante for theCUBE, your leader in enterprise and emerging tech coverage. We'll see you next time.
SUMMARY :
in the quality, provenance
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Dave Vellante | PERSON | 0.99+ |
five | QUANTITY | 0.99+ |
Dave | PERSON | 0.99+ |
Dell | ORGANIZATION | 0.99+ |
three | QUANTITY | 0.99+ |
four | QUANTITY | 0.99+ |
siliconangle.com | OTHER | 0.99+ |
thecube.net | OTHER | 0.99+ |
both | QUANTITY | 0.99+ |
Dell Technologies | ORGANIZATION | 0.98+ |
dell.com/dell.com/securitysolutions | OTHER | 0.97+ |
A Blueprint for Trusted Infrastructure | TITLE | 0.95+ |
theCUBE | ORGANIZATION | 0.94+ |
today | DATE | 0.93+ |
tons | QUANTITY | 0.83+ |
part 2 | OTHER | 0.82+ |
dell.com/securitysolutions | OTHER | 0.77+ |
part | QUANTITY | 0.57+ |
one | OTHER | 0.49+ |
Mahesh Nagarathnam, Dell Technologies
(upbeat music) >> We're back with a Blueprint for Trusted Infrastructure in partnership with Dell Technologies and theCUBE. And we're here with Mahesh Nagarathnam who is a consultant in the area of networking product management at Dell technologies. Mahesh, welcome, good to see you. >> Hey, good morning, Dave. It's nice to meet you as well. >> Hey, so we've been digging into all the parts of the infrastructure stack, and now we're going to look at the all important networking components. Mahesh, when we think about networking in today's environment, we think about the core data center and we're connecting out to various locations including the cloud and both the near and the far edge. So the question is from Dell's perspective what's unique and challenging about securing network infrastructure that we should know about? >> Yeah, so a few years ago, IT security in an enterprise was primarily putting a wrapper around the data center because IT was constrained to an infrastructure owned and operated by the enterprise for the most part. So putting a wrapper around it like a perimeter or a firewall was a sufficient response because you could basically control the enormous data into small enough control. Today, with the distributed data intelligent software different systems, multi-cloud environment and asset service delivery. The infrastructure for the modern era changes the way to secure the network infrastructure. In today's data driven world, IT operates everywhere and data is created and accessed everywhere. So far from the centralized mono data centers of the past. The biggest challenge is how do we build the network infrastructure of the modern era that are intelligent, with automation, enabling maximum flexibility and business agility without any compromise on the security. We believe that in this data era, the security transformation must accompany digital transformation. >> Yeah, that's very good. You talked about a couple of things there. Data by its very nature is distributed, there is no perimeter anymore. So you can't just, as you say, put a wrapper around it, I like the way you phrase that. So when you think about cyber security resilience from a networking perspective, how do you define that? In other words, what are the basic principles that you adhere to when thinking about securing network infrastructure for your customers? >> So our belief is that cybersecurity and cybersecurity resilience, they need to be holistic. They need to be integrated, scalable, one that spans the enterprise and with a consistent and objective and policy implementation. So cybersecurity needs to span across all the devices and running across any application whether the application resets on the cloud or anywhere else in the infrastructure. From a networking standpoint, what does it mean? It's again, the same principles. In order to prevent the threat actors from accessing, changing, destroying or stealing sensitive data, this definition holds good for networking as well. So if you look at it from a networking perspective it's the ability to protect from and withstand attacks on the networking systems. As we continue to evolve, this will also include the ability to adapt and recover from these attacks which is what cyber resilience aspect is all about. So cybersecurity, best practices as you know is continuously changing the landscape primarily because the cyber threats also continue to evolve. >> Yeah, got it. I like that. So, it's got to be integrated. It's got to be scalable. It's got to be comprehensive and adaptable. You're saying it can't be static. >> Right. So I think, you had a second part of the question that says, what are the basic principles when you're thinking about securing network infrastructure. When you are looking at securing the network infrastructure it revolves around core security capability of the devices that form the network. And what are these security capabilities? These are access control, software integrity and vulnerability response. When you look at access control it's to ensure that only the authenticated users are able to access the platform and they're able to access only the kind of the assets that they're authorized to, based on their user level. Now accessing a network platform like a switch or a router, for example, is typically used for configuration and management of the networking switch. So user access is based on roles for that matter role based access control, whether you are security admin or a network admin or a storage admin. And it's imperative that logging is enabled because any of the change to the configuration is actually logged and monitored as well. When we're talking about software's integrity, it's the ability to ensure that the software that's running on the system has not been compromised. And this is important because it could actually get hold of the system and you could get undesired results. In terms of validation of the images, it needs to be done through digital signature. So it's important that when you're talking about software integrity, A, you are ensuring that the platform is not compromised and B, that any upgrades that happens to the platform is happening through validated signature. >> Okay. And now you've, so there's access control, software integrity and I think you got a third element, which is, I think response, but please continue. >> Yeah. So, the third one about vulnerability. So we follow the same process that's been followed by the rest of the products within the Dell Product family that's to report or identify any kind of vulnerability that's being addressed by the Dell Product Security Incident Response Team. So the networking portfolio is no different. It follows the same process for identification for triage and for resolution of these vulnerabilities. And this address either through patches or through new resource via networking software. >> Yeah, got it. I mean, you didn't say zero trust but when you were talking about access control you're really talking about access to only those assets that people are authorized to access. I know zero trust sometimes is a buzzword, but you, I think gave it some clarity there. Software integrity, it's about assurance, validation, your digital signature, you mentioned, and that there's been no compromise. And then how you respond to incidents in a standard way that can fit into a security framework. So outstanding description. Thank you for that. But then the next question is how does Dell Networking fit into the construct of what we've been talking about, Dell Trusted Infrastructure? >> So networking is the key element in the Dell Trusted Infrastructure. It provides the interconnect between the server and the storage world and it's part of any data center configuration. For a trusted infrastructure, the network needs to have access control in place where only the authorized personals are able to make change to the network configuration and logging of any of those changes is also done through the logging capabilities. Additionally, we should also ensure that the configuration should provide network isolation between the management network and the data traffic network because they need to be separate and distinct from each other. And furthermore, even if you look at the data traffic network, you have things like segmentation, isolated segments and via VRFs or micro-segmentation via partners. This allows various level of security for each of those segments. So it's important that the network infrastructure has the ability to provide all these services. From a Dell networking security perspective, there are multiple layers of defense, both at the edge and in the network, in the hardware and in the software. And essentially, a set of rules and a configuration that's designed to sort of protect the integrity, confidentiality and accessibility of the network assets. So each network security layer, it implements policies and controls, as I said, including network segmentation, we do have capabilities, resources, centralized management, automation, and capability and scalability for that matter. Now you add all of these things with the open networking standards or software different principles, and you essentially reach to the point where you're looking at zero trust network access which is essentially sort of a building block for increased cloud adoption. If you look at the different pillars of a zero touch architecture, if you look at the device aspect, we do have support for secure boot, for example, we do have trusted platform, trusted platform models, TPMs on certain offer products. And the physical security, plain simple old WLAN port enable disable. From a user trust perspective, we know it's all done via access control base via role based access control and capability in order to provide remote authentication or things like sticky MAC or MAC learning limit and so on. If you look at a transport and a session trust layer, these are essentially, how do you access this switch. Is it by plain old Telnet, or is it like secure SSH. And when a host communicates to the switch, we do have things like self-signed or a certificate authority based certification. And one of the important aspect is, in terms of the routing protocol the routing protocol, for example, BGP, for example, we do have the capability to support MD5 authentication between the BGP peers so that there is no malicious attack to the network where the routing table is compromised. And the other aspect is about control plain ESL. It's typical that if you don't have a control plane Azure, it could be flooded and the switch could be compromised by denial of service attacks. From an application test perspective, as I mentioned, we do have the application specific security rules where you could actually define the specific security rules based on the specific applications that are running within the system. And I did talk about the digital signature and the cryptographic checks and that we do for authentication and, I mean rather for the authenticity and the validation of the image and the boundary and so on and so forth. Finally the data trust, we are looking at the network separation. The network separation could happen over VRF, plain old VLANs which can bring about multitenancy aspects. We talk about micro-segmentation as it applies to NSX, for example. The other aspect is we do have with our own smart fabric services, that's enabled in a fabric, we have a concept of cluster security. So all of this, the different pillars, they sort of make up for the zero trust infrastructure for the networking assets of an infrastructure. >> Yeah, so thank you for that. There's a lot to unpack there. One of the premise, the premise really this segment that we're setting up in this series, is really that everything you just mentioned, or a lot of things you just mentioned used to be the responsibility of the security team and the premise that we're putting forth is that because security teams are so stretched thin, you got to shift a vendor community, Dell specifically is shifting a lot of those tasks to their own R&D and taking care of a lot of that. 'cause SecOps teams got a lot of other stuff to worry about. So my question relates to things like automation which can help and scalability. What about those topics as it relates to networking infrastructure? >> Our portfolio, it enables state of the automation software that enables simplifying of the design. So for example, we do have the fabric design center, a tool that automates the design of the entire fabric and from a deployment and the management of the network infrastructure, there are simplicities using like Ansible playbooks for SONiC, for example. Or for a better storage, we do have smart fabric services that can automate the entire fabric for a storage solution or for one of the workloads, for example. Now we do help reduce the complexity by closely integrating the management of the physical and the virtual networking infrastructure. And again, we have those capabilities using SONiC or smart traffic services. If you look at SONiC for example, it delivers automated intent based secure containerized network. And it has the ability to provide network visibility and awareness and of these things are actually valid for a modern networking infrastructure. So now if you look at SONiC, the usage of those tools that are available within the SONiC NAS is not restricted just to the data center infrastructure, it's a unified NAS that's well applicable beyond the data center, right up to the edge. Now, if you look at our NAS from a smart traffic OS10 perspective, as I mentioned, we do have smart traffic services, which essentially simplifies the deployment, day one day two deployment expansion plans and the life cycle management of our converged infrastructure and hyperconverged infrastructure solutions. And finally, in order to enable zero touch deployment, we do have a VEP solution with our SD-WAN capability. So these are in a ways by which we bring down the complexity by enhancing the automation capability using a singular NAS that can expand from a data center now, right to the edge. >> Great, thank you for that. Last question real quick. Pitch me, can you summarize from your point of view what's the strength of the Dell networking portfolio? >> So from a Dell networking portfolio we support the capabilities at multiple layers, as I mentioned. We've talking about the physical security, for example, let's say disabling of the unused interface, sticky MAC and trusted platform modules are the things that to go after. And when you're talking about secure boot, for example, it delivers the authenticity and the integrity of the OS10 images at the startup. And secure boot also protects the startup configuration so that the startup configuration file is not compromised. And secure boot also enables the bootloader protection, for example. That is at another aspect of software image, integrity validation, wherein the image is validated for the digital signature prior to any upgrade process. And if you are looking at secure access control we do have things like role-based access control, SSH to the switches, control plane, access control, that pre-onset attacks and access control through multifactor authentication. We do have Radius Tech ads for entry control to the network and things like CSE and PRV support from a federal perspective. We do have logging wherein any event, any auditing capabilities can be possible by looking at the syslog servers which are pretty much in our transmitter from the devices ORTS, for example. And last we talked about network separation. And this separation ensures that that is a contained segment for a specific purpose or for the specific zone. And this can be implemented by a micro-segmentation, just a plain old WLAN or using virtual route of framework VRF, for example. >> A lot there. I mean, I think frankly, my takeaway is you guys do the heavy lifting in a very complicated topic. So thank you so much for coming on theCUBE and explaining that in quite some depth. Really appreciate it. >> Thank you, Dave. >> Oh, you're very welcome. Okay in a moment, I'll be back to dig into the hyperconverged infrastructure part of the portfolio, and look at how, when you enter the world of software defined where you're controlling servers and storage and networks via software led system, you could be sure that your infrastructure is trusted and secure. You're watching a Blueprint for Trusted Infrastructure made possible by Dell technologies and collaboration with theCUBE, your leader in enterprise and emerging tech coverage. (soft upbeat music)
SUMMARY :
And we're here with Mahesh Nagarathnam It's nice to meet you as well. of the infrastructure stack, infrastructure of the modern I like the way you phrase that. it's the ability to protect from So, it's got to be integrated. of the system and you could and I think you got a third element, So the networking into the construct of what the network needs to have and the premise that we're And it has the ability to Great, thank you for that. are the things that to go after. do the heavy lifting of the portfolio, and look at how,
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Dave | PERSON | 0.99+ |
Mahesh | PERSON | 0.99+ |
Dell | ORGANIZATION | 0.99+ |
Mahesh Nagarathnam | PERSON | 0.99+ |
Dell Technologies | ORGANIZATION | 0.99+ |
Radius Tech | ORGANIZATION | 0.99+ |
third element | QUANTITY | 0.98+ |
Today | DATE | 0.98+ |
SONiC | TITLE | 0.98+ |
two | QUANTITY | 0.98+ |
Dell Technologies | ORGANIZATION | 0.98+ |
each | QUANTITY | 0.98+ |
both | QUANTITY | 0.98+ |
second part | QUANTITY | 0.98+ |
one | QUANTITY | 0.97+ |
OS10 | TITLE | 0.97+ |
theCUBE | ORGANIZATION | 0.97+ |
One | QUANTITY | 0.96+ |
today | DATE | 0.96+ |
third one | QUANTITY | 0.93+ |
few years ago | DATE | 0.9+ |
zero | QUANTITY | 0.87+ |
zero touch | QUANTITY | 0.79+ |
Telnet | ORGANIZATION | 0.78+ |
each network security layer | QUANTITY | 0.78+ |
Azure | TITLE | 0.78+ |
Dell technologies | ORGANIZATION | 0.73+ |
Ansible | ORGANIZATION | 0.55+ |
Blueprint | ORGANIZATION | 0.53+ |
CSE | TITLE | 0.47+ |
Infrastructure | ORGANIZATION | 0.42+ |
playbooks | TITLE | 0.24+ |
Jerome West, Dell Technologies
(upbeat music) >> We're back with Jerome West, the Product Management Security Lead for HCI at Dell Technologies Hyper-Converged Infrastructure. Jerome, welcome. >> Thank you, Dave. >> Hey, Jerome, in this series "A Blueprint for Trusted Infrastructure," we've been digging into the different parts of the infrastructure stack, including storage servers and networking, and now we want to cover hyper-converged infrastructure. So my first question is what's unique about HCI that presents specific security challenges? What do we need to know? >> So what's unique about hyper-converged infrastructure is the breadth of the security challenge. We can't simply focus on a single type of IT system, so like a server or a storage system or a virtualization piece of software. I mean, HCI is all of those things. So luckily we have excellent partners like VMware, Microsoft and internal partners, like the Dell Power Edge Team, the Dell Storage Team, the Dell Networking Team, and on and on. These partnerships and these collaborations are what make us successful from a security standpoint. So let me give you an example to illustrate. In the recent past, we're seeing growing scope and sophistication in supply chain attacks. This means an attacker is going to attack your software supply chain upstream, so that hopefully a piece of code, malicious code that wasn't identified early in the software supply chain is distributed like a large player, like a VMware or a Microsoft or a Dell. So to confront this kind of sophisticated hard to defeat problem, we need short-term solutions and we need long-term solutions as well. So for the short-term solution, the obvious thing to do is to patch the vulnerability. The complexity is for our HCI portfolio, we build our software on VMware. So we would have to consume a patch that VMware would produce and provide it to our customers in a timely manner. Luckily, VxRail's engineering team has co engineered a release process with VMware that significantly shortens our development life cycle, so that VMware will produce a patch, and within 14 days we will integrate our own code with the VMware release. We will have tested and validated the update, and we will give an update to our customers within 14 days of that VMware release. That as a result of this kind of rapid development process, VxRail had over 40 releases of software updates last year. For a longer term solution, we're partnering with VMware and others to develop a software bill of materials. We work with VMware to consume their software manifest including their upstream vendors and their open source providers to have a comprehensive list of software components. Then we aren't caught off guard by an unforeseen vulnerability, and we're more able to easily detect where the software problem lies so that we can quickly address it. So these are the kind of relationships and solutions that we can co-engineer with effective collaborations with our partners. >> Great, thank you for that description. So if I had to define what cybersecurity resilience means to HCI or converged infrastructure, to me, my takeaway was you got to have a short-term instant patch solution and then you got to do an integration in a very short time, you know, two weeks to then have that integration done. And then longer-term, you have to have a software bill of materials so that you can ensure the provenance of all the components. Help us, is that a right way to think about cybersecurity resilience? Do you have, you know, additives to that definition? >> I do. I really think that cybersecurity and resilience for HCI, because like I said it has sort of unprecedented breadth across our portfolio. It's not a single thing. It's a bit of everything. So really the strength or the secret sauce is to combine all the solutions that our partner develops while integrating them with our own layer. So let me give you an example. So HCI, it's a basically taking a software abstraction of hardware functionality and implementing it into something called the virtualized layer. It's basically the virtualizing hardware functionality, like say a storage controller. You could implement it in the hardware, but for HCI, for example, in our VxRail portfolio, our VxRail product, we integrated it into a product called vSan which is provided by our partner VMware. So that portfolio strength is still, you know, through our partnerships. So what we do, we integrate these security functionality and features into our product. So our partnership grows through our ecosystem through products like VMware products, like NSX, Horizon, Carbon Black and vSphere. All of them integrate seamlessly with VMware. And we also leverage VMware's software partnerships on top of that. So for example, VxRail supports multifactor authentication through vSphere's integration with something called Active Directory Federation Services or ADFS. So there is a lot of providers that support ADFS, including Microsoft Azure. So now we can support a wide array of identity providers such as Auth0, or I mentioned Azure or Active Directory through that partnership. So we can leverage all of our partners' partnerships as well. So there's sort of a second layer. So being able to secure all of that, that provides a lot of options and flexibility for our customers. So basically to summarize my answer, we consume all of the security advantages of our partners, but we also expand on them to make a product that is comprehensively secured at multiple layers from the hardware layer that's provided by Dell through Power Edge to the hyper-converged software that we build ourselves to the virtualization layer that we get through our partnerships with Microsoft and VMware. >> Great, I mean, that's super helpful. You've mentioned NSX, Horizon, Carbon Black, all the you know, the VMware component, Auth0, which the developers are going to love. You got Azure Identity. So it's really an ecosystem. So you may have actually answered my next question, but I'm going to ask it anyway cause you've got this software-defined environment, and you're managing servers and networking and storage with this software-led approach. How do you ensure that the entire system is secure end to end? >> That's a really great question. So the answer is we do testing and validation as part of the engineering process. It's not just bolted on at the end. So when we do, for example VxRail is the market's only co-engineered solution with VMware. Other vendors sell VMware as a hyper-converged solution, but we actually include security as part of the co-engineering process with VMware. So it's considered when VMware builds their code, and their process dovetails with ours because we have a secure development lifecycle which other products might talk about in their discussions with you, that we integrate into our engineering lifecycle. So because we follow the same framework, all of the code should inter-operate from a security standpoint. And so when we do our final validation testing, when we do a software release, we're already halfway there in ensuring that all these features will give the customers what we promised. >> That's great. All right, let's close. Pitch me. What would you say is the strong suit, summarize the the strengths of the Dell hyper-converged infrastructure and converged infrastructure portfolio, specifically from a security perspective, Jerome? >> So I talked about how hyper-converged infrastructure simplifies security management because basically you're going to take all of these features that are abstracted in hardware. They're not abstracted in the virtualization layer. Now you can manage them from a single point of view, whether it would be say, you know, for VxRail it would be vCenter, for example. So by abstracting all this, you make it very easy to manage security and highly flexible because now you don't have limitations around a single vendor. You have a multiple array of choices and partnerships to select. So I would say that is the key to making, to HCI. Now what makes Dell the market leader in HCI is not only do we have that functionality, but we also make it exceptionally useful to you because it's co-engineered. It's not bolted on. So I gave the example of SBOM. I gave the example of how we modify our software release process with VMware to make it very responsive. A couple of other features that we have specific just to HCI are digitally signed LCM updates. This is an example of a feature that we have that's only exclusive to Dell. It's not done through a partnership. So we digitally sign our software updates. So the user can be sure that the update that they're installing into their system is an authentic and unmodified product. So we give it a Dell signature that's invalidated prior to installation. So not only do we consume the features that others develop in a seamless and fully validated way, but we also bolt on our own specific HCI security features that work with all the other partnerships and give the user an exceptional security experience. So for example, the benefit to the customer is you don't have to create a complicated security framework. That's hard for your users to use, and it's hard for your system administrators to manage. It all comes in a package, so it can be all managed through vCenter, for example. And then the specific hyper-converged functions can be managed through VxRail manager or through STDC manager. So there's very few panes of glass that the administrator or user ever has to worry about. It's all self-contained and manageable. >> That makes a lot of sense. So you've got your own infrastructure. You're applying your best practices to that like the digital signatures. You've got your ecosystem. You're doing co-engineering with the ecosystems, delivering security in a package, minimizing the complexity at the infrastructure level. The reason, Jerome, this is so important is because SecOps teams, you know, they got to deal with Cloud security. They got to deal with multiple Clouds. Now they have their shared responsibility model going across multiple. They got all this other stuff that they have to worry. They got to secure the containers and the run time and the platform and so forth. So they're being asked to do other things. If they have to worry about all the things that you just mentioned, they'll never get, you know, the security is just going to get worse. So my takeaway is you're removing that infrastructure piece and saying, okay, guys, you now can focus on those other things that is not necessarily Dell's, you know, domain, but you, you know, you can work with other partners and your own teams to really nail that. Is that a fair summary? >> I think that is a fair summary because absolutely the worst thing you can do from a security perspective is provide a feature that's so unusable that the administrator disables it or other key security features. So when I work with my partners to define and develop a new security feature, the thing I keep foremost in mind is will this be something our users want to use and our administrators want to administer? Because if it's not, if it's something that's too difficult or onerous or complex, then I try to find ways to make it more user-friendly and practical. And this is a challenge sometimes because our products operate in highly regulated environments, and sometimes they have to have certain rules and certain configurations that aren't the most user friendly or management friendly. So I put a lot of effort into thinking about how can we make this feature useful while still complying with all the regulations that we have to comply with. And by the way, we're very successful in a highly regulated space. We sell a lot of VxRail, for example, into the Department of Defense and banks and other highly regulated environments. And we're very successful there. >> Excellent, okay, Jerome, thanks. We're going to leave it there for now. I'd love to have you back to talk about the progress that you're making down the road. Things always, you know, advance in the tech industry, and so would appreciate that >> I would look forward to it. Thank you very much, Dave. >> You're really welcome. In a moment, I'll be back to summarize the program and offer some resources that can help you on your journey to secure your enterprise infrastructure. (upbeat music)
SUMMARY :
the Product Management Security Lead and now we want to cover So for the short-term solution, So if I had to define what So really the strength or the secret sauce all the you know, the VMware component, So the answer is we do of the Dell hyper-converged infrastructure So for example, the So they're being asked to do other things. that aren't the most user I'd love to have you back Thank you very much, Dave. and offer some resources that can help you
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Jerome | PERSON | 0.99+ |
Microsoft | ORGANIZATION | 0.99+ |
Dave | PERSON | 0.99+ |
Jerome West | PERSON | 0.99+ |
Dell | ORGANIZATION | 0.99+ |
first question | QUANTITY | 0.99+ |
Department of Defense | ORGANIZATION | 0.99+ |
second layer | QUANTITY | 0.99+ |
Dell Technologies | ORGANIZATION | 0.99+ |
two weeks | QUANTITY | 0.99+ |
HCI | ORGANIZATION | 0.99+ |
last year | DATE | 0.99+ |
VMware | ORGANIZATION | 0.99+ |
VxRail | ORGANIZATION | 0.99+ |
14 days | QUANTITY | 0.99+ |
A Blueprint for Trusted Infrastructure | TITLE | 0.98+ |
NSX | ORGANIZATION | 0.98+ |
VxRail | TITLE | 0.97+ |
Dell Networking Team | ORGANIZATION | 0.97+ |
vCenter | TITLE | 0.97+ |
over 40 releases | QUANTITY | 0.95+ |
Azure | TITLE | 0.95+ |
Auth0 | ORGANIZATION | 0.94+ |
single thing | QUANTITY | 0.94+ |
single vendor | QUANTITY | 0.92+ |
vSan | TITLE | 0.91+ |
Dell Storage Team | ORGANIZATION | 0.91+ |
SBOM | ORGANIZATION | 0.9+ |
Horizon | ORGANIZATION | 0.89+ |
vSphere | TITLE | 0.89+ |
single point | QUANTITY | 0.89+ |
Carbon Black | ORGANIZATION | 0.85+ |
Azure Identity | TITLE | 0.84+ |
ADFS | TITLE | 0.81+ |
Dell Power Edge Team | ORGANIZATION | 0.78+ |
Power Edge | TITLE | 0.75+ |
single type | QUANTITY | 0.74+ |
vSphere | ORGANIZATION | 0.69+ |
couple | QUANTITY | 0.68+ |
VMware | TITLE | 0.6+ |
HCI | TITLE | 0.47+ |
SecOps | ORGANIZATION | 0.45+ |
HCI | OTHER | 0.38+ |
Oracle Announces MySQL HeatWave on AWS
>>Oracle continues to enhance my sequel Heatwave at a very rapid pace. The company is now in its fourth major release since the original announcement in December 2020. 1 of the main criticisms of my sequel, Heatwave, is that it only runs on O. C I. Oracle Cloud Infrastructure and as a lock in to Oracle's Cloud. Oracle recently announced that heat wave is now going to be available in AWS Cloud and it announced its intent to bring my sequel Heatwave to Azure. So my secret heatwave on AWS is a significant TAM expansion move for Oracle because of the momentum AWS Cloud continues to show. And evidently the Heatwave Engineering team has taken the development effort from O. C I. And is bringing that to A W S with a number of enhancements that we're gonna dig into today is senior vice president. My sequel Heatwave at Oracle is back with me on a cube conversation to discuss the latest heatwave news, and we're eager to hear any benchmarks relative to a W S or any others. Nippon has been leading the Heatwave engineering team for over 10 years and there's over 100 and 85 patents and database technology. Welcome back to the show and good to see you. >>Thank you. Very happy to be back. >>Now for those who might not have kept up with the news, uh, to kick things off, give us an overview of my sequel, Heatwave and its evolution. So far, >>so my sequel, Heat Wave, is a fully managed my secret database service offering from Oracle. Traditionally, my secret has been designed and optimised for transaction processing. So customers of my sequel then they had to run analytics or when they had to run machine learning, they would extract the data out of my sequel into some other database for doing. Unlike processing or machine learning processing my sequel, Heat provides all these capabilities built in to a single database service, which is my sequel. He'd fake So customers of my sequel don't need to move the data out with the same database. They can run transaction processing and predicts mixed workloads, machine learning, all with a very, very good performance in very good price performance. Furthermore, one of the design points of heat wave is is a scale out architecture, so the system continues to scale and performed very well, even when customers have very large late assignments. >>So we've seen some interesting moves by Oracle lately. The collaboration with Azure we've we've covered that pretty extensively. What was the impetus here for bringing my sequel Heatwave onto the AWS cloud? What were the drivers that you considered? >>So one of the observations is that a very large percentage of users of my sequel Heatwave, our AWS users who are migrating of Aurora or so already we see that a good percentage of my secret history of customers are migrating from GWS. However, there are some AWS customers who are still not able to migrate the O. C. I to my secret heat wave. And the reason is because of, um, exorbitant cost, which was charges. So in order to migrate the workload from AWS to go see, I digress. Charges are very high fees which becomes prohibitive for the customer or the second example we have seen is that the latency of practising a database which is outside of AWS is very high. So there's a class of customers who would like to get the benefits of my secret heatwave but were unable to do so and with this support of my secret trip inside of AWS, these customers can now get all the grease of the benefits of my secret he trip without having to pay the high fees or without having to suffer with the poorly agency, which is because of the ws architecture. >>Okay, so you're basically meeting the customer's where they are. So was this a straightforward lifted shift from from Oracle Cloud Infrastructure to AWS? >>No, it is not because one of the design girls we have with my sequel, Heatwave is that we want to provide our customers with the best price performance regardless of the cloud. So when we decided to offer my sequel, he headed west. Um, we have optimised my sequel Heatwave on it as well. So one of the things to point out is that this is a service with the data plane control plane and the console are natively running on AWS. And the benefits of doing so is that now we can optimise my sequel Heatwave for the E. W s architecture. In addition to that, we have also announced a bunch of new capabilities as a part of the service which will also be available to the my secret history of customers and our CI, But we just announced them and we're offering them as a part of my secret history of offering on AWS. >>So I just want to make sure I understand that it's not like you just wrapped your stack in a container and stuck it into a W s to be hosted. You're saying you're actually taking advantage of the capabilities of the AWS cloud natively? And I think you've made some other enhancements as well that you're alluding to. Can you maybe, uh, elucidate on those? Sure. >>So for status, um, we have taken the mind sequel Heatwave code and we have optimised for the It was infrastructure with its computer network. And as a result, customers get very good performance and price performance. Uh, with my secret he trade in AWS. That's one performance. Second thing is, we have designed new interactive counsel for the service, which means that customers can now provision there instances with the council. But in addition, they can also manage their schemas. They can. Then court is directly from the council. Autopilot is integrated. The council we have introduced performance monitoring, so a lot of capabilities which we have introduced as a part of the new counsel. The third thing is that we have added a bunch of new security features, uh, expose some of the security features which were part of the My Secret Enterprise edition as a part of the service, which gives customers now a choice of using these features to build more secure applications. And finally, we have extended my secret autopilot for a number of old gpus cases. In the past, my secret autopilot had a lot of capabilities for Benedict, and now we have augmented my secret autopilot to offer capabilities for elderly people. Includes as well. >>But there was something in your press release called Auto thread. Pooling says it provides higher and sustained throughput. High concerns concerns concurrency by determining Apple number of transactions, which should be executed. Uh, what is that all about? The auto thread pool? It seems pretty interesting. How does it affect performance? Can you help us understand that? >>Yes, and this is one of the capabilities of alluding to which we have added in my secret autopilot for transaction processing. So here is the basic idea. If you have a system where there's a large number of old EP transactions coming into it at a high degrees of concurrency in many of the existing systems of my sequel based systems, it can lead to a state where there are few transactions executing, but a bunch of them can get blocked with or a pilot tried pulling. What we basically do is we do workload aware admission control and what this does is it figures out, what's the right scheduling or all of these algorithms, so that either the transactions are executing or as soon as something frees up, they can start executing, so there's no transaction which is blocked. The advantage to the customer of this capability is twofold. A get significantly better throughput compared to service like Aurora at high levels of concurrency. So at high concurrency, for instance, uh, my secret because of this capability Uh oh, thread pulling offers up to 10 times higher compared to Aurora, that's one first benefit better throughput. The second advantage is that the true part of the system never drops, even at high levels of concurrency, whereas in the case of Aurora, the trooper goes up, but then, at high concurrency is, let's say, starting, uh, level of 500 or something. It depends upon the underlying shit they're using the troopers just dropping where it's with my secret heatwave. The truth will never drops. Now, the ramification for the customer is that if the truth is not gonna drop, the user can start off with a small shape, get the performance and be a show that even the workload increases. They will never get a performance, which is worse than what they're getting with lower levels of concurrency. So this let's leads to customers provisioning a shape which is just right for them. And if they need, they can, uh, go with the largest shape. But they don't like, you know, over pay. So those are the two benefits. Better performance and sustain, uh, regardless of the level of concurrency. >>So how do we quantify that? I know you've got some benchmarks. How can you share comparisons with other cloud databases especially interested in in Amazon's own databases are obviously very popular, and and are you publishing those again and get hub, as you have done in the past? Take us through the benchmarks. >>Sure, So benchmarks are important because that gives customers a sense of what performance to expect and what price performance to expect. So we have run a number of benchmarks. And yes, all these benchmarks are available on guitar for customers to take a look at. So we have performance results on all the three castle workloads, ol DB Analytics and Machine Learning. So let's start with the Rdp for Rdp and primarily because of the auto thread pulling feature. We show that for the IPCC for attended dataset at high levels of concurrency, heatwave offers up to 10 times better throughput and this performance is sustained, whereas in the case of Aurora, the performance really drops. So that's the first thing that, uh, tend to alibi. Sorry, 10 gigabytes. B B C c. I can come and see the performance are the throughput is 10 times better than Aurora for analytics. We have done a comparison of my secret heatwave in AWS and compared with Red Ship Snowflake Googled inquiry, we find that the price performance of my secret heatwave compared to read ship is seven times better. So my sequel, Heat Wave in AWS, provides seven times better price performance than red ship. That's a very, uh, interesting results to us. Which means that customers of Red Shift are really going to take the service seriously because they're gonna get seven times better price performance. And this is all running in a W s so compared. >>Okay, carry on. >>And then I was gonna say, compared to like, Snowflake, uh, in AWS offers 10 times better price performance. And compared to Google, ubiquity offers 12 times better price performance. And this is based on a four terabyte p PCH workload. Results are available on guitar, and then the third category is machine learning and for machine learning, uh, for training, the performance of my secret heatwave is 25 times faster compared to that shit. So all the three workloads we have benchmark's results, and all of these scripts are available on YouTube. >>Okay, so you're comparing, uh, my sequel Heatwave on AWS to Red Shift and snowflake on AWS. And you're comparing my sequel Heatwave on a W s too big query. Obviously running on on Google. Um, you know, one of the things Oracle is done in the past when you get the price performance and I've always tried to call fouls you're, like, double your price for running the oracle database. Uh, not Heatwave, but Oracle Database on a W s. And then you'll show how it's it's so much cheaper on on Oracle will be like Okay, come on. But they're not doing that here. You're basically taking my sequel Heatwave on a W s. I presume you're using the same pricing for whatever you see to whatever else you're using. Storage, um, reserved instances. That's apples to apples on A W s. And you have to obviously do some kind of mapping for for Google, for big query. Can you just verify that for me, >>we are being more than fair on two dimensions. The first thing is, when I'm talking about the price performance for analytics, right for, uh, with my secret heat rape, the cost I'm talking about from my secret heat rape is the cost of running transaction processing, analytics and machine learning. So it's a fully loaded cost for the case of my secret heatwave. There has been I'm talking about red ship when I'm talking about Snowflake. I'm just talking about the cost of these databases for running, and it's only it's not, including the source database, which may be more or some other database, right? So that's the first aspect that far, uh, trip. It's the cost for running all three kinds of workloads, whereas for the competition, it's only for running analytics. The second thing is that for these are those services whether it's like shit or snowflakes, That's right. We're talking about one year, fully paid up front cost, right? So that's what most of the customers would pay for. Many of the customers would pay that they will sign a one year contract and pay all the costs ahead of time because they get a discount. So we're using that price and the case of Snowflake. The costs were using is their standard edition of price, not the Enterprise edition price. So yes, uh, more than in this competitive. >>Yeah, I think that's an important point. I saw an analysis by Marx Tamer on Wiki Bond, where he was doing the TCO comparisons. And I mean, if you have to use two separate databases in two separate licences and you have to do et yelling and all the labour associated with that, that that's that's a big deal and you're not even including that aspect in in your comparison. So that's pretty impressive. To what do you attribute that? You know, given that unlike, oh, ci within the AWS cloud, you don't have as much control over the underlying hardware. >>So look hard, but is one aspect. Okay, so there are three things which give us this advantage. The first thing is, uh, we have designed hateful foreign scale out architecture. So we came up with new algorithms we have come up with, like, uh, one of the design points for heat wave is a massively partitioned architecture, which leads to a very high degree of parallelism. So that's a lot of hype. Each were built, So that's the first part. The second thing is that although we don't have control over the hardware, but the second design point for heat wave is that it is optimised for commodity cloud and the commodity infrastructure so we can have another guys, what to say? The computer we get, how much network bandwidth do we get? How much of, like objects to a brand that we get in here? W s. And we have tuned heat for that. That's the second point And the third thing is my secret autopilot, which provides machine learning based automation. So what it does is that has the users workload is running. It learns from it, it improves, uh, various premieres in the system. So the system keeps getting better as you learn more and more questions. And this is the third thing, uh, as a result of which we get a significant edge over the competition. >>Interesting. I mean, look, any I SV can go on any cloud and take advantage of it. And that's, uh I love it. We live in a new world. How about machine learning workloads? What? What did you see there in terms of performance and benchmarks? >>Right. So machine learning. We offer three capabilities training, which is fully automated, running in France and explanations. So one of the things which many of our customers told us coming from the enterprise is that explanations are very important to them because, uh, customers want to know that. Why did the the system, uh, choose a certain prediction? So we offer explanations for all models which have been derailed by. That's the first thing. Now, one of the interesting things about training is that training is usually the most expensive phase of machine learning. So we have spent a lot of time improving the performance of training. So we have a bunch of techniques which we have developed inside of Oracle to improve the training process. For instance, we have, uh, metal and proxy models, which really give us an advantage. We use adaptive sampling. We have, uh, invented in techniques for paralysing the hyper parameter search. So as a result of a lot of this work, our training is about 25 times faster than that ship them health and all the data is, uh, inside the database. All this processing is being done inside the database, so it's much faster. It is inside the database. And I want to point out that there is no additional charge for the history of customers because we're using the same cluster. You're not working in your service. So all of these machine learning capabilities are being offered at no additional charge inside the database and as a performance, which is significantly faster than that, >>are you taking advantage of or is there any, uh, need not need, but any advantage that you can get if two by exploiting things like gravity. John, we've talked about that a little bit in the past. Or trainee. Um, you just mentioned training so custom silicon that AWS is doing, you're taking advantage of that. Do you need to? Can you give us some insight >>there? So there are two things, right? We're always evaluating What are the choices we have from hybrid perspective? Obviously, for us to leverage is right and like all the things you mention about like we have considered them. But there are two things to consider. One is he is a memory system. So he favours a big is the dominant cost. The processor is a person of the cost, but memory is the dominant cost. So what we have evaluated and found is that the current shape which we are using is going to provide our customers with the best price performance. That's the first thing. The second thing is that there are opportunities at times when we can use a specialised processor for vaccinating the world for a bit. But then it becomes a matter of the cost of the customer. Advantage of our current architecture is on the same hardware. Customers are getting very good performance. Very good, energetic performance in a very good machine learning performance. If you will go with the specialised processor, it may. Actually, it's a machine learning, but then it's an additional cost with the customers we need to pay. So we are very sensitive to the customer's request, which is usually to provide very good performance at a very low cost. And we feel is that the current design we have as providing customers very good performance and very good price performance. >>So part of that is architectural. The memory intensive nature of of heat wave. The other is A W s pricing. If AWS pricing were to flip, it might make more sense for you to take advantage of something like like cranium. Okay, great. Thank you. And welcome back to the benchmarks benchmarks. Sometimes they're artificial right there. A car can go from 0 to 60 in two seconds. But I might not be able to experience that level of performance. Do you? Do you have any real world numbers from customers that have used my sequel Heatwave on A W s. And how they look at performance? >>Yes, absolutely so the my Secret service on the AWS. This has been in Vera for, like, since November, right? So we have a lot of customers who have tried the service. And what actually we have found is that many of these customers, um, planning to migrate from Aurora to my secret heat rape. And what they find is that the performance difference is actually much more pronounced than what I was talking about. Because with Aurora, the performance is actually much poorer compared to uh, like what I've talked about. So in some of these cases, the customers found improvement from 60 times, 240 times, right? So he travels 100 for 240 times faster. It was much less expensive. And the third thing, which is you know, a noteworthy is that customers don't need to change their applications. So if you ask the top three reasons why customers are migrating, it's because of this. No change to the application much faster, and it is cheaper. So in some cases, like Johnny Bites, what they found is that the performance of their applications for the complex storeys was about 60 to 90 times faster. Then we had 60 technologies. What they found is that the performance of heat we have compared to Aurora was 100 and 39 times faster. So, yes, we do have many such examples from real workloads from customers who have tried it. And all across what we find is if it offers better performance, lower cost and a single database such that it is compatible with all existing by sequel based applications and workloads. >>Really impressive. The analysts I talked to, they're all gaga over heatwave, and I can see why. Okay, last question. Maybe maybe two and one. Uh, what's next? In terms of new capabilities that customers are going to be able to leverage and any other clouds that you're thinking about? We talked about that upfront, but >>so in terms of the capabilities you have seen, like they have been, you know, non stop attending to the feedback from the customers in reacting to it. And also, we have been in a wedding like organically. So that's something which is gonna continue. So, yes, you can fully expect that people not dressed and continue to in a way and with respect to the other clouds. Yes, we are planning to support my sequel. He tripped on a show, and this is something that will be announced in the near future. Great. >>All right, Thank you. Really appreciate the the overview. Congratulations on the work. Really exciting news that you're moving my sequel Heatwave into other clouds. It's something that we've been expecting for some time. So it's great to see you guys, uh, making that move, and as always, great to have you on the Cube. >>Thank you for the opportunity. >>All right. And thank you for watching this special cube conversation. I'm Dave Volonte, and we'll see you next time.
SUMMARY :
The company is now in its fourth major release since the original announcement in December 2020. Very happy to be back. Now for those who might not have kept up with the news, uh, to kick things off, give us an overview of my So customers of my sequel then they had to run analytics or when they had to run machine So we've seen some interesting moves by Oracle lately. So one of the observations is that a very large percentage So was this a straightforward lifted shift from No, it is not because one of the design girls we have with my sequel, So I just want to make sure I understand that it's not like you just wrapped your stack in So for status, um, we have taken the mind sequel Heatwave code and we have optimised Can you help us understand that? So this let's leads to customers provisioning a shape which is So how do we quantify that? So that's the first thing that, So all the three workloads we That's apples to apples on A W s. And you have to obviously do some kind of So that's the first aspect And I mean, if you have to use two So the system keeps getting better as you learn more and What did you see there in terms of performance and benchmarks? So we have a bunch of techniques which we have developed inside of Oracle to improve the training need not need, but any advantage that you can get if two by exploiting We're always evaluating What are the choices we have So part of that is architectural. And the third thing, which is you know, a noteworthy is that In terms of new capabilities that customers are going to be able so in terms of the capabilities you have seen, like they have been, you know, non stop attending So it's great to see you guys, And thank you for watching this special cube conversation.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Dave Volonte | PERSON | 0.99+ |
December 2020 | DATE | 0.99+ |
Amazon | ORGANIZATION | 0.99+ |
John | PERSON | 0.99+ |
France | LOCATION | 0.99+ |
AWS | ORGANIZATION | 0.99+ |
10 times | QUANTITY | 0.99+ |
two things | QUANTITY | 0.99+ |
Oracle | ORGANIZATION | 0.99+ |
Heatwave | TITLE | 0.99+ |
100 | QUANTITY | 0.99+ |
60 times | QUANTITY | 0.99+ |
one year | QUANTITY | 0.99+ |
12 times | QUANTITY | 0.99+ |
GWS | ORGANIZATION | 0.99+ |
60 technologies | QUANTITY | 0.99+ |
first part | QUANTITY | 0.99+ |
240 times | QUANTITY | 0.99+ |
two separate licences | QUANTITY | 0.99+ |
third category | QUANTITY | 0.99+ |
second advantage | QUANTITY | 0.99+ |
0 | QUANTITY | 0.99+ |
seven times | QUANTITY | 0.99+ |
two seconds | QUANTITY | 0.99+ |
two | QUANTITY | 0.99+ |
Apple | ORGANIZATION | 0.99+ |
seven times | QUANTITY | 0.99+ |
ORGANIZATION | 0.99+ | |
one | QUANTITY | 0.99+ |
25 times | QUANTITY | 0.99+ |
second point | QUANTITY | 0.99+ |
November | DATE | 0.99+ |
85 patents | QUANTITY | 0.99+ |
second thing | QUANTITY | 0.99+ |
Aurora | TITLE | 0.99+ |
third thing | QUANTITY | 0.99+ |
Each | QUANTITY | 0.99+ |
second example | QUANTITY | 0.99+ |
10 gigabytes | QUANTITY | 0.99+ |
three things | QUANTITY | 0.99+ |
One | QUANTITY | 0.99+ |
two benefits | QUANTITY | 0.99+ |
one aspect | QUANTITY | 0.99+ |
first aspect | QUANTITY | 0.98+ |
two separate databases | QUANTITY | 0.98+ |
over 10 years | QUANTITY | 0.98+ |
fourth major release | QUANTITY | 0.98+ |
39 times | QUANTITY | 0.98+ |
first thing | QUANTITY | 0.98+ |
Heat Wave | TITLE | 0.98+ |
Rob Emsley, Dell Technologies
(upbeat music) >> Welcome back to a Blueprint For Trusted Infrastructure. We're here with Rob Emsley. Who's the director of product marketing for data protection and cyber security. Rob, good to see you. A new role. >> Yeah. Good to be back, Dave. Good to see you. Yeah, it's been a while since we chatted last and, you know, one of the changes in my world is that I've expanded my responsibilities beyond data protection marketing to also focus on cybersecurity marketing specifically for our infrastructure solutions group. So certainly that's, you know, something that really has driven us, you know, to come and have this conversation with you today. >> So data protection obviously has become an increasingly important component of the cyber security space. I don't think necessarily of, you know, traditional backup and recovery as security, to me, it's an adjacency. I know some companies have said, oh, yeah. Now we're a security company. They're kind of chasing the valuation bubble. >> For sure. >> Dell's interesting because you have, you know, data protection in the form of backup and recovery and data management, but you also have security, you know, direct security capabilities. So you're sort of bringing those two worlds together and it sounds like your responsibility is to connect those dots. Is that right? >> Absolutely. Yeah. I mean, I think that the reality is is that security is a multi-layer discipline. I think the days of thinking that it's one or another technology that you can use or process that you can use to make your organization secure are long gone. I mean, certainly you actually correct. If you think about the backup and recovery space, I mean, people have been doing that for years, you know, certainly backup and recovery, it's all about the recovery. It's all about getting yourself backup and running when bad things happen. And one of the realities, unfortunately today is that one of the worst things that can happen is cyber attacks. You know, ransomware, malware are all things that are top of mind for all organizations today. And that's why you see a lot of technology and a lot of innovation going into the backup and recovery space because if you have a copy, a good copy of your data, then that is really the first place you go to recover from a cyber attack. And that's why it's so important. The reality is is that unfortunately the cyber criminals keep on getting smarter. I don't know how it happens, but one of the things that is happening is that the days of them just going after your production data are no longer the only challenge that you have, they go after your backup data as well. So over the last half a decade, Dell Technologies with its backup and recovery portfolio has introduced the concept of isolated cyber recovery vaults. We've had many conversations about that over the years and that's really a big tenant of what we do in the data protection portfolio. >> So this idea of cybersecurity resilience that definition is evolving. What does it mean to you? >> Yeah, I think the analyst team over at Gartner, they wrote a very insightful paper called you will be hacked embrace the breach. And the whole basis of this analysis is so much money's been spent on prevention is that what's out of balance is the amount of budget that companies have spent on cyber resilience and cyber resilience is based upon the premise that you will be hacked. You have to embrace that fact and be ready and prepared to bring yourself back into business. You know, and that's really where cyber resiliency is very, very different than cyber security and prevention, you know, and I think that balance of get your security disciplines well funded, get your defenses as good as you can get them but make sure that if the inevitable happens and you find yourself compromised that you have a great recovery plan and certainly a great recovery plan, it's really the basis of any good, solid data protection backup from recovery philosophy. >> So if I had to do a SWOT analysis, we don't have to do the WOT, but let's focus on the S. What would you say are Dell's strengths in this, you know, cyber security space as it relates to data protection? >> One is we've been doing it a long time. You know, we talk a lot about Dell's data protection being proven and modern. You know, certainly the experience that we've had over literally three decades of providing enterprise scale data protection solutions to our customers has really allowed us to have a lot of insight into what works and what doesn't. As I mentioned to you, one of the unique differentiators of our solution is the cyber recovery vaulting solution that we introduce a little over five years ago, five, six years. Power protect cyber recovery is something which has become a unique capability for customers to adopt on top of their investment in Dell Technologies data protection, you know, the unique elements of our solution already threefold, and we call them the three Is. It's isolation, it's a immutability and it's intelligence. And the, the isolation part is really so important because you need to reduce the attack surface of your good known copies of data. You know, you need to put it in a location that the bad actors can't get to it. And that really is the essence of a cyber recovery vault. Interestingly enough, you're starting to see the market throw out that word, you know, from many other places, but really it comes down to having a real discipline that you don't allow the security of your cyber recovery vault to be compromised insofar as allowing it to be controlled from outside of the vault, you know, allowing it to be controlled by your backup application. Our cyber recovery vaulting technology is independent of the backup infrastructure. It uses it, but it controls its own security. And that is so, so important. It's like having a vault that the only way to open it is from the inside, you know, and think about that. If you think about, you know, vaults in banks or vaults in your home, normally you have a key pad on the outside. Think of our cyber recovery vault as having its security controlled from inside of the vault. >> So nobody can get in, nothing can get in unless it's already in. And if it's already in, then it's trusted. >> Exactly, exactly. >> Yeah. So isolation's the key. And then you mentioned immutability is the second piece. >> Yeah, so immutability is also something which has been around for a long time. People talk about backup mutability or immutable backup copies. So I mutability is just the additional technology that allows the data that's inside of the vault to be unchangeable, you know, but again that immutability, you know, your mileage varies, you know, when you look across the different offers that are out there in the market especially in the backup industry. You made a very valid point earlier that the backup vendors in the market seem to be security washing their marketing messages. I mean, everybody is leaning into the ever present danger of cybersecurity, not a bad thing, but the reality is is that you have to have the technology to back it up, you know, quite literally >> Yeah, no pun intended. Right. Actually pun intended. Now what about the intelligence piece of it? That's that's AI, ML, where does that fit? >> For sure. So the intelligence piece is delivered by a solution called CyberSense. And CyberSense for us is what really gives you the confidence that what you have in your cyber recovery vault is a good clean copy of data. So it's looking at the backup copies that get driven into the cyber vault, and it's looking for anomalies. So it's not looking for signatures of malware. You know, that's what your antivirus software does. That's what your endpoint protection software does. That's on the prevention side of the equation. But what we're looking for is we're looking to ensure that the data that you need when all hell breaks loose is good and that when you get a request to restore and recover your business, you go, right, let's go and do it. And you don't have any concern that what you have in the vault has been compromised. So cyber sense is really a unique analytic solution in the market based upon the fact that it isn't looking at at cursory indicators of malware infection or ransomware introduction, it's doing full content analytics, you know, looking at, you know, has the data in any way changed, has it suddenly become encrypted? Has it suddenly become different to how it was in the previous scan? So that anomaly detection is very, very different. It's looking for, you know, like different characteristics that really are an indicator that something is going on. And, of course, if it sees it, you immediately get flagged. But the good news is is that you always have in the vault the previous copy of good known data which now becomes your restore point. >> So we're talking to Rob Emsley about how data protection fits into what Dell calls DTI, Dell Trusted Infrastructure. And I want to come back, Rob, to this notion of, and not or cause I think a lot of people are skeptical. Like how can I have great security and not introduce friction into my organization? Is that an automation play? How does Dell tackle that problem? >> I mean, I think a lot of it is across our infrastructure is is security has to be built in, I mean, intrinsic security within our servers, within our storage devices, within our elements of our backup infrastructure. I mean, security, multifactor authentication, you know, elements that make the overall infrastructure secure. You know, we have capabilities that, you know, allow us to identify whether or not configurations have changed. You know, we'll probably be talking about that a little bit more to you later in the segment, but the essence is security is not a Bolton. It has to be part of the overall infrastructure. And that's so true, certainly in the data protection space >> Give us the bottom line on how you see Dell's key differentiators. Maybe you could talk about Dell, of course, always talks about its portfolio, but why should customers, you know, lead in to Dell in this whole cyber resilience space? >> You know, staying on the data protection space as I mentioned, the work we've been doing to introduce this cyber resiliency solution for data protection is in our opinion, as good as it gets. You know, you've spoken to a number of our best customers whether it be Bob Bender from Founders Federal or more recently at (indistinct) you spoke to Tony Bryson from the Town of Gilbert. And these are customers that we've had for many years that have implemented cyber recovery vaults. And at the end of the day, they can now sleep at night. You know, that's really the peace of mind that they have is that the insurance that a data protection from Dell cyber recovery vault, a power protect cyber recovery solution gives them, you know, really allows them to, you know, just have the assurance that they don't have to pay a ransom. If they have an insider threat issue and, you know, all the way down to data deletion is they know that what's in the cyber recovery vault is good and ready for them to recover from. >> Great. Well, Rob, congratulations on the new scope of responsibility. I like how, you know, your organization is expanding as the threat surface is expanding. As we said, data protection becoming an adjacency to security, not security in and of itself. A key component of a comprehensive security strategy. Rob Emsley, thank you for coming back in theCUBE. Good to see you again. >> You too, Dave. Thanks. >> All right, in a moment, I'll be back to wrap up a blueprint for trusted infrastructure. You are watching theCUBE. (upbeat music)
SUMMARY :
Who's the director of product So certainly that's, you know, of the cyber security space. also have security, you know, is that the days of them that definition is evolving. that you have a great recovery plan in this, you know, cyber security space from outside of the vault, you know, And if it's already in, then it's trusted. immutability is the second piece. is that you have to have the That's that's AI, ML, where does that fit? that the data that you need Is that an automation play? elements that make the you know, lead in to Dell is that the insurance I like how, you know, your You too, Dave. I'll be back to wrap up a blueprint
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Tony Bryson | PERSON | 0.99+ |
Rob Emsley | PERSON | 0.99+ |
Dave | PERSON | 0.99+ |
Rob | PERSON | 0.99+ |
Gartner | ORGANIZATION | 0.99+ |
Dell | ORGANIZATION | 0.99+ |
second piece | QUANTITY | 0.99+ |
Bob Bender | PERSON | 0.99+ |
Dell Technologies | ORGANIZATION | 0.99+ |
one | QUANTITY | 0.99+ |
CyberSense | ORGANIZATION | 0.98+ |
Gilbert | LOCATION | 0.97+ |
three | QUANTITY | 0.97+ |
today | DATE | 0.97+ |
One | QUANTITY | 0.97+ |
DTI | ORGANIZATION | 0.96+ |
two worlds | QUANTITY | 0.95+ |
last half a decade | DATE | 0.94+ |
three decades | QUANTITY | 0.92+ |
over | DATE | 0.86+ |
five years ago | DATE | 0.81+ |
Founders Federal | ORGANIZATION | 0.77+ |
first place | QUANTITY | 0.77+ |
things | QUANTITY | 0.72+ |
six years | DATE | 0.54+ |
threefold | QUANTITY | 0.5+ |
five | QUANTITY | 0.5+ |
worst things | QUANTITY | 0.5+ |
Blueprint For Trusted Infrastructure | TITLE | 0.43+ |
Pete Gerr & Steve Kenniston, Dell technologies
(upbeat music) >> The cybersecurity landscape has changed dramatically over the past 24 to 36 months. Rapid cloud migration has created a new layer of security defense, sure, but that doesn't mean CISOs can relax. In many respects, it further complicates, or at least changes, the CISO's scope of responsibilities. In particular, the threat surface has expanded. And that creates more seams, and CISOs have to make sure their teams pick up where the hyperscaler clouds leave off. Application developers have become a critical execution point for cyber assurance. "Shift left" is the kind of new buzz phrase for devs, but organizations still have to "shield right," meaning the operational teams must continue to partner with SecOps to make sure infrastructure is resilient. So it's no wonder that in ETR's latest survey of nearly 1500 CIOs and IT buyers, that business technology executives cite security as their number one priority, well ahead of other critical technology initiatives including collaboration software, cloud computing, and analytics rounding out the top four. But budgets are under pressure and CISOs have to prioritize. It's not like they have an open checkbook. They have to contend with other key initiatives like those just mentioned, to secure the funding. And what about zero trust? Can you go out and buy zero trust or is it a framework, a mindset in a series of best practices applied to create a security consciousness throughout the organization? Can you implement zero trust? In other words, if a machine or human is not explicitly allowed access, then access is denied. Can you implement that policy without constricting organizational agility? The question is, what's the most practical way to apply that premise? And what role does infrastructure play as the enforcer? How does automation play in the equation? The fact is, that today's approach to cyber resilience can't be an "either/or," it has to be an "and" conversation. Meaning, you have to ensure data protection while at the same time advancing the mission of the organization with as little friction as possible. And don't even talk to me about the edge. That's really going to keep you up at night. Hello and welcome to this special CUBE presentation, "A Blueprint for Trusted Infrastructure," made possible by Dell Technologies. In this program, we explore the critical role that trusted infrastructure plays in cybersecurity strategies, how organizations should think about the infrastructure side of the cybersecurity equation, and how Dell specifically approaches securing infrastructure for your business. We'll dig into what it means to transform and evolve toward a modern security infrastructure that's both trusted and agile. First up are Pete Gerr and Steve Kenniston, they're both senior cyber security consultants at Dell Technologies. And they're going to talk about the company's philosophy and approach to trusted infrastructure. And then we're going to speak to Parasar Kodati, who's a senior consultant for storage at Dell Technologies to understand where and how storage plays in this trusted infrastructure world. And then finally, Rob Emsley who heads product marketing for data protection and cyber security. We're going to going to take a deeper dive with Rob into data protection and explain how it has become a critical component of a comprehensive cyber security strategy. Okay, let's get started. Pete Gerr, Steve Kenniston, welcome to theCUBE. Thanks for coming into the Marlborough studios today. >> Great to be here, Dave. Thanks. >> Thanks, Dave. Good to see you. >> Great to see you guys. Pete, start by talking about the security landscape. You heard my little wrap up front. What are you seeing? >> I thought you wrapped it up really well. And you touched on all the key points, right? Technology is ubiquitous today. It's everywhere. It's no longer confined to a monolithic data center. It lives at the edge. It lives in front of us. It lives in our pockets and smartphones. Along with that is data. And as you said, organizations are managing sometimes 10 to 20 times the amount of data that they were just five years ago. And along with that, cyber crime has become a very profitable enterprise. In fact, it's been more than 10 years since the NSA chief actually called cyber crime the biggest transfer of wealth in history. That was 10 years ago. And we've seen nothing but accelerating cyber crime and really sophistication of how those attacks are perpetrated. And so the new security landscape is really more of an evolution. We're finally seeing security catch up with all of the technology adoption, all the build out, the work from home and work from anywhere that we've seen over the last couple of years. We're finally seeing organizations, and really it goes beyond the IT directors, it's a board level discussion today. Security's become a board level discussion. >> Yeah, I think that's true as well. It's like it used to be that security was, "Okay, the SecOps team. You're responsible for security." Now you've got, the developers are involved, the business lines are involved, it's part of onboarding for most companies. You know, Steve, this concept of zero trust. It was kind of a buzzword before the pandemic. And I feel like I've often said it's now become a mandate. But it's still fuzzy to a lot of people. How do you guys think about zero trust? What does it mean to you? How does it fit? >> Yeah. Again, I thought your opening was fantastic. And this whole lead in to, what is zero trust? It had been a buzzword for a long time. And now, ever since the federal government came out with their implementation or desire to drive zero trust, a lot more people are taking it a lot more seriously, 'cause I don't think they've seen the government do this. But ultimately, it's just like you said, right? If you don't have trust to those particular devices, applications, or data, you can't get at it. The question is, and you phrase it perfectly, can you implement that as well as allow the business to be as agile as it needs to be in order to be competitive? 'Cause we're seeing, with your whole notion around DevOps and the ability to kind of build, make, deploy, build, make, deploy, right? They still need that functionality but it also needs to be trusted. It needs to be secure and things can't get away from you. >> Yeah. So it's interesting. I've attended every Reinforce since 2019, and the narrative there is, "Hey, everything in the cloud is great. And this narrative around, 'Oh, security is a big problem.' doesn't help the industry." The fact is that the big hyperscalers, they're not strapped for talent, but CISOs are. They don't have the capabilities to really apply all these best practices. They're playing Whac-A-Mole. So they look to companies like yours, to take your R&D and bake it into security products and solutions. So what are the critical aspects of the so-called Dell Trusted Infrastructure that we should be thinking about? >> Yeah, well, Dell Trusted Infrastructure, for us, is a way for us to describe the the work that we do through design, development, and even delivery of our IT system. So Dell Trusted Infrastructure includes our storage, it includes our servers, our networking, our data protection, our hyper-converged, everything that infrastructure always has been. It's just that today customers consume that infrastructure at the edge, as a service, in a multi-cloud environment. I mean, I view the cloud as really a way for organizations to become more agile and to become more flexible, and also to control costs. I don't think organizations move to the cloud, or move to a multi-cloud environment, to enhance security. So I don't see cloud computing as a panacea for security, I see it as another attack surface. And another aspect in front that organizations and security organizations and departments have to manage. It's part of their infrastructure today, whether it's in their data center, in a cloud, or at the edge. >> I mean, I think that's a huge point. Because a lot of people think, "Oh, my data's in the cloud. I'm good." It's like Steve, we've talked about, "Oh, why do I have to back up my data? It's in the cloud?" Well, you might have to recover it someday. So I don't know if you have anything to add to that or any additional thoughts on it? >> No, I mean, I think like what Pete was saying, when it comes to all these new vectors for attack surfaces, you know, people did choose the cloud in order to be more agile, more flexible. And all that did was open up to the CISOs who need to pay attention to now, okay, "Where can I possibly be attacked? I need to be thinking about is that secure?" And part of that is Dell now also understands and thinks about, as we're building solutions, is it a trusted development life cycle? So we have our own trusted development life cycle. How many times in the past did you used to hear about vendors saying you got to patch your software because of this? We think about what changes to our software and what implementations and what enhancements we deliver can actually cause from a security perspective, and make sure we don't give up or have security become a hole just in order to implement a feature. We got to think about those things. And as Pete alluded to, our secure supply chain. So all the way through, knowing what you're going to get when you actually receive it is going to be secure and not be tampered with, becomes vitally important. And then Pete and I were talking earlier, when you have tens of thousands of devices that need to be delivered, whether it be storage or laptops or PCs, or whatever it is, you want to be know that those devices can be trusted. >> Okay, guys, maybe Pete, you could talk about how Dell thinks about its framework and its philosophy of cyber security, and then specifically what Dell's advantages are relative to the competition. >> Yeah, definitely, Dave. Thank you. So we've talked a lot about Dell as a technology provider. But one thing Dell also is is a partner in this larger ecosystem. We realize that security, whether it's a zero trust paradigm or any other kind of security environment, is an ecosystem with a lot of different vendors. So we look at three areas. One is protecting data in systems. We know that it starts with and ends with data. That helps organizations combat threats across their entire infrastructure. And what it means is Dell's embedding security features consistently across our portfolios of storage, servers, networking. The second is enhancing cyber resiliency. Over the last decade, a lot of the funding and spending has been in protecting or trying to prevent cyber threats, not necessarily in responding to and recovering from threats. We call that resiliency. Organizations need to build resiliency across their organization, so not only can they withstand a threat, but they can respond, recover, and continue with their operations. And the third is overcoming security complexity. Security is hard. It's more difficult because of the things we've talked about, about distributed data, distributed technology, and attack surfaces everywhere. And so we're enabling organizations to scale confidently, to continue their business, but know that all the IT decisions that they're making have these intrinsic security features and are built and delivered in a consistent, secure way. >> So those are kind of the three pillars. Maybe we could end on what you guys see as the key differentiators that people should know about that Dell brings to the table. Maybe each of you could take a shot at that. >> Yeah, I think, first of all, from a holistic portfolio perspective, right? The secure supply chain and the secure development life cycle permeate through everything Dell does when building things. So we build things with security in mind, all the way from, as Pete mentioned, from creation to delivery, we want to make sure you have that secure device or asset. That permeates everything from servers, networking, storage, data protection, through hyperconverged, through everything. That to me is really a key asset. Because that means you understand when you receive something it's a trusted piece of your infrastructure. I think the other core component to think about, and Pete mentioned, as Dell being a partner for making sure you can deliver these things, is that even though that's part of our framework, these pillars are our framework of how we want to deliver security, it's also important to understand that we are partners and that you don't need to rip and replace. But as you start to put in new components, you can be assured that the components that you're replacing as you're evolving, as you're growing, as you're moving to the cloud, as you're moving to more on-prem type services or whatever, that your environment is secure. I think those are two key things. >> Got it. Okay. Pete, bring us home. >> Yeah, I think one of the big advantages of Dell is our scope and our scale, right? We're a large technology vendor that's been around for decades, and we develop and sell almost every piece of technology. We also know that organizations might make different decisions. And so we have a large services organization with a lot of experienced services people that can help customers along their security journey, depending on whatever type of infrastructure or solutions that they're looking at. The other thing we do is make it very easy to consume our technology, whether that's traditional on premise, in a multi-cloud environment, or as a service. And so the best-of-breed technology can be consumed in any variety of fashion, and know that you're getting that consistent, secure infrastructure that Dell provides. >> Well, and Dell's got probably the top supply chain, not only in the tech business, but probably any business. And so you can actually take your dog food, or your champagne, sorry, (laughter) allow other people to share best practices with your customers. All right, guys, thanks so much for coming up. I appreciate it. >> Great. Thank you. >> Thanks, Dave. >> Okay, keep it right there. After this short break, we'll be back to drill into the storage domain. You're watching "A Blueprint for Trusted Infrastructure" on theCUBE, the leader in enterprise and emerging tech coverage. Be right back. (upbeat music)
SUMMARY :
over the past 24 to 36 months. Great to see you guys. And so the new security landscape But it's still fuzzy to a lot of people. and the ability to kind The fact is that the big hyperscalers, and to become more flexible, It's in the cloud?" that need to be delivered, relative to the competition. but know that all the IT that Dell brings to the table. and that you don't need Got it. And so the best-of-breed technology And so you can actually Thank you. into the storage domain.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Rob | PERSON | 0.99+ |
Steve | PERSON | 0.99+ |
Rob Emsley | PERSON | 0.99+ |
Dave | PERSON | 0.99+ |
Dell Technologies | ORGANIZATION | 0.99+ |
Pete | PERSON | 0.99+ |
Steve Kenniston | PERSON | 0.99+ |
Pete Gerr | PERSON | 0.99+ |
Dell | ORGANIZATION | 0.99+ |
10 | QUANTITY | 0.99+ |
Parasar Kodati | PERSON | 0.99+ |
NSA | ORGANIZATION | 0.99+ |
A Blueprint for Trusted Infrastructure | TITLE | 0.99+ |
third | QUANTITY | 0.99+ |
each | QUANTITY | 0.99+ |
both | QUANTITY | 0.99+ |
First | QUANTITY | 0.99+ |
2019 | DATE | 0.99+ |
one | QUANTITY | 0.99+ |
today | DATE | 0.98+ |
zero trust | QUANTITY | 0.98+ |
second | QUANTITY | 0.98+ |
five years ago | DATE | 0.97+ |
two key | QUANTITY | 0.97+ |
more than 10 years | QUANTITY | 0.97+ |
nearly 1500 CIOs | QUANTITY | 0.97+ |
three areas | QUANTITY | 0.97+ |
20 times | QUANTITY | 0.97+ |
One | QUANTITY | 0.96+ |
SecOps | ORGANIZATION | 0.96+ |
10 years ago | DATE | 0.96+ |
ETR | ORGANIZATION | 0.96+ |
pandemic | EVENT | 0.92+ |
three pillars | QUANTITY | 0.92+ |
36 months | QUANTITY | 0.9+ |
tens of thousands | QUANTITY | 0.9+ |
devices | QUANTITY | 0.9+ |
zero trust | QUANTITY | 0.89+ |
Reinforce | ORGANIZATION | 0.88+ |
CUBE | ORGANIZATION | 0.87+ |
decades | QUANTITY | 0.86+ |
last couple of years | DATE | 0.85+ |
Marlborough | LOCATION | 0.82+ |
top four | QUANTITY | 0.81+ |
DevOps | TITLE | 0.8+ |
number one | QUANTITY | 0.76+ |
last decade | DATE | 0.75+ |
Blueprint for | TITLE | 0.69+ |
24 | QUANTITY | 0.69+ |
lot more people | QUANTITY | 0.69+ |
Infrastructure | TITLE | 0.64+ |
Dell Trusted Infrastructure | ORGANIZATION | 0.59+ |
theCUBE | ORGANIZATION | 0.57+ |
Dell Trusted Infrastructure | ORGANIZATION | 0.48+ |
Whac- | TITLE | 0.45+ |
Andy Mendelsohn, Oracle | CUBE Conversation, March 2021
the cloud has dramatically changed the way providers think about delivering database technologies not only has cloud first become a mandate for many if not most but customers are demanding more capabilities from their technology vendors examples include a substantially similar experience for cloud and on-prem workloads increased automation and a never-ending quest for more secure platforms broadly there are two prevailing models that have emerged one is to provide highly specialized database products that focus on optimizing for a specific workload signature the other end of the spectrum combines technologies in a converge platform to satisfy satisfy the needs of a much broader set of use cases and with me to get a perspective on these and other issues is andy mendelson is the executive vice president of oracle the world's leading database company andy leads database server technologies hello andy thanks for coming on hey dave glad to be here okay so we saw the recent announcements this is kind of your baby around next generation autonomous data warehouse maybe you could take us through the path you took from the original cloud data warehouses to where we are today yeah when we uh we first brought autonomous database out uh we were basically a second generation technology at that point you know we decided that what customers wanted was to the other you know the push of a button provision the really powerful oracle database technology that they've been using for years and um we did that with autonomous database and beyond that we provided a very unique capability that around self-tuning self-driving of the database which is something the first generation vendors didn't provide and this this is really important because customers today are you know developers and data analysts you know you know at the push of a button build out their their data warehouses but you know they're not experts in tuning and so what we thought was really important is that customers get great performance out of the box and that's one of the really unique things about autonomous data warehouse autonomous database in particular and then this latest generation that we just came out with also answers the questions we got from you know the data analysts and developers they said you know it's really great that i can press a button and provision this very powerful data warehouse infrastructure or database infrastructure from oracle but you know if i'm an analyst i want data you know so it's still hard for me to go and you know get data from various data sources transform them clean them up and get them to a way a place where i can start querying the data now i still need data engineers to help me do that and so we've done in the new release we said okay we want to give data analysts and data engineer data scientists developers is a true self-service experience where they can do their job completely without bringing in any you know any any engineers from their i.t organization and so that's what this new version is all about yeah awesome i mean look years ago you guys identified the i.t labor problem and you've been focused on r d and putting it in your r d to solve that problem for customers so we're really starting to see that hit now now gartner recently did some analysis they ranked and rated them some of the more popular cloud databases and oracle did very well i mean particularly particularly in operational categories i mean an operational side and the mission critical stuff you smoked everybody we had mark stamer and david floyer on and our big takeaways were that you're you're again dominating in that mission critical workloads that that that dominance continues but your approach of converging functionality really differs from some others that we saw i mean obviously when you get high ratings from gartner you're pretty stoked about that but what do you think contributed to those rankings and what are you finding specifically in customer interactions yeah so gardner does a lot of its analysis based on talking to customers finding out how their product these products that sound great on paper actually work in practice and i think that's one of the places where oracle database technology really shines it's it's uh it solves real-world problems um it's been doing it for a long time and as we've moved that technology into the cloud you know that continues you know the differentiation we've built up over the years really stands out you know you look at like amazon's databases they generally take some open source technology that isn't that new it could be 30 years old 25 years old and they put it up on the cloud and they say oh it's cloud native it's great but but in fact it's the same old you know technology that that doesn't really compete you know decade behind oracle's database technology so i think the gartner analysis really showed that sort of thing quite clearly yeah so let's talk about that a little bit because obviously i've learned a lot you know one of the things i've learned over the last many years of following this business a lot of ways to skin a cat and cloud database vendors if you think about you mentioned aws you know look at snowflake kind of right tool for the right job approach they're going to say that their specialty databases they're focused uh are better than your converged approach which they make you know think of as a you know swiss army knife what's your take on that yeah well the converged approach is something of course we've been working on for a long time so the the idea is pretty simple you know think about your smartphone you know if you can think back you know over 10 years ago used to have you know a camcorder and a a camera and a messaging device and also a dump phone device that all those different devices got converged into what we now call the smartphone why did the smartphone win it's just simply much more productive for you to carry one device around that that is actually best to breed in all the different categories instead of lots of separate devices and that's what we're doing with converge database over the years you know we've been able to build out technologies that are really good at transaction breasts at analytics for data warehousing now we're working on you know json technologies graph technologies the other vendors basically can't do this i mean it's much easier to build a specialty database that does one thing to build out a converged database that does end things really well and that's what we've been doing for years and again it's it's based on technology that uh you've invested in for quite a long time um and it's something that i think uh customers and developers and analyze analysts find to be a much more productive way of doing their jobs it's very unique and not common at all to see a technology that's been around as long as oracle database to see that sort of morph into a more modern platform i mean you mentioned aws uses leverages open source a lot you know snowflake would say okay hey we are born in the cloud and they are i think google bigquery would be another good example but but but that notion of boy i want to get your take on this born in the cloud those folks would say well we're superior to oracle's because you know they started you know decades ago not necessarily you know native cloud services uh how have you been able to address that i know you know cloud first is kind of the buzzword but but how have you you made that sort of transparent to users or or irrelevant to users because you are cloud first maybe you could talk about how you've able to achieve that and convince us that you actually really are cloud native now you know one of the things we we sort of like pointing out is that um oracle very uniquely has had this scale out technology for running all kinds of workloads not just analytic workloads which is what you see out in the cloud there but we can also scale out transaction processing workloads now that was another one of the reasons we do so well in for example the gardner analysis for trans operational workloads and that technology is really valuable as we went to cloud it lets us do some really unique things and the most obvious unique thing we we have is something we like to call you know you know cloud native you know instant elasticity and so with our technology if you want to provision a share you know some number of amount of compute to run your workloads you can provision exactly what you need you know if you need 17 cpus to get your job done you do 17 cpus when you provision your autonomous database our competitors who claim to be born in the cloud like snowflake and amazon they still use this this archaic way of provisioning uh servers based on shapes you know snowflake you know says what which shape cluster do you want you want 16 you want 32 you want 64. no it goes up by a power of 2 which means if you compare that to what oracle does you you have to provision up to like twice as much cpu than you really need so if you really need 17 they make you provision 32. if you really need 33 they make your provision 64. so this is not a cloud native experience at all it's an archaic way of doing things and and we like to point out with our instant elasticity you know we can go from 17 to 18 to 19 you know whatever you want plus we have something called auto scale so you can set your baseline to be 17 let's say but we will automatically based on your workload scale you up to three times that so in this case be 51 and because of that true elasticity we have we are really the only ones that can deliver true pay as you go kind of you know just pay for what you need kind of capability which is certainly what amazon was talking about when they first called their cloud elastic but it turns out for database services these guys still do this archaic thing with shapes so that's a really good example of where we're quite better than the other guys and it's much more cloud native than the other guys i want to follow up on that uh just stay here for a second because you're basically saying we have we have better granularity than the so-called cloud native guys now you mentioned snowflake right you got you got the shapes you got to you got to choose which shape you want and it sounds like it sounds like redshift the same and of course i know the way in which amazon separates compute from storage is largely a tiering exercise so it's not as as is as smooth as you might expect but nonetheless it's it's good how is it that you were you were able to achieve this with a database that was you know born you know many decades ago is it i mean what is it in from a technical standpoint an r d standpoint that you were able to do i mean did you design that in in the 1980s how did you how did you get here yeah well um it's a combination of interesting technologies so autonomous database you know it has the oracle database software that software is running on a very powerful optimized infrastructure for database based on the exadata technology that we've had on prem for many years we brought that to the cloud and that technology is a scale-out infrastructure that supports you know thousands of cpus and then we use our multi-tenant technology which is a way of sharing large infrastructures amongst amongst separate uh clients and we divide it up dynamically on the fly so if there's thousands of cpus you know this guy wants 20 and this one wants 30 we we divide it up and give them exactly what they need and if they want to grow we just take some extra cpus that are in reserve and we give it to them instantly and so that's a very different way of doing things and that's been a shape based approach where you know what what snowflake and amazon do under the covers they give you a real physical server you know or a cluster and that's how they provision if you want to grow they give you another big physical cluster which takes a long time to get the data populated to get it get it working we just have that one infrastructure that we're sharing among lots of users and we just give you a little extra capacity we don't it doesn't it's done instantly there's no need for data to be moved to populate the new clusters that you know snowflake or amazon are provisioning for you so it's a very different way of doing things and you're able to do that because of the tight integration between you mentioned exadata tight integration between the hardware and software we got david floyer calls it the iphone of enterprise sometimes sometimes you get some grief for that but it's it's not a bad metaphor but is that really the sort of secret well the big secret under the covers is this you know exudated technology our real application cluster scale out technologies our multi-tenant technologies so these are things we've been working on for a long time and they are very mature very powerful technologies and they really provide very unique benefits in a cloud world where people want things to happen instantly and they want to work well for any kind of workload um you know that's that's why we call we talk about being converged we can do mixed workloads you can do transactions and analytics all in the same data the other guys can't do that you know they're really good at like you said a narrow workload like i can do analytics or i can do graph you know i can do json but they can't really do the combination which is what real world applications are like they're not pure one thing versus enough right thank you for that so one of the questions people want to know is can oracle attract you know new customers that aren't existing oracle customers so maybe you could talk about that and you know why should uh somebody who's not an existing oracle customer think about using autonomous database yeah that's a that's a really good question you know oracle if you look at our customer base has a lot of really large enterprises you know the biggest banks and the biggest telcos you know they run oracle they run their businesses on oracle and these guys are sort of the most conservative of the bunch out there and they are moving to cloud at a somewhat slower rate than the than the smaller companies and so if you look at who's using autonomous database now it's actually the smaller companies you know the same type of people that first decided amazon was an interesting cloud 10 years ago they're also using our technologies and it's for the same reason they're finding you know they don't have large it organizations they don't have large numbers of engineers to engineer their infrastructure and that's why cloud is so attractive to them and autonomous database on top of cloud is really attractive as well because you know information is the lifeblood of every organization and if they can empower their analysts to get their job done without lots of help from it organizations they're going to do it and you know that's really what's made autonomous database really interesting you know the whole self-driving nature is very attractive to the smaller shops that don't have a lot of sophisticated um i.t expertise all right let's talk about developers you guys are the stewards of the java community so obviously you know big probably you know the biggest most popular programming language out there but when i think of developers i think of guys in hoodies pounding away but when i think of oracle developers i might think of maybe an app dev team inside of maybe some of those large customers that you talked about but why would developers and or analysts be interested in in using oracle as opposed to some some of those more focused narrow use databases that we were talking about earlier yeah so if you're a developer um you want to get your job done as fast as possible and so having a database that gives you the most productive application development experience is important to you and so you know i was talking we've been talking about converged database off and on so if i'm a developer i have a given job to do a converged database that lets me do a combination of analytics and and transactions and do a little json and little graph all in one is a much more productive place to go because if i if i i don't have something like that then i'm stuck taking my my application and breaking it up into pieces you know this piece i'm going to run on say aurora on amazon and this piece i have to run on the graph database and here's some json i got to run that on some document database and then i have to move the data around the data gets sort of fragmented between these databases and i have to do all this data you know integration and and whatever with a converged database i have a much simpler world where i can just use one technology stack i can get my job done and then i'm future proof against change you know requirements change all the time so you build the initial version of the application and your users say you know that this is not what i want i want some something else and it turns out that something else often is why i want analytics and you use something like a you know a document stored technology that has really poor analytic capabilities and then so you have to take that data and you have to move it to another database and so with with our converged approach you don't have to do that you know you're already in a place where everything works everything that you need you can possibly need in the future is going to be there as well and so for developers i i think you know converged is the right way to go plus for people who are what we call citizen developers you know like the data analysts that they cuddle they write a little code occasionally but they're really after getting value of the data we have this really fabulous no code loco tool called apex and apex is again a very mature technology it's been around for years and it lets somebody who's just a data analyst he knows a little sql but doesn't want to write code get their job done really fast and we've published some benchmark on our website showing you know basically you can get the job done 20 to 40 times faster using a no co loco tool like apex versus something like you know just writing cutting lots of traditional code i'm glad you brought up apex we recently interviewed one of your former colleagues amit xavery and all he would talk about is low code no code and then in the apex announcement you said something to the effect of coding should be the exception not the rule did you mean that what do you mean by that yeah so apex is a tool that people use with our our database technology for building what we call data driven applications so if you got a bunch of data and you want to get some value out of it you want to build maybe dashboards or more sophisticated reports apex is an incredible tool for doing that and it's it's modern you know it builds applications that look great on your smartphone and it automatically you know renders that same user interface on a bigger device like a laptop desktop device as well and uh it's very it's one of these things that uh the people that use it just go bonkers with it it's a viral technology they get really excited about how productive they they've been using it and they tell all their friends and i think we decided uh i guess about a year ago when we came up with this apex service that you know we really want to start going bigger on the marketing around it because it's very unique nobody else has anything quite like it and it's it again it just adds value to the whole developer productivity story around an oracle database so uh that's why we have the apex service now and we also have apex available with every oracle database on the cloud god i want to i want to ask you about some of the features around 21c there are a lot of them you announced earlier this year maybe you could tease out some of the top things that we should be paying attention to in 21c yeah sure um so one of the ways to look at 21c is we're we're continuing down this path of a converged database and so one of the the marquee features in 21c is something we call blockchain tables so what is blockchain well blockchain was this technology that's under the covers behind bitcoin you know it's a way of creating a tamper-proof data store um that was used by the original bitcoin algorithms well developers actually like having tamper proof data objects and databases too um you know and so what we decided to do was say well if i create a sql table in an oracle database what if there's a new option that just says i want that table implemented using blockchain technology to make the table tamper proof and fully audited etc and so we just did that and so in 21c you can now get a basically another feature of the converged database that says uh you know give me a sql table i can do everything i can query it i can insert rows into it but it's it's tamper proof i can't ever update it i can't delete rows from it amazon did the their usual thing they took again some open source technology and they said hey we got this great thing called quantum ledger database and it does blockchain tables but but if you want to do blockchain tables in any of their other databases you're out of luck they don't have it you have to go move the data into this new thing and it's again one of their it's again showing sort of the problem with their their proprietary this proprietary approach of having specialty databases versus just having one conversion that does it all so that's the blockchain cable feature uh we did a bunch of other things um the one i i think is worth mentioning the most is is support for persistent memory so a lot of people out there haven't noticed this this very interesting technology that intel shipped a couple years ago called optane data center memory and what it is it's basically a hybrid of flash memory which is persistent memory and standard dram which is not persistent means you can't store a database in dram um and so with this persistent memory you can basically have a database stored persistently in memory all the time and so it's a very innovative new technology from a database standpoint it's a very disruptive technology to the database market because now you can have an in-memory database basic period all the time 24 7. and so 21c is the first database out there that has native support for this new kind of persistent memory technology and we think it's it's really important so we're actually making it available as uh to our 19c customers as well and uh you know that's another technology i'd call out that we think is very unique we're way ahead of the game there and we're going to continue investing moving forward in that space as well yeah so that layer in between dram and and persistent flash that's that's a great innovation and good game changing from a from a performance and actually the way you write applications but i gotta i gotta ask you i and all the analysts were wrong with juan recently juan loyza and and to listen to that introduction of blockchain and everybody wants to know is safra going to start putting bitcoin on the oracle balance sheet i'm about to get that leap yeah that's a good question who knows yeah i can't comment on speculation ah that would be interesting okay last question then we got to go uh look oracle the narrative on oracle is you're expensive and you're mean you know it's hard to do business with do you care are you doing things to maybe change that perception in the cloud yeah i think we've made a very conscious decision that as we move to the cloud we're offering a totally new business model on the club that is a a cloud-native model you pay for what you use um you have everyday low prices you don't have to negotiate with some salesman for for months to get get a good price um so yeah we really like the message to get out there that those of you who think you know what oracle's all about um you know i and how it might be to work with oracle on in from your on premises days um you should really check out how oracle is now on the cloud we have this autonomous database technology really easy to use really simple any analysts can help get value out of the data without any help from any other engineers it's very unique it's it's uh it's the same technology you're used to but now it's delivered in a way that's much easier to consume and much lower cost and so yeah you should definitely take a look at what we've got out there on the cloud and it's all free to try out we got this free tier you can provision free vms free databases um free apex whatever you want and uh try it out and see what you think well thanks for that i was kidding about me and a lot of a lot of friends at oracle some relatives as well and thanks andy for coming on thecube today it's really great to talk to you yeah it's my pleasure and thanks for watching this is dave vellante we'll see you next time you
SUMMARY :
and so for developers i i think you know
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Andy Mendelsohn | PERSON | 0.99+ |
amazon | ORGANIZATION | 0.99+ |
March 2021 | DATE | 0.99+ |
20 | QUANTITY | 0.99+ |
gartner | ORGANIZATION | 0.99+ |
oracle | ORGANIZATION | 0.99+ |
apex | TITLE | 0.99+ |
juan loyza | PERSON | 0.99+ |
first database | QUANTITY | 0.99+ |
Oracle | ORGANIZATION | 0.99+ |
david floyer | PERSON | 0.99+ |
two prevailing models | QUANTITY | 0.99+ |
twice | QUANTITY | 0.98+ |
dave vellante | PERSON | 0.98+ |
today | DATE | 0.98+ |
first generation | QUANTITY | 0.98+ |
10 years ago | DATE | 0.98+ |
thousands of cpus | QUANTITY | 0.98+ |
decades ago | DATE | 0.98+ |
40 times | QUANTITY | 0.98+ |
51 | OTHER | 0.97+ |
25 years old | QUANTITY | 0.97+ |
30 | QUANTITY | 0.96+ |
first | QUANTITY | 0.96+ |
andy mendelson | PERSON | 0.96+ |
17 | OTHER | 0.96+ |
1980s | DATE | 0.96+ |
second generation | QUANTITY | 0.96+ |
33 | OTHER | 0.96+ |
one | QUANTITY | 0.96+ |
30 years old | QUANTITY | 0.96+ |
json | ORGANIZATION | 0.95+ |
earlier this year | DATE | 0.95+ |
one device | QUANTITY | 0.94+ |
amit xavery | PERSON | 0.94+ |
mark stamer | PERSON | 0.92+ |
ORGANIZATION | 0.91+ | |
years | DATE | 0.91+ |
32 | OTHER | 0.9+ |
about a year ago | DATE | 0.9+ |
oracle | TITLE | 0.9+ |
over 10 years ago | DATE | 0.89+ |
safra | ORGANIZATION | 0.88+ |
16 | OTHER | 0.88+ |
one thing | QUANTITY | 0.87+ |
many decades ago | DATE | 0.87+ |
lot of people | QUANTITY | 0.83+ |
Rajesh Janey, Dell Technologies, Uptal Bakshi & Satish Yadavali, Wipro | Dell Technologies World '20
>> Narrator: From around the globe it's theCUBE with digital coverage of Dell Technologies World. Digital experience brought to you by Dell Technologies. >> Welcome back everybody. Jeff Frick here with theCUBE. Welcome back to our ongoing coverage of Dell Technology World. We've been covering Dell Tech World since it started really. It used to just be Dell World and there was EMC World after the merger and this is the all virtual version but we're excited to be here and we've got a great panel coming up. I think you're going to enjoy it. Our first guest is Rajesh Janey. He is the Senior Vice President of Global Alliances for APJ for Dell Technologies. Rajesh, where are you coming in from today? >> I'm speaking to you from Gurgaon, India. >> Awesome. It's the power of the virtual, right? It's not all bad that we don't have to get on planes all the time. >> Absolutely. >> And joining him is Utpal Bakshi. He is the Vice President and Global Vertical Head High Tech for Wipro. Utpal, good to see you. >> Nice to see you. >> And where are you calling us in from? >> I'm from Dallas, Texas. Actually suburb outside of Dallas called South Lake. >> Oh, excellent. Great to see you and again didn't have to get on a plane to do this so not all bad. And also joining us is Satish Yadavalli. He is the Vice President and Global Practice Head, Cloud and Infrastructure Services for Wipro. Satish, where are you joining us from? >> Hi, I'm joining from Bangalore, India. >> Excellent. Welcome. So gentlemen let's just jump into it. Wipro's a huge services firm, does a lot of work with Dell so I wonder Rajesh if you can talk really about the importance of partnerships and the importance of having somebody like Wipro within the Dell ecosystem. >> Absolutely. Thank you for having us on with Wipro. Wipro and we have had a partnership which is over two decades old and we have a multifaceted 360 degree kind of relationship with Wipro. Wipro is a platinum partner and what's more while we bring a lot of technology and products and the depth of product which are relevant to customer's transformation scenarios today, coupled with Wipro's consulting and services and design abilities this becomes an unbeatable power house so to say whereby we can work closely with a customer to help them transform and live in what we are calling the next normal. >> Yeah that's great. Utpal to you there's a lot of interesting trends going on. We've had cloud and big data been going on for a lot but really the talk in social media is what's driving your digital transformation, the CEO, the CIO or COVID and we all know what the answer is. So we've got a lot of new stuff in terms of digital transformation, working from anywhere, workforce transformation. Wonder if you can speak a little bit about how COVID has accelerated some of the priorities that your customers are trying to get done. >> Yeah. I think that's a great point. Wipro has been transforming over the last several years. We were a strong, large scale system integration partner, large IT organization but over the last several years we pivoted hard into the digital transformation world moving into the design side, leading the design, moving to cloud and helping our clients help make that journey and all of that got accelerated with the whole COVID situation. The work from home became all pervasive and the whole virtualization of the workforce really pivoted with some of our key transformational ideas around live workspace and the virtual desk which we've been working very closely with Dell have taken shape. So that has been a big part of our ongoing strategy. Doing the modernization off the network has also accelerated the customer networks and infrastructure was not necessarily set up for enabling these hybrid work environment. A lot of our clients are coming back and saying they want to modernize and actually accelerate. So that has all changed with COVID. Some of it is very positive actually for the business. >> Right. >> From an SI perspective. >> Satish, you've got cloud and infrastructure in your title. Public cloud really changed the game when Amazon kind of came on the scene and now we're seeing this evolution and change over time between a public cloud and hybrid cloud and multi cloud and cloud on cloud. I wonder if you could speak to and then even have an AWS inside of other people's clouds. They're trying to get it out there. The evolution of cloud both as a technology but really more as a way of thinking in terms of rapid deployment of new functionality to support the business and what you're seeing with your customers today. >> So let me share a perspective, right? Enterprises today are looking at options to extract greater value from hybrid cloud investment. It's a brownfield environment today where customers have their existing data centers but the hyperscalers have really come into play now and right cloud is the strategy which most of our customers embrace to address the market demands which are primarily focused on business outcomes today. As Wipro we have invested in developing a holistic extensible platform led approach called Wipro BoundaryLess Enterprise to drive business outcomes to customers. So the BLE construct is all about providing a ready to use plug-and-play platforms making IT easily consumable from multiple stakeholder personas be it admins, be it line of businesses, developers and partners. So basically we have built a holistic solution and our BLE solutions has majorly five building blocks. The first building block would be the BoundaryLess Data Center. The second is the BoundaryLess Container Platform. The third is the BoundaryLess Data Protection Platform. The fourth is the BoundaryLess Cloud Exchange where we get together all the internet connections and define the software defined network part to give access to the workloads across hybrid environments and the BoundaryLess Integration Platform which we call it as BLIP. Basically this is what we have put together to deliver an outcome to the customers powered by BLE. >> So BLE again, you call it the BoundaryLess Enterprise. What's the most important components of BLE? What are the things that most people are missing to actually implement the strategy? >> So if I actually build on you, right? The five building blocks let me elaborate in detail. The first is on the BoundaryLess Data Center. This enables our clients to deliver an infrastructure as a service across data centers and public clouds and enables customers to seamlessly move workloads from Edge to Cloud and manage them in a consistent and efficient model. That's the first building block of our BLE. The second important building block is container, right? We all know today container orchestration is key across hybrid cloud and with micro services and architectures becoming more prominent we see huge search for managing various Kubernetes enrollments with our clients. So our BLCP platform leverages solutions like VMware Tanzu, which is again a Dell company to enable clients manage the multicloud Kubernetes enrollments through a single pane of glass and provide seamless migration and movement of workloads across cloud environments. That's going to be the key in the future with microservices being dominant and every enterprise embracing microservices architectures this becomes very important building block in our overall solution. The third important stuff is BoundaryLess Data Protection. Now that data is all cross in hybrid cloud environment and application actually consume this data it is important to protect the data which is intellectual property and very critical to every business. So with the BLDP platform we ensure that we deliver availability, solidarity, security and reliability of cloud adoption increasingly and rapidly across multicloud platforms. So our solution leverages the DTC of Dell and other existing Dell storages and data production solutions to offer seamless and right cost models which will be very critical for any cloud transformation and schedules as we move forward. The fourth point which I was talking about is BLCE. This is basically a cloud exchange where in a hybrid cloud environment you need to establish connectivities across PaaS and SaaS platforms as well as on-premise networks to provide seamless access to data and the workloads which are in multicloud scenarios. So that's about BLCE. With respect to BLIP it is an integration platform. Today we are in a software defined world and when I talk about providing a single pane of glass solution it is important for us to have an integration platform where I can bring all EPIs together and do northbound and southbound integrations with the architectures of clients and the cloud providers to spin off workloads, to commission, decommission and provide a seamless consumption experience to clients across multiple hyperscalers and on-premise infrastructure. >> Thank you for that summary. I think you hit on all the big trends. I want to go back to you Rajesh 'cause you said that this is a really unique time. You've been in the business for a very long time. You've seen a lot of other transformations and you've seen a lot of big trends. Why is this one different? What makes where we are today such a unique point in time in this IT industry journey? >> Excellent. I think I would say we are in a period of what is called an enforced innovation. While most of the time transformation in IT has been very, very sequential or continuous I think we are seeing an order of shift in the transformation and this whole situation is forcing everyone to accelerate the pace of innovation and transformation. There are two key priorities for every organization in this time. One, build resilient operations and second employee safety. These two parameters have forced the organization to look at their businesses differently, look at their IT infrastructure differently and created a sort of opportunity you can say which is ripe for Wipro's BoundaryLess Enterprise because there are no boundaries. People are working from home. They're no longer in an office confined or boundary. So that's smart. Coming back we are seeing an accelerated innovation. That means our partnership to deliver customer transformation at scale becomes all the more important. Bringing all the good technologies of Dell on one side and combining it Wipro's size, scale and services help us lead in the marketplace for customer transformation. And what's more, we are adding our Dell financial services solutions as Dell Tech on demand to enable all this to be consumed as a service and with flexible payment options which Wipro helps us translate it to customer offerings. >> That's great. Utpal, I want to go to you and get your perspective on how customers, in terms of this boundaryless, how things have changed since March 15th which at least here in the US, I don't know if in India it was on the same date when everything basically got shut down. So it was this light switch moment. Everybody worked from home, no planning, no thought like ready, set, go to now we're six, seven, eight months into this thing and clearly we're it's a marathon not a sprint and even if we go back to some semblance of what was the old normal the new normal is going to be different and everyone is not going to go back to work full time like they did before. So how, from a customer perspective, from a technology implementation perspective and from an initiative and getting this stuff done how has that changed pre-COVID then oh my goodness, it's the light switch moment and now it's, hey, we're in this for the long term. >> Yeah. I think Rajesh did hit upon that a little bit. This is truly that moment where it was a forced innovation. Some of it was happening anyways and it was bound to happen but I think the COVID kind of accelerated all of it. What has impacted is it all started with, okay, how do we enable work from home? And that is when the whole BoundaryLess infrastructure, the virtual desk solutions and all of that started getting impact. I think after that most companies have realized that this is not a short term fix. It is a longterm it's going to be here for staying so they wanted to have a longterm fix so they wanted to come in with innovation but at the same time from a business perspective they've had impact in business so they wanted very creative business models for them to get set with the technology innovation quicker but they didn't want to do it in a traditional way of paying it all upfront and moving it to that. So that is where the creativity in terms of joint innovation which we did with Dell, in flexible payment options, bringing in some kind of an asset lease model and things like that have gained traction. A lot more conversations are around we want to transform help us find a way to make the transformation sooner with maybe less investment upfront and find a way to fund this from the future savings we'll get so that we can be ready for the future without necessarily impacting the bottom line today. All of that has changed, I would say in summary, has accelerated the adoption and the rate of change but it has also led to all of us thinking some creative business models and new approaches to doing business. >> Right, right. Satish back to you. What are the big conflicts that always exist? There's innovation versus security, right? And enabling innovation and giving people more power, more tools, more data to do things at the same time now your tax surface has increased you don't necessarily have everybody locked down on their home infrastructure and they were forced into this. When people are talking about digital transformation, how do they continue to drive forward and how are you helping them on innovation and enabling innovation at the same time as you talked about keeping the data protected and really thinking about business resiliency and continuity in this to increase the tax surface not only because of mobile, but now with the working from home thing? It's increased exponentially. >> Yeah. So I would just take an example of how Wipro handled this pandemic when it hit us and what solutions we get. So let me just give you a perspective. As we all know the current pandemic has disrupted many industries and we were no exception. Basically COVID has brought to the forefront many crucial factors in terms of business continuity process, the quality of employee experience and the automation connected with the employees. So while we enable our employees to connect, collaborate, and communicate with ease from anywhere from any device in a secure way with a consistent user experience powered by Wipro LiVE Workspace platform which actually takes care of delivering a seamless onboarding of user via the Wipro LiVE Workspace platform and consume all the services the way they used to traditionally consume when they were working from office? So this is something which is the power of Wipro LiVe Workspace platform we have implemented to deliver a seamless employee experience access to the workspaces. That's one but also there are some learnings. When we implemented the solutions on the flip side as businesses we must also acknowledge and be cognizant of the fact that employees are trying hard to juggle between frequent interruptions at home and notifications from various applications we receive both on corporate and personal devices. Basically in a nut shell it is difficult to have the culture of corporate to be working from home. Basically that's another big learning. While all of us are adjusting to this new normal we are in constant touch with our employees and trying to improve the overall employee connect and experience. From a solution perspective let me just give you what we actually did. We have close to 175,000 employees across the globe. Suddenly started working from home post lockdown. What does this mean? The traffic pattern suddenly changed the directions which were traditionally moving on a East to West direction started moving North to South. Basically this means a 100% of the workforce in a corporate started coming from the internet to access the corporate infrastructure and then gain access to the customer network. So basically we had to quickly swing in with our solutions and got our engineering teams to re engineer and tweet the infrastructure and security architecture to this new normal. By leveraging our Wipro BLE and video architectures which is powered by Dell VxRail, NSX we were able to spin off and build capacity on on-prem as well as on cloud in less than 24 hours post one got approvals from the client. Lastly we also deployed a back to work IoT solution which helped our employees to get back to work safely. Basically the solution offers various security parameters. Apart from traditional COVID updates it also helps in scanning the employees' temperatures, employee movement within the office premises, bundled with video analytics and enables secure touch less access to the ODCs for employees who are coming back to work. So we are putting all these solutions together and we pretty much seamlessly were able to navigate from the pandemic situation and get our business back to operations in a matter of days. >> 175,000 People. It's really interesting to think about how that network traffic completely changed from inside the firewalls to everything coming from the outside. It's a lot of people to get working from home right away so congratulations on that. As we come to a close Rajesh, I want to come back to you and talk about again, partnership in the age of this rapid acceleration of technology adoption, new technology move. We talked about the work from home. We've talked about cloud. We haven't talked very much about there's this other big thing that's coming down the pike which is 5G and IoT and kind of this entirely new scale of communication that's machine to machine, not person to person and now these connected devices. The amount of traffic continues to go up into the right at an accelerating rate. Tell us a little bit about the meaningfulness of having a partnership like Wipro that you guys can build solutions around new cutting edge technologies and have that real close connection with the customer or with all the supporting services. >> We'd love to. And maybe first I'll give you a perspective on how our employee base started working from home. Some other statistics that they wanted to show maybe add on towards what Satish said. We transitioned 120,000 employees. Twice the normal to work from home within two weeks and every day we are running something like 20,000 meetings and 16 million zoom minutes per day. That's the kind of traffic IT has seen. >> 16 million zoom minutes per day? >> Zoom minutes per day. >> Wow. >> That's the kind of traffic and our VPN traffic user load just tripled. At software or IT we call Dell digital. It was just a smooth and seamless experience. Now coming back, you said rightly. While we have partnered so far to deliver to the solution which are here today and the customers needs which are here today, what are we going to do for the future needs especially ie 5G IoT? We believe as a corporation that Edge is going to be the next wave of innovation. And next way our customers will benefit. Therefore connectivity to Edge via 5G becomes critical. IoT devices and managing the traffic and contain it there itself rather than flowing it back to data center becomes critical. As an example Wipro and Dell technologies are using our hyper converge solutions along with VMware telco and software for a European telco to provide automation and AI to deliver rapid results for the customer. So these are just early parts of it. We are partnering with Wipro to build solutions around 5G as well as telecom related innovation that'll come into the picture. IoT Satish spoke about a simple example of employee attendance. Imagine this is a need which will only accelerate from every organization, multiply it with the automation and AI that needs to be built into machines and feeding all the data back to drive some intelligence and refine the processes, refine the business outcomes. So I think we are working together on many such things and what's important is in all this, when the universe just explodes to devices and millions of devices, security becomes a paramount feature and we are working with Wipro to build what is called an embedded security into each of the solutions that we are designing. Security cannot be an afterthought or a bolt on it's becoming an integral part of the overall solution as we move towards the Edge. >> Yeah, right. And I think as Satish talked about all the distractions and notifications there're a lot of great opportunities for applied AI too to help people know what to do next. It's hard to be context switching all the time, not only on your work, but also the spouses working from home, the kids are doing homeschooling. It's not an optimal environment at all. Gentlemen thank you for your time. Congratulations on your partnership and hope you have a fantastic Dell Tech World. Sorry we can't be in person but this is not too bad. >> Thank you. >> Jeff >> Thank you >> Thank you Utpal, thank you Satish for your partnership. >> All right. Thank you gentlemen. >> Thank you. >> Alright. Stay with us for continuing coverage of Dell Technologies World 2020. I'm Jeff Frick. Thanks for watching. (upbeat music)
SUMMARY :
to you by Dell Technologies. and this is the all virtual version I'm speaking to you It's the power of the virtual, right? He is the Vice President I'm from Dallas, Texas. and again didn't have to and the importance of and products and the depth of product and we all know what the answer is. and the virtual desk and cloud on cloud. and the BoundaryLess Integration Platform What are the things that and the workloads which are You've been in the business and with flexible payment options the new normal is going to be different and the rate of change and continuity in this to and be cognizant of the fact that and kind of this entirely Twice the normal to work and AI that needs to and hope you have a Thank you Utpal, thank you Thank you gentlemen. of Dell Technologies World 2020.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Rajesh Janey | PERSON | 0.99+ |
US | LOCATION | 0.99+ |
Satish Yadavalli | PERSON | 0.99+ |
India | LOCATION | 0.99+ |
Jeff | PERSON | 0.99+ |
Satish | PERSON | 0.99+ |
Rajesh | PERSON | 0.99+ |
Dell | ORGANIZATION | 0.99+ |
Jeff Frick | PERSON | 0.99+ |
Dell Technologies | ORGANIZATION | 0.99+ |
Amazon | ORGANIZATION | 0.99+ |
Wipro | ORGANIZATION | 0.99+ |
Satish Yadavali | PERSON | 0.99+ |
Utpal | PERSON | 0.99+ |
Twice | QUANTITY | 0.99+ |
six | QUANTITY | 0.99+ |
Dallas, Texas | LOCATION | 0.99+ |
Bangalore, India | LOCATION | 0.99+ |
Dallas | LOCATION | 0.99+ |
100% | QUANTITY | 0.99+ |
20,000 meetings | QUANTITY | 0.99+ |
seven | QUANTITY | 0.99+ |
Utpal Bakshi | PERSON | 0.99+ |
Gurgaon, India | LOCATION | 0.99+ |
Edge | ORGANIZATION | 0.99+ |
March 15th | DATE | 0.99+ |
South Lake | LOCATION | 0.99+ |
each | QUANTITY | 0.99+ |
third | QUANTITY | 0.99+ |
first | QUANTITY | 0.99+ |
fourth | QUANTITY | 0.99+ |
today | DATE | 0.99+ |
five building blocks | QUANTITY | 0.99+ |
120,000 employees | QUANTITY | 0.99+ |
eight months | QUANTITY | 0.99+ |
360 degree | QUANTITY | 0.99+ |
Today | DATE | 0.99+ |
first guest | QUANTITY | 0.99+ |
second | QUANTITY | 0.99+ |
less than 24 hours | QUANTITY | 0.99+ |
both | QUANTITY | 0.98+ |
fourth point | QUANTITY | 0.98+ |
Dell Technologies World | ORGANIZATION | 0.98+ |
Dell Tech | ORGANIZATION | 0.98+ |
two weeks | QUANTITY | 0.97+ |
two key | QUANTITY | 0.97+ |
pandemic | EVENT | 0.96+ |
Uptal Bakshi | PERSON | 0.95+ |
millions of devices | QUANTITY | 0.95+ |
One | QUANTITY | 0.94+ |
Tom Sweet, Dell Technologies | Dell Technologies World 2020
>>from around the globe. It's the Cube with digital coverage of Dell Technologies. World Digital Experience Brought to You by Dell Technologies. Hello, everyone, and welcome Back to the cubes. Continuing coverage of Del Tech World 2020. This is David Dante With Me is Tom Sweet. He's the EVP and chief financial officer of Dell Technologies. Tom is great to see you. Thanks for coming on The Virtual Cube. >>Dave is always good to see you. And thanks for having me. It's always good to have a conversation with you. >>I actually don't think I've spent a lot of time talking to folks from jail, but I don't think you and I have talked since the pandemic hit. So you know, what's the macro picture? You know, you and I was usually start with the big picture. And, of course, the impact of the pandemic and kind of the big waves that you're seeing out. There may be some of the changes that you're navigating >>Well, you know, it's it's been uninterested near David's. You and I both know, right, and so we way clearly did a number of tactical actions as we worked our way through the pandemic in the early days to make sure our team members could work and we're safe and then pivoted to making sure we could, you know, help our customers and get them up in productive from a work from home perspective, you know? And so it's and then we've evolved into Then, you know, how do you think your way through? Um, you know, what's the what's the work? How do you work your way through? What do you look like on the other end? And so we've been spending a lot of time thinking about investments. Where do we put Capital Toe work to position the organization for success? Post Cobain, whenever that might be, by the way, and and so that's been the focus in, you know, really spending a lot of time on investment areas. The whole macro dynamic has been interesting is, you know, way went through this huge trough in Q two in terms of GDP and global GDP. You know, we're working our way out of that at a macro level. It's very interesting as you go across the globe and look at the various countries and regions and how they're recovering at very different paces. You know, the business has been uninterested in business in terms of what we do, and our PC business has been quite strong. And we've seen a big shift with the work from home and learn from home dynamics with strong demand from government and education. Three infrastructure business R I s G business has been a bit softer, just a zoo Companies have pivoted, but all in all, I think we're working our way through it. I e think the actions we took to preserve liquidity and protect the P and L early in the pandemic have paid off for us. And, uh, we're now focused on how do we position Post Post when we get through this whole cova dynamic? >>You know, way both seen a couple of pretty severe downturns. I think about the dot com downturn and then the financial crisis. I'm actually kind of surprised and impressed the way that that not just our industry, but all industries have worked through this. I guess in hindsight, that shouldn't be surprising given the pace of technology. But I remember those two that I just mentioned. People were flat footed. I remember Ed Zander joking when he was a son. Anybody wanna buy a server? And it was just there was business wasn't being transacted. And that's different this time around, Uh, industries have have responded and you know, technology, of course, is is at the heart of that. But were you surprised at all by the by the pace of I don't want to say recovery, but resiliency, I guess >>a little bit to be honest day. I mean I mean, it does highlight the fact that at the heart of what most companies are you know are doing these days is technology and how they evolve their business model, how how they interact with their customers. And so clearly, if you you think all the way back with our industry date back to the early two thousands and we had a with the bump with the dot com bust and people shut down, I t spending, you know. And now I don't think you can really do that if you think about where you need to be from a business model perspective. So I think there's been a maturation and a recognition that technology plays a key role. But But it has been surprising about how fast it's pivoted. To be honest with you in the sense of, you know, I think of the very distinct cycles is would come through the Coba dynamic. Big PC demand early innings. You know, we saw some recovering the I S G spend in Q two in our quarter second quarter a little bit better than Q one. You know, as companies readjusted spin eso, it's The organizations across in our customer base have have adjusted quite well. Clearly, there is vertical implications. If you're in the airline industry or some of the hospitality, you're you're being a bit more cautious, right? But all in all, it's been a It's been an interesting journey for all of us. >>Yeah, I mean, at the height of the pandemic, you saw, you know, some people taking actions. Obviously, they were freezing I t projects. They were starting to do layoffs or freezing new hires. That's moderated based on the data that we've seen. I just published the other day that we're starting to see some, you know, slow thawing of that tight grip on I t. What are you seeing? Both externally and maybe as the CFO. What are you doing internally? Well, >>if you talk to my CEO should probably give you a different answer day that I'm about to give you because you know, I'm a extraordinarily balanced guy in my point of view, right? But, you know, look, I think externally we're seeing targeted investments happening by customers that are moving projects forward. I think there's a bit of caution, and I do think this whole evolution off. How do customers want to consume? I t is evolving, you know. Is it a cat expand? Is it a Is it a financing structure? Is it a as a service and consumption model type? You know, So those three economic models around I t. Or changing and evolving. But I think overall, what we've seen is some level off, you know, cautious, you know, cautiousness. But yet, you know, targeted and investment with our customers and in an internally, Quite frankly, we're continuing to invest. We have capabilities that we need to evolve. You know, we're working. We're very focused on transformational projects that enable our customers to do business with us easier. On the other hand, we're being very tight around. What do I need to do from, You know, some of those old run the business types spend and how doe I streamline that while still supporting the business properly. So it's a bit of a balance right now. >>Yeah, and you obviously have the advantage of large portfolio parts of your portfolio exposed. Like you said, some of the on Prem stuff. But then you've got the certainly the laptop in the work from home shift. A couple of questions there. One is, first of all, you know, Della was largely a larger work from home culture than the average. The average Let's say the average is on a 15 to 20% of employees work from home. You're probably higher than that. And and But now we're seeing that people are expecting at least double that long term are gonna work from home. So you were, you know, somewhat, maybe more prepared than than most. But then again, you have that tailwind on one side of your business. Your supply chain did very well, unlike some of your competitors that we saw early in the pandemic, you know? So it seems like you've managed that pretty well. Maybe your thoughts. >>Yeah. Okay. We do have a culture that provided flexibility. We've been on this journey for roughly 10 years about having our people have some flexibility where they work. And so we had roughly 20 25,000 people working remotely, or some are in some hybrid fashion before the pandemic. You know, obviously, right now, 90% of our workforce is is remote. We think, you know, post pandemic, you know that it's gonna look like something like, you know, you know, 45 50% of the organization is probably gonna be in some sort of hybrid or remote setting. You know, that's the feedback our team members are giving us. And, uh and so you know, we have been fortunate to be able to have the culture that pivoted quite frank quite quickly, I should say, as we worked our way through this from a supply chain perspective Look our supply chain has done. Team has done a terrific job on sort of navigating the barriers and the challenges put up by a covert 19 crisis. But I'll go further back that if you and I talked about this before, think about what's happened with our supply chain and global supply chains over the last couple of years and whether it's the US China dynamic and how do you work your way through that? You know, and how do you ensure continuity of supply for our customers? And so that that teams done a great job? You know, we have long term relationships with many of our key suppliers, which has been helpful. And, you know, as you know, we have one of the largest, if not the largest, technology by in the industry. So it has helped us in terms of making sure we have capability and availability for custom. >>Let's talk a little bit about some of the strategy and the value levers that you guys talk about. You've always hit on industry consolidation, integration delivering. You've seen the 13 D with the movie you're gonna make with VM Ware. How have things changed? There has a pandemic changed your thinking at all, And how are you doing in terms of those turning those knobs? >>You know, first, it has not changed our thinking in the sense of some of those keep long term value creation activities we've been focused on and platforms we've been focused on around Hey, you know, we know that in the where we where we sell where we compete, that the industry is not a, you know, a rapidly growing industry. And so you grow organically by consolidation and share gain, and that's what we've been focused on. You couple that with the innovation engine we have with Dell Technologies. And, uh, including our, you know, way need to including that VM ware. You know, we've got a new, extraordinary patent portfolio and we've got these what we think are unique solutions and capability. So we're pushing hard on the innovation engine, and then you couple that with the capital work we've been doing around, how do you delivering the balance sheet? Getting the company reposition back towards investment grade. And we've made really good progress on that. You know will pay down $5.5 billion of debt this year, which will again position us closer to those investment grade like metrics. And so those those platforms are pillars, if you will, of our strategy, haven't changed. But in addition to that, you know, we are looking at where do you grow and how do you continue to grow at a pace, perhaps at GDP GDP plus, which is sort of where we think you know, is the long term framework we've got to be thinking about. So that's where you get into these adjacency is like, How do you How do you further driving a multi cloud hybrid cloud? How do you think about the opportunity with Telco, with five G roll out that's happening across the globe and the investment that's going to go into that the whole edge computing the edge cloud is of interest to us. And so there's a number of these emerging areas that we think are pretty interesting, and their adjacent and fit nicely into what we do is a, you know is, quite frankly, that essential infrastructure company. So that's the focus we've been driving about. How do we set up both continue on our core mission of consolidation, innovation and delivering as well as how do you set up some of these growth vectors as we move forward? >>Well, in one of the other levers you filed the 13 d, I don't know what you can share with us. Some of it gets confused. How much is fact sometimes and how much is speculation. But, I mean, I've said that it appears that one of the things that you're looking at is creating an equilibrium in terms of the balance sheets of both companies. Uh, keep getting them both that investment grade. What can you tell us about what you're thinking there? >>Yeah, I look, you know, obviously we did file a 13 D in mid July, which essentially said we were contemplating whether you know, a potential spin of our 81% ownership interest out to the Dell Technology shareholders. And so we're continuing to work with the VM Ware team on, you know, what does that look like with a couple of fundamental principles, which is Hey, you know, we have both benefited from this better together story. And so how do we keep that differentiation in some type of a long term operating agreement or operating framework? But at the same point in time, you know, you know, do the potentially look at it spend that unlocks value for both sets of shareholders of both companies, right? VM ware gets additional flexibility from a from a strategic perspective, they don't have the Dell balance sheet. Dell Technologies balance sheets sitting on top of them from the Dell Technologies perspective. You know, we presumably as part of this would be some type of a dividend stream. But by being were out to its share. What shareholders? We get the opportunity to accelerate our delivering story and get back closer to investment grade or right at investment grade, depending upon how this all works out. So we think there's a number of really interesting value levers here, right at the same point in time, wanting to protect what's been really good about the relationship in the way we've gone to market, the way we've innovated. And so that's the balance were walking right now. And you know there's work to do is we work with being where to see. If this makes sense, can we get it done? But But we're early innings and and we may end up not doing anything honestly, But I mean, that's that's sort of the thinking that we're working through right now. >>Well, it's an interesting thought exercise, if nothing else. And so e I look at it when when you combine del in the M. C when you did the acquisition. Now you became VM Ware's most important partner. Just even if it's in terms of revenue because you've got a massive distribution channel. So there's there's that inherent value in that relationship, independent of anything else. The flip side of that is VM Ware has been, you know, awesome acquire of companies. Uh, you know, inorganic r and D, if you will. And some pretty cool R and D A Z Well, so it's gonna be really interesting toe watch how that plays out. I think we wait and see. That's a comment, you know, >>we're working through it and we'll see where we end up. But, you know, you've highlighted a couple of great points. I mean, our, you know, our go to market reach, you know, it is extraordinary. And VM Ware has benefited from that. We've benefited from the VM Ware relationship with some of their technologies is we've integrated those into our combined solution. So it's been a it's been a win win, and that's the balance of how do you keep that, Aziz. Well, as you know, quite frankly, provide some value back to your shareholders. >>Well, we've seen that not just the the uplift of the market. But clearly the speculation has caused some unlocking of value and may bring some others from the sidelines. But I wanted to ask you about I've been talking about this automation mandate. I think there was one. Certainly. There was one before the pandemic, and now it's even accentuated. Um, can you talk a little bit about how you're applying automation, thio your business and maybe what you're seeing with customers? How that could affect, you know, the long term productivity of your business? Maybe new ways to work. What can you tell us there? >>Yeah, Look, I mean, we we have a pretty significant automation agenda within Dell Technologies, both from an internal perspective as well as the automation and a I am and machine learning capabilities were embedding into our solutions to help our customers Dr their automation agendas. Internally, what we've been focused on is how do I simplify? How do I take complexity out? You know, how doe I providing a richer mawr interactive experience with our customers? How doe I lean into service needs service capabilities, all those areas that are ripe for automation and my finance organization alone Right now, I think I have over 125 automation projects going right now is we? We look at how we simplify from a customer. Perspective is I go out and talk to customers. They're also doing much the same thing that we're doing, which is how did they take complexity out of their process? How do they streamline? How are they? How do they drive? Responsiveness and customer, uh, you know, customer experience at a much higher level. And so it's all you know. It's all war walking down this pathway of process simplification, automation, which includes technology, investment, obviously which is, you know, helpful from our perspective. And so there's a agenda out there is Aziz. We talked with customers in terms of in a commonality as we talked with customers. And then the other point I'd give you Dave, is that just as you think about, you know, as I talked to my peers out in the industry, I mean, many of us are driving automation agendas. Have a lot of that, you know, with focused on taking touch out, enrichment of job and capabilities, enrichment of, you know, we gotta build skill sets to drive that. So there is a big theme across the industry in this area, and I think it's gonna do nothing but accelerate. Quite frankly, Aziz, we work our way forward. >>Yeah, I've talked to a bunch of customers in this topic, and it seems to be sort of three paths. Actually, one path is there's. There's a lot of low hanging fruit and easy wins. And but the problem with that is a lot of times it's just paving the cow path with automation. You know, the other is you got to do the hard work of really digging into the process and the third that I've seen, which is kind of interesting to which is kind of what you're alluding to is your free up. You know, some of the mundane tasks, and you let the people who really understand the process rethink that process. And then you go into a deeper automation agenda, and that seems toe that will turn millions into billions. >>That's the value. Add their game. I mean, it's that third framework that you laid out, which is you have to do the work around process. But then again, how doe I then you know over time is I is. I have the experts help us on the automation capabilities. Once we've identified, what are the appropriate processes or functions to be automated? How do you then pivot resource tomb or higher value add activity across the organization and that Z when you when you do that, you unlock, I think, a terrific value creation opportunity, which we're very focused on. >>And I know there's always a big concern about jobs with automation. But the reality is, if you look at the data from the U. S. And Europe of the last couple of decades, the productivity trend is clear. It's it's gone down. And if you think about the big problems that we face in the world, whether it's climate change, your national debt or health care, you know you know hunger, you just can't throw people at that problem. You gotta have a combinations of people in machines. And so well, there may be, you know, a short term impact. I'm kind of an optimist. I know you are a swell >>No, it Zuno. Obviously, this is a tough time for a lot of businesses and customers. As we work our way through the pandemic and and including, you know, and and some have adjusted their workforce, you know, and part of its from the economic reality. But part of it is also a skill set. Dynamic is a reshaping workforce. And but I do think automation plays a key role. And how do you enable skill sets to evolve and get again re allocated Thio other value creation activity. So there is, you know, unfortunately, are probably gonna be some short term disruptions in certain areas. But on the other hand, if you think about the long term gain and the productivity gains that we all need to drive, you know you can't do it without automation and thinking your way through streamlining and taking complexity out of the organization. >>So my last question has come back the productivity We're talking about work from home. Do you feel like you've had a bump in productivity? As a result? Maybe there was some short term disruption. But you know, what's your what's your data or your gut say, in terms of the impact on your organization and then maybe on your customers as well in terms of the program. So >>I think it's been fairly similar between us and our customers. I waas concerned when we went to a work from home back in March that we were gonna lose productivity and, you know, and I thought it was gonna be a productivity drain, you know, a czar. Team members were juggling work and their family dynamics and situation is in. Obviously in the middle of that are in the early innings of this covert crisis. What we have seen, in fact, is actually, we've seen productivity improved pre Koba to where we are today. And I think a lot of that has to do with the fact that we're giving our team members one flexibility on how they do their job. But we're giving them time back there, and they're not commuting. There's less meetings that are consuming time, you know, and the responsiveness in the capabilities of the order such that we're moving through decisions and projects. I think, at a faster pace, quite frankly. And so it's been an interesting and, I think to me a bit of a surprising result from what we've seen as I talked to customers and I'm the executive sponsor on a number of extraordinary, very large multinational customers. It's pretty much the same response. You know, the similar experience, right, that they've seen similar results that we have. So now what you don't want this to be is that you're doing it on the backs of the team members working 15 or 16 hours a day. You've got to find the right balance. But the fact that we're giving them flexibility to jump out during the middle of Daito tend to some family members or help with, you know, their Children's learning. Then they're back in maybe a little bit later during the day. I mean, I do think that we've been able to a culture that's pretty interesting that is paying dividends for us right now. >>Yeah, it's ironic that this hit at the beginning of of 2020 it's clear that it's gonna be a different decade than it was last decade, which I guess every decade is Tom Tom Sweet. It was great to have you on the Cube. Thanks so much. Always a pleasure speaking with you. >>Always, always great to see you. Thanks for having me. >>You're welcome. And thank you for watching everybody says Dave Volonte, you're watching our coverage, the cubes coverage of del Tech World 2020. But right back after this short break
SUMMARY :
It's the Cube with digital coverage of Dell It's always good to have a conversation with you. I actually don't think I've spent a lot of time talking to folks from jail, but I don't think you and I have talked since the pandemic and and so that's been the focus in, you know, really spending a lot of time on investment responded and you know, technology, of course, is is at the heart of that. And now I don't think you can really do that if you think about where you need to be from Yeah, I mean, at the height of the pandemic, you saw, you know, some people taking actions. level off, you know, cautious, you know, cautiousness. One is, first of all, you know, Della was largely a larger And, you know, as you know, we have one of the largest, if not the largest, technology by Let's talk a little bit about some of the strategy and the value levers that you guys talk about. that the industry is not a, you know, a rapidly growing industry. Well, in one of the other levers you filed the 13 d, I don't know what you can share with us. But at the same point in time, you know, you know, do the potentially look at it spend that That's a comment, you know, I mean, our, you know, our go to market reach, How that could affect, you know, the long term productivity of your business? Have a lot of that, you know, with focused on taking touch out, You know, some of the mundane tasks, and you let the people who really understand the process rethink across the organization and that Z when you when you do that, And if you think about the big problems that we face in the world, But on the other hand, if you think about the long term gain and the productivity gains that But you know, what's your what's your data or your gut that are consuming time, you know, and the responsiveness It was great to have you on the Cube. Always, always great to see you. And thank you for watching everybody says Dave Volonte, you're watching our coverage, the cubes coverage of del Tech
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Susan Wojcicki | PERSON | 0.99+ |
Dave Vellante | PERSON | 0.99+ |
Lisa Martin | PERSON | 0.99+ |
Jim | PERSON | 0.99+ |
Jason | PERSON | 0.99+ |
Tara Hernandez | PERSON | 0.99+ |
David Floyer | PERSON | 0.99+ |
Dave | PERSON | 0.99+ |
Lena Smart | PERSON | 0.99+ |
John Troyer | PERSON | 0.99+ |
Mark Porter | PERSON | 0.99+ |
Mellanox | ORGANIZATION | 0.99+ |
Kevin Deierling | PERSON | 0.99+ |
Marty Lans | PERSON | 0.99+ |
Tara | PERSON | 0.99+ |
John | PERSON | 0.99+ |
AWS | ORGANIZATION | 0.99+ |
Jim Jackson | PERSON | 0.99+ |
Jason Newton | PERSON | 0.99+ |
IBM | ORGANIZATION | 0.99+ |
Daniel Hernandez | PERSON | 0.99+ |
Dave Winokur | PERSON | 0.99+ |
Daniel | PERSON | 0.99+ |
Lena | PERSON | 0.99+ |
Meg Whitman | PERSON | 0.99+ |
Telco | ORGANIZATION | 0.99+ |
Julie Sweet | PERSON | 0.99+ |
Marty | PERSON | 0.99+ |
Yaron Haviv | PERSON | 0.99+ |
Amazon | ORGANIZATION | 0.99+ |
Western Digital | ORGANIZATION | 0.99+ |
Kayla Nelson | PERSON | 0.99+ |
Mike Piech | PERSON | 0.99+ |
Jeff | PERSON | 0.99+ |
Dave Volante | PERSON | 0.99+ |
John Walls | PERSON | 0.99+ |
Keith Townsend | PERSON | 0.99+ |
five | QUANTITY | 0.99+ |
Ireland | LOCATION | 0.99+ |
Antonio | PERSON | 0.99+ |
Daniel Laury | PERSON | 0.99+ |
Jeff Frick | PERSON | 0.99+ |
Microsoft | ORGANIZATION | 0.99+ |
six | QUANTITY | 0.99+ |
Todd Kerry | PERSON | 0.99+ |
John Furrier | PERSON | 0.99+ |
$20 | QUANTITY | 0.99+ |
Mike | PERSON | 0.99+ |
January 30th | DATE | 0.99+ |
Meg | PERSON | 0.99+ |
Mark Little | PERSON | 0.99+ |
Luke Cerney | PERSON | 0.99+ |
Peter | PERSON | 0.99+ |
Jeff Basil | PERSON | 0.99+ |
Stu Miniman | PERSON | 0.99+ |
Dan | PERSON | 0.99+ |
10 | QUANTITY | 0.99+ |
Allan | PERSON | 0.99+ |
40 gig | QUANTITY | 0.99+ |
Tina Nolte & Tenry Fu, Spectro Cloud | KubeCon + CloudNativeCon Europe 2020 – Virtual
>> Man: from around the globe, it's "theCUBE" with coverage of "Kubecon" and "CloudNativeCon Europe 2020", virtual. Brought to you by Red Hat, the cloud native computing foundation and ecosystem partners. >> Welcome back, I'm Stu Miniman, and this is "theCUBE's" coverage of KubeCon CloudNativeCon Europe 2020, the virtual edition of course, it, this ecosystem has been bustling, a lot of activity in the five years that we've been covering it with "theCUBE" we've watched very much the maturation of what's going on. Remember, in the early days, it was open source projects, companies pulling all the pieces together. Now, there's a lot more things to choose from lots of projects, not just Kubernetes, but all the other pieces, and still lots of new innovations and new startups coming into the space. So happy to welcome to the program, have two first time guests from Spectro Cloud, first of all, we have the co founder and CEO Tenry Fu, and also Tina Notle who's the Vice President of product, Tina and Tenry, thank you so much for joining us. >> Thank you for having us. >> Likewise. >> All right, so Tenry, as one of the co founders, I want to understand, you know, why Spectro Cloud? Why now, you know, many outsiders, would they have said for a while, you know, Kubernetes, it's just getting baked into all of the environment. They looked at all the platforms, whether you're talking, you know, Google and AWS or VMware, they all have their platforms, they all have their managed services offering. So help us understand, what your team does and how you differentiate from what's already existing. >> Absolutely yeah, so I actually used to work at VMware, I, and then, I saw clouds taking off right and then I left VMware, to start my first startup called CliQr Technologies, which focus on multicloud management. But at that time, really, multicloud management through a single pane of glass is obviously right, and then clicker later acquired by Cisco. So at Cisco, I kind of witness The Container and Kubernetes taking off, right? And it makes a lot of sense, right for the first time both the application workloads and infrastructure became truly portable across multiple environments, but also very interestingly at Cisco I observed there are many developer teams, right? That is adopting Kubernetes and everyone is doing a little bit different things, that because different teams, they have a different stack constructor requirements, like some for AI/ML, some, they need a different base OS, some they just don't want to have a different version, and a lot of existing solutions doesn't really provide this kind of flexibility to satisfy all the different needs, right? one size fit all, typically is a one size fit for nothing. So we asked ourselves, why can't we try to create a platform that will give people the flexibility, but not turning it into a DIY project, right, still have a full manageability, so that user don't need to worry about the upgrade, Day Two operations, governance so and so forth. >> Yeah to Tina, I know when I've looked at your product, it's discussed as layers, which my background's in networking. So I love seeing things visually and understanding the pieces as they lay out the stack. So maybe help us understand a little bit as to, you know, that the flexibility that you give and how it's not just the Paradox of Choice, just too many options out there and you know, developers left to create their own mess that they can't then support. (laughing) >> Yeah, so you know, as Tenry mentioned, offering folks flexibility without turning into a do it yourself, you know, hot mess is what we're what we're helping People do at Spectrol Cloud, the core of our solution, the core of the differentiation within our solution is around this concept of a cluster profile, and as you mentioned, cluster profile basically allows people to define in a layered fashion, what's part of their Kubernetes infrastructure stack? So at the bottom, you're talking, what's the base operating system? What's the version of Kubernetes, that's going to be part of clusters that uses profile? What's your networking and storage interface look like? And then on top of that, you have a number of optional layers. So again, you know, back to flexibility manageability, we give people options around what those other layers look like on top. They include everything from security, logging, monitoring, etc, just anything that you want to go ahead and kind of bake into a definition, a profile of what a cluster should look like in one of your deployed environments. >> All right, well, Want to make sure I understand when you talk about Kubernetes in there, can it be, you know, say VMware with Vsphere7, now has Kubernetes support. Red Hat open shift is an option, all of the cloud players have their, you know, AKS, EKS. And they're like, can I bake that Kubernetes in or are you taking a different approach? >> We're going with upstream vanilla Kubernetes today, that allows us to go ahead and provide what's newest within the ecosystem, and let people go ahead and have a really open, really open solution that's replying. >> Okay, so when I talk to, when you look out there, a lot of companies are saying how can I manage multiple clusters? So if you look at what Google, Microsoft and VMware, they're talking about, we can manage our clusters and we can also help you with those other clusters. How does that impact Tenry, your Solution, doesn't it need to be, it's just the upstream solution that I put into that cluster profile, or can I connect to, say a managed cloud solution? >> Yeah, so I think in terms the multi class management or the consistency is really the key, right. So through this class profile concept, not only it can be used as the initial template to deploy a cluster, but it can also use as a single source for choose, to drive the cluster Lifecycle Management income upgrade. So right now, as Tina mentioned, we primarily focus on upstream, so that we want to provide the maximum flexibility in terms of our end to end Kubernetes stack. But we do also have a plan, that down the road that we go into in Brownfield existing clusters. So that enterprise, existing investment to their Kubernete infrastructure can be under managed by us. >> Well there always reaches a time when the brand new technology gets called Brownfield. I think that's the first time I've heard something like, you know, EKS or the like, you know, referred to as Brownfield. Tina, you know, when I think back to my history with integrated solutions, obviously, if I have the various pieces, it should be easier for me to stay on the latest make upgrades, roll things forward or roll things back, but you know, what, give us if you could some of the, the key values of, you know, building these cluster profiles, what that enables for your customers. >> So the key around cluster profiles, we offer this policy based management, so you describe as an administrator, what it is that those clusters need to look like, right? And we've got, we adopt a declarative desired state, you know, management approach along what Kubernetes does itself, and so what you're able to get through adopting, utilize cluster profiles, is this guarantee that from deployment and then into day two as well, what you've described in this profile, winds up maintaining itself, it remains true of the clusters that have been deployed. So what it is that you require as far as the operating system, what is required as far as some configuration options, etc. So the profile itself winds up being ground source of truth and around what it is that you've got running at all these various locations, across clouds, across different clusters, etc. >> All right. Tenry, you mentioned that having things more standardized is going to help customers, absolutely, we saw that in data centers for a long time, and standardized, how do you help customers make sure that the configuration that they build are going to work, are going to be stable, if they make changes that they're not going to get things out of sync. Is there you know, interoperability matrix or some other ways that we're trying to make sure that customers, you know, stay on the rails, if you will. >> Absolutely right, So through our system, right, all the integration points, we carry the additional metadata, right to basically give the hint about compatibility, resource constraints, right, and also the upgradability, in terms of moving from one version to another. So this way, we can kind of give you some guidance, when they initially construct a class profile, what will work together nicely and then what will not, right. And then on top of that, when upgrading from one existing cluster to a new version of a class profile definition, then we can look at the environment, right to understand, right, if there's something that potentially incompatible will popping up right, so we call that pre pilot integration, check right and also post deployment, we also allow user to run additional conformance tests. So that make sure the cluster everything is actually is still acting as as it's supposed to be. >> Another way to explain that is that you know, the cluster profile concept has a lot of flexibility attached with to it, right? That's a lot of power, it can get you into trouble if you don't have the right safety nets and safety harnesses underneath you. So we have a multi layered approach to helping make sure that people are getting benefit out of that flexibility. >> Wonderful and I'm wondering did, when you've had more customers using this, is their shared information, and if there're community guidelines that help, you know, understand when it's going to be okay, hey, 1.19's out, we're looking at 1.20. You might want to do this or hey, if you're using this piece of networking, you might want to wait a little bit before you go to the next version. >> That's definitely the idea over time, folks that are engaging with us, are very interested in the fact that, because of the fact that we're SaaS management platform, SaaS space management platform today, that it offers them the opportunity to learn from their peers, if you will, right, and their peers experiences. On top of that, we also have the ability to watch just what's been going on in other deployments in the Kubernetes ecosystem and we can make sure that all that's available, as Tenry mentioned, you know, in the form of the metadata that's on top of those packs. >> All right, how about how do you price this solution? When I look out there, I talked about Kubernetes baked into all the platforms, oftentimes, it can be baked into ELA, It's part of, you know, my just general cloud spend from that platform. So how do you do the pricing and, you know, are you plugged into any of the cloud marketplaces yet? >> Yeah, so flexibility is really part of our DNA. So even for pricing, we want to provide the maximum flexibility to our customer. So unlike some traditional solution typically is priced based on number of pause, right, a year, or even number of nodes, right. So we actually price based on number of CPU cores of all workers node under management by hour. So what we call those, core hour under management, right, and then every thousand core hours at one unit, we call kilo core hours. So kind of similar to how electricity is consumed, right, so this way, based on these core hour consumption, we allow user to either pay as you go as amongst the on demand plan, or you can do an annual commitment. >> And we are in process on the marketplaces. >> Yeah. >> All right, how about, we talked about Kubernetes, I think service mesh are part of it. What in this Kube, kubecon cloud native con ecosystem, which projects are the most tied into what you're doing anything that specter cloud is particularly contributing to that you can share? >> Yeah, so our system is built on top of Kubernetes cluster API project. So we are one of the contributor to class API, we are actively adding additional functionality to enhance class API, especially by in some other VMware environment for some custom use case, such as static IP or some special placement behaviors, and also adding additional contribute on different cloud support. >> Yeah, and as far as things that we're watching, and clearly we're, we've seen a dramatic increase in the number of people on our customer front that are interested in actual deployment, of service mesh now. So that's something that you know, we're going to be more engaged in over time. And another one that we're hoping to see, check out more talks around Kubecon is AI ML, right? A lot of interest on the part of customers around AIML use cases. >> Yeah, absolutely edge and AI and ML. Definitely very hot topics to conversation this year at the, at the Europe show, expect that to continue. Tina, I'm wondering, do you have any customer examples, maybe even anonymized that could kind of just explain the key values that your customers are seeing using your solution? >> Yeah, sure, so we've got one of our earliest customers is a Canadian financial, who came to us because, they were looking to figure out how to manage consistently at scale, and they have the problem that Tenry described earlier, around, I've got different development teams, they have different needs, and you know, how do you satisfy all those guys without going crazy, right? They've got an AIML use case, that's a special snowflake they've got two separate teams in different groups that would like to be under an IT management umbrella. That's a convergence use case that they're looking at, so kind of a typical example of somebody that we think of is, you know, a really good set of people for us to be having conversations with. We've also been working with a telecom provider that it's in a similar, similar vein actually, there's an AIML, there are multiple teams of different infrastructure, and they want to be able to consistently manage it's a story that we're seeing over and over again, thankfully. >> Yeah, we also see right from I think, at individual group or team level, right. There are a lot of, kind of a product owner or data scientists that they really want to have a kind of an easy button to quickly be able to provision Kubernetes clusters that suit for their need, right. And a lot of these groups, their primary focus is really the application, right? It's not their interest to spend a lot of time and resource on Kubernete management, in terms of deploying update, or secure an operation. So through us, they can very easily spin up a Kubernetes cluster, whether it's for AIML or for developing experiment, they can very quickly do that But with the flexibility, because a lot of existing solution, they may limit the version of Kubernetes clusters, they may limit the what kind of integration they can do. >> Yeah, Tenry you, we talked a little bit earlier about, you know, potential integration down the road. I'm curious, just there's so many companies creating innovations out there, you know, say for example, one that I hear a lot of feedback on is AWS now has far gate support for their EKS offering. Is that Something down the line you should look at or do you have some guidance as to how customers should be thinking about that, and if they want that kind of functionality, how they would get that with a solution like yours? >> Yeah, actually, we really share the same vision as AWS, right. So we believe, ultimately is the infrastructure really should be transparent to application developers, right, and it should be boundary-less. So our goal is not only manage Kubernetes, across multiple environment, but eventually we will be able to link all these cluster together, to make them acting as a single infrastructure. So developers, they can still use their familiar Kubernetes interface to deploy and manage their application, but without worrying about the how infrastructure underneath is operated or managed, right. So this in a way will eventually become kind of a phallic model, but across multiple cluster and multiple clouds. >> Alright, Tina, if maybe if you could give us the final takeaway, people attending Kubecon, cloud native con, what's the one thing that if you know they have a problem, they should be coming to Spectro cloud to hear more about? >> Yeah, sure so what Spectrol cloud aims to do is help enterprises not have to trade off between flexibility and control of their infrastructure, and manageability of use that stuff's that's the main, the main thing that we would like people to remember. >> All right, well Tenry and Tina, thank you so much for sharing with our community a little bit about Specter Cloud great talking to you and look forward to hearing more in the future. >> Thanks so much. >> Thank you too. >> All right, and stay tuned more coverage from Kubecon Cloud Native Con 2020. I'm Stu MiniMan and thank you, for watching "theCUBE." (light music)
SUMMARY :
Brought to you by Red Hat, a lot of activity in the five years that and how you differentiate and a lot of existing solutions that the flexibility that you So again, you know, back to all of the cloud players have that allows us to go ahead and provide and we can also help you that down the road that or roll things back, but you know, what, So what it is that you require that customers, you know, stay So that make sure the cluster that is that you know, guidelines that help, you know, the ability to watch just So how do you do the So kind of similar to how on the marketplaces. that you can share? So we are one of the So that's something that you know, expect that to continue. we think of is, you know, a kind of an easy button to quickly be able Is that Something down the is the infrastructure really that stuff's that's the main, talking to you and look forward I'm Stu MiniMan and thank
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Tina | PERSON | 0.99+ |
Tina Notle | PERSON | 0.99+ |
AWS | ORGANIZATION | 0.99+ |
Microsoft | ORGANIZATION | 0.99+ |
ORGANIZATION | 0.99+ | |
Cisco | ORGANIZATION | 0.99+ |
Red Hat | ORGANIZATION | 0.99+ |
Tina Nolte | PERSON | 0.99+ |
Stu Miniman | PERSON | 0.99+ |
Tenry | PERSON | 0.99+ |
Tenry Fu | PERSON | 0.99+ |
Spectro Cloud | ORGANIZATION | 0.99+ |
CliQr Technologies | ORGANIZATION | 0.99+ |
Stu MiniMan | PERSON | 0.99+ |
VMware | ORGANIZATION | 0.98+ |
Kubernetes | TITLE | 0.98+ |
one | QUANTITY | 0.98+ |
Spectrol Cloud | ORGANIZATION | 0.98+ |
one unit | QUANTITY | 0.98+ |
first time | QUANTITY | 0.98+ |
KubeCon | EVENT | 0.97+ |
five years | QUANTITY | 0.97+ |
single source | QUANTITY | 0.97+ |
both | QUANTITY | 0.97+ |
this year | DATE | 0.96+ |
two first time | QUANTITY | 0.96+ |
Brownfield | ORGANIZATION | 0.96+ |
one version | QUANTITY | 0.96+ |
a year | QUANTITY | 0.95+ |
ELA | TITLE | 0.93+ |
first startup | QUANTITY | 0.93+ |
CloudNativeCon Europe 2020 | EVENT | 0.93+ |
Kubecon Cloud Native Con 2020 | EVENT | 0.92+ |
Day Two | QUANTITY | 0.91+ |
Tenry | ORGANIZATION | 0.91+ |
today | DATE | 0.91+ |
Spectrol cloud | ORGANIZATION | 0.9+ |
two separate teams | QUANTITY | 0.9+ |
day two | QUANTITY | 0.9+ |
Kubernete | TITLE | 0.9+ |
one size | QUANTITY | 0.88+ |
single pane | QUANTITY | 0.85+ |
one thing | QUANTITY | 0.84+ |
single infrastructure | QUANTITY | 0.82+ |
every thousand core hours | QUANTITY | 0.79+ |
cloud native con | EVENT | 0.78+ |
KubeCon CloudNativeCon Europe 2020 | EVENT | 0.78+ |
Kubernetes | ORGANIZATION | 0.76+ |
theCUBE | TITLE | 0.75+ |
first | QUANTITY | 0.73+ |
Canadian | OTHER | 0.73+ |
Red Hat | TITLE | 0.72+ |
Specter Cloud | TITLE | 0.7+ |
Caitlin Gordon, Dell Technologies | CUBE Conversation, July 2020
>> Narrator: From theCUBE studios in Palo Alto in Boston, connecting with thought leaders all around the world, this is theCUBE Conversation. >> Hello, and welcome to this CUBE Conversation. I'm John Furrier, host of theCUBE in our Palo Alto studios. We're here with our quarantine crew, doing all the remote interviews, getting all the stories that matter. The great guest, Caitlin Gordon, Vice President of Product Marketing at Dell Technologies. Caitlin, CUBE alumni, welcome back remotely. We didn't make it to the Dell Technologies World got moved to the fall. We'll see you certainly virtually, but thank you for coming on remotely, appreciate it. >> Thank you so much for having me again, it's great to be here. >> So storage is on the upswing. We're seeing a lot of activity. We're going to talk about data protection specifically. But first, we want to find out what's going on with you guys. There's been some changes in your organization within Dell, can you take a minute to explain what they are? >> Yeah, absolutely. What we found is certainly a lot of our conversations in the storage space end up talking about data protection and data protection, talking about storage. And what we've decided to do is actually really bring those parts to the business together. So specifically now I've been in the storage business for a few years, I spent a long time in data protection before that. So now we've brought the gang back together, and we've got storage and data protection really brought together as an organization all the way through engineering, and product marketing. Product Management really help us collaborate and really attack problems for customers cohesively. So we're really early days here, but it's exciting. We've been really busy on the storage side, and we've got some exciting things coming here on the data protection side as well. >> I want to get your thoughts 'cause almost every interview I do in the past four months is just doesn't stop. It's COVID impact. It's one of those things that we've talked about data protection. I've had so many great conversations, continuous operations, non-disruptive operations, it couldn't ask for more disruption than people being asked to work at home. So it's caused some IT divides, this is something that we didn't see coming. Business still needs to go on. So I want to get your thoughts, we're seeing cloud obviously become highlighted in this pandemic, that's obviously impacting the data protection. What's going on in the data protection front on your side, because obviously, cloud is showing everyone, "Hey, I can use modern technologies in the cloud, but I still got to do my business, I still got to protect my data." What's going on? >> Yeah, I mean, absolutely. I think we've seen a lot accelerate with this whole situation we're all in with a global pandemic, with the challenges that all businesses and people are having. But the digital transformation has been compressed, right? It would have taken people years, but now they've been forced to do that in months. Things like containers are really exploding and the requirement to protect Kubernetes is really something that we now more and more are having conversations about. Cyber ransomware has really unfortunately, only accelerated in this increasingly digital world that we're now all exclusively living in. So cyber resiliency has become a lot more important conversation. And then being able to protect data, certainly on-prem, but also across multiple public clouds and having that consistent experience is probably more important than it's ever been before as well. So it's really just put the accelerant on a lot of conversations that we were having before, and now they've become even more important. >> Talk about the innovations around the protect product, you've got the PowerProtect, it's agile, there's been some developments, what's the new additions? What's being highlighted? What are the key features? >> Yeah, so it's actually pretty exciting month for us here. PowerProtect Data Manager has been in the market for a full year. So believe it or not full year and again, as you mentioned, agile development. So it was introduced a year ago, we've had a number of enhancements over that year in the space of adding workloads, our cloud integration, we've added cloud Dr to both Azure and AWS. You have three click failover, two click failback. Really simple cloud disaster recovery, the availability and AWS marketplace for in-cloud data protection. As well, we have integration with our cyber recovery solutions, so again that ransomware protection and recovery is an important part. As well as a number of enhancements for supporting additional workloads, SAP Hana, CR Microsoft Exchange, we have broad workload support, we've really really enhanced that a lot. And then most recently, just this month, we now have a brand new data protection of PowerProtect Data Manager offer which includes all of our cloud capabilities, all inclusive, available in a subscription. So again, as we talked about the way not only people are using their data protection solutions, but how they're consuming and purchasing that, we've really transformed also now the way that people will be purchasing that. >> That's awesome, congratulations. Subscription is the format people want. And Amazon marketplace that shows they can consume if you're amazon customer, you just go in the marketplace, you get it, that's awesome. Congratulations, that's the way the world wants to consume. So that's awesome news. The thing I want to get your thoughts on and you guys have been busy. The cyber recovery and resilience piece you mentioned, can you talk about that because, we're hearing a lot more that work at home is not going to be more permanent. More permanent in the sense of, as we come out of the pandemic, people will say, "Hey, I can be productive at home." So you get to see the at home, not just a, "Here's some extra expense for your bandwidth." Is going to be more thought through. There's going to be more cyber attacks, just the attacks just on the COVID scams alone has been a problem at a personal level. But from a business standpoint, I got to have a VPN, I got to have my connections, I got to be secure. How do you guys look at that because organizations are putting a focus on it? >> Yeah, absolutely. I mean, cyber resiliency is something we've focused on actually for a number of years and it started in the obvious places, right. The banks of the world, the financial institutions and the healthcare organizations. Where they always had to have data really protected, and they were kind of some of the more early targets. But now we've seen ransomware. And these digital attacks really get worse and worse. I think all businesses, including our own, are really ramping up to make sure that we are protecting in every way we can. And from our data protection portfolio, we have a fully air-gapped solution. So you have that protection. And it does two things, it first helps mitigate against the attack in the first place by actually being able to do full content scanning to detect if an attack has happened. And just as importantly, if an attack happens, being able to quickly in an automated way, recover from that attack. I think it's something that we are really finding that our entire sales team, is having conversations about. It's no longer focused on the financial institutions of the world. It's every organization, and a lot of people really appreciate that we've come with that expertise and that knowledge to be able to help them prevent, and then, unfortunately, in many cases recover from these attacks. >> That's to me, it's table stakes, I'd have to agree with you. The question I have for you on that, you've doubled speed piece because one of the speed to recovery has always been a big feature. Now with the at home situation, how does that play into, how you guys have been on that speed to recovery aspect of that? Can you share some thoughts on that? >> Yeah, and it's specifically with cyber because we have a fully air-gapped solution, and it's in a secure enclave. That recovery is automated, and it's all within that secure enclave. So you have that security, you have the confidence, and you have the speed of that recovery. So it's really important the way we've implemented that, it's not attack on to an existing, it's truly a fully secure enclave, a full air-gapped solution so that you can recover quickly, but just as importantly, you can recover securely as well. >> One of the quotes that's been kicked around in the industry is, in the past two months, we've seen more digital transformation than the past two years. And I think that's rightfully articulate 'cause of COVID. And we're seeing all the warts and scabs out there, and the infrastructure whether it was investments lacking, the ones that made the right investments were doing well. And it becomes around cloud native, some of the things you guys saw with your success with agility. What is going on with a container based architecture, because that to me is becoming one of those things where it's accelerating development teams, at the same time providing some of those business values that people have to keep the lights on for. So, what do you guys look at that? How do you look at this container architecture? What specifically in the portfolio you guys have to address that? >> Yeah, absolutely. I think containers we found accelerating in the past couple years and then in the past few months, is a huge, huge requirement. And although we didn't think so pretty recently, containers are part of production applications. They need to be stored persistent storage on the storage side, but they probably even more critically and urgently they need to be protected. We've done a number of integrations and work specifically, with VMware to be able to support Kubernetes, and being able to support those workloads and protect Kubernetes workload. A lot of advanced integration, being able to protect and recover those clusters natively, and having that deep integration with VMware, as well as other other distributions as well. 'Cause we have really found that containers are exploding, the ecosystem is obviously very much evolving, but we are really keeping up with the bleeding edge of that to ensure that as these cloud native applications are developed, that the containers are truly being protected, just as physical applications of past had been. We need to make sure that certainly VMs but even more importantly, those containers alongside, are being protected. >> I've always been a big fan of containers and certainly Kubernetes that keeps the legacy alive and until you can transition, the new end and the old, and sometimes they can work together. With that, I want to get your thoughts specifically around this idea of technical debt. A lot of customers we talked to said, "Hey, I want more end-to-end, I want some cloud native, I got to have the versatility, I got to have the agility and the speed, I got to be multi cloud. So multi cloud's on the horizon, it's certainly hybrids today. I don't want my infrastructure to be the technical debt for tomorrow." That's the question that comes up. How do you answer that, and how do you talk to that specifically? >> Yeah, it's interesting, you bring that up, especially in the storage side, too. We've been talking about that a lot. That was a pretty centralized message about how we architected power store, and it's pretty central to everything that we're designing. Is that, investment with our Dell EMC Infrastructure with Dell Technologies, is investing for what you need today, but more importantly, is going to bring you into the future. And what we have with PowerProtect Data Manager is something that is rooted in the innovation and the proven architecture to provide support for all these broad workloads and all of these broad clouds, but also also be able to protect these new modern cloud native applications, and help you bridge that gap in your own environment, so you have that. And even just as important as supporting modern applications is that support for multiple clouds, AWS and Azure. We all know that, that technical debt can also come in the form of being locked into a single public cloud, you need that flexibility to be able to leverage that public cloud of choice, whether it's for disaster recovery, backup to cloud, long term retention to cloud, having that flexibility is also just as an important part of that equation as it is for your on-prem investments as well. >> Well, congratulations on that data protection on the product front. Having the bright mix. Having that certainly is going to be key as the buying cycle start to ramp up again. I want to get back to the business 'cause I'll check on the technology. Congratulations, I love cloud native, you know that. But check on the technology business model. You mentioned subscriptions. So can you talk about the trend on your customer side, the move from CapEx and OpEx. Because if you go cloud, the consumption will be subscription, there'll be more operating expenses. How does that impact the IT budgets? How do you guys align there? What's your answer to that, can you explain? >> Yeah, absolutely. We announced, late last year, so in the fall of last year, Dell technology is on demand family, and that's really our effort to focus more on our cloud like experience and consumption and product offerings. And part of that is our subscription, pay as you go model. And what we've found, and I'd love your perspective on this as well, is that, the moving from CapEx and OpEx has been a conversation and certainly when it comes to infrastructure, there's been some set of customers over the past 12 months that have been moving in that direction. We're seeing that accelerate, certainly in the infrastructure space, but as we all know, software is where that's already pretty well established. As I think you've said, that's table stakes. So we've seen that that's really the methodology, both from our standpoint and our customers' and our partners' is, when we're selling software, that's got to be really honest subscription basis. So that's why obviously, with PowerProtect Data Manager, it makes all the sense in the world to really focus there. And that's really part of our bigger initiative overall, to move towards more of these consumption based as a service OpEx models for our customers. >> Yeah, I'm glad you brought that up I'd love to share my opinion, because I do have opinion on this. And one of the things that's coming out of some of the COVID interviews with the practitioners and the customers and the insiders is, it's a developer lead market. So cloud native, we've been talking about for years and it certainly happened. But as the pandemic has shown, people are going to be coming out of this. They have to have a growth strategy, they got to have the foundational product sets and technologies in place. But the customers, your customers, have to have a growth strategy. They got to refactor. They got to look at what they want to double down in, and kind on what they want to cut back. Some things are pretty obvious now, what not to do. So it's clear there's lines of sight around certain things, but it's developer led. The applications are going to drive value of the business, and so I'm seeing the alignment between that trend of developer led with a flex of consumption based resource. So yeah, you get the foundational services. And then hey, if the app successful, you're just still in business. I mean, people are really worried about, even, making sure they come out of this not on a downward trajectory. They want to be on an upward trajectory. That's a really key thing for 'em, your reaction. >> Yeah, I mean, that really resonates. I think it's and when we look at just to go back to the technology a little, 'cause, I never can resist, is if you look even just PowerProtect Data Manager, one of the things that's so important is that, we've have built that to be both controllable by the application and users so they can do their own protection, but then have that centralized view. And that being able to have that consolidated and centralized management of data from a single console for IT. And I think that gets to the now the next level with developers is, we need to enable developers as seamlessly as possible in their own language to be able to protect, to be able to store data, so IT can feel good about it. But we have to be able to enable them in the way that they are needing to develop these applications as quickly as possible, and from an IT perspective, that means being able to do that on-prem, or even do that in the cloud, so that we can keep all of those policies in place and keep that centralized governance, but really support the acceleration and the digital transformation that those folks are driving. So I think it makes a lot of sense and it really resonates with our product strategy. >> I think there's going to be a slew of new applications that are going to need to have all kinds of strategies built in countermeasures, recovery, all new things are going to emerge. So you guys certainly will be certainly more busy than ever. I want to get your product kind of view on something why I got you here, because I think this is kind of key. As you look at your portfolio, you mentioned the tech and the tech, all the features that you have, what are the few that resonate the most, it means classic product marketing, I mean, everyone wants to know, we've got all these features, which is great. Which ones do you say, Caitlin, are jumping out right now that are resonating the most? 'Cause sometimes it's a feature that might not be that heavy tech, or it's something that's really differentiated, but the customers will glob onto key features, what are some of the things that you're seeing that are rising to the top in terms of the feature set? >> Yeah, and it's not the speeds and feeds of yesterday. And I think this, more broadly across storage and data protection is what we're finding. The speeds and feeds are good, and some people do want to have that conversation. But we've gotten to a point from a technology from an industry standpoint, that we're able to meet latency, the bandwidth, the throughput that people need. But what's more interesting and is more compelling and important to the business is, how can you help me change the way I'm running my data center, and inter-operate with the cloud, and therefore change the way I'm running my business. And some of the pieces that come in there, is automation. I think automation within systems to systems across the enterprise, across edge and cloud, that is so incredibly critical. The AI that we're building into platforms, the integration with whether it's VMware based with VRO, whether it's Ansible modules, intelligence, and this idea of having an autonomous data center that then has that connectivity to cloud and inter-operate then also with the edge, is so incredibly compelling. And again, not just for the large enterprises, but more and more for smaller ones. Because in this world, we need to help our customers have their data center run itself as much as possible, and whatever does require administration is as simple as possible, right? We've all gotten used to technology being as simple as our smartphones, this consumerization of IT has really changed the requirement of what people think simple means. So the things that you don't necessarily think about, and we don't necessarily market even that actively about, how important the number of clicks and the user interface and the seamless transition to products, as well as automation, is so critical. And I think the other ones we've already hit on, integration with multiple public clouds, that flexibility, support for containers, and Kubernetes and deep VMware integration are increasingly critical. And I think, for someone who's been in product marketing for 15 years, I couldn't be happier that our conversations have kind of moved off of speeds and feeds and into these much more compelling and business centric conversation, because, I think we can add a lot more value to the business that way. >> It also shows the strategic nature, you mentioned edge, these new environments. It's a multi environment that you have to have build products for. So it's not so much, how fast packets are moving back and forth, or this or that. It's really about the business value. >> Yeah, it's about the business value, the locality, the value of the data, it's really all about the data and how we can help our customers better manage that across all locations. But do that in a very, very simple way. But the requirement for what simple really means, has really, really raised the bar on that, and we're going to continue to push ourselves and challenge ourselves on that as well. >> Caitlin, I'll give you the final word, talk about choice. Choice has always been a big part of what you guys have offered customers, Dell Technologies has great storage. In this day and age, what does that mean for a customer? What have the choice mean? >> Yeah, and I think it's a delicate balance. And we've gone through quite a transformation over the past couple years here. And this summer was an exciting one for many reasons, but, we just recently completed that full simplification of our portfolio and we have our full portfolio of power solutions, all the way from PowerMax to PowerVolt, PowerStore, PowerScale, PowerFlex, and of course, the one we talked about today, PowerProtect. We now have that all in market. And I bring that up because, that is our simple portfolio to give customers best in class products across all of these different categories. And the fact that we have that choice, but, we've simplified that choice down to as few choices as possible, coming back to what we were just talking about. It's critical that we have solutions that meet the requirements of all of our different customers, but also that we don't give them more than that. That we need to give them choices that will meet their needs, but also not give them so many choices, that it's overwhelming. You don't want to be the cheesecake factory and not be able to choose what you want, you need to just be able to choose from what the options that really makes sense. And that's why I think it's really exciting now as we move into the second half of this year and look into next, we have that portfolio now, and we can focus on, which is the right combination of solutions for you. >> During the pandemic, people are reading a book, doing a hobby, you guys are updating your product portfolio. Congratulations on all the hard work, Caitlin Gordon, Vice President of Product. Great to see you. Thank you for spending the time, giving us an update on the data protection stuff. And again, congratulations for being so productive during a tough time and stay safe, thank you. >> Thank you. Thanks for having me, good to see you. >> Okay, this is theCUBE coverage with Dell Technologies. Caitlin Gordon, Vice President of Product Marketing giving us the breakdown. Very productive for them during this time, and again, companies want a growth strategy when they come out of the pandemic. More than ever, infrastructure has to enable the software for the new solutions. Just to keep coverage, I'm John Furrier, thanks for watching. (upbeat music)
SUMMARY :
leaders all around the world, getting all the stories that matter. it's great to be here. So storage is on the upswing. been in the storage business I do in the past four months and the requirement to protect Kubernetes has been in the market for a full year. and you guys have been busy. and it started in the because one of the speed to recovery So it's really important the some of the things you guys saw are developed, that the containers Kubernetes that keeps the legacy alive and the proven architecture How does that impact the IT budgets? is that, the moving from CapEx and OpEx and so I'm seeing the or even do that in the cloud, that are resonating the most? Yeah, and it's not the It's really about the business value. it's really all about the data What have the choice mean? and of course, the one we talked Congratulations on all the Thanks for having me, good to see you. the software for the new solutions.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Caitlin Gordon | PERSON | 0.99+ |
Caitlin | PERSON | 0.99+ |
Dell Technologies | ORGANIZATION | 0.99+ |
John Furrier | PERSON | 0.99+ |
15 years | QUANTITY | 0.99+ |
Palo Alto | LOCATION | 0.99+ |
CapEx | ORGANIZATION | 0.99+ |
AWS | ORGANIZATION | 0.99+ |
OpEx | ORGANIZATION | 0.99+ |
July 2020 | DATE | 0.99+ |
amazon | ORGANIZATION | 0.99+ |
Dell | ORGANIZATION | 0.99+ |
late last year | DATE | 0.99+ |
Amazon | ORGANIZATION | 0.99+ |
Boston | LOCATION | 0.99+ |
a year ago | DATE | 0.99+ |
two things | QUANTITY | 0.99+ |
CUBE | ORGANIZATION | 0.99+ |
first | QUANTITY | 0.98+ |
tomorrow | DATE | 0.98+ |
theCUBE | ORGANIZATION | 0.98+ |
One | QUANTITY | 0.98+ |
Dell Technologies World | ORGANIZATION | 0.98+ |
PowerStore | ORGANIZATION | 0.98+ |
yesterday | DATE | 0.98+ |
two click | QUANTITY | 0.98+ |
both | QUANTITY | 0.98+ |
today | DATE | 0.97+ |
pandemic | EVENT | 0.97+ |
one | QUANTITY | 0.96+ |
PowerMax | ORGANIZATION | 0.94+ |
single | QUANTITY | 0.93+ |
PowerScale | ORGANIZATION | 0.93+ |
PowerFlex | ORGANIZATION | 0.93+ |
single console | QUANTITY | 0.93+ |
this summer | DATE | 0.92+ |
agile | TITLE | 0.92+ |
Azure | ORGANIZATION | 0.92+ |
Vice President | PERSON | 0.91+ |
PowerVolt | ORGANIZATION | 0.91+ |
PowerProtect | ORGANIZATION | 0.9+ |
this month | DATE | 0.9+ |
past four months | DATE | 0.9+ |
fall of last year | DATE | 0.88+ |
Kubernetes | TITLE | 0.83+ |
second half of this year | DATE | 0.83+ |
CUBE Conversation | EVENT | 0.83+ |
CR | ORGANIZATION | 0.82+ |
Vice President | PERSON | 0.8+ |
past few months | DATE | 0.8+ |
COVID | OTHER | 0.79+ |
Dell EMC Infrastructure | ORGANIZATION | 0.78+ |
past couple years | DATE | 0.78+ |
three click | QUANTITY | 0.77+ |
past 12 months | DATE | 0.77+ |
theCUBE Conversation | EVENT | 0.75+ |
first place | QUANTITY | 0.72+ |
past two months | DATE | 0.72+ |
SAP | ORGANIZATION | 0.69+ |
PowerProtect Data Manager | COMMERCIAL_ITEM | 0.67+ |
a full year | QUANTITY | 0.66+ |
past two years | DATE | 0.64+ |