Fortinet Security Summit Wrap | Fortinet Security Summit 2021
>>From around the globe. It's the cube covering Fortinet security summit brought to you by Fortinet. >>Welcome back to the cubes coverage of 40 net championship security summit from beautiful Napa valley. Lisa Martin here with John farrier, John, and has been phenomenal to do an event in person outdoors and Napa valley. >>You're so bright. We have to wear shades. It's been sunny and it's been hot. It's been great. It's been a great, it's been a great day. I mean, I think Fordanet stepping up to that sponsorship for the PGA is a bold move they're doing well on the business front. They're expanding it. It's good for their customers. It's a new, bold marketing step. Affordanet honestly, they're doing extremely well on the business front. As I mentioned, they got a lot of cash coming in. They got happy customers and they're all here. And golf is a great environment for tech buyers. We know that. So it's great to have the cube on the sports circuit and, uh, we'll be doing more of them. It's it's awesome. >>Good. I, it is great to be on this sport circuit. One of the things that I talked with several folks about today, John Madison being one that CEO, CFO, COO, and then Kenzie, the CEO of Fordanet about the cultural synergies between the PGA and Ford nine. It was really nice to hear how both of these companies, both of these organizations are so invested in things like women in technology and steam and stem programs, and they really align on those two cultures. >>Yeah, there's a, it's a, it's a, it's a culture fit. I mean, they basically, it's a winning formula. Look at Ford and net. Um, you know, and having that kind of representation is good. They, they have a great reputation put in. It does PGA does as well and it's quality, right? So people like, like quality and they want to line that. So it's a great business move for Fordanet to, uh, to do the, uh, the golf sponsorship, uh, multiple years. I think it's six years, five or six years, they get they're doing this. Um, it's phenomenal. I think they're going to Fortnite is going to turn into a marketing powerhouse. I think you're going to start to see John Madison and the team, uh, really gin up some nice new things, because you can do a lot with the PGA. Again, this foundations is charities, again, a lot of causes that are involved in, in fundraising around the PGA and you got the tour players and honestly the tech scene. So I think tech and sports has always been something that I've loved. And I think, you know, we'd love to come and bring our sets here and having the cube here is just a really fun kind of winning formula as well. We'd love it. And we, and we wish we could eat it for more days this year. I think we will, but this has been so much, >>It has been so much fun. There's been about over 300 customers and partners here. Fortnite is a, is a hundred percent partner driven organization. Lot of innovation being discussed the last eight hours or so, but one of the things that you definitely feel is the strength in their partner, community and Fortinets commitment to it. Also something that really impresses me is their commitment to helping to fill the cybersecurity skills gap. This is a gap that has been growing for the last five years. They last week announced a pledge to train 1 million people in the next five years to help shorten that gap. And as we know that the threat landscape is only continuing to expand. So the great combination there, >>And it's a, cause that's a good business logic behind it because there's a of negative unemployment. They need more people to do cybersecurity careers, but also you mentioned women in tech, you know, a lot of that's a big movement too. You start to see a much more women in tech scene here. We had, uh, Merritt bear on principal office of the CSO at Amazon web services on she's amazing. She's wearing the Amazon Krypto shirts. That was a home run, love that interview, but you started to see them afford a net with the whole scene. Here is they're taking their message directly to their customers and they're including their customers. So the magic of this formula that they have with the PGA and this whole program is they don't have live concert series. They got a pavilion here with all their top partners, with customers that doing a summit behind us with their top marquee customers. And they're telling the story direct and you're going, I think you need to shift to see Fordanet really do more of that. What we love in the key, which is take that direct to, to media model, to their customers and contents data. We had great conversations here. I mean, that's all you, you know, viewing the, uh, head VP SVP of at and T cybersecurity, uh, amazing, uh, uh, candidate there's great cube guests. And he was just traveling some serious wisdom. So great guests all along. Fantastic. >>Well, it's, it's been an inspiring day. It's nice that 40 minute has taken the step to do an in-person event. Obviously they did it extremely safely. We were outdoors, but people are, I think a lot of people and I'm speaking for myself, for sure, ready for this to come back and meet the threat landscape that changes that that 40 net has seen in the last 18 months are phenomenal. The growth in ransomware, nearly 11 X in a year. And you had this massive shift to work from home. And now they're talking about how they're partnering with links us, for example, to help enterprises, to really make that remote work environment far more secure, faster, and optimize for the worker. Who's on video conferencing, communication tools. All the kids at home gaming are probably going to be pretty bummed about this, but it really shows coordinates commitment to this. There's a lot of permanence to what we're seeing here in this model. >>I know you and I have done ton of interviews together and, uh, with great guests around cybersecurity and the phrase always comes up and over the past decade, there's there is no more perimeter here. You couldn't, you couldn't, it was louder than ever here because now you have so much going on connected devices. The future of work is at home with the virtual, uh, issues with the pandemic. And now with the Delta variant, uh, continuing at forward, it's a reality, we're in a hybrid world and, um, everything's going hybrid. And I think that's a new thing for companies to operationalize. So they got, there's no playbook. So there is a security playbook. And what these guys are doing is building an ecosystem to build product that people can wrap services around and to solve the key security problems. And that's that, that to me is a good business model. And the SAS is, again, you're seeing everyone go SAS. They want to go SAS product, or, you know, uh, some sort of business models involved in cloud. So cloud security, SAS all kind of rolled up. It's really kinda interesting trend. >>Yeah. We've talked about a whole bunch of trends today. One of them is just one of the marketing terms I've been using and I don't like to use it, but around for years as a future ready people, tech companies always describing solutions and technologies and products is future ready? Well, what does that really mean? Well, when the pandemic struck, none of us were future ready, but what we did hear and see and feel today from 40 net and their partners is how much acceleration they've done. So that going forward, we are going to be future ready for situations that arise like in this challenging cybersecurity landscape that businesses in every industry can prepare for. >>I think, I think the talks here in the cyber security summit behind us, it's interesting. Uh, Tufin one of their customers on a lot of the talks were the same thing, talking about the cultural shift, the cultural shift and security departments has to become more agile. And so that is a big untold story right now is that security departments. Aren't well-liked, they slow things down. I mean, you know, app review everything's gotta be looked at and it takes weeks. That is not good for developers. So app developers in the cloud, they want minutes, you know, shift left is something that we talk about all the time in our events with the developers dev ops movement is putting pressure on the security teams, culturally, who moves first. You don't go faster. You're going to be replaced, but you can't replace a security team. So I find that whole security cloud team dynamic, real organizational challenges. That's something I'm going to look into is one of my key takeaways from this this week. Yeah. >>A huge organizational change. And with that comes, you know, obviously different cultures with these organizations, but at the same time, there really is no more choice. They have to be working together. And as Kenzie and I were talking about, you know, security is no longer an ITP, this is a board level initiative and discussion businesses in every industry, whether it's a retailer or PGA tour have to be prepared. >>Yeah. I mean, I'm a security Hawk. I think every company needs to be prepared to take an offensive strike and be ready on the defense. And this is a huge agility and speed cause ransomware, you get taken down, you know, I mean that's business critical issue. You're dead, you're dead in the water. So, so again, this is all part of his quote digital transformation, uh, that everyone's talking about and is a do over, everyone's doing it over and doing it with the cloud. And I remember just recently in 2012, people were saying, oh, the cloud is not secure. It's now some more secure than anything else. So we starting to see that shift so that realities hit everybody. So it's been great. >>What are some of the things that excited you about the conversations that you had today? >>I was pretty impressed by the fact that one was a physical advantage. You mentioned. So, you know, people in personal, I found it refreshing. I think people here, I noticed we're one relieved to be out and about in public and talking on the cube. Um, but I was really impressed with, uh, the guests from Amazon web services. She was a crypto shirt that got me there. But I think this idea that security is not just a guy thing, right? So to me, women in tech was a, was a big conversation. I thought it was very positive this week, um, here and still a lot more work to do, but I think that's, what's cool. And just the talks were great. I mean, it's cutting edge concepts here. And I thought at, and T was great. I thought, uh, Tufin was a great conversation and again, all the guests that were awesome. So what did you think, what was your take? >>Just how much acceleration we've seen in the last year on innovation and partnerships that really jumped out that when, like I said, we talked about future ready and go, wow. So much of the world wasn't future ready a year and a half ago when this came out and all of the innovation and the positivities that have come out of technology companies creating, because we don't have a choice. We have to figure out secure work from home. For example, we know that some amount of it's going to persist hybrid maybe here to stay, to see what 40 net and their partner ecosystem have done in a short time period. Given the fact that you mentioned ransomware and their global threat landscape, I was talking with Derek, nearly X increased in ransomware and just, >>And they've got four to guard. They got all this. I think your interview with Ken, the CEO, I thought it was really compelling. It was one point he said, um, we're making a lot more investments when you asked him a pointed question. And I think that theme comes across really strong in all of our interviews today. And the conversations in the hallway here is that people that are making the investments are doing well. And so there's more investments being made and that's like, people kind of say, oh yeah, we can do this one, but you have to now. And so the other thing that I thought was awesome with John Madison, talking about their strategy around the PGA, it's a bold move, but it's kind of got this mindset of always innovating, but they're not, they go step at a time, so they get better. So I'm, I'm expecting next year to be better than this year, bigger, uh, and more integrated because that's what they do. They make things better. Um, I think that's gonna be fun to watch, but I think that's a bold move for Affordanet to be doing this kind of marketing. It's really, they haven't done that in the, in the past. So I think this is a really bold move. >>I agree. And they've spun this out of their accelerate event, which is an event that we've covered for years in person. So this was the first time that they've pulled the security summit out as its own event. And clearly there was a great buzz behind us all day. Lots of, lots of topics, a lot of discussions, a lot of partnership. And you're right. A lot of talk about investment investment in their partner ecosystem and investment internally. Yes. >>It's fun too. On a personal note, we've been following Fordanet for many, many years. You and I both got doing the interviews and you do and go to the events is watching them grow and be successful. And it's kind of proud though. I, yeah, I'll go for it. And that kind of rooting for him. And I want to thank them for inviting the cube here because we're so psyched to be here and be part of this awesome event. And again, golf, the cube kind of go together, right? Sports, the cubes. We love it. So always fun. So thanks to, for, to net out there for, uh, supporting us and being, being part of the cube. >>Well, you got the gear, you got your Fordanet Gulf t-shirt I got one too. And pink. It's beautiful. Yeah. You got some shades, but we also have some gear here help us in the morning for our next shows. Be caffeinated. Yeah. But no, it's been great. It's been great to be here. Great to hook co-host with you again in person if for 20 months or so, and looking forward to seeing how 49 and how back >>He was back up the vents. Thanks to the crew. Chuck Leonard, every one's era, Brendan. Right. Well done. Fordanet thank you. Thank you for >>John's been great. Thanks for having me up here today. Looking forward to the next time from Napa valley, Lisa Martin, for John farrier, you've been watching the cube
SUMMARY :
security summit brought to you by Fortinet. Welcome back to the cubes coverage of 40 net championship security summit from beautiful Napa valley. So it's great to have the cube on the sports circuit and, uh, One of the things that I talked with several folks about And I think, you know, we'd love to come and bring our sets here and having the cube here is just a last eight hours or so, but one of the things that you definitely feel is the strength They need more people to do cybersecurity careers, but also you mentioned women in tech, you know, It's nice that 40 minute has taken the step to do an in-person event. And I think that's a new thing for companies So that going forward, we are going to be future ready for situations You're going to be replaced, but you can't replace a security team. And with that comes, you know, obviously different cultures I think every company needs to be prepared to take an offensive strike and be ready on the defense. And I thought at, and T was great. So much of the world wasn't future ready a year and a half ago when this came out and I think that's gonna be fun to watch, but I think that's a bold move for Affordanet to be doing this kind of marketing. And clearly there was a great buzz behind us all day. And I want to thank them for inviting the cube here because we're Great to hook co-host with you again in person Thanks to the crew. Looking forward to the next time from Napa
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Lisa Martin | PERSON | 0.99+ |
Ken | PERSON | 0.99+ |
John Madison | PERSON | 0.99+ |
2012 | DATE | 0.99+ |
Chuck Leonard | PERSON | 0.99+ |
Kenzie | PERSON | 0.99+ |
Amazon | ORGANIZATION | 0.99+ |
20 months | QUANTITY | 0.99+ |
Brendan | PERSON | 0.99+ |
John | PERSON | 0.99+ |
PGA | ORGANIZATION | 0.99+ |
Napa valley | LOCATION | 0.99+ |
John farrier | PERSON | 0.99+ |
five | QUANTITY | 0.99+ |
Ford | ORGANIZATION | 0.99+ |
six years | QUANTITY | 0.99+ |
40 minute | QUANTITY | 0.99+ |
next year | DATE | 0.99+ |
Napa valley | LOCATION | 0.99+ |
Derek | PERSON | 0.99+ |
Tufin | PERSON | 0.99+ |
today | DATE | 0.99+ |
last week | DATE | 0.99+ |
both | QUANTITY | 0.99+ |
1 million people | QUANTITY | 0.99+ |
Fordanet | ORGANIZATION | 0.99+ |
One | QUANTITY | 0.99+ |
one | QUANTITY | 0.99+ |
one point | QUANTITY | 0.99+ |
Fortnite | ORGANIZATION | 0.99+ |
Fortinet Security Summit | EVENT | 0.99+ |
a year and a half ago | DATE | 0.99+ |
hundred percent | QUANTITY | 0.98+ |
two cultures | QUANTITY | 0.98+ |
over 300 customers | QUANTITY | 0.98+ |
last year | DATE | 0.98+ |
this year | DATE | 0.98+ |
Delta variant | OTHER | 0.98+ |
first time | QUANTITY | 0.98+ |
this year | DATE | 0.98+ |
this week | DATE | 0.97+ |
Fortinet | ORGANIZATION | 0.97+ |
Ford nine | ORGANIZATION | 0.97+ |
Fortinet Security Summit 2021 | EVENT | 0.96+ |
pandemic | EVENT | 0.95+ |
about | QUANTITY | 0.94+ |
Fordanet | PERSON | 0.93+ |
Fortinets | ORGANIZATION | 0.93+ |
Merritt | PERSON | 0.91+ |
nearly 11 X | QUANTITY | 0.9+ |
four | QUANTITY | 0.89+ |
40 net | QUANTITY | 0.88+ |
a year | QUANTITY | 0.88+ |
Affordanet | PERSON | 0.86+ |
Fordanet | TITLE | 0.86+ |
CSO | ORGANIZATION | 0.86+ |
Fortinet security summit | EVENT | 0.84+ |
first | QUANTITY | 0.8+ |
ton of interviews | QUANTITY | 0.79+ |
last 18 months | DATE | 0.78+ |
last five years | DATE | 0.78+ |
SAS | ORGANIZATION | 0.76+ |
next five years | DATE | 0.72+ |
49 | QUANTITY | 0.71+ |
past decade | DATE | 0.7+ |
Ken Xie, Fortinet | Fortinet Security Summit 2021
>>from around the globe. >>It's the cube >>covering fortunate security summit brought to you by ford in it. >>Welcome back to the cubes coverage, affording that security summit at the ford championship here in napa. I'm lisa martin and I'm very pleased to welcome back to the cube kenzi founder and chairman and ceo affording that, ken. Welcome back to the program. >>Thank you is uh, we're happy to be here after almost two years and uh, >>I know it's great to see you in person. I was saying before we went live, I forgot how tall you are. So this is a great event. But I want you to talk to me a little bit about some of the amazing growth. The Fortinet has seen 500,000 customers close to 30% year on year growth continuing to post solid earnings stock is more than double this year. What are some of the things that you attribute this group to and what do you think in your opinion differentiates format? >>I think some of the more strategic long term investment we made started paying off like uh, we're still the only company actually develop basic chip which can making a huge computing power advantage compared to using software to all the security function computing Because security tend to need about like 1300 times more company in power to process the same data as a routing switching. So that's where for the network security definitely a chap, a huge advantage And we invested very early and take a long term and also a big investment and so far started paying off the other thing we also keeping a lot of innovation and the internal organic growth for the company instead of do a lot of acquisition and that's also started making all these different products integrate well ultimately to get well. And that's also driving a huge growth, not just that was security, but also we see the fabric also has global fast, >>interesting. So you're really keeping it organic, which is not common a lot of these days we see a lot of acquisitions, but one of the things, a lot of growth, another thing that we do know that's growing is the threat landscape I was mentioning before we went live that I spoke with Derek Manky a couple times this summer and John Madison and the global threat landscape report showing ransomware up nearly 11 times in the last year. Of course we had this rapid transition to work from home and all these devices on accessing corporate networks from home. Talk to me about some of the security challenges that you're helping customers deal with. >>I think during the pandemic, definitely you see a lot of security issues that come up because work from home with your remote access a lot of important information, a lot of important data there At the same time. The ransomware attacks studying like a mentioning 11 times compared to like one or two years ago all this driving all there's a new technology for security. So now you cannot just secure the board anymore. So you have a secure the whole infrastructure. Both internal to a lot of internal segmentation And also go outside security when like I see when the 5G. Connection and how to secure work from home and they trust their trust access environment all these drive a lot of security growth. So we see the yeah it's a it's a pretty healthy market >>it's definitely a healthy market that's one thing looking at it from that lens. What are some of the customer conversation? How have the customer conversations changed? Are you now talking with different levels and organizations security Being a board level conversation discussion and talk to me about how those conversations have evolved. >>Security now become very important part of I. T. And uh pretty much all top one top two on the 80 spending now and the same time what to work from home or some other uh definitely seeing the board level conversation right now because you can see if there's a security issue for the company the damage could be huge. Right? So that's where the secure awareness especially ransomware is very very huge And plus the supply chain issues some other attack on the infrastructure. So we see a lot of security conversation in the bowl level in the Ceo in the in the executive level now compared to before more I. T. Conversation. So it's to drive the huge awareness of security and that's also we see everybody citing concerns security now. >>But I'm sure I imagine that's across every industry. Yes. >>Yeah pretty much all the vertical right? And especially a lot of new area traditionally they don't have much security like some smb some consumer some traditional Ot IOT space now it's all security studying that very important for them now. >>So let's talk about, here we are. The security summit at the fortunate championship. Give me your perspective on the P. G. A. Ford in that relationship. >>Uh first I think it's a golf is also event sports especially during the epidemic that's probably become the most favorite spot. And for me also I'm a golfer for 30 years. Never market golfer but I love the sport on the other side we see sometimes it's uh working with a lot of a customer a lot of a partner they behave if we can combine some business and there was certain like activity especially outdoor that's also be great. And also helping Brandon and that's another way we can contribute back to the community. So they say hey then then that's that's the first time for us. We just love it gets going. >>It's great to be outdoors right at 40 minutes doing an event outdoors showing that yes you can do that safely. But also I also hear from some of your other team members that it's a very culturally synergistic relationship. The pgn format. >>Yes. Exactly. Yeah that's where we love this golf and especially working with a different partner and different partner and also all the team working together. So it's a team sport kind of on the other side it's all do and enjoy a combined working uh activity altogether. Everybody love it. >>Something that so many of us have missed Ken for the last 18 months or so. So we're at the security summit, there's over 300 technology leaders here. Talk to me about some of the main innovations that are being discussed. >>Uh definitely see security starting uh little covered whole infrastructure and uh especially in a lot of environment. Traditionally no security cannot be deployed like internal segmentation because internal network can be 10, 200 faster than the one connection. So it has to be deployed in the in the internal high speed environment whether inside the company or kind of inside the data center, inside the cloud on the other side, like a lot of one connection traditionally like whether they see one or the traditional like cuba more than the S E O. They also need to be combined with security and also in the zero trust access environment to really supporting work from home and also a lot of ot operation technology and a lot of other IOT space utility. All these different kind of like environment need to be supported, sometimes recognized environment. So we see security studying deport everywhere whether the new small city or the like connected car environment and we just see become more and more important. That's also kind of we studying what we call in a secure driven networking because traditionally you can see today's networking just give you the connectivity and speed so they treat everything kind of uh no difference but with security driven network and you can make in the networking decision move based on the security function, like a different application or different content, different user, different device, even different location, you can make a different kind of level decision so that we see is a huge demand right now can make the whole environment, whole infrastructure much secure. >>That's absolutely critical that pivot to work from home was pretty much overnight a year and a half ago and we still have so many people who are permanently remote, remote but probably will be permanently and a good amount will be hybrid in the future, some TBD amount. Uh and one of the challenges is of course you've got people suddenly from home you've got a pandemic. So you've got an emotional situation, you've got people multitasking, they've got kids at home trying to learn maybe spouses working, they're trying to do Everything by a video conferencing and collaboration tools and the security risks. There are huge and we've seen some of that obviously reflected in the nearly 11 x increase in ransomware but talk to me about what 14 announced yesterday with links is to help on that front in a considerable way. >>That's where we totally agree with you the work from home or kind of hybrid way to work in. Pretty much will become permanent. And that's where how to make a home environment more kind of supporting is a remote working especially like when you have a meeting, there are some other things going on in the whole activity and also sometimes data you access can be pretty important, pretty confidential. That's where whether in the zero trust environment or making the home connection more reliable, more secure. It's all very, very important for us. Uh, that's where we were happy to partner with Lynxes and some other partner here uh, to support in this hybrid working environment to make work from home more secure. And uh, as we see is a huge opportunity, >>huge opportunity and a lot of industries, I had the pleasure of talking with links to Ceo Harry do is just an hour or so ago and I asked him what are some of the vertical, since we know from a security and a ransomware perspective, it's just wide open. Right, Nobody's safe anymore from it. But what are some of the verticals that you think are going to be early adopters of this technology, government health care schools, >>I think pretty much all vertical start and see this work from home and it's very, very important for us. There's a few top vertical, traditionally finance service, uh, spend a lot of money healthcare, spend a lot of money on security. So they are still the same? We don't see that change March on the other side. A lot of high tech company, which also one of the big vertical for us now, I say maybe half or even more than half the employee they want to work for home. So that's also making they say uh they call home branch now, so it's just make home always just secure and reliable as a branch office and at the same time of Southern government and the sort of education vertical and they all started C is very, very important to do this, remote their trust access approach and the same time working with a lot of service providers to supporting this, both the D. N. A. And also the sassy approach. So we are only companies on the saturday company partner, a lot of IT service provider. We do believe long term of the service provider, they have the best location, best infrastructure, best team to supporting Sassy, which we also build ourselves. If customers don't have a service provider, we're happy to supporting them. But if they have a service provider, we also prefer, they go to service provider to supporting them because we also want to have a better ecosystem and making everybody like uh benefit has women's situation. So that's what we see is whether they trust no access or sassy. Very happy to work with all the partners to making everybody successful. >>And where our customers in that evolution from traditional VPN to Z T and a for example, are you seeing an acceleration of that given where we are in this interesting climate >>uh definitely because work from home is uh if you try to access use VPN, you basically open up all the network to the home environment which sometimes not quite secure, not very reliable. Right? So that's where using a Z T N A, you can access a certain application in a certain like environment there. And the same leverage ste when there's other huge technology advantage can lower the cost of the multiple link and balance among different costs, different connection and uh different reliability there. Uh it's a huge advantage, >>definitely one of the many advantages that reporting it has. So this afternoon there's going to be a, as part of the security summit, a panel that you and several other Fortinet execs are on taking part in A Q and a, what are some of the topics that you think are going to come up? And as part of that Q and >>A. I see for certain enterprise customer, definitely the ransomware attack, how to do the internal segmentation, how to securely do the remote access work from home. So we are very important For some service provider. We also see how to supporting them for the sassy environment and certain whole infrastructure security, whether the 5G or the SD went because everyone has a huge demand and uh it's a group over for us, we become a leader in the space. It's very very important for them. We also see uh like a different vertical space, Some come from healthcare, some from come from education. Uh they all have their own kind of challenge. Especially like there's a lot of uh oh T IOT device in healthcare space need to be secured and the same thing for the O. T. IOT space, >>Tremendous amount of opportunity. One thing I want to ask it, get your opinion on is the cybersecurity skills gap. It's been growing year, over year for the last five years. I know that just last week 14 that pledge to train one million professionals in the next five years, you guys have been focused on this for a while. I love that you have a veterans program. I'm the daughter of a Vietnam combat veterans. So that always warms my heart. But is that something, is the cybersecurity skills got something that customers ask you ken? How do you recommend? We saw this? >>Yes, we have been doing this for over 10 years. We have the program, we call the network secured expert program a different level. So we have 24 million people. We also commit a traditional million people because there's a huge shortage of the scale separate security expert there. So we do work in with over like a 4500 university globally at the same time. We also want to offer the free training to all the people interested, especially all the veterans and other Like even high school graduate high school student there and at the same time anyone want to learn several security. We feel that that's, that's very good space, very exciting space and very fast-growing space also still have a huge shortage globally. There's a 3-4 million shortage of skilled people in the space, which is a or fast growing space. And so we were happy to support all the train education with different partners at the same time, try to contribute ourselves. >>I think that's fantastic. Will be excited to see over the next five years that impact on that training one million. And also to see it to your point with how much the industry is changing, how much, how fast supporting that's growing. There's a lot of job opportunity out there. I think it was Sandra who said that I was talking to her this morning that there's no job security like cybersecurity. It's really true. If you think about it. >>Yeah, I totally agree. Yeah. Like remember a few years ago when we started the first time to do all this interview, I said, hey, it's a barber hot space now, let's get harder and harder, more people interested now. And I really thank you cube and you give all the support it all these years and we're happy to be here. >>Absolutely. It's our pleasure. Well, I know you are paired up. You said tomorrow with Phil Mickelson for the pro am. That's pretty exciting, ken. >>I'm not sure I'm a very good golfer, but I will try my best. >>You try your best. I'm sure it will be a fantastic experience. Thank you for having the cube here for bringing people back together for this event, showing that we can do this, we can do this safely and securely. And also what Fortinet is doing to really help address that cyber security skills gap and uh, really make us more aware of the threats and the landscape and how we, as individuals and enterprises can help sort to quiet that storm >>also will be happy to be here and also being honored to be part of the program at the same time. We also want to thank you a lot of partner model customer and join us together for this big PJ event and thank you for everyone. >>Absolutely. And you guys are a big partner driven organization. I'm sure the partners appreciate that, ken, Thank you so much. >>Thank you. Thank you lisa >>for kenzi. I'm lisa martin. You're watching the cue from the Fortinet security summit in napa valley. >>Yeah. Mhm
SUMMARY :
Welcome back to the cubes coverage, affording that security summit at the ford championship here in napa. What are some of the things that you attribute this group to and what do you think in your opinion differentiates format? And that's also driving a huge growth, not just that was security, but also we see the fabric a lot of acquisitions, but one of the things, a lot of growth, another thing that we do know that's growing is So you have a secure the whole infrastructure. What are some of the customer conversation? the executive level now compared to before more I. T. Conversation. But I'm sure I imagine that's across every industry. Yeah pretty much all the vertical right? So let's talk about, here we are. on the other side we see sometimes it's uh working with a lot of a It's great to be outdoors right at 40 minutes doing an event outdoors showing that yes you can do that safely. So it's a team sport kind of on the other side it's all do and Talk to me about some of the main innovations that are being discussed. So it has to be deployed in the That's absolutely critical that pivot to work from home was pretty much overnight a year and a half ago and we still That's where we totally agree with you the work from home or kind of hybrid way huge opportunity and a lot of industries, I had the pleasure of talking with links to Ceo Harry do is just I say maybe half or even more than half the employee they want to work for home. So that's where using a Z T N A, you can access a certain a, as part of the security summit, a panel that you and several other Fortinet execs are on We also see how to supporting them for the sassy environment and certain is the cybersecurity skills got something that customers ask you ken? So we do work in with over like a 4500 And also to see it to your point with how much the industry is changing, And I really thank you cube and you give for the pro am. and the landscape and how we, as individuals and enterprises can help sort to quiet that storm We also want to thank you a lot of partner model customer and join us And you guys are a big partner driven organization. Thank you lisa I'm lisa martin.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Sandra | PERSON | 0.99+ |
40 minutes | QUANTITY | 0.99+ |
30 years | QUANTITY | 0.99+ |
Derek Manky | PERSON | 0.99+ |
lisa martin | PERSON | 0.99+ |
one million | QUANTITY | 0.99+ |
500,000 customers | QUANTITY | 0.99+ |
11 times | QUANTITY | 0.99+ |
yesterday | DATE | 0.99+ |
tomorrow | DATE | 0.99+ |
Phil Mickelson | PERSON | 0.99+ |
10, 200 | QUANTITY | 0.99+ |
John Madison | PERSON | 0.99+ |
Lynxes | ORGANIZATION | 0.99+ |
kenzi | PERSON | 0.99+ |
Ken Xie | PERSON | 0.99+ |
Brandon | PERSON | 0.99+ |
24 million people | QUANTITY | 0.99+ |
last year | DATE | 0.99+ |
Fortinet | ORGANIZATION | 0.99+ |
half | QUANTITY | 0.99+ |
napa valley | LOCATION | 0.99+ |
lisa | PERSON | 0.99+ |
over 10 years | QUANTITY | 0.99+ |
last week 14 | DATE | 0.99+ |
first time | QUANTITY | 0.99+ |
over 300 technology leaders | QUANTITY | 0.98+ |
million people | QUANTITY | 0.98+ |
ken | PERSON | 0.98+ |
30% | QUANTITY | 0.98+ |
Sassy | ORGANIZATION | 0.98+ |
D. N. A. | LOCATION | 0.98+ |
saturday | DATE | 0.97+ |
3-4 million | QUANTITY | 0.97+ |
one million professionals | QUANTITY | 0.97+ |
this year | DATE | 0.97+ |
one | QUANTITY | 0.96+ |
today | DATE | 0.96+ |
a year and a half ago | DATE | 0.96+ |
napa | LOCATION | 0.96+ |
more than half | QUANTITY | 0.96+ |
Both | QUANTITY | 0.96+ |
both | QUANTITY | 0.95+ |
this summer | DATE | 0.95+ |
two years ago | DATE | 0.94+ |
One | QUANTITY | 0.93+ |
one | DATE | 0.93+ |
one connection | QUANTITY | 0.93+ |
zero trust | QUANTITY | 0.92+ |
few years ago | DATE | 0.92+ |
pandemic | EVENT | 0.92+ |
80 | QUANTITY | 0.92+ |
4500 university | QUANTITY | 0.92+ |
this afternoon | DATE | 0.92+ |
ford | EVENT | 0.91+ |
more than double | QUANTITY | 0.91+ |
1300 times | QUANTITY | 0.9+ |
first | QUANTITY | 0.9+ |
Vietnam | LOCATION | 0.89+ |
Fortinet Security Summit 2021 | EVENT | 0.89+ |
this morning | DATE | 0.89+ |
nearly 11 times | QUANTITY | 0.87+ |
couple times | QUANTITY | 0.87+ |
one thing | QUANTITY | 0.87+ |
top one | QUANTITY | 0.86+ |
last 18 months | DATE | 0.85+ |
rogram | PERSON | 0.85+ |
last five years | DATE | 0.84+ |
Southern government | ORGANIZATION | 0.84+ |
ford | ORGANIZATION | 0.84+ |
Fortinet security summit | EVENT | 0.84+ |
top two | QUANTITY | 0.78+ |
an hour or | DATE | 0.76+ |
Ken | PERSON | 0.76+ |
nearly 11 x | QUANTITY | 0.76+ |
PJ | EVENT | 0.74+ |
zero | QUANTITY | 0.73+ |
5G | ORGANIZATION | 0.72+ |
Ceo Harry | ORGANIZATION | 0.72+ |
P. | ORGANIZATION | 0.71+ |
about | QUANTITY | 0.71+ |
March | DATE | 0.7+ |
almost two years | QUANTITY | 0.68+ |
cuba | LOCATION | 0.68+ |
five | DATE | 0.66+ |
next five years | DATE | 0.6+ |
years | QUANTITY | 0.58+ |
employee | QUANTITY | 0.57+ |
John Maddison, Fortinet | Fortinet Security Summit 21
>> Narrator: From around the globe, it's theCUBE, covering Fortinet Security Summit, brought to you by Fortinet. >> Welcome back to theCUBE, Lisa Martin here live in Napa Valley at the Fortinet Championship. This is the site of kickoff to the 2021-22 FedEx Cup regular series. We're here with Fortinet and we're here with one of our distinguished alumni, John Madison, the CMO and EVP of products. John, it's great to see you in person. >> Yes, Lisa it's been a while. >> It has been a while. >> Good to be back here, live. >> I know, you're not on Zoom, you're actually right six feet across from me. >> Yep, look, yes, it's definitely physical. >> It does, talk to me about the PGA and Fortinet. What are some of the synergies? >> There's a lot. I think one of the biggest ones is the culture of the two companies. So I mean, PGA tour, I think they've donated almost $3 billion to charities over the last 15 years, 20 years and we're the same. We would definitely want to give back to the community. We want to make sure we're providing training and education. We're trying to re-skill some of the veterans, for example, over 2000, also women in technology, you may have heard one of the key notes today about that, attempts from a education and training perspective. So there's a lot of synergies between the PGA Tour, and Fortinet from a cultural perspective. >> I love that. Cultural synergy is so important but also some of the initiatives, women in tech, STEM, STEAM, those are fantastic. Give our audience a little overview of what's going on here. We've got over 300 partners and customers here. What are some of the key themes being discussed today? >> Yeah, we're going to try and keep it smaller, this event. We don't want 10,000, 20,000 people. We'll keep it smaller. So about 300 customers and partners, and what we want to do is bring together, you know, the top people in cybersecurity and networking, we want to bring in customers so they can net with each other, we want to bring the partners here. And so, what you're going to see is you can see the tech expo behind you there, where people are talking technology. Some of the keynotes focus on areas like ransomware, for example, and cyber security in different industries. So definitely it's a smaller gathering, but I think it's very focused on cybersecurity and networking. >> Well, that's such an important topic these days. You know, you and I have spoken a number of times this summer by Zoom, and talking about the threat landscape and the changes-- >> Yep. >> And the work from anywhere. When you and I spoke, I think it was in June, you said 25% we expect are going to go back to the office, 25% permanently remote and the other 50 sort of transient. Do you still think given where we are now in September that that's still-- >> Yeah, I'm going to modify my prediction a bit, I think it's going to be hybrid for some time. And I don't think it's just at home or not at home or at work or not at work, I think it's going to be maybe one or two days, or maybe three days versus five days. And so, we definitely see the hybrid mode of about 50% for the next couple of years at least. I think that, you know, ransomware has been in the news a lot. You saw the Colonial, the ransomware has increased. We did a threat report recently. Showed about a 10X increase in ransomware. So, I think customers are very aware of the cybersecurity threats. The damage now is not just sucking information out and IP, it's causing damage to the infrastructure. So definitely the, you know, the attack surface is increased with people working from home, versus in the office, and then you've got the threat landscape, really, really focused on that ransomware piece. >> Yeah, ransomware becoming a household word, I'm pretty sure even my mom knows what that is. And talking about the nearly 11X increase in, what was that, the first half of 2021? >> Yeah, over the last 12 months. And I think what's also happened is ransomware used to be a broad attack. So let me send out, and see if I can find a thousand companies. Again, you saw with the Colonial attack, it's very targeted now as well. So you've got both targeted and broad ransomware campaigns going on. And a lot of companies are just rethinking their cybersecurity strategy to defend against that. And that work from home component is another attack surface. So a lot of companies that were operational technology companies that had air gaps and people would come to work, now that you can remotely get into the network, it's again, you can attack people at home, back into the network. >> Is that a direct correlation that you've saw in the last year, in terms of that increase in ransomware and this sudden shift to working from home? >> Well, I also think there's other components. And so, I think the ransomware organizations, the gangs, could use crypto more reasonably than checks and dollars and stuff like that. So they could get their money out. It became very profitable versus trying to sell credit card data on the dark web. So you saw that component. You also saw, as I said, the attack surface be larger for companies, and so those two things unfortunately have come together, and you know, really seen an exponential rise in attacks. >> Perfect storm. Let's talk about some of your customer conversations and how they've changed and evolved in the last 18 months. Give me a snapshot of when you're talking with customers, what are some of the things that they're coming to you for help, looking for the most guidance? >> Yeah, well I think, you know, the digital innovation transformation is almost accelerated because of, you know, COVID. They've accelerated those programs, especially in industries like retail, where it becomes almost essential now to have that digital connectivity. So they can't stop those programs. They need to accelerate those programs, but as they move those programs faster, again they expand their attack surface. And so, what I'm definitely seeing is a convergence of traditional kind of networking, connectivity, and cybersecurity teams like the CIO and the CSO working on projects jointly. So whether it be the WAN connectivity, or whether it be endpoint, or whether it be cloud, both teams are working much more closely going forward. >> Synergies there that are absolutely essential. Talk to me about what you guys announced with Linksys yesterday, speaking of work from home and how that has transformed every industry. Talk to us about the home work solution powered by Fortinet. >> Yeah, well, we definitely see work from home being there for some time. And so the question is, what do you do there? So I think initially 18 months ago, what happened was companies turned on their, what they call a VPN, which gives them an encrypted access when they went from 5% to a 100% people on the VPN. I speak to customers now and they're saying, that was kind of a temporary solution. It puts an end point security there. It was kind of temporary and now I need a longer-term solution because I can see this at least 50% for the next two years, being this hybrid work from home, and some of them are saying, "Well, let's look at something. Let's try and take the best of enterprise networking and security, and then try and match that with an easy to set up Wi-Fi or routing system." So the two companies, you know, have come together with this joint venture. We're taking Linksys technology from an ease of use at home, it's very simple to set up, you can do it on an app or whatever. And then we integrate the Fortinet technology inside there from a security and enterprise networking. The enterprises can manage themselves, the enterprise component and the consumer can manage their piece. What's very important is that separation as well. So the privacy of your home network, and then to make sure the enterprise piece is secure, and then also introducing some simple, what we call quality of service. So for a business person, things like Teams or Zoom as preference over some of the gaming and downloads of the family. So I think it brings the best of both worlds: ease of use and enterprise security together. >> I'm sure the kids won't like that it's not optimized for gaming, but it is optimized for things like video conferencing which, in the last year we've been dependent on for collaboration and communication. Tell me a little bit about the tuning for video conferencing and collaboration. >> Yeah, so we announced both Zoom and Microsoft Teams, probably the two biggest apps, which I use from a work from home business perspective. And definitely if you've got a normal system at home and your kids they've been downloading something, a new game or something like that, they can just take the whole bandwidth. And so the ability to kind of scale that back and make sure the Zoom meeting or the Teams meeting is first priority, I think is very important, to get that connectivity and that quality of service, but also have that security component as well. >> Yeah, the security component is increasingly important. Talk to me about why Linksys, was COVID the catalyst for this partnership? >> Well, I think we looked at it and we have our own work from home solutions as well. I mean, our own gear. We definitely wanted to find something where we could integrate into more of a ease of use solution set. And it just so happened we were speaking to Linksys on some other things and as soon as we started talking, it was very, very clear that this would be a great relationship and joint venture and so we made the investment. Not just "here's some of our code", we made a substantial investment in Linksys and yeah, we see some other things coming in the future as well. >> Can you talk to me a little bit about what the go to market will be, how can enterprises and consumers get this? >> Yeah. So it's more of an enterprise sale. I know some people think Linksys, they think consumer straight away. For us, this is a sale to the enterprises. So the enterprises buy it, it's a subscription service. So they just pay a monthly fee and they can have different levels of service inside there as well. They will get, you know, for each employee they'll get one, two or three nodes. And then so the, so the enterprise is paying for it, which I think will help a bit and they will manage it through their system, but the consumer will get this kind of a game that's very easy to use, very high speed connectivity, mesh technology. So yes, Linksys will sell some of it as well. But I think, you know, actually Fortinet will be the major kind of go to market because of our 500,000 business customers we have out there. >> Right. And your huge partner network. >> Yes. >> So let's talk about, give me a little bit of a view in terms of the benefit that IT will get leveraging the Linksys home work solution. I imagine that centralized visibility of all the devices connected to the corporate network, even though, wherever the devices are? >> Yeah, it actually extends the corporate network. So not in this initial release, in the second release. In the first release, they can go to a cloud portal and they can manage what they can manage from an enterprise perspective. The employee can go to the same portal, but gets a different view, can manage their piece. In the second release, we'll actually have support in our management systems. So if you're an existing Fortinet customer and you've got our management systems and say you've got, I don't know, 250 sites, and you're managing some of our firewalls or SD WAN systems, You'll be able to see all the employees links as systems as well, in that same management system. But again, there's a separation of duty and privacy where they can just manage the enterprise components, not they can't see the traffic from the employees' side, from the non-business transactions. >> Good. That privacy is key there. Do you think that in a perfect world, would help quiet down some of the perfect storm that we're seeing with ransomware and this explosion, this work from anywhere, work from home, going to be persisting technologies, like what you're doing with Linksys, is going to help make a dent in that spike? >> I think it's a component. So for us, the long term strategy for users, end point, this kind of Linksys component is an element. We also feel like there needs to be a transition of VPN technology into zero trust. So you're limiting again, the access to applications versus the network. And then definitely the third component would be a technology like EDR, which is more behavioral-based versus signature-based. And so you bring all those three together. Absolutely we'll make a dent in ransomware because you're just reducing the attack surface greatly, but also scanning the technology to make sure if you see something, you can act straight away. >> And then pair that with what you guys are doing and the investment that Fortinet's been making for a while in training and helping to fill that cybersecurity skills gap, which is growing year on year. >> Yeah. I speak to a lot of CSOs and CIOs and they go "What's the latest technology? What can you do next?" I say, well, the most important thing you can do is train your people. Train them not to click on that phishing link, right? Because still our numbers are around 6% of employees click on things and it doesn't matter what company you are. And so the education and the training is the one of the core, the most basic steps. We're introducing what we call an IT awareness program as part of NSC, which allows companies to download some tools. And they'll try some phishing emails that go out there, they'll see the response, see how they can (mumbles). So I always say that the people, the social engineering is the first step to try and fix and reduce. That's the biggest attack surface you will have. >> It's getting so sophisticated and so personalized. I mean I've seen examples with training that I've done for various companies where you really have to look 2, 3, 4 times at it and have the awareness alone to know that this might not be legitimate. >> Yeah, especially when people are just clicking on more things because they're going to more places. And so you have to be very careful. You can stop a bunch of that with some rule sets. So the systems, but if they're faking the domain, spear phishing, where they know exactly the context of where the email's coming out, it's hard, but you've just got to be very, very careful. If in doubt don't click on it. >> I agree if in doubt, don't click it. Well, John, it's always great talking to you. Exciting to hear the growth of Fortinet, what you're doing with PGA tour, the synergies there, the cultural synergies and the growth in customers and partners, lots of stuff to come. Can't wait till our next conversation, which I hope is also in person. >> Yes, yes, yes, for sure. You know, I think this is a great venue in that it's- as you can see it's open, which helps a lot. >> Yeah. >> It's not far from our headquarters, just down the road there, we've committed to this event for six or seven years. And so this is our first time, but definitely we're hoping to get out a bit more as we go forward. >> Excellent. I'm glad to see to see a company like Fortinet taking the lead and you look like you're dressed for golf. You said you have meetings, but I'm going to let you go because you probably have to get to that. >> I have a few more meetings. I wish they would leave a little gap for some golf. I'll try and work one as we go forward. >> Yeah. Anyway, John, thank you for joining me, great to see you. For John Madison, I'm Lisa Martin. You're watching theCUBE from the Fortinet Championship Security Summit in Napa. (Upbeat music)
SUMMARY :
brought to you by Fortinet. This is the site of kickoff to the 2021-22 I know, you're not definitely physical. What are some of the synergies? some of the veterans, but also some of the Some of the keynotes focus and talking about the threat And the work from anywhere. I think it's going to be And talking about the Yeah, over the last 12 months. credit card data on the dark web. and evolved in the last 18 months. like the CIO and the CSO Talk to me about what you guys announced And so the question is, in the last year we've been dependent on And so the ability to kind of the catalyst for this partnership? coming in the future as well. the major kind of go to And your huge partner network. the devices connected to In the first release, they the perfect storm that we're the access to applications what you guys are doing and the the first step to try and fix and reduce. awareness alone to know So the systems, but if and partners, lots of stuff to come. as you can see it's the road there, we've taking the lead and you I have a few more meetings. great to see you.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Lisa Martin | PERSON | 0.99+ |
Linksys | ORGANIZATION | 0.99+ |
John Maddison | PERSON | 0.99+ |
John | PERSON | 0.99+ |
one | QUANTITY | 0.99+ |
September | DATE | 0.99+ |
John Madison | PERSON | 0.99+ |
Fortinet | ORGANIZATION | 0.99+ |
Napa Valley | LOCATION | 0.99+ |
June | DATE | 0.99+ |
two companies | QUANTITY | 0.99+ |
John Madison | PERSON | 0.99+ |
Lisa | PERSON | 0.99+ |
5% | QUANTITY | 0.99+ |
six | QUANTITY | 0.99+ |
second release | QUANTITY | 0.99+ |
three days | QUANTITY | 0.99+ |
five days | QUANTITY | 0.99+ |
first release | QUANTITY | 0.99+ |
25% | QUANTITY | 0.99+ |
two companies | QUANTITY | 0.99+ |
seven years | QUANTITY | 0.99+ |
250 sites | QUANTITY | 0.99+ |
two days | QUANTITY | 0.99+ |
two | QUANTITY | 0.99+ |
Microsoft | ORGANIZATION | 0.99+ |
PGA | ORGANIZATION | 0.99+ |
three | QUANTITY | 0.99+ |
18 months ago | DATE | 0.99+ |
500,000 business customers | QUANTITY | 0.99+ |
two biggest apps | QUANTITY | 0.99+ |
first time | QUANTITY | 0.99+ |
last year | DATE | 0.99+ |
six feet | QUANTITY | 0.99+ |
each employee | QUANTITY | 0.99+ |
third component | QUANTITY | 0.98+ |
Napa | LOCATION | 0.98+ |
first step | QUANTITY | 0.98+ |
last year | DATE | 0.98+ |
both | QUANTITY | 0.98+ |
two things | QUANTITY | 0.98+ |
yesterday | DATE | 0.98+ |
4 times | QUANTITY | 0.98+ |
both worlds | QUANTITY | 0.98+ |
around 6% | QUANTITY | 0.98+ |
today | DATE | 0.98+ |
almost $3 billion | QUANTITY | 0.98+ |
Fortinet Security Summit | EVENT | 0.98+ |
about 50% | QUANTITY | 0.97+ |
Fortinet Championship Security Summit | EVENT | 0.97+ |
Zoom | ORGANIZATION | 0.97+ |
NSC | ORGANIZATION | 0.97+ |
this summer | DATE | 0.96+ |
both teams | QUANTITY | 0.96+ |
over 300 partners | QUANTITY | 0.96+ |
about 300 customers | QUANTITY | 0.96+ |
2021-22 FedEx Cup | EVENT | 0.95+ |
10,000, 20,000 people | QUANTITY | 0.95+ |
first | QUANTITY | 0.94+ |
3 | QUANTITY | 0.93+ |
Fortinet Championship | EVENT | 0.93+ |
first half of 2021 | DATE | 0.9+ |
Fortinet Security Summit 21 | EVENT | 0.88+ |
next couple of years | DATE | 0.88+ |
100% people | QUANTITY | 0.86+ |
20 years | QUANTITY | 0.84+ |
over 2000 | QUANTITY | 0.83+ |
last 12 months | DATE | 0.83+ |
last 18 months | DATE | 0.81+ |
Glenn Katz, Comcast | Fortinet Security Summit 2021
>> It's The Cube covering Fortinet Security Summit brought to you by Fortinet. >> Hey and welcome back to the cubes coverage of Fortinets championship series. Cybersecurity summit here in Napa valley Fortinet is sponsoring the PGA tour event, kicking off the season here, and the cubes here as part of the coverage. And today is cybersecurity day where they bring their top customers in. We got Glenn Katz SVP, general manager, Comcast Enterprise Solutions. Glenn, thanks for coming on The Cube. Thanks for taking time out of your day. - Thank you no This is great. This is great. >> Interviewer: Tell me to explain what you guys do in the Comcast business enterprise group. >> That's our Comcast business. We're a part of Comcast overall. I always like to explain what Comcast really is. If you look at Comcast, it's a technology innovation company by itself that happens to focus on communications and media type of, of markets, right? And if you look at the Comcast side there on the communication side, it's really everything residential with customers. Then there's the us Comcast business and we're the fastest growing entity over the last 15 years within Comcast. And we started in small business, voice, video, and data to small businesses. Then we moved up to provide fiber ethernet type of a transport to mid-market. And then my group started in 2014. And what we do is focus on managed services. It doesn't matter who the transport layer is for enterprise Fortune 1000 type companies. And then when you layer in all these managed wider network services. So that's my business unit. >> Interviewer: Well, we appreciate it we're a customer by the way in Palo Alto >> Glen: Oh great >> So give a shout out to you guys. Let's get into the talk you're giving here about cybersecurity, because I mean, right now with the pandemic, people are working at home. Obviously everyone knows the future of work is hybrid now you're going to see more decentralized defy and or virtual spaces where people are going to want to work anywhere and businesses want to have that extension, right? What people are talking about, and it's not new, but it's kind of new in the sense of reality, right? You've got to execute. This is a big challenge. >> Glen: It is - What's your thoughts on that, >> Well it's a big challenge. And one of the things that I'll try to, I'll speak to this afternoon here, which is at least from the enterprise perspective, which includes the headquarters, the enterprise, the branch locations, the digital commerce, everywhere else, commerce is being done. It's not just at a store anymore. It's everywhere. Even if you only have a store and then you have the remote worker aspect. I mean, they do that to your point earlier. We're not in that fortress sort of security mentality anymore. There's no more DMZs it's done. And so you've got to get down to the zero trust type of network architecture. And how do you put that together? And how does that work? Not just for remote workers that have to access the enterprise applications, but also for simple, you know, consumers or the business customers of these, of these enterprises that have to do business from over the phone or in the store. >> Interviewer: What are the some of the challenges you hear from your customers, obviously, business of the defend themselves now the, the, the attacks are there. There's no parameters. You mentioned no fortress. There's more edge happening, right? Like I said, people at home, what are the top challenges that you're hearing from customers? >> So the biggest challenge, and this is, I would think this is, this is mostly focused on the enterprise side of it is that the is two interesting phenomenons going on. This is sort of beginnings before the pandemic. And then of course the pandemic, the role of the CIO has been elevated to now, they have a real seat at the table. Budgets are increasing to a point, but the expertise needed in these, in these it departments for these large enterprises, it's, it's impossible to do what you were just talking about, which is create a staff of people that can do everything from enterprise applications, e-commerce analytics, the network. How do you secure that network all the way down to the end users? Right? So it's that middle portion. That's the biggest challenge because that takes a lot of work and a lot of effort. And that's where folks like Comcast can come in and help them out. That's their biggest challenge. They can handle the enterprise, they can handle the remote workers. They can handle their own applications, which are continually trying to be, you know, have to be it's competitive out there. It's that middle area, that communications layer that their challenged with. >> Interviewer: Yeah. And John Madison's EVP, CMO Ford. It's always talking about negative unemployment in cybersecurity. Nevermind just the staff that do cyber >> Glen: That's exactly right, that's given. If you're a business, you can't hire people fast enough and you might not have the budget for you want to manage service. So how do you get cyber as a service? >> Glen: Well, so it's even bigger than that. It's not just the cyber as a service because it's now a big package. That's what SASE really is SASE is Secure Access Service Edge. But think of it where I think of it is you've got remote users, remote workers, mobile apps on one side, you've got applications, enterprise or commercial that are now moved into different cloud locations. And in the middle, you've got two real fundamental layers, the network. And, and that includes uh, the actual transport, the software defined wide area, networking components, everything that goes with that, that's the network as a service. And then you've got the secure web gateway portion, which includes everything to secure all the data, going back and forth between your remote laptop, the point of sales. And let's say the cloud based applications, right? So that's really the center stage right there. >> Interviewer: And the cloud has brought more service at the top of the stack. I mean, people thought down stack up stack is kind of like a geeky terms. You're talking about innovation. If you're down stack with network and transport, those are problems that you have to solve on behalf of your customers And make that almost invisible. And that's your job >> That's our job. That's our job is to service provider What's interesting is though back in the day, I mean, when, I mean, back in the day, it could have been 10 years ago in 20. You really, you know, you had stable networks, they were ubiquitous, they were expensive and they were slow. That's kind of the MPLS legacy TDM. Yeah. So you just put them in and you walked away and you still did all your enterprise. You still did all of your applications, but you had your own private data centers. Everything was nicer. It was that fortress mentality right now. It's different. Now everybody needs broadband. Well guess what? Comcast is a big company, but we don't have broadband everywhere. ATT doesn't have it. Verizon doesn't have it Charter doesn't have it. Right. So you need, so now to think about that from enterprise, I'm going to go, I'll give you an example. All of our customers to fulfill a nationwide network, just for the broadband infrastructure, that's, you know, redundant. If you want to think of it that way we, we source probably 200 to 300 different providers to provide an ubiquitous network nationwide for broadband. Then we wrap a layer of the SD wan infrastructure for that, as an example, over the top of that, right? You can't do that by yourself. I mean, people try and they fail. And that's the role of a managed service provider like us is to pull all that together. Take that away. We have that expertise. >> Interviewer: I think this is a really interesting point. Let's just unpack that just for a second. Yeah. In the old days, we want to do an interconnect. You had an agreement. You did, you have your own stuff, do an interconnected connect. >> Glen: Yep. >> Now this, all this mishmash, you got to traverse multiple hops, different networks. >> Glen: That's right >> Different owners, different don't know what's on that. So you guys have to basically stitch this together, hang it together and make it work. And you guys put software on the top and make sure it's cool is that how it works? >> Glen: Yeah. Software and different technology components for the SD wan. And then we would deliver the shore and manager all that. And that's, that's where I really like what's happening in the industry, at least in terminology, which is they try, you have to try to simplify that because it's very, very complicated, but I'm going to give you the network as a service mean, I'm going to give you all the transport and you have to don't have to worry about it. I'm going to rent you the, the SD wan technology. And then I'm going to have in my gateways all these security components for a firewall as a service, zero trust network access, cloud brokerage services. So I will secure all of your data as you go to the cloud and do all of that for you. That's really what we, that's what we bring to the table. And that's what is really, really hard for enterprises to do today. Just because they can't, the expertise needed to do that is just not there. >> Interviewer: Well, what's interesting is that first you have to do it now because the reality of your business now is you don't do it. You won't have customers, but you're making it easier for them. So they don't have to think about it. - [Glen] That's right. >> But now you bring in hybrid networking hybrid cloud, they call it or multi-cloud right. It's essentially a distributed computing and essentially what you're doing, but with multiple typologies, >> Glen: that's right. >> Interviewer: I got an edge device. - [Glen] That's right. If I'm a business. - [Glen] That's right. >> That's where it could be someone working at home >> Glen: That's right. - Or it could be my retail >> Or whatever it could be. So edge is just an extension of what you guys already do. And is that right? Am I getting that right? >> Glen: Yeah that's exactly right. And, and, but the point is, is to make it economic and to make it really work for the end user. If you're a branch, you may have a, a application that's still being run via VPN, but you also need wifi internet for your customers because you want to use your mobile device. They've entered into your store and you want to be able to track that right. And push something to them. And then you've got the actual store applications could be point of sales could be back of house comparing that's going up to AWS. Azura whatever. Right. And that all has to be, it all has to come from one particular branch and someone has to be able to manage that capability. >> Interviewer: It's funny, - Its so different >> Interviewer: just as you're talking, I'm just thinking, okay. Facial recognition, high, high bandwidth requirements, >> Glen: Huge high bandwidth requirements >> Processing at the edge becomes huge. >> Glen: It does. >> So that becomes a new dynamic. >> Glen: It does. It's got to be more dynamic. It's not a static IP end point. >> Glen: Well, I'll give you another an example. Let's say it's, it seems silly, but it's so important from a business perspective, your quick service restaurant, the amount of digital sales from applications are just skyrocketing. And if you yourself, and particularly in the pandemic, you order something, or that goes up to the cloud, comes back through, goes to the point of sales. And then the, the back of house network in a particular restaurant, if that doesn't get there, because one line of you only have one internet connection and it's down, which sometimes happens, right? You lose business, you lose that customer. It's so important. So what's being pushed down to the edge is, you know, reliable broadband hybrid networks, where you have a primary wire line and a secondary wire line, maybe a tertiary wireless or whatever. And then a box, a device that can manage between those two so that you can keep that 99.9, 9% availability at your branch, just for those simple types of applications. >> Interviewer: You know Glenn, you as you're talking most people, when we talk tech, like this is mostly inside the ropes, Hey, I can get it. But most people can relate with the pandemic because they've ordered with their phone on - [Glen] Exactly right >> With the QR code. - [Glen] That's exactly right >> They see the menu - [Glen] That's right >> They get now what's happening - [Glen] That's right that their phone is now connected to the service. >> Glen: That's right >> This is not going away. The new normal. >> Glen: No, it's absolutely here. And what I've seen are there are many, many companies that already knew this and understood this pre pandemic. And they were, they had already changed their infrastructure to really fit what I was calling that network as a service in the SASE model, in different ways. Then there were a bunch that didn't, and I'm not going to name names, but you can look at those companies and you can see how they're, they're struggling terribly. But then there was this. Now there's a, a much bigger push and privatization again, see, I was sending, Hey, I asked for this before. It's not like the CIO didn't know, but management said, well, maybe it wasn't important. Now it is. And so you're seeing this actual amazing surge in business requests and requirements to go to the model that we're all talking about here, which is that SASE type of implementation high-speed broadband. That's not going away for the same reason. And you need a resilient network, right? Yes. >> Interesting. Best practice. Let's just take that advice to the, to the audience. I want to get your thoughts because people who didn't do any R and D or experimentation prior to the pandemic, didn't have cloud. Wasn't thinking about this new architecture got caught flat-footed. -Exactly. >> And they're hurting and or out of business. >> Correct. >> If people who were on the right side of that took advantage as a tailwind and they got lifts. >> That's exactly right. >> So what is the best practice? How should a business think about putting their toe in the water a little bit or jumping in and getting immersed in the new, new architecture? What advice would you give? Because people don't want to be in the wrong side of history. >> No, they don't. >> What's your guy's best practice? >> I may sound biased, but I'm really not trying to be biased. And this'll be some of the I'll speak about here later today. You have to try it. You, as the end user, the enterprise customer, to, to fulfill these types of needs, you've got to really probe your managed service providers. You've got to understand which ones, not just can give you a nice technology presentation and maybe a POC, but who's going to be there for the longterm who has the economic wherewithal to be able to give the resources needed to do what I was talking about, which is you're going to outsource your entire network to me and your sh, and a good portion of your security for the network to a service provider. that service provider has to be able to provide all that has to be able to have the financial capabilities, to be able to provide you with an operating type of model, not you have to buying equipment all the time. That service provider has to be able to have teams that can deliver all of that 200 to 300 different types of providers aggregate all that, and then be there for day two. Simple thing. Like if you know, most companies, if you're not a really large location, you can't afford to, you know, double types of routers that are connected. And if one fails you have fail over, right, most of them will have one router and they'll have, but they'll have two backup paths. Well, what happens is that router or switch, single switch fails? You need to have a meantime to repair a four hours. I mean, that's kind of basic and well do that. How do you do that? You've got to have depots around the entire country. These are the types of questions that any enterprise customers should be probing their managed service provider, right? It's not just about the technology. It's about how can you deliver this and assure this going forward. >> And agility too cause when, if, if things do change rapidly, being agile... >> Exactly >> means shifting and being flexible with your business. >> That's exactly right. And that's important. That's a really important question. And the agility comes from this financial agility, right? Like new threat, new box. I want, I want this old one. I'm going to upgrade to a different type of service. The service providers should be able to do that without me having to force you to go get some more CapEx and buy some more stuff. Cause that's number one. But the other agility is every enterprise is different. Every enterprise believes that its network is the only network in the world and they have opinions and they've tested different technologies. And you're going to have to adapt a little bit to that. And if you don't, you're not going to get out of this. >> It's funny. The old days non-disruptive operations was like a benefit, we have non-disrupt- now it's a table stakes. You can't disrupt businesses. - You can't. You can't at the branch at the remote worker. If you're on a zoom call or whatever, or you're on a teams call, we've all been there. We're still doing it. If it breaks in the middle of a presentation to a customer that's problem. >> Glenn thanks for coming on the cube with great insight. >> Oh great. This was fun. >> Are you exciting and plays golf? You're going to get out there on the range? >> I played, I played golf a lot when I was younger, but I haven't. And so I have a few other things I do, but I guess I'm going to have to learn now that we're also a sponsor of PGA, so yeah, for sure. >> Great. Well, great to have you on - All right thank you and great talk. Thanks for coming on and sharing your insight. >> This was great. I appreciate okay. >> Keep coverage here. Napa valley with Fortinet's Cybersecurity Summit as part of their PGA tour event, that's happening this weekend. I'm John for the Cube. Thanks for watching.
SUMMARY :
brought to you by Fortinet. and the cubes here as in the Comcast business enterprise group. And if you look at the So give a shout out to you guys. do that to your point earlier. you hear from your customers, is that the is two interesting just the staff that do cyber So how do you get cyber as a service? And in the middle, those are problems that you have to solve And that's the role of a managed did, you have your own stuff, you got to traverse multiple And you guys put software on the top but I'm going to give you the that first you have to do it now But now you bring in hybrid - [Glen] That's right. Glen: That's right. of what you guys already do. And that all has to be, Interviewer: just as you're talking, It's got to be more dynamic. to the edge is, you know, is mostly inside the ropes, With the QR code. connected to the service. This is not going away. And you need a resilient network, right? prior to the pandemic, And they're hurting the right side of that took to be in the wrong side of for the network to a service provider. And agility too cause when, flexible with your business. having to force you to go get You can't at the branch the cube with great insight. This was fun. but I guess I'm going to Well, great to have I appreciate okay. I'm John for the Cube.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Comcast | ORGANIZATION | 0.99+ |
Glenn | PERSON | 0.99+ |
2014 | DATE | 0.99+ |
Glen | PERSON | 0.99+ |
Verizon | ORGANIZATION | 0.99+ |
Glenn Katz | PERSON | 0.99+ |
Glenn Katz | PERSON | 0.99+ |
John Madison | PERSON | 0.99+ |
Palo Alto | LOCATION | 0.99+ |
John | PERSON | 0.99+ |
200 | QUANTITY | 0.99+ |
AWS | ORGANIZATION | 0.99+ |
ATT | ORGANIZATION | 0.99+ |
Comcast Enterprise Solutions | ORGANIZATION | 0.99+ |
99.9, 9% | QUANTITY | 0.99+ |
Napa valley | LOCATION | 0.99+ |
two | QUANTITY | 0.99+ |
Charter | ORGANIZATION | 0.99+ |
10 years ago | DATE | 0.98+ |
two interesting phenomenons | QUANTITY | 0.98+ |
four hours | QUANTITY | 0.98+ |
Fortinet Security Summit | EVENT | 0.98+ |
pandemic | EVENT | 0.97+ |
one line | QUANTITY | 0.97+ |
SASE | TITLE | 0.97+ |
first | QUANTITY | 0.97+ |
one side | QUANTITY | 0.97+ |
one | QUANTITY | 0.96+ |
CapEx | ORGANIZATION | 0.96+ |
one router | QUANTITY | 0.96+ |
today | DATE | 0.96+ |
300 different providers | QUANTITY | 0.95+ |
PGA | EVENT | 0.94+ |
two real fundamental layers | QUANTITY | 0.94+ |
Fortinet | ORGANIZATION | 0.94+ |
day two | QUANTITY | 0.94+ |
one internet connection | QUANTITY | 0.93+ |
PGA | ORGANIZATION | 0.92+ |
this afternoon | DATE | 0.92+ |
zero | QUANTITY | 0.91+ |
Fortinet Security Summit 2021 | EVENT | 0.89+ |
Azura | ORGANIZATION | 0.88+ |
Fortinet | EVENT | 0.87+ |
later today | DATE | 0.86+ |
20 | QUANTITY | 0.85+ |
one particular branch | QUANTITY | 0.85+ |
Cybersecurity Summit | EVENT | 0.84+ |
SVP | PERSON | 0.84+ |
two backup | QUANTITY | 0.84+ |
last 15 years | DATE | 0.82+ |
a second | QUANTITY | 0.82+ |
300 different types | QUANTITY | 0.76+ |
single switch | QUANTITY | 0.75+ |
John Maddison, Fortinet | CUBEconversation
(calm electronic music) >> Welcome to this CUBE Conversation with Fortinet. I'm Lisa Martin. John Madison joins me, the CMO and EVP of products. John, welcome back to the program. >> Thanks Lisa. Good to be here. >> Good to see you. So, so much has changed since I last saw you. The move to remote work caused by the pandemic led so many organizations to invest in modern networking and security technologies. And we see, you know, the rise in the threat landscape that protecting digital assets is becoming even more and more urgent because the threats are continuing to escalate. Talk to me about some of the things that you're seeing with this current threat landscape. >> Yeah. Well, it keeps changing that's for sure. You saw some recent surveys where, you know, now companies are seeing, in terms of where employees are located, you know, 25% expecting to be in the office, 25% expected to be permanently in the home. And then there's this big 50% of hybrid, which we think will move a bit more towards the office as people get back in the office. But that's going to take some time. We're actually starting to move back in the office here in Santa Clara, Sunnyvale. but it's very different in every region in the U.S and regulations and laws around the world. And so we think it's going to be very much work from anywhere. There's a bit of travel starting as well. And so this work from anywhere concept is going to be very important to customers going forward. And the ability to change the dynamics of that ratio as they go forward. >> (indistinct) This work from anywhere that over- last year overnight sort of became an absolute essential. But now, as you said, we're going to have this hybrid model of some going back, some staying home and the security and the perimeter is dissolving. When you look at supporting customers and their remote work from anywhere, their new work from anywhere model, what are some of the things that are top of mind that you're hearing from customers? >> Well, I, you know, I sometimes hear this premise is disappearing. I think in some ways it's moving to the user and the devices. And there's this concept called zero trust network access which I've said in many occasions should be zero trust application access, but they named it that way which is going to be an important technology because as I said, it kind of moves that premise then to that user and previous technology that we had VPN technology was good technology. And in fact, a lot of companies, if you go back to when the pandemic started last year, put a lot of people on the VPN technology as quick as possible and it was reasonably robust. But as we go forward, what we're going to have to do is make sure that perimeter- at that perimeter, that users only get access to the applications they're using rather than the whole network. Eventually when they're on the network you need to make sure that it's segmented so they can't go everywhere as well. And so this zero trust network access or zero trust or zero trust access, there's lots of kind of different versions of it, is going to be very important concept for users. The other piece of it, I think, is also that it needs to be more intuitive to use, as anything you kind of have users do like the VPN where you had to kind of dial in and- or bring up- you're bringing up your connection and your IPsec connection, et cetera, et cetera means that people tend not to use it. And so to make it intuitive and automatic is going to be really important. >> Intuitive and automatic. One of the things that we also saw was this massive rise in digital transformation last year, right? SAS adoption, these SAS applications keeping many of us in collaboration. So I'm thinking, you know, in that sense with the perimeter changing and the work from anywhere, this consistent, secure internet connection among users at the branch or the branch of one has to be there to keep organizations productive and safe. How is the Fortinet enabling the ZTNA- this evolution of VPN? >> Yeah. That's another piece of it. So not only are users on and off the network or traveling so that- or both, so the applications are moving. So a lot of them are moved from data centers to public cloud in the form of infrastructure or SAS. We're now seeing customers actually move some applications towards the building or building compute or edge compute. So the applications keep moving which also causes this problem. And so another function of zero trust access or ZTNA is to not care where the application is. You rely on some technology and it's called proxy technology, which allows the proxy to track where the applications are. And for us, that sits inside of our firewalls. And that makes it very flexible. And so we've been able to kind of just ramp up that proxy against the policy engine, whether it be in the data center or in the cloud, or even on your premise. Even integrated inside a branch or something like that. That's going to be very important because, as you just said, those applications will just keep moving into different areas and different zones as you go forward. >> (Lisa) And that's probably going to be permanent for a lot of organizations. So it- so they haven't renamed it zero trust application access, like you think it should be. But when organizations are looking into zero trust network access, what should- what are some of the key things that they need to be looking for and mindful of? >> Yeah, (indistinct) And so it's probably the, you know, the number one conversation they've had over the last six months. I think people initially just had to get something working. Now they're looking seriously at a longer term architecture for their access, their user access and device access. I think what I find is that something like zero trust network access is more of a use case across multiple components. And so if you look inside it, you need a client component endpoint; you need a proxy that in front of the cloud capabilities; you need a policy engine; you need to use identity-based systems. If you haven't got- if you can't get an agent on the device, you may need a NAC system. And so usually what customers find is I've got four or five current- different vendors in those areas. And cybersecurity vendors are not the best at working together, which they were, because then we do better for customers. And so trying to get two vendors to work is hard enough, trying to get five or six is really hard. And so what they're looking at over time is to say, maybe I get the minimum basic ZTNA working. And then as I go forward, for example, what they really want is this continuing posture assessment. Well, you can do that with some EDR technology, but is that EDR technology integrated into your policy engine? No. So I think what customers are saying is, let me start with the base ZTNA with maybe two vendors. And then as I go forward implement a, you know, a fabric or a platform approach to get everything working together. 'Cause it's just too hard with five or six vendors. >> Right. Is there, I'm curious if there's a shared responsibility model with customers working with different vendors; what actions and security responsibilities fall on the customer that they need to be aware of? >> Well, and it also comes back to this, you know, there's convergence of networking and security. And I've said a few times I'm definitely seeing CIOs and CSOs, security teams, and networking teams working much more closely. And especially when you've got a use case now that goes across security items and networking items and networking, the proxy has always been in the control of the networking team. Endpoint security is always been in the- you know, the security team. It's just forcing this convergence not just of the technologies itself but of the organizations inside enterprises. >> (Lisa) Well, and that's a challenging one for every organization is getting, you know, if you're talking about it in general, the business folks, the IT folks. Now this is not just a security problem. This is a problem for the entire corporation, as we just saw with the Colonial Pipeline. Ransomware is now becoming a household name. These are business-critical board-level discussions I imagine on the security side. How is Fortinet helping customers kind of bridge that gap between the biz folks and the IT folks where security is concerned? >> Yeah. You know, ransomware has been around quite a while. I think two years ago, we saw a lot of it in the schools. K-12 schools in the U.S. I think they're picking some richer targets now. The colonial one, I think there was a 4 million ransom. I think that they managed to get some of that money back. But, you know, instead of, you know, demanding $5,000 or $10,000 from a small business or a school they're obviously demanding millions from these larger companies. And you know, one of the problems with ransomware is, you know, it still relies heavily on social engineering. I don't think you can eliminate that people clicking on stuff, you know, a very small percentage still. I think what it means is you have to put some more proactive things in place, like the zero trust, like micro-segmentation, like web application file warning. All these capabilities to try and make your systems as strong as possible. So then put in detection and response systems to assume that someone's clicking on something somewhere just to help. But it's definitely the environment. You know, the threat environment. It's not really gotten more sophisticated; yes, there are still advanced threats. I fear more about those weaponized APTs and state sponsored, but there's definitely a huge volume of ransomware now going after, you know, not only, you know, meat processing factories, but pipelines and critical infrastructure as we go forward. That's the more worrying. >> (Lisa) Right. You bring up a good point about, sort of, people being one of the biggest challenges from a security perspective. Clicking on links, not checking to see if a link is bogus or legitimate. So, help me understand a little bit more how is zero trust can help maybe take some of that human error out of the equation? >> Well, because I think before, you know, when you got access, when you're off the network and you've got access to the network, you've got access to everything, okay. So once you're on the network, and I think the Colonial Pipeline was a good example where traditionally, operational technology networks, physical networks sort of separate from the IT network and they had something called an air gap. And that air gap meant you really couldn't get to it. Now when people had to be remote because of the pandemic, they started taking these air gaps. And so now we had remote access. And so again, when you- when they got that remote access and they got into the network, they could- the network was very flat and you could see everything you can go anywhere. And so that's what zero trust does. It kind of says, I kind of did the zero trust approach to you that I'm only going to allow you access to this application. And I'm going to keep checking on you to make sure you are you are who you say you are on a continuous basis. And that really provides a bit more safety. Now, I still- we still think you need to put things like segmentation in place and some other capabilities and monitoring everything else, but it just narrows the attack surface down from this giant network approach to a specific application >> Narrowing that is the right direction. How do organizations, when you're working with customers, how do they go- How do they evolve from a traditional VPN to zero trust? What are some of the steps involved in that? >> Well, I think it's, you know, what's interesting is customers still have data centers. In fact, you know, some of the customers who have legacy applications will have a data center for a long time. And in fact, what I find is even if you've implemented zero trust to a certain population, employee population, they still have VPNs in place. And sometimes they use them for the IT folks. Sometimes they use them for a specialized developers and stuff like that. And so I think it's going to be like everything, everything goes a hundred percent this way and it stays this way. And so it's going to be hybrid for a while where we see VPN technology and zero trust together. You know- our approach is that you can have both together and it's both on the same platform and it'll just gradually evolve as you go forward. >> What are some of the things you're looking forward to in the next year as this hybrid environment continues, but hopefully things start to open up more? What are some of the things that we can expect to hear and see from Fortinet? >> Well, I'm looking forward to getting out of my home office, that's for sure. >> (Lisa laughing) >> It's like I've been imprisoned here for eighteen months. >> I agree with you on that! So we'll try that. And, you know, I always thought I traveled too much before and now I'm contemplating on the travel piece. But from, you know, Fortinet's perspective, you know, our goal is to make sure that, you know, our customers can increase. We'll make sure they can protect themselves. And so we want to help them and keep working with them such that they put best practices in place and they start architecting longer-term to implement things like zero trust or sassy or some of these other capabilities. And so, you know, I think the- we've had a lot of interest with customers on these virtual sessions. I'm really looking forward to getting them back in our new building, our new executive briefing center, which we're opening up in the next few weeks. You may have more of those face-to-face and white boarding conversations with customers. >> Oh, that sounds so exciting. I agree with you on the travel front, but going from traveling a ton to none was a big challenge. But also, I imagined it'll be great to actually get to collaborate with customers again, and partners. You know, you can only do so much by Zoom. Talk to me a little bit about some of the things on the partnership front that we might be seeing. >> Yeah, our partners, you know, we're a hundred percent partner-driven company and partners are very important to us. And, you know, and that's why we always, when we introduce new technology, we work with the partners to make sure that they understand it. So for example, we provide free what they call an NSE training to all our partners. And then we also work with them very closely to put systems in their labs and the demos and make sure they can architect. And so partners are really important to us and, you know, making sure that they can provide value as part of a solution set to our customers, because customers trust them. And so we want to make sure that we work with our partners closely so they can help the customer implementing architect solutions as they go forward. >> That trust is critical. Right? I mean, we can talk about that at every event, every CUBE Conversation, the trust that an a customer has in you, the trust that you have in a partner and vice versa. That whole trust circle kind of goes along the lines with what we're talking about in terms of being able to establish that trust. So that threat landscape that's probably only going to continue to get bigger is in the trusted hands of folks like Fortinet and your partners to be able to enable those customers to narrow that threat landscape. >> Yeah, yeah. And so it could be the smallest partner to the largest service provider. We don't mind. We want to make sure that we're working with them to provide that implementation from the customers. And again, the word trust is sometimes overused, but that's what customers are looking for. >> (Lisa) So, John, point me to when our audience is some of the information that they can find on Dotcom about zero trust. What are some of the things that you think are great calls to action for the audience? >> Yeah. I mean, it depends. I think it depends on what level you want to get into where we have a bunch of assets, videos, and training but start at the very highest level, you know, why is zero trust something you need to implement? And then it goes down into more details and then even the architecture, long-term architecture and connectivity and implementation. So there's a lot of assets on Fortinet.com If you go on our training sessions, there's- all our training's free to our customers. And so you can go in all those NSE levels and look at the capabilities. So yeah, definitely it's a- it's an area of high interest from our customers. But as I say to them, it's more of a journey. Yes, you can implement something today really quickly, but will that work for you over the long-term in making sure you can take all the information from the, like I said, you know, how is the voice, the posture of that device? What is the device with an agent doing, you know, as my contextual engine integrated as well? So it's a journey for customers and, but you can start with something simple but you need to have that plan for that journey in place. >> I imagine though, John, it's a journey that is either accelerating, or with the threat landscape and some of the things that we've already talked about, is becoming an absolutely board-critical conversation. So, and on that journey, does Fortinet work with customers to accelerate certain parts of it? Because you know, these businesses have been pivoting so much in the last year and they've got to not just survive, but now thrive in this new landscape, this new hybrid work from home, work from anywhere environment and also with more threats. >> Yeah, no, it's a good point. And so, you know, even those internally are implementing it starting the most critical assets first. So let's say, you know, I've got somebody working on source code, they should be the first ones to get the zero trust implementation. I've got somebody asking from the internet to search for stuff. Maybe they're okay for now, but yeah. So you kind of prioritize your assets and users against, you know, the threat and then implement. That's why I'm saying you can roll it out across everyone as, you know, a certain version of it. But I think it's better to prioritize first the most important assets in IP and then roll it out that way. >> (Lisa) Great advice. >> Because some of- a lot of those assets are still sitting in the data center. >> Right. >> So they're not sitting in the cloud. >> Right. John, great advice. Thank you so much for joining me. Good to see you, glad all is well and that you will be able to get out of your home office. You're just days away from that. I'm sure that's going to feel great. >> Certainly is. And thank you, Lisa. >> Nice to see you. For John Madison, I'm Lisa Martin. You're watching this CUBE Conversation. (calm electronic music with piano)
SUMMARY :
John Madison joins me, the And we see, you know, the And the ability to and the security and the And so to make it intuitive One of the things that we also saw so that- or both, so the that they need to be on the device, you may need a NAC system. they need to be aware of? back to this, you know, is getting, you know, And you know, one of the of that human error out of the equation? And that air gap meant you Narrowing that is the right direction. And so it's going to be Well, I'm looking forward to It's like I've been imprisoned And so, you know, I think the- I agree with you on the travel front, important to us and, you know, the trust that you have in And again, the word trust is some of the information And so you can go in all those NSE levels and some of the things that from the internet to search for stuff. are still sitting in the data center. that you will be able to And thank you, Lisa. Nice to see you.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Lisa Martin | PERSON | 0.99+ |
$5,000 | QUANTITY | 0.99+ |
John | PERSON | 0.99+ |
Lisa | PERSON | 0.99+ |
five | QUANTITY | 0.99+ |
John Maddison | PERSON | 0.99+ |
John Madison | PERSON | 0.99+ |
Fortinet | ORGANIZATION | 0.99+ |
$10,000 | QUANTITY | 0.99+ |
eighteen months | QUANTITY | 0.99+ |
six | QUANTITY | 0.99+ |
two vendors | QUANTITY | 0.99+ |
50% | QUANTITY | 0.99+ |
two vendors | QUANTITY | 0.99+ |
U.S. | LOCATION | 0.99+ |
four | QUANTITY | 0.99+ |
last year | DATE | 0.99+ |
25% | QUANTITY | 0.99+ |
U.S | LOCATION | 0.99+ |
six vendors | QUANTITY | 0.99+ |
next year | DATE | 0.98+ |
two years ago | DATE | 0.98+ |
both | QUANTITY | 0.98+ |
Fortinet.com | ORGANIZATION | 0.98+ |
today | DATE | 0.98+ |
one | QUANTITY | 0.98+ |
pandemic | EVENT | 0.97+ |
Dotcom | ORGANIZATION | 0.97+ |
millions | QUANTITY | 0.97+ |
zero | QUANTITY | 0.96+ |
Colonial Pipeline | LOCATION | 0.95+ |
NSE | ORGANIZATION | 0.95+ |
4 million ransom | QUANTITY | 0.94+ |
Colonial Pipeline | ORGANIZATION | 0.93+ |
zero trust | QUANTITY | 0.93+ |
One | QUANTITY | 0.92+ |
hundred percent | QUANTITY | 0.91+ |
first | QUANTITY | 0.89+ |
Santa Clara, Sunnyvale | LOCATION | 0.87+ |
last six months | DATE | 0.86+ |
Fortinet | PERSON | 0.85+ |
Zoom | ORGANIZATION | 0.84+ |
ZTNA | TITLE | 0.81+ |
first ones | QUANTITY | 0.79+ |
five current | QUANTITY | 0.74+ |
K | OTHER | 0.72+ |
zero trust | ORGANIZATION | 0.66+ |
SAS | TITLE | 0.65+ |
12 | OTHER | 0.58+ |
people | QUANTITY | 0.56+ |
SAS | ORGANIZATION | 0.54+ |
Nirav Shah and Peter Newton, Fortinet | CUBE Conversation, March 2021
(ethereal music) >> Welcome to the special Cube Conversation. I'm John Furrier, your host of "The Cube" here in Palo Alto, California. We've got two great remote guests here having a conversation around security, security convergence with platforms around networking and security with cybersecurity at an all time high, the need for understanding how to manage the breaches how to understand them, prevent them, everything in between cybersecurity and data are the number one conversation happening in the world today. We got two great guests, we've got Nirav Shah, VP of products at Fortinet and Peter Newton's senior director of products at Fortinet. The product leaders in the hottest cybersecurity company. And guys, thanks for coming on this Cube Conversation. >> Thanks for having us. >> Thank you, John. >> So last month or so I talked to John Madison about the Fortinet new release, FortiOS 7.0, as well as highlighting the convergence that's going on between the platforms around companies trying to consolidate and or manage or grow and build, converting networking and security together. Seeing that happening in real time, still doesn't change the underpinnings of how the internet works, and how these companies are structured. But the need for security is at an all time high. Talk about the impact to the customer. Do you guys have the keys to the kingdom here, product group? What is the killer product? What are customers doing? Give us the overview of why there's such a big need for the security platforms right now. >> Yeah, absolutely John. So if you see today's environment, we have seen working from anywhere it's become normal. And as part of that, we have seen so many different network edges. At the same time, they have different devices that they're using from anywhere. So what's important is as users have different devices, different users and applications that they're consuming from Cloud, we have to make sure that we provide security across the endpoint, across all network edges, and going to the Cloud compute. And for that kind of approach, you cannot have point products provide the visibility control and management. You need to have a comprehensive cybersecurity platform, which gives you security from that endpoint, to the edge, to the user, so that you have a simple but effective management and have a solid security in place to get that working from anywhere in a much more better user experience way. And that's exactly Fortinet describes as the security fabric platform. >> It's interesting not to kind of go on a tangent here, but to illustrate the point is, if you look at all the cyber security challenges that we're facing globally, especially here in the United States, the public private partnerships are increasing. We're seeing more public sector, commercial integration, the role of data. We've covered this on SiliconANGLE and many other cube interviews, especially with you guys. And there's all this kind of new approaches. Everyone's trying everything. They're buying every product that's out there, but now there's like overload. There's too much product. And that the obvious thing that's becoming clear, as cloud-scale, the evolution of this new edge environment. And so with that becomes the importance two trends that you guys are participating in. I want to get your thoughts on this because that's called SASE and SD-WAN. We know SD-WAN, but SASE stands for Secure Access Service Edge. That's I think Gartner made that term up or someone made that term up, but that's a new technology. And you've got SD-WAN, these are traditionally had been like edge for like branch offices. Now evolve now as pure network edges than a distributed computing environment. What's so important about these two topics. Nirav take us through the changes that are happening and why it's important for enterprises to get a handle on this >> Yeah John. So, as you said, SASE, Secured Access Services Edge. Really the foundation of that topic is the convergence of networking and security. And as you mentioned, Fortinet has been doing a lot of innovation in this area, right? Six years back, we pioneered the convergence of security and networking with security SD-WAN but what's happening now with the SASE is, as that working from anywhere continues to remain the dominant trend, users are looking for a Cloud-Delivered Security. And that's what Fortinet recently announced, where we can provide the most comprehensive Cloud-Delivered Security for remote users. For thin edge. You can still, anytime access from any device. To give you an example, now, our remote users, they are still at home or they can be branch of one user, but still have that always on threat protection with the consistent security given in the Cloud. So they don't have to go anymore from the branch or data center, but have a direct connectivity to the Cloud Security before they access SaaS application. That's what one of the SASE trend is. Second thing, John we are observing is users are now, as they are going back to the hybrid workforce, they are looking for a thin edge right? To your point of an edge, edge is still intelligent and a very important but there is an interesting architectural shift of, can I just use an intelligent networking there move my CapEx to OPEX and have security in Cloud? That unified security, unified policy is again becoming important. That's what SASE-- >> Okay, so I like this Cloud-Delivered Security. This is a hybrid workforce you're addressing with this marketplace, that's clear. Hybrid is a everywhere, hybrid cloud, hybrid workforce, hybrid events are coming. I mean, we love covering events physically but also now virtual. Everything's impacted by the word hybrid and Cloud. But talk about this thin edge. What do you mean by that? I mean I think thin edge, I think thin clients, the old trend. What is thin edge mean? >> Yeah, so there're different organizations are looking at the architecture in a different way. Some organizations are thinking about having a very simple branch where it is used for modern networking technologies, while security has been shifted to the Cloud deliver. What happens with this model is, now they are relying more into technologies like SD-WAN on edge to provide that intelligence steering, while everything in the security is being done in a Cloud compute way for both remote users and thin edge environment. Now the good news here is, they don't have to worry about the security patching, or any of those security capabilities. It is all done by Fortinet as they go and use the SaaS applications performance >> I want to come back and drill down on that but I want to get Peter in here in the Zero Trust equation because one of the things that comes up all the time with this edge discussion is network access. I mean, you go back to the old days of computing, you had edge log in, you'd come in, radius servers, all these things were happening, pretty simple cut paradigm. It's gotten so complicated now, Peter. So Zero Trust is a hot area. It's not only one of the things but it's a super important, what is Zero Trust these days? >> Zero Trust is indeed a very hot term because I think part of it is just it sounds great from a security standpoint, Zero Trust, you don't trust anyone, but it really comes down to a philosophical approach of how do you address the user's data applications that you want to protect? And the idea of Zero Trust and really what's driving it is the fact that as we've been talking, people are working remotely. The perimeter of the organization has dissolved. And so you no longer can afford to have a trusted internal zone and an untrusted external zone. Everything has to be "Zero Trust." So this means that you need to be authenticating and verifying users and devices on a repeat and regular basis, and you want to when you're bringing them on and giving them access to assets and applications, you want to do that with as granular of control as possible. So the users and devices have access to what they need, but no more. And that's kind of the basic tenets of Zero Trust. And that's what, it's really about prioritizing the applications and data, as opposed to just looking at, am I bringing someone into my network. >> God, the concept of Zero Trust, obviously hot. What's the difference between Zero Trust Access and Zero Trust Network Access, or as people say ZTA versus ZTNA? I mean, is there a nuance there? I mean, what's the difference between the two? >> That's actually a really good question because they both have the Zero Trust in the name. ZTNA is actually a specific term that a Gardner created or other analyst I should say, created 10 years ago. And this refers specifically to controlling application to controlling access to applications. whereas Zero Trust, overall Zero Trust access deals with both users and devices coming on to networks, how are you connecting them on? What kind of access are you giving them on the network? ZTNA is specifically how are you bringing users and connecting them to applications? Whether those applications are on premise or in the Cloud. >> So what the NA is more like the traditional old VPN model connecting users from home or whatever. Just connecting across the network with user to app. Is that right? >> That's actually a really good insight, but ironically the VPN clinical benefits of this are actually an outgrowth of the ZTNA model because ZTA doesn't differentiate between when you're on network or off network. It creates a secure tunnel automatically no matter where the user is, but VPN is all just about creating a secure tunnel when you're remote. ZTNA just does that automatically. So it's a lot easier, a lot simpler. You get a hundred percent compliance and then you also have that same secure tunnel even when you're "on a safe network" because with Zero Trust, you don't trust anything. So yes it really is leading to the evolution of VPN connectivity. >> So Nirav I want to get back to you on tie that circle back to what we were talking about around hybrid. So everyone says everything's moving to the Cloud. That's what people think. And Cloud ops is essentially what hybrid is. So connect the dots here between the zero trust, zero trust A and NA with the move to the hybrid cloud model. How does that, how does it, what's the difference between the two? Where's the connection? What's the relevance for your customers and the marketplace? >> Yeah, I think that again goes back to that SASE framework where ZTNA plays a huge role because John, we talked about when users are working from anywhere in this hybrid workforce, one of the important thing is to not give them this implicit trust right? To the applications, enabling the explicit trust is very important. And that is what ZTNA does. And the interesting thing about Fortinet is we provide all of this part of FortiOS and users can deploy anywhere. So as they are going to the Cloud-Delivered Security, they can enable ZTNA there so that we make sure this user at what time, which application they're accessing and should we give them that access or not. So great way to have ZTNA, SASE, everything in one unified policy and provide that anytime access for any device with a trusting place. >> Okay, real quick question to you is, what's the difference between SASE, Secure Access Service Edge, and SD-WAN? Real quick. >> Yeah, so SD-WAN is one of the core foundation element of SASE, right? So far we talked about the Cloud-Delivered Security, which is all important part of the security of the service. SASE is another element, which is a networking and a service where SD-WAN plays a foundation role. And John that's where I was saying earlier that the intelligent edge modern technology that SD-WAN provides is absolutely necessary for a successful SASE deployment, right? If users who are sitting anywhere, if they can't get the right application steering, before they provide the Cloud-Delivered Security, then they are not going to get the user experience. So having the right SD-WAN foundation in that edge, working in tandem with the Cloud-Delivered Security makes a win-win situation for both networking and security teams. >> So Peter, I want to talk to you. Last night I was on a chat on the Clubhouse app with some cybersecurity folks and they don't talk in terms of "I got ZTNA and I got some SASE and SD-WEN, they're talking mostly about just holistically their environment. So could you just clarify the difference 'cause this can be confusing between Zero Trust Network Access ZTNA versus SASE because it's kind of the same thing, but I know it's nuance, but, is there a difference there? People get confused by this when I hear people talking 'cause like they just throw jargon around and they say, "Oh, with Zero Trust we're good. What does that even mean? >> Yeah, we get a lot of that when talking with customers because the two technologies are so complimentary and similar, they're both dealing with security for remote workers. However sassy is really dealing with that kind of firewall in the Cloud type service, where the remote user gets the experience and protection of being behind a firewall, ZTNA is about controlling the application and giving them that secure tunnel to the application. So they're different things one's kind of that firewall and service, security and service, even networking in a service. But ZTNA is really about, how do I have the policies no matter where our user is, to give them access to specific applications and then give them a secure tunnel to that application? So very complimentary, but again, they are separate things. >> What's the landscape out there with competitive because has there products, I mean you guys are product folks. You'll get the product question. Is it all kind of in one thing, is this bundled in? Do you guys have a unique solution? Some people have it, they don't. What's the marketplace look like from a product standpoint? >> Yeah. So John, that starts back to the platform that we talked about, right? Fortinet always believes in not to develop a point product, but doing organic development which is part of a broader platform. So when we look at the thing like SASE, which required a really enterprise grade networking and security stack, Fortinet has organically developed them SD-WAN, we are a leading vendor, for the Gartner magic quadrant leader there, network firewall, including whether they deployed on Cloud, on-prem or a segmentation. We are a leader there. So when you combine both of them and ZTNA is part of it, there is only handful of vendor you will see in the industry who can provide the consistent security, networking, and security together and have that better user experience for the single management. So clearly there's a lot of buzz John, about a lot of vendors talk about it. But when you go to the details and see this kind of unified policy of networking and security, Fortinet is emerging as a leader. >> Well I always like talking the experts like you guys on this topic. And we get into the conversations around the importance under the hood. SASE, SD-WEN, we've been covering that for a long time. And now with Zero Trust becoming such a prominent architectural feature in Cloud and hybrid, super important under the hood. At the end of the day though, I got to ask the customers question, which is, "what's in it for me? "I care about breaches. "I don't want to be breached. "The government's not helping me over the top. "I got to defend myself. "I have to put resources in place, it's expensive, "and nevermind if I get breached." The criticality of that alone, is a risk management discussion. These are huge table. These are huge stakes and the stakes are high. So what I care about is are you going to stop the breaches? I need the best security in town. What do you say to that? >> Yeah this goes back to the beginning. We talked about consistent certified security, right John. So yes a SASE model is interesting. Customers are going to move to Cloud, but it's going to be a journey. Customers are not going Cloud first day one. They are going to take a hybrid approach where security is required in a segment, in an edge and on the Cloud. And that's where having a solid security in place is a number one requirement. And when you look at the history of Fortinet, over the last 20 years, how we have done, with our FortiGuard Labs, our threat intelligence and ability for us to protect over 450,000 customers, that's a big achievement. And for us to continue to provide that security but more importantly, continue to go out, and do a third-party certification with many organization to make sure no matter where customers are deploying security, it is that same enterprise grade security deployment. And that's very important that we talk to our users to make sure they validate that. >> Peter would weigh in on this. Customers don't want any breaches. How do you help them with the best security? What's your take on that? >> Well, to kind of reiterate what Nirav said earlier, we really believe that security is a team sport. And you do need best in class products at each individual element, but more importantly you need those products we talking together. So the fact that we have industry leading firewalls, the fact that we have industry-leading SD-WAN, we've got industry leading products to cover the entire gamut of the end point all the way email application, Cloud, all these products while it's important that they're, third-party validated as Nirav was mentioning, it's more important that they actually talk together. They're integrated and provide automated actions. Today's cyber security moves so fast. You need that team approach to be able to protect and stop those breaches. >> Well, you guys have a great enterprise grade solution. I got to say, I've been covering you guys for many years now and you guys have been upfront, out front on the data aspect of it with FortiGuards. And I think people are starting to realize now that data is the key, value proposition is not a secret anymore. Used to be kind of known for the people inside the ropes. So congratulations. I do know that there's a lot action happening. I want to give you guys a chance to at the end of this conversation now to just put a plug in Fortinet because there's more people coming into the workforce now. Post pandemic, young people with computer science degrees and other degrees that want to go into career with cybersecurity, could you guys share both your perspective on for the young people watching or people re-skilling, what opportunities there are from a coding standpoint, and or from say an analyst perspective. What are some of the hot openings? 'cause there are thousands and thousands of jobs give a quick plug for Fortinet and what openings you guys might have. >> Well, certainly in the cyber industry, one of the major trends we have is a work place shortage. There are not enough trained professionals who know about cybersecurity. So for those who are interested in retooling or starting their career, cybersecurity is an ongoing field. It's going to be around for a long time. I highly encourage those interested, come take a look at Fortinet. We offer free training. So you can start from knowing nothing to becoming certified up to a security architect level, and all those, all that training is now available for free. So it's a great time to star, great time to come into the industry. The industry needs you >> Any particularly areas, Peter you see that's like really jumping off the page. >> Well, it's hybrid, knowing Cloud, knowing on-prem, knowing the traffic, knowing the data on the applications, there's just so much to do. >> You're the head of product, you've got all, probably a ton of openings but seriously young people trying to figure out where to jump in, what are the hot areas? Where can people dig in and get retrained and or find their career? >> Yeah, no, I think to reiterate what Peter said, right? The program that Fortinet has built, LSE one, two, three which is free available, is a great foundation. Because that actually goes into the detail of many topics we touched upon. Even though we are talking about SD-WAN, SASE, ZTNA, fundamentally these are the networking and security technologies to make sure users are able to do the right work in the user experience. And that will be really helpful to the young people who are looking to learn more and go into this area. So highly encouraged to take those training, reach out to us. We are there to provide any mentorship, anything that is required to help them in that journey. >> Anything jump off the page in terms of areas that you think are super hot, that are in need. >> Certainly there's convergence of networking and security. There is a growing need of how and what is Zero Trust is? and how the security is applied everywhere. Definitely that's a topic of mine for a lot of our customers, and that's an area, it's a good thing to gain more knowledge and utilize it. >> Nirav and Peter, thank you for coming on. You guys are both experts and the leaders at Fortinet, the product team. The need for security platform is an all time high consolidating tools into a platform. More tools are needed and there's new tools coming. So I'm expecting to have more great conversations as the world evolves. Certainly the edge is super important. Thanks for coming on, appreciate it. >> Thanks for having us. >> Okay, Cube Conversation on security here in the Palo Alto studios. I'm John furrier. Thanks for watching. (ethereal music)
SUMMARY :
in the world today. Talk about the impact to the customer. to the user, so that you have a simple And that the obvious thing So they don't have to go the word hybrid and Cloud. are looking at the architecture here in the Zero Trust equation So the users and devices have access God, the concept of Zero Trust in the name. Just connecting across the of the ZTNA model because So connect the dots here So as they are going to the Okay, real quick question to you is, that the intelligent because it's kind of the same of firewall in the Cloud type service, What's the landscape So John, that starts back to the platform and the stakes are high. in an edge and on the Cloud. How do you help them So the fact that we have that data is the key, one of the major trends we really jumping off the page. knowing the data on the applications, Because that actually goes into the detail of areas that you think are and how the security and the leaders at here in the Palo Alto studios.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Fortinet | ORGANIZATION | 0.99+ |
Peter | PERSON | 0.99+ |
John | PERSON | 0.99+ |
Nirav Shah | PERSON | 0.99+ |
March 2021 | DATE | 0.99+ |
thousands | QUANTITY | 0.99+ |
John Madison | PERSON | 0.99+ |
Nirav | PERSON | 0.99+ |
Peter Newton | PERSON | 0.99+ |
Gartner | ORGANIZATION | 0.99+ |
John Furrier | PERSON | 0.99+ |
two technologies | QUANTITY | 0.99+ |
Zero Trust | ORGANIZATION | 0.99+ |
United States | LOCATION | 0.99+ |
Palo Alto, California | LOCATION | 0.99+ |
two | QUANTITY | 0.99+ |
ZTNA | TITLE | 0.99+ |
both | QUANTITY | 0.99+ |
SASE | TITLE | 0.99+ |
Palo Alto | LOCATION | 0.99+ |
Today | DATE | 0.99+ |
over 450,000 customers | QUANTITY | 0.99+ |
FortiGuard Labs | ORGANIZATION | 0.99+ |
one | QUANTITY | 0.99+ |
two great guests | QUANTITY | 0.98+ |
10 years ago | DATE | 0.98+ |
two topics | QUANTITY | 0.98+ |
Second thing | QUANTITY | 0.98+ |
first day | QUANTITY | 0.98+ |
FortiGuards | ORGANIZATION | 0.97+ |
Six years back | DATE | 0.97+ |
Cloud | TITLE | 0.97+ |
FortiOS 7.0 | TITLE | 0.97+ |
Last night | DATE | 0.97+ |
last month | DATE | 0.97+ |
today | DATE | 0.97+ |
OPEX | ORGANIZATION | 0.96+ |
one user | QUANTITY | 0.95+ |
each individual element | QUANTITY | 0.95+ |
John Maddison, Fortinet | CUBE Conversation January 2021
(upbeat introductory music) >> Presenter: From theCUBE Studios in Palo Alto and Boston, connecting with thought leaders all around the world, this is theCUBE CONVERSATION. >> Hi everyone, welcome to this special CUBE CONVERSATION I'm John Furrier, Host of theCUBE here in Palo Alto, California in our studios, we have a remote guest here talking about cybersecurity and all the industry trends and the recent news and announcements around Fortinet with John Madison CMO and Executive Vice President of products at Fortinet John, great to see you, welcome back to theCUBE. Great to have you back for some commentary around what's going on in the trends and your recent news. So thanks for coming on. >> Thanks John, nice to see you again. >> So you guys had earnings, congratulations again another successful results, you guys are doing well. Cyber is super important and that's the top conversation, cloud computing, cloud native, we're living in a pandemic. New things are exposed. Clearly the environment has changed in the past four months in a major, major way. So a lot of demand, a lot of needs out there from customers. So you guys had some earnings and you also have an update on your Fortinet OS67.0 platform with major updates. Let's quickly hit the news real quick. What's the hot topic? >> Yeah, well you're right. Things have accelerated in some ways in this cybersecurity world and we had the recent solar winds incident that's also made people look really, really closely at their cyber security strategy and architecture. We announced our results yesterday for Q4. For Q4 we had over 20% product growth which is the key, of course, the future growth. We also, for the full year in 2020 past 3 billion in billings for the first time for the company. And we're really proud of that. We're proud for a lot of reasons with our people and our team, but also another company that goes and makes large acquisitions to boost revenue and billings growth. We've done it predominantly organically over the last 20 years. And so we're very proud of our achievement and obviously a big thank you to our partners, our employees, and our customers. >> We also have been covering you guys for many, many years. Congratulations, well deserved good products win the long game, as we say on theCUBE, and that's a great Testament, but now more than ever I really want to get your thoughts because everyone that I talked to is really kind of sitting back saying, "Wow, look what's happened in the past three, six months in particular, a lot of sea change in both on the technical landscape, the intersection with society obviously with cyber, you mentioned solar winds that's been kind of hanging around. More data's coming out about how pervasive that was and how native it was for many months. So what's out there, we don't even know what's next. So this is causing a lot of people to take pause and reevaluate their environment. Can you share your perspective and how Fortinet sees this playing out and how that you are advising your customers? >> Yeah, well, leaving compliance and regulatory to one side for now because that's also a driver cybersecurity and focus on the two main drivers. One is the threat landscape, and I hinted a bit around that supply chain attack which affects a lot of people in solar winds incident. They got hold or got onto a device that has privileged access across a lot of servers and applications. And that's exactly what they wanted to get to. So state-sponsored ABTs, there's still volume out there. We still see now ransomware doubling every six months but that's very scary. The threat landscape around state sponsored. Now, the other driver of cybersecurity is the infrastructure. And whether that be end point. So as you know people are working from home as I am for the last eight months. So there's a on and off network, end point kind of a zero trust architecture there that people are looking towards. On the network side, we've seen these edges develop. And so whether it be the WAN edge, LANedge, Cloud Edge, data center edge even OT edge, those need protecting. So that's a big challenge for customers. And then also on the cloud side where the applications have moved to cloud, but different types of cloud, multi-cloud I've even seen building cloud recently. So that's a very adaptive area. So challenging for the customer in the terms of the threats and weaponized threats as well as the ability to cover all the different parts of the attack surface going forward. >> It's interesting, we've been living in a generation in the technology business around, you just get a tool for that. Every hammer looks for a nail, that's the expression. Now more than ever when you have this no perimeter environment, which we've been talking about for many years, that's not new. What is new is that everyone's now thinking about architectural systems approach to this and thinking systematically around the platform of what their business is. So in your announcement that you guys just released for OS67.0, there's really some meat on the bone there. You have the secure access, edge SASE and then the endpoint protection which are defined categories by the analyst. But those are the areas that are super hot. Can you translate that into the architectural equation because you and I were talking before we came on camera around how it's not just one thing there's multiple layers to this. Could you break that out for us please? >> Yeah. If you look at historically and I'm now coming up to my 20th year in cybersecurity. Before Fortinet I worked for an end point company. If you go back a while and I can, between 2000, 2010, the Endpoint Vendors were the the big cybersecurity players because Endpoint was where the data was and everything else. And then over the last 10 years the network security vendors, the next gen firewalls have been the most important vendors out there. And it's also reflected in revenues and market cap and everything else. What we're going to see over the next 10 years is the platform. And that platform can't be just an endpoint platform. It can't be just a network security platform or just the cloud platform, because you only, you're only seeing and defending and protecting a part of the overall we call digital experience. Whether it be a device in the factory, whether it be a person dialing in from somewhere or connecting from somewhere through the network and through to the applications you've got to measure that digital experience. And so that's going to be very important to be able to provide a platform that sits across all your devices users, across your whole network including new networks like 5G and across the applications and in the cloud. So the platform to us extends across all those areas. We've been building that platform on what we call our FortiOS operating system. The latest release is 7.0, which released yesterday. It obviously upgrades and extends all parts of the platform but we did major parts of the release yesterday were around SASE, which of course is the CloudEdge. So we're adding that CloudEdge to our component. We did acquire a company Opaque Networks a few months ago that's now we've integrated that technology. And then just as importantly on the access side, a zero trust network access capability for giving access per application. In fact, again, with this, I've talked a bit about in the past about all these Gartner acronyms I don't think zero trust network access is the right wording for it. It should be application access, because that's all we are going to move to. Application specific access versus just getting on the network and getting access to everything. But something that gives you context. So those are the two big things, but there's 300 plus new features across networking end point in cloud across management, inside the resource. It's a major release for us. And it gives us our customers the capability to really protect that attack surface from the end point to the cloud. >> Yeah, there's a lot of meat in there, from that release, I've got to say. but it's basically you're saying devices and users have access. That's been around. There's been tools for that. You hire people, you get some tools. Network access, it's been around. It's getting evolving. Now apps in the cloud, cloud native is a hot area. And people that I talk to, I want to get your reaction to this comment that I hear from people and customers and CXOs and developers. "Hey, we bought a tool for that. We hired a bunch of people. They mainly left, or the environment changed. We bought another tool. And then we bought a tool for that. We bought a tool for that." And then you have this kind of tool shed mentality, where they have tools that don't even have people to run them. So you have this problem there kind of tools need to be upgraded. And then you have this hot trend of observability on the app side, where now you have new data coming in on the application side, those are new tools. You got all kinds of stuff and competing for that. How do you talk to that customer? Because this is what the customer hears all this noise, all this action. They need to have it. They got to have the staff, they got to be trained up. What's going on there? What's your reaction to that? And how do you talk to customers who have this problem? Well, it's a big problem for them. Because, and by the way when I speak to a lot of customers about cloud they don't go to cloud because it's cheaper. It's not, it's actually more expensive. But they go to cloud to give them more agility because they want flexibility in the way they deploy applications as they go forward. And again, this pandemic has made a lot of companies realize they need to be more flexible in the way they deploy IT resources and faster in the way they bring up new services and applications. And so, but there's quite a few elements I say of cybersecurity and networking, which to me and to us are just features. You shouldn't be buying 40 different networking and cybersecurity vendors. You just can't staff and maintain that. And so we do see some things consolidated and converging into a single platform. We're a leader in the magic quadrant for SD WAN or a leader for network security or a visionary in WIFI. And many of the times in each of those magic quadrants, it's a different vendor or if it's the same vendor it's a different platform. For us it's the same platform in each one. And we pride ourselves in building not only best of breed capabilities, but also it's the same platform same management system, same API. And that gives the customer some capabilities in trying to manage that. What we say to customers is not a question of going from 40 vendors down to one That's no good, but go from 40 vendors down to maybe seven or eight platforms but make sure those platforms can inter-operate. They can share policy, and they can share threat intelligence. And that's why customers are looking to more of an architectural approach to cybersecurity but also they feel cybersecurity and networking are starting to converge at the same time. >> One of the biggest stories we're covering these days in 2021 besides the pandemic and how people are going to come out with a growth strategy that's secure, trusted and scalable, is the rise of the new executive in business in the enterprise where they're more tech savvy, right? You see executives like Satya and Intel. Intel, rise with the CEO of Microsoft. Andy Jassy rise up to the CEO of Amazon and you're seeing lawmakers in DC become more techie, less lawyer-oriented. So you seeing the rise of a business techie person. And I think this speaks to this holistic fabric philosophy you guys have as you talk to customers, when they look at the business impact of cybersecurity, for instance you mentioned solar winds earlier. I mean, these are deadly company killing events. This is real. So it's not just an IT problem. It's a business problem. How do you guys talk to customers, obviously that you have the security fabric and you're stitching things together? What's the conversation when you talk to customers like that? >> One interesting thing I've noticed, and I do quite a lot of customer calls each week, executive briefings and pretty early on, I noticed that both the infrastructure networking with the CIO team and the cyber security the CSO teams run on the same video call and that's got more and more as we've gone on. And I think what companies have realized is that if they want to move fast, they can't have these silos or this layering of capabilities. Then when they build something they needed to build it securely from day one and have that as a joint team. And so I don't think the teams are not merged but they're definitely working more closely. And I think the responsibility of reporting back into the board level gain is not just, it's just an IT project. Oh, by the way, we've got a security project. It's the same project. And I think that's again, points to this convergence of networking and security. >> Yeah. The silos got to be broken down. That's been a theme that's been more highlighted more than ever the benefits and the consequences of doing it or not doing it are clear to people especially at all levels of the corporation and tech. That brings up my favorite conversation. I always ask you whenever you're back on theCUBE giving me an update on what's going on with Fortinet I got to ask you how it's going with data, because data again is the consistent theme we always talk about, how we're exposing that data, how we're protecting that data, the role of data as people continue to get more data and figure out how to use machine learning how to use AI, how to democratize it all kinds of things are happening around data. What's the latest in your opinion? >> Yeah, I think there's progress, but I always say there's progress on both sides. The cyber criminals, big AI networks and machine learning just to counter what the cyber security companies are doing. I think right now we're processing hundreds of billions of events on a weekly basis. We've got the largest install base of network security out there over 500,000 customers. And so processing that event, it's going well in that we're able to determine really quickly for specific threat vectors in specific geographies that this battle good. It's about a good file. It's about a good URL. It's a vulnerability that's associated with Stevia. So we're able to kind of do use machine learning and volume against a specific application to get a good result. The key going forward for us, and I think for the whole industry is using the AI to start to discover campaigns in the wild like the solar winds ones, which is going on without anybody knowing. And that takes a lot of compute, takes a lot of threat intelligence and the AI piece needs to understand the relationship between the different elements of threat vectors, the command and controls and everything else to get you that result. I do think a couple of things. One is the cybersecurity industry, and I've said this before on this broadcast is are not walking together as they should. And sharing this threat intelligence across the industry. As soon as they find something, I actually applaud Microsoft on the solar wind side, they got information out really quickly and did well. And so we did the same. I think the industry needs to do more of that more proactively. And then I do think that, again, that I see a lot of companies cybersecurity companies claim a lot of things without any evidence that it works whatsoever. >> The world's got to call them out the consequences of not having, things work as they're advertised and or sharing them, your point about sharing. There should be some recognition for folks that are actually being fast on the sharing side. It's not like... We need our own militia against the bad guys. That's what's kind of going on here. So great stuff. I got to get your thoughts on the edge real quick. I know we talked about it briefly. You broke it down to three categories device users, network, and then apps in the cloud. The hottest topic on our recent CUBE on cloud editorial virtual event we had was the edge. And edge being industrial edge. And also, just the edge of the network with humans and users and devices. How are you seeing the current situation out there? A lot of hype, obviously the reality of that, that we're in a distributed network, the internet and the web and the cloud cloud natives coming. What's Fortinet's thoughts? What's your thoughts on how the edge is evolving and what people should pay attention to when they look at as they're architecturally planning for building out and managing and securing the edge? >> Given this a zero trust conversation on users and devices and given that people are familiar with the cloud and how they're going to use cloud. I think the network is becoming a really important very important area. And some people say, "Oh, don't worry about the network, just go to the cloud." The network is very important in providing that digital experience, but what's happening with the network is it's being stretched. It's being extended into factories. It's opening up on the winning side. You've got people now working from home. You've got that edge that used to be just the data center edge is now CloudEdge and SAS edge. And so you have to pay close attention to those edges. Now what you can't do is say, "Oh, I know we've got all those edges there. Let me overlay some security on each edge," because it's going to be different the way you deploy that in on a wifi device versus a CloudEdge. And so what you need to look towards is convergence of a capability either of the CloudEdge or the WAN edge or the LTE edge, it's got to be converged networking, and security. Otherwise it's too operationally inefficient, too complex to do. And so I think this is a really important subject and area for customers because as I said at the beginning, it provides that digital, we acquired a company called (indistinct) a few months ago, which actually focuses on the digital experience monitoring marketplace. What are users actually going through in terms of availability and quality and performance all the way from their device, all the way back into the application? I think that's very important. And the network edges have to be secured, where you can only do it through a converged solution. >> Yeah, that's a great point Architecturally, you might have a good technology or product look on paper but the complexity is the vulnerability. That's a really, really great point. John always great to have you on. Thanks for coming on, sharing the update. Before we end, I'll give you a quick minute to plug the news you had. Quickly put a plug in for the release you guys just put out around the new FortiOS 7.0 the features. What's the most important point about that release? Share, take a minute to explain. >> Yeah. FortiOS 7.0 is our big release our operating system is big news because it allows us FortiOS to sit at any edge across the network, whether it would be the one edge CloudEdge, data center edge. We've extended it into the CloudEdge with SASE in this release. We're also bringing in zero trust network access capabilities but overall it includes 300 features across the network, Endpoint in cloud. So a very important release for us and our customers and partners. >> John, great to have you on theCUBE again and get the news. You guys doing a great job, congratulations on your earnings but more importantly, congratulations on the product success and how you guys are thinking about it as a platform. That's what customers want. And you guys are continuing to do a great job there and congratulations from the news. Thanks for coming on. >> Thanks Jim. >> Again, John Furrier here inside theCUBE for CUBE Conversation getting the update on Fortinet and cybersecurity. Look for our cybersecurity coverage on SiliconANGLE.com. And of course, theCUBE's coverage continuing to talk to the thought leaders and the people making things happen, securing our networks and our cloud and deploying cloud native applications. Thanks for watching. (upbeat music)
SUMMARY :
leaders all around the world, and all the industry trends in the past four months in billings for the first in the past three, and focus on the two main drivers. in the technology business around, So the platform to us extends and faster in the way One of the biggest stories I noticed that both the and the consequences and the AI piece needs to understand and managing and securing the edge? And the network edges have to be secured, Thanks for coming on, sharing the update. We've extended it into the CloudEdge and congratulations from the news. and the people making things happen,
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Jim | PERSON | 0.99+ |
John | PERSON | 0.99+ |
seven | QUANTITY | 0.99+ |
John Furrier | PERSON | 0.99+ |
January 2021 | DATE | 0.99+ |
Amazon | ORGANIZATION | 0.99+ |
Andy Jassy | PERSON | 0.99+ |
John Maddison | PERSON | 0.99+ |
Fortinet | ORGANIZATION | 0.99+ |
Microsoft | ORGANIZATION | 0.99+ |
2020 | DATE | 0.99+ |
Boston | LOCATION | 0.99+ |
40 vendors | QUANTITY | 0.99+ |
Intel | ORGANIZATION | 0.99+ |
Palo Alto | LOCATION | 0.99+ |
20th year | QUANTITY | 0.99+ |
Palo Alto, California | LOCATION | 0.99+ |
yesterday | DATE | 0.99+ |
300 features | QUANTITY | 0.99+ |
2010 | DATE | 0.99+ |
first time | QUANTITY | 0.99+ |
eight platforms | QUANTITY | 0.99+ |
FortiOS 7.0 | TITLE | 0.99+ |
both sides | QUANTITY | 0.99+ |
2021 | DATE | 0.99+ |
FortiOS | TITLE | 0.99+ |
over 500,000 customers | QUANTITY | 0.99+ |
Endpoint | ORGANIZATION | 0.99+ |
each edge | QUANTITY | 0.99+ |
theCUBE | ORGANIZATION | 0.99+ |
One | QUANTITY | 0.99+ |
2000 | DATE | 0.98+ |
John Madison | PERSON | 0.98+ |
two main drivers | QUANTITY | 0.98+ |
Opaque Networks | ORGANIZATION | 0.98+ |
one side | QUANTITY | 0.98+ |
OS67.0 | TITLE | 0.98+ |
each week | QUANTITY | 0.98+ |
both | QUANTITY | 0.98+ |
CloudEdge | TITLE | 0.98+ |
one | QUANTITY | 0.98+ |
each | QUANTITY | 0.98+ |
over 20% | QUANTITY | 0.97+ |
each one | QUANTITY | 0.96+ |
three categories | QUANTITY | 0.96+ |
DC | LOCATION | 0.96+ |
pandemic | EVENT | 0.95+ |
300 plus new features | QUANTITY | 0.95+ |
3 billion | QUANTITY | 0.95+ |
two big things | QUANTITY | 0.93+ |
Q4 | DATE | 0.93+ |
single platform | QUANTITY | 0.93+ |
SASE | TITLE | 0.93+ |
theCUBE Studios | ORGANIZATION | 0.92+ |
40 different | QUANTITY | 0.91+ |
One interesting thing | QUANTITY | 0.91+ |
zero trust | QUANTITY | 0.91+ |
hundreds of billions of events | QUANTITY | 0.9+ |
every six months | QUANTITY | 0.89+ |
last 20 years | DATE | 0.89+ |
few months ago | DATE | 0.89+ |
one thing | QUANTITY | 0.88+ |
Gartner | ORGANIZATION | 0.88+ |
last eight months | DATE | 0.84+ |
zero | QUANTITY | 0.84+ |
six months | QUANTITY | 0.83+ |
Satya | ORGANIZATION | 0.81+ |
past four months | DATE | 0.8+ |
last 10 years | DATE | 0.8+ |
SiliconANGLE.com | OTHER | 0.79+ |
few months ago | DATE | 0.78+ |
John Maddison. Fortinet | CUBEConversation, July 2020
>>From the cube studios in Palo Alto, in Boston, connecting with thought leaders all around the world. This is a cute conversation. >>Everyone. Welcome to the cube conversation here from our Palo Alto studios. I'm John furrier, host of the cube. We're here with our remote crew, getting all the interviews, getting all the stories that matter during this time were all sheltering in place during the COVID crisis. We've got a great returning guest, John Madison, EVP of products and chief marketing officer. Fordanet John. Great to see you, uh, looking good with the home studio. They're getting used to it. Yeah, indeed. Good to be here again, John. Thanks for coming. I really appreciate it. We're hearing a lot about sassy, which has a secure access network adjuncts, zero trust network access. Uh, what does that all mean now these days? What does this sassy? Well, there's definitely a lot of hype around the word sassy, which is the security of the age. Uh, for us actually it confirms a strategy that we've had since the beginning of the company. >>And two important concepts. One is, uh, the coming together of, uh, networking and security. We could refer to it as security driven networking, and we've been doing it using ACX and appliances for a long time. Uh, we're now going to expand it to a cloud as well as that's one concept, again, bringing together networking and security or converging them in a way. And then the second concept is more around a platform approach. So if you look at the definition of sassy, it includes, it includes web gateway as a service you a trust Caz B, a wife, et cetera. And so bringing those together in a platform approach, we refer to it as the fabric. So we're actually really happy about those two concepts coming together. Maybe the name itself could be, could be different, but definitely the concepts and the technologies play really well to our strategy. >>Yeah, it's sassy. S a S E not two ways, not like SAS softwares of service. Wait for one noses cloud. Yeah. I tried using the full name and I've reverted back to sassy again. So short and sassy, keep it short and sweet. Um, okay, well this is a super important relevant topic for multiple reasons. One is COVID is kind of accelerated the future for everybody. And you know, we've been kind of riffing on Twitter and throughout the industry I've been calling it the big IOT, uh, experiment because the unforecasted disruption of COVID is forced everyone to work at home. So the notion of work changes workplace is now home workforce, the people, how their interaction with the networks, workloads, workflows, all changing new expectations, new experiences. This is the real deal. And the edge is where the action is. That's the big, new obvious architectural highlight here. >>Yeah, so we talked last time. I think it would just be getting this work from home, uh, element, but, um, we're still here. And I think what it says is that what is forced is that, uh, enterprises and customers need to look at their edges and they're increasing. So we always, the one edge was a new one over the last two years. As we introduced us the, when they had a data center edge, they had an endpoint edge and now you have a home edge. And so you've got to apply security as a cloud edge as well. You've got to apply security to these edges. And the key is the flexibility to apply the security you want and you need against this agent. And so we're seeing some customers right now, look at setting up mini enterprise networks to protect that home age again, in that, in the homes of their executives or developers. >>And we reported with the news. You guys had a couple of months ago around just as such been a feeding frenzy for hackers and bad actors to go after the home environment. Um, as well as the it guys who are working from home, you have the cloud consumption's shifted as well. You're seeing the cloud players doing extremely well because now you have more cloud, you have more vulnerabilities at the edge with the home. This is changing completely increasing the attacks. >>Yeah. The tack factors, you know, predominantly, still actually, you know, a lot of fishing, but then if you're on the network, that attack factor is very important. So for us, and, you know, we did an acquisition last week of opaque networks because that gave us an additional consumption model and different additional form factor. So if somebody going from the home straight into the cloud, or the pairing off a branching off an SD Wang connection straight into the cloud, we can now apply that cloud edge security throughout our sassy capabilities. And so again, the ability to have security at all, these edges has become very important going forward. So for us now we've got appliances, we've got virtual machines, we've got cloud delivery, and this is becoming very important to customers. I'm not saying, and customers are not saying they're going to go to just cloud only going forward. They're going to be hybrid. And so having those options is very important. >>You mentioned opaque networks, we reported that acquisition. Congratulations. What does that mean for Fordanet and where does that technology fit? And you mentioned software. Can you just take a minute to explain the acquisition impact Affordanet and where does the tech fit? >>Well, as I said, we've been driving a lot of this conversion, sassy conversions through our appliances. Um, but it's sometimes makes sense to put that security closer to the cloud during points or wherever. And so opaque, we really liked their model of building out these hyper hearing stations and making sure they got high-speed security there as well as edges. And so, um, we bring, we're going to bring that inside our environment, uh, update it to include some of our technology, uh, but it gives us now great flexibility, uh, of applying that security at the SD wan edge, the data center agent now without edge or longer-term roadmaps will integrate orchestration capabilities. It also includes a zero trust network access capability as well. So really when we looked at our, uh, of sassy framework, uh, we had most of the things in place. This now adds firewall as a service as well as zero trust network access, giving us the most complete sassy framework in the marketplace. >>What is the security component of the work at home? You mentioned earlier, there's more networks and companies are looking to kind of up level the capabilities. Can you give an example and take us through what that like and what companies are thinking about, because it's not just, here's some extra money for your home bandwidth, your people are working there. It's like, it's gotta be industrial strength edge. Now it's not just, um, you know, temporary and their kids are home too. So you got they're gaming, they're watching Netflix, people zooming in and doing WebExes all day long. >>Yeah, it can be as simple as putting a zero trust network access, you know, an agent on there and doing some security locally, and then going back through a proxy in a, we believe actually that it's, it can be even better than that. That can apply many enterprise security in your house through a next gen firewall, give high availability through SD wan, uh, then, you know, expand out their secure access and switching and end points. And we can do that today. I think what's going to be key going forward is as you're dealing as it, uh, teams have to deal with more of a consumer approach remotely in the homes, we're gonna have to simplify the way things get set up, such that you can easily separate out, maybe home usage from corporate enterprise users. So that will be something we'll be working on over the next 18 months. >>I mean, just the provisioning, the hardware, okay, here you go. Plug it in it. Should it be plug and play? And this is kind of back to the future of where SAS is going. I mean, the old days was plug and play was the technology. Now you've hit that concept. It has to be auto configured. You have to provision pretty quickly. What's the future of sassy in your mind. >>Yeah. And so, you know, if you think about, you know, coming back to the home usage, then people have dumbed down those routers and the security is very simplistic. So we, people can just plug and play. If you, it needs to be a bit more sophisticated. Uh, you're going to need to put some tools in place. We believe longterm that the sassy model, once you've got the platforms in place, once you've got SD wan in place, your Cosby or your sassy zero trust and longterm, you're going to need an orchestration system. That's more AI driven. So we've done a lot of work on AI around security and making sure we can see things very quickly. Um, but the longterm goal, I think will be around AI ops, AI network ops, uh, where the system and the big data systems are looking across your network, across these different components to see where there may be an issue. Maybe there's a certain length has gone down across a certain ISP. We need to bring that back up. Maybe there's a certain cure or as to an application in the cloud somewhere. So we need to change the OnRamp. Uh, so once everything's in place and you have that console and policy engine that can look across everything, and then we need to get smarter by looking at the data and the logs, et cetera, and applying some of that AI technology. >>You know, John, we've been following Fordanet as you know, for many, many years and watching the evolution of you guys as a company. And also as the industry, the new waves are coming in. Um, a lot of the stuff you're doing with the fabric and now the secure driven networking has been kind of on the playbook. So I want to get your thoughts before we get into those topics and define them and kind of unpack them. But generally customers are looking at, um, a slew of vendors out there and you have 10 of two approaches. You have a platform, and then you have the we're an application or fully full stack or SAS or something. And this there's trade offs between the two. And how should customers understand the difference? Because there's different value propositions for each platforms, more enabling out of the box, SAS or point solution can solve a particular thing, but it may not have that breadth. How should customers think about a platform approach or fabric and how should they think about the value and how to engage with that longterm? >>Yeah, I'm definitely seeing more customers look towards a platform going forward. They just can't manage all the different point solutions and you don't have to train an individual in that product. You have to have a separate management console, you have to integrate it. And so more and more I'm finding customers wanting to converge, which is the basis of sassy consolidate applications onto a platform of security applications. What's important over that platform is that the consumption model is flexible enough to be an appliance, to be a virtual machine and to be cloud delivery does as a customer's networks move and their orchestration systems move into different, more cloud, or they've got their IP enabling their factories, for example, then they need that security to be flexible. So yes, you need to be a platform as the way forward. Um, but two things. One is you need a flexible consumption model for it. You know, clients, virtual machine and cloud. And also that platform needs to be very open. It needs to have connectors into the main orchestration systems that needs to allow people to build API and automation. So, uh, yes, you, you need a platform, but it needs to be open and it needs to be flexible. >>Great, great insight there. And that's exactly what the marketing, especially with cloud the kind of scale, second follow up question to that is how do you tell the difference between a tool camouflage is a platform. So I have a tool I want to sell you a tool, but no, it's a platform. So a lot of people are peddling tools and saying their platforms. How do you know the difference? >>Well, to me, a platform that has much greater scope across the attack surface festival, they attack factors whether that be email or application the network, the end point. So platforms not just of a specific attack back to go across the complete surface. And then also a platform is Wednesday organically built, allows those products to communicate. So then you can build automation across it. It's very hard to build automation across two or three different vendors. They have different scripts. So been able to build that automation. And then of course, on top of that, to have a single view, single visibility capability, as well as longterm applied that AI ops across it. So platform is very, very different from the, some of the tools I've seen in the marketplace. >>I want to get to your reaction to a comment that your CEO said about security driven, networking, and underscores what we've been saying for years, blah, blah, blah. He goes on in this era of hyperconnectivity and expanding networks with the network edge stretching across the entire digital infrastructure, um, networking and security have to be kind of be their, their convergence. You mentioned describe how you view hyper-connectivity and expanding networks and how the edge stretches across the digital infrastructure. What's what does that look like? Can you share your vision of that? >>Well, when you think about networking, if you go back 20 years, when you have these 10 megabit per second connections, learning, networking, and routing and switching, they haven't really changed that much over the last eight years, 20 years, they've just got a lot faster, gone to now to 400. You give us a second, but the basic functionality is the same. And so it's allowed them to go a lot faster. Um, security is very different, even though it started off with firewalling than VPN, and then next gen firewall, SSL inspection, all these functionalities IPS have been added, making a lot harder for it to keep up in the network. And so one of the fundamental principles of security and networking is bringing these two things together, but accelerating them either using a six and now cloud through our acquisition, uh, to allow those to run in a converged format. >>And that's very important because as I said, there's now more, you can look at it two ways. You can say the perimeter has expanded because it used to be a very narrow perimeter. The data center across these areas, or at the edges have formed as well. There's new edges sitting at the OT environment, sitting at the wan edge, sitting at the home mattress. I talked about seeing the cloud edge. And so the ability to apply that security in very high performance, very high quality security, not just a small sampling of security, a full enterprise stack, but those edges is going to be critical going forward. And the flexibility to apply in different ways is going to be very important. >>I think the convergence piece is totally relevant and honestly it consolidating into a platform is very key point there. Um, while I got you here, I would just like you I'd like you to define what is security driven networking and what does it mean to be security driven? So define security, driven, networking, and give an example of what it means. >>Yeah. And so I think it's, I think the one edge was one of the best examples of it. I mean, actually go before that next gen Fila was where you bought firewalling and then content inspection to go there. But I think the latest one is definitely the one edge or secure SD land where you had a networking function, which was to get the users to the right applications. And so they got this application now steering that goes out through there. Well, you also want to apply security to that because security into the wham, you've also got to protect the land. And so the ability to run a security stack there, whether it be IDs, right, patient control is very important. So getting all those networking functions, working at high speed, getting all the security functions, working at high speed, uh, is that it's the kind of the Genesis of security driven networking, and you can apply it there. We can also apply it in other places at the age, in the cloud. Now the home, uh, it's a very, very important concept, uh, to be able to run networking and security together. But high speed, >>Everyone has their own kind of weird definition of sassy, depending on when you're building your own or different analyst firms. Uh, I noticed you guys have a different take on this. Even Gartner has a different view on this. How do you guys diff differ from that, that definition and what should people be aware of when they hear that? What is the right definition? >>Yeah. You know, it's unfortunate. I mean, I think Ghana does some good work there and that they define it and I've come up with sassy, but this is like acronym soup. And, you know, I want a bit of next gen firewall on my sassy. It's just, it's just so many different terms. It confuses the customer. Then what makes it more confusing is that vendors look at their portfolio and go, Oh, sassy is a hot topic. I've got a sassy as well. And really, it should be very clear what the definition from Gardner is. It is bringing together security and networking. Now their definition is that they, uh, you should do that in the cloud, which we agree with as well, but it can only be in the cloud. The reason it's in the cloud is because not many people have got the ability to run on an appliance very fast. >>So we believe our different stairs that you should be able to run it on an appliance virtual machine in cloud. And then the second kind of differences that they've defined the components of Sassies being Estee, wagon, Cosby, firewalls, a service zero trust. We also think that the land age is very important. So we would add into that definition, that secure access of wifi and Ethan at switching as well. And so we try and point out, you know, the gun definition and we also point out where we differ and I think that's fair to the customer can make a good decision. >>I think it is fair. And I think one of the things I've been saying for years, and I love garden, I love the guys over there and gals. I just don't think that their business model is real time as much, but they ended up kind of getting it right down the road. But you brought up a good point. And again, I've been saying this for years, cloud changes Gartner's model because there's, if you have quadrants, it implies silos and implies categories. And one of the best things about cloud is it does horizontally scale. So some of the best vendors actually have multiple capabilities that might fall on different quadrants that may or may not be judged on a criteria that meets what cloud's doing. So, yeah, for instance, Asics, you mentioned right. That's in there too. You get cloud and ACX is that where they've got two different categories? You add the edge in there. If you do all three, really great as an integrated, converged and consolidated platform, you're technically awesome, but you might not fit in the quadrant. >>Yes. That's a really good point. I have this conversation with them all the time in that traditionally enterprises have a networking teams and security teams, and they've been in silos or I've had a networking team that just does switching or just this routing, just this SD wan. And I have a security team that does web gateway, and then they like to separate them all into different components. When you look inside those Nike quadrants, they're all different, even at the same vendor, the different products. And what we like to do is bring it all together. You a single operating system, a single appliance or cloud virtual machine. Sometimes it's not quite, it doesn't quite fit the model, but in the end, you're trying to do the same thing. Know, and COVID-19 >>One of the real realities that everyone's dealing with is it does expose everything and an expose. And again, it's been a disruption unforecasted, but it's not like an outage or a flood or a hurricane. If it happened and it's happening, it really puts the pressure on looking at the network. It's looking at how you can have continuous operations. How are you working with your people and workloads, workforces apps. You got to have it all there. And if you're not digitally enabled, you're going to be on the wrong side of history. This is what companies are facing every day. And they've got to come back and double down on the right project. So every CXO I talk about, that's the number one challenge I need to come out of the pandemic with a growth strategy and an architecture. That's going to allow me to take advantage of the new realities. Hey, it's really good for people to work at home. That's cool. Some people are going to continue to do that. Maybe that's normal. Maybe that's a new tactic >>And it's going to vary by industry as well. So if I'm a retail outlet, I absolutely need it 100% of the time, but those retail outlets cause people are ordering online and then they're driving up. And so it has changed the dynamics. It's for me working at home, I have to be on all the time. And so the ability to do really good, high quality networking, high availability, high IQ of as, with this integrated security across the different edges is super critical. >>I was talking with a network friend of mine. Again, we were having a few zoom cocktails and do a little social networking online. And we were like, and we've, and we've mentioned it before in the queue, but we keep coming back to the land is the new land. And meaning that it's in the old days, land was everything, everything, the local area network, and you were inside the data center, everything was great on premises. When is the new land? So if you think about it that way you go, okay, when edge I got a, now Atlanta at home, you got to SD wan and your house, of course you worked for Fournette. So it's a little bit beneficial for you, your, your, your, your geek there, but this is the new normal where it's all one network. It's not just a land link, it's a system. Can you react to that? What's your take on that? When is the new land kind of ref, >>First of all, it can't be too picky. He goes on the CMO as well. So there's no talk about the geekiness. Um, but, um, it's just, it just makes as a skip saying, it's, it's, it's making sure that wherever you may be, uh, you know, you're doing less traveling these days, but that may come back at some point or where they are at a branch office or a campus environment or wherever applications, and then moving around in different clouds, in different areas, in terms of consumption of workloads, um, wherever that's happening, you gotta be able to be flexible and applying that security to the different edges, land edge, one edge home edge data center edge. And so the ability to do that, uh, while providing high speed and connectivity, uh, is very important. And then again, as you go forward and you implement that platform approach. So not just the point product now, three or four products working together, uh, being able to apply that policy orchestration and AI ops is going to make sure that they get that user in the end. It's all about the user experience. Do I have a high quality of experience, whatever application I'm using? That's the key measurement in the end? >>You know, one observation I would have, if you look back at the whole virtualization trend, going back to the early days of VMware, that kind of enabled Amazon and kind of having a large scale kind of infrastructure, hyperconvergence really kind of collapsed everything together. And now you seeing things with Amazon, like outposts, you seeing, you know, these non premises devices, which is basically one cloud operations kind of highlights what you're saying here. And I want to get your thoughts on this because the combination of Asics with cloud, it's not a bug, it's a feature for you guys. That's a value proposition and it's kind of consistent with some of the big players like AWS. When you look at what they're doing and apprenticeships, for instance, what they're putting in the servers, having that combination of horsepower Asex with cloud is a guiding principle of the future architecture. Can you share your thoughts was also, you guys are, are announcing that and have that feature. >>Yeah, well, w another reason why I like the opaque acquisition as they were their major appearing pubs into the different cloud service providers that were using hardware and that hardware, uh, we, we can run hardware and with our Asics almost 50, a hundred times faster than equipment CPU. So I've got a firewall application I've gone on appliance. There, I may need a hundred virtual machines and, and CPU they're running the same thing. So again, we're coming back to our definition of security driven, networking in our minds. It can be basic, it can be virtual machine and it can be cloud. Now, imagine if we can take the best benefits of basic and combine that with cloud, uh, that's a great model going forward again, given that flexibility. So when people think cloud something has to run on something, it doesn't run in fresh air. So, you know, the big cloud vendors are putting in some Asex to accelerate some of the AI stuff, and we're going to use the same thing in some of our major, what we call 40 sassy. You know, our naming methodology is 40, whatever it does or going forward to provide us that performance and high availability now. Yeah. So you're always going to need some flexibility of virtual machines in certain areas, but we think the combination of both, it gives us a great advantage. Yeah. >>And there's definitely evidence that, I mean, there's a, there's kind of two schools of thought on hardware. Are you a box mover, you know, commodity general purpose, or are you using the hardware and a system architecture, acceleration has been a huge advantage, whether I've seen companies doing accelerated Kubernetes processing, you know, for clusters and some, you know, see GPS are out there. It's, it's, it's how you use the hardware. Yeah. That's the, really the key it's and again, back to the architecture. So, okay. So wrapping up, if you, if you believe that, and you look at the fabric that you guys are having out there, and as it evolves, what's the, what's the next level for 400. How do you see this going forward? You've got security driven networking, and you got the fabric. What's next? What are you guys working on the product side? >>I know you're public, you can't reveal any future earnings, but give us a taste of kind of the direction on the roadmap. I think, you know, we've got now all the, all the kind of component that underlying components of the platform in terms of the ability to apply appliances, deliver it by appliances or virtual machine or cloud. Um, we've got a very broad portfolio from endpoint, uh, all the way into, to the cloud and the networks, all those things that are in place. Obviously you always need some features here and there as you go forward and nest it when and next gen firewall, et cetera. Um, but I think the longterm, I think a goal for his nine is to, again, to apply a bit more intelligence, uh, both from a security perspective and from a network perspective, such that we can predict things, we can automatically change things. >>We can build automation and react to things much more quickly. So I think the building blocks are in place. Now. I think it's the ability to provide a bit more smarts across it, uh, which of course takes big data and very specific application programming. And I think, uh, definitely our customers are asking us about that. And we look very closely with our customers to build out that, to make sure it meets their needs going forward while it's great to see the platform continue to grow and, and fill in a holistic view of the, of the landscape from edge to throughout the enterprise. So a great strategy and thanks for the update, John Madison, the VP of product and CMR for that. John. Great to have you on. Thanks for coming on extra. Okay. This is the cube conversation here in Palo Alto studios. I'm Chad for a year hosting the cube. Thanks for watching.
SUMMARY :
From the cube studios in Palo Alto, in Boston, connecting with thought leaders all around the world. I'm John furrier, host of the cube. So if you look at the definition of sassy, it includes, And you know, flexibility to apply the security you want and you need against this agent. You're seeing the cloud players doing extremely well because now you have more cloud, And so again, the ability to have security at all, And you mentioned software. Um, but it's sometimes makes sense to put that security closer to the cloud during points or wherever. So you got they're gaming, uh, then, you know, expand out their secure access and switching and end points. I mean, just the provisioning, the hardware, okay, here you go. and you have that console and policy engine that can look across everything, and then we need to get smarter by And also as the industry, the new waves are coming in. You have to have a separate management console, you have to integrate it. So I have a tool I want to sell you a tool, but no, it's a platform. So then you can build automation across it. Can you share your vision of that? And so one of the fundamental principles of security and networking is bringing these two things together, And so the ability to apply that security in very high performance, very high quality security, Um, while I got you here, I would just like you I'd like you to define what is security driven networking And so the ability Uh, I noticed you guys have a different take on this. The reason it's in the cloud is because not many people have got the ability to So we believe our different stairs that you should be able to run it on an appliance virtual machine in cloud. And one of the best things about cloud is it does horizontally scale. And I have a security team that does web gateway, that's the number one challenge I need to come out of the pandemic with a growth strategy and And so the ability to do really good, high quality networking, And meaning that it's in the old days, land was everything, And so the ability to do that, And now you seeing things with Amazon, So, you know, the big cloud vendors are putting in some Asex to accelerate some of the AI stuff, you know, for clusters and some, you know, see GPS are out there. I think, you know, we've got now all the, all the kind of component Great to have you on.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
John | PERSON | 0.99+ |
two | QUANTITY | 0.99+ |
Amazon | ORGANIZATION | 0.99+ |
John Maddison | PERSON | 0.99+ |
Asics | ORGANIZATION | 0.99+ |
Palo Alto | LOCATION | 0.99+ |
100% | QUANTITY | 0.99+ |
John Madison | PERSON | 0.99+ |
10 | QUANTITY | 0.99+ |
July 2020 | DATE | 0.99+ |
Boston | LOCATION | 0.99+ |
AWS | ORGANIZATION | 0.99+ |
Ethan | PERSON | 0.99+ |
second concept | QUANTITY | 0.99+ |
Gartner | ORGANIZATION | 0.99+ |
Atlanta | LOCATION | 0.99+ |
three | QUANTITY | 0.99+ |
one concept | QUANTITY | 0.99+ |
two things | QUANTITY | 0.99+ |
Nike | ORGANIZATION | 0.99+ |
COVID-19 | OTHER | 0.99+ |
two ways | QUANTITY | 0.99+ |
20 years | QUANTITY | 0.99+ |
both | QUANTITY | 0.99+ |
One | QUANTITY | 0.99+ |
Affordanet | ORGANIZATION | 0.99+ |
last week | DATE | 0.98+ |
two concepts | QUANTITY | 0.98+ |
Fordanet John | PERSON | 0.98+ |
20 | QUANTITY | 0.98+ |
each platforms | QUANTITY | 0.98+ |
Fordanet | ORGANIZATION | 0.98+ |
two important concepts | QUANTITY | 0.98+ |
400 | QUANTITY | 0.98+ |
one | QUANTITY | 0.98+ |
today | DATE | 0.98+ |
zero trust | QUANTITY | 0.97+ |
second | QUANTITY | 0.96+ |
a second | QUANTITY | 0.96+ |
second kind | QUANTITY | 0.96+ |
Fournette | ORGANIZATION | 0.95+ |
one edge | QUANTITY | 0.95+ |
six | QUANTITY | 0.95+ |
almost 50 | QUANTITY | 0.94+ |
single appliance | QUANTITY | 0.94+ |
three different vendors | QUANTITY | 0.94+ |
ORGANIZATION | 0.94+ | |
two different categories | QUANTITY | 0.93+ |
single operating system | QUANTITY | 0.93+ |
First | QUANTITY | 0.93+ |
WebExes | TITLE | 0.93+ |
two approaches | QUANTITY | 0.93+ |
nine | QUANTITY | 0.92+ |
single view | QUANTITY | 0.9+ |
COVID | OTHER | 0.89+ |
a year | QUANTITY | 0.89+ |
10 megabit per second | QUANTITY | 0.88+ |
Gardner | ORGANIZATION | 0.87+ |
Ghana | ORGANIZATION | 0.86+ |
last two years | DATE | 0.86+ |
Wednesday | DATE | 0.85+ |
Caz B | ORGANIZATION | 0.85+ |
pandemic | EVENT | 0.85+ |
two schools | QUANTITY | 0.85+ |
one network | QUANTITY | 0.83+ |
couple of months ago | DATE | 0.83+ |
a hundred times | QUANTITY | 0.81+ |
single visibility | QUANTITY | 0.8+ |
Asex | ORGANIZATION | 0.79+ |
SAS | ORGANIZATION | 0.78+ |
John Maddison, Fortinet | CUBE Conversation, May 2020
from the cube studios in Palo Alto in Boston connecting with thought leaders all around the world this is a cube conversation everyone welcome to this cube conversation here in the cubes Palo Alto Studios we're here with the quarantine crew I'm John for your host we've got a great guest John Madison CMO an EVP of products of Fortinet and today more than ever in this changing landscape accelerating faster and faster certainly as this covin 19 crisis has forced business to realize a lot of the at scale problems are at hand and a lot of things are exposed in terms of problems and opportunities you have to take care of one of them security John thanks for coming on cube and looking forward to chatting about your recent event you had this week and also the updates at Florida thanks for joining me yeah it's great to be here John so more than ever the innovation strategies are not just talking points anymore in board meetings or companies there's they actually have to come out of this pandemic and operate through it with real innovation with actionable outcomes they've got to get their house in order you're seeing projects really focusing in on the at scale problems which is essentially keep the network's run and keep the sick the security fabric in place this is critical path stuff but the innovation coming out of it has to be a growth play for companies and this has been a big thing so you guys are in the middle of it we've chatted about all the four to guard stuff and all this you're seeing all the traffic you're seeing all the all the impact this work at home has forced companies to not only deal to new realities but it's exposed some things they need to double down on and things they need to either get rid of or fix fast what's your take on all this yeah you know I think it took a lot of people by surprise and the first thing I would like to do is you know spank our employees our customers and partners for the work they've done in the last six to seven weeks now what was happening was a lot of customers had built their work from home programs around a certain percentage 5% 10% 15% and that's what they scaled it for then all of a sudden you know everybody had to work from home and so you went from maybe a thousand people to 10,000 or 5,000 to 50,000 they had to scale very quickly because this had to be implemented in hours and days not weeks and months luckily our systems are able to gaile very quickly we can scale using a security processing units which offload the CPU and allow a lot of users simultaneously to access through VPN SSL VPN IPSec VPN and then we have an implementation at home ranging from a very simple Microsoft Wyant all the way to our clients all the way to even off Buda gate firewalls at home so we really did work very hard to make sure that our customers could maintain their business proposition during these times you know I want to get those work at home and I think it's a little big Sdn story and you guys have been on for a long time I mean we've talked with your you and your folks many times around st Wynn and what it means to to have that in place but this work at home those numbers are off the charts strange and this is disruption this was an unforeseen disruption it's not like a hurricane or flood this is real and we've also talked with you guys and your team around the endpoint you know the edge of the network that's the explosion of the billions of edges this is just an industry kind of inside baseball conversation and then also the immersion of the lifestyle we now live in so you have a world where it was inside baseball for this industry now every company and everyone's feeling it this is a huge issue I'm at home I got to protect myself I got data I gotta have a VPN I mean this is a reality that just wasn't seen I mean what do you guys are what are you guys doing in this area well I think it changes that this long-term architect and so you know the past we talked about there being millions of edges and people go how many billions of edges and what's happened is if you're working from home that's an edge and so the long term architecture means that companies need to take care of where their network edges are now the SEM at home they had them at the branch office they have them at the end of prize and the data center in the cloud then we need to decide know where to apply the security is it at the endpoint is it at the edges is the data center or bout an S T one is absolutely essential because every edge you'll have whether that were home now whether it be in your data center or eCampus on the cloud needs that st-1 technology and make sure you can guide the applications in a secure manner what's interesting is I actually deployed st-1 in my home here I've got two ISP connections one week I'm casting off with AT&T now that may be overkill right now for most people about putting st-1 in their homes but I think long-term homes are gonna be part of the enterprise network it's just another eight take a minute to explain the SD win I would call it the this is a mill especially this is not your grandfather's st win I mean it's changed st when is the internet I mean basically at home what does that mean if users don't know care what the products are at the end of the day they're working at home so kind of SD win has taken on a new broader scope if you will it's not just the classic SD win or is it can you take us through I mean and this is a category that's becoming much broader what's your what's your nails is there yeah again I'm not saying that you know consumers are gonna be putting SD wine in the homes right now but if I'm an executive and I rely on my communication out there are lots of meetings during the day work from home I want it to be as reliable as possible so if my one is pee goes down and I can't get on the internet that's an issue if I have to ISPs I have much higher availability but more importantly us you and I can guide the applications where I want when they want I can make sure you know my normal home traffic goes off certain direction the certain on a VLAN and segmentation policy whereas my war can be completely set out so again I you know I think SDRAM technology is important for the home long term is important for the branch for the enterprise and the data center and Earls St ones built into all up all our forty gates have sp1 you just switch it on we think it's a four essential technology going forward to drive that cloud on-ramp real quick follow-up on that for the folks in the enterprise I see the enterprise will make it easier for their customers their users who are at home so it feels consumer II invisible if you will I think that's the short-term what's what are what are you seeing your customers and prospective customers thinking when they come back or as they operate now in this new reality when they say you know what we really miss forecasted this now they have to get back to business what are they gonna do do they do more sta on I mean what's the architecture how does that get done what's the conversation like you know as this evolved for the next it's gonna slowly open up it still it's going to be a new reality for at least 12 months what's the conversation with the customer right now when it comes to going in and taking care of this so it doesn't happen again yeah what I'm doing actually actually what I'm doing a lot of virtual ABC's obviously we usually have 200 our customers that come to our corporate quarters or executive briefings and I'm doing actually more virtually and a lot of the opening conversations is they don't think they're gonna go completely Hunter's under percent back to where they were there's always going to be now a fraction of work-from-home people they may move around some of their physical location so as I said the ST when is that piece on the edge whether it be your home ranch campus or data centers gonna be there to guide the applications guide the users and devices to the right applications of wherever they may be as it could be in the cloud of communion data center it could be anywhere and then the key conversation thereafter for customers long-term architecture wise is where do I apply my security stack and the security spat consists of basic things like antivirus all right yes more detection capabilities even even response to Isis given that stack how much do I put in the edge how much do I put in my endpoint how much do I put my branch how much I put in my campus data center and cloud and then how do I maintain a policy a single policy across all of those and then now and again maybe I have to move that stack cross so that's going to be the key long term architecture question for enterprises as they move to a slightly different composition of workforce in different locations is hey I've got to make sure every edge that I have I identify and I secure when SP ran and then how do I apply the security stack cross all the diff tell great insight thanks for sharing that I want to get your take on now speaking of working at home you're also the CMO as well as the EVP of products which is a unique job because you can talk about any think when the cube we love it you had an event accelerate 2020 the folks watching go to the hashtag on Twitter hashtag accelerate 20 that's the hash tag you'll see a lot of the the pictures of the slides and some commentary I was laying down some tweets all the analysts were as well what are some of the highlights for you is a great presentation by the CEO you gave a talk and there's a lot of breakouts you had to do a digital event because you couldn't hold the physical event so you kind of had a shelter-in-place kind of and how did it go and what are some of the highlights yeah on the one side I was a bit sad you know we had or what we call accelerates arrange for this year in Barcelona and New York Mexico and San Jose we had to cancel war for them and I'm very quickly spin up a digital event a virtual event and you know we end up there's some initial targets around you know you know each of our physical events we get between two and three thousand and so we're thinking you know if we got to ten thousand this would be great we actually ended up with thirty thirty-two thousand or something like that registered and actually the percentage that showed off was even higher so we had over 20,000 people actually come online and go through our keynotes we built it so you go through the keynotes then you can go off to the painting what we call the breakouts for more detail we did verticals oh it did more technology sessions and so it's great and you know we tried our best to answer the questions online because these things are on demand we had three we had one for the u.s. one premiere and won't write back and so there was times but to get that sort of exposure to me is amazing twenty thousand people on there listening and it connects into another subject which is education and fun yet for some time as invested I would say you know my CEO says but I'll invest a bit more in education versus the marketing advertising budget now go okay okay that's that hey we'll work on that but education for us we announced a few weeks ago that education is now training is free for customers for everybody and we'd also been you know leading the way by providing free training for our partners now it's completely free for everybody we have something called the network security expert which goes from one to eight one and two of that are actually open to the public right now and if I go to the end of last year we had about two to three thousand people maybe a week come on and do the training obviously majority doing the NSC one courses you get further through to eight it's more technical last week we had over eighty thousand people we just think about those numbers incredible because people you know having more time let's do the training and finding is as they're doing this training going up the stack more quickly and they're able to implement their tools more quickly so training for us is just exploded off the map and I and there's a new reality of all the unemployment and also people are at home and there's a lot of job about the skill gap before in another cube conversation it's it's more apparent than ever and why not make it free give people some hope give them some tools to be successful there's demand yes and it's not you know it's not just them you know IT professionals are Ennis e1 is a foundational course and you'll see kids and students and universities doing it and so Ben Mars granddad's dad's doing it so we we're getting all sorts of comments and social media about the training you know our foundation great stuff has a great we'll put a plug on that when should we get that amplified for its really good stuff I got to ask you about the event one of the things I really like about the presentation was from your CEO and you gave one as well was the clarity around the vision of security and a couple of things that were notable to me was the confluence of the collision between networking and security and at the intersection of those two forces you have an accelerated integrated policy dynamic to me this is the heart of DevOps of what used to be in cloud being kind of applied to security you have data you got all kinds of new things emerging new patterns new signals that's security so you got to be you got to be fast you got to identify things so you guys are in this business that's one force and the other one was the billions of edges and this idea that there's no perimeter so it's everything's immersive so illustrate some points of validation on that from your standpoint is that how you guys are seeing it unfold in the future is that happening now can you give us a feeling for whether where we are and that those those kind of paradigms yeah good point so I think it's been happening it's happening now has been happening the future you know if you look at networking and our CEO Enzi talked about this and that networking hasn't really cheer outing and switching we go back to 2000 we had 100 mega under megabit now you have formed a gigabit but the basic function we haven't really changed that much securities different we've gone from a firewall and we add VPN then we at next-gen firewall then we had SSL inspection now we've added sd1 and so this collisions kind of an equal in that you know networking's sped ahead and firewalling is stayed behind because it's just got too many applications on that so the basic principle premise of the company of putting net is to build and bring that together so it's best of all accelerate the basic security network security functions so you can consolidate multiple functions on one system and then bring networking and security together a really good example of security where or nexium firewall where you can accelerate and so our security processing units and my analogy simple analogy is GPUs inside games where their GPU offloads CPU to allow rendering to happen very quick it's the same for us RSP use way of a network SPU and we have a Content SPU which all flows the CPU to allow a security and networking do it be accelerated work now coming to your second point about the perimeter I I'm not quite sure whether the perimeters disappear and the reason I say that is customer still goes they have firewalls on the front of the networks they have endpoint protection they have protection in the cloud so it's not that the perimeters disappeared it's just but much larger and so now the perimeters sitting across all your infrastructure your endpoints your in factories you got IOT devices you've got workloads in different powered and that means you need to look very carefully at those and give visibility initially and then apply the control that control maybe it's a ten-point security it may be SD mine at the edge it may be a compliance template in the cloud but you need visibility of all those edges which have been created with the perimeters reading across the image it's interesting you bring up a good point we always have kind of debates over beers on this on this topic you know the old model was mote you know get the castle and the gate but here the perimeter of the edge if you believe there's an edge and I do believe you find it perfectly the edge is a perimeter it's an endpoint right so it's a door into the internet so are the network so is the perimeter just an end adorn there's more doors right so or service yeah just think about it the castle would did multiple doors is the back everyone's the door there's this dozle someday and you have to define those H's and have visibility of them and that's why things like network access control know for you know zero trust network access is really important making sure you kind of look at the edge inside your way and so your data center and then it's like you powd what workloads are spinning off and what's the configuration and what's there what's from a data perspective right your recommendation and I'm a customer looking at my network I got compute I got edge devices and users I realized there's a billions of edges on my network now and the realities hit me I wasn't really being proactive on investing what do I do what's the PlayBook for me as I start to rethink that and what do I put into place how do I get going now I got to rethink it I now recognize I got full validation I got to manage this I got to do something what's your recommendation to me if I'm a customer the key to me is and I've had this conversation now for the last five years and it's getting louder and louder and that is I suppose I spend a lot of money on point solution point but even end point may have five point products on there and so they're getting to the conclusion it's just too hard to manage I can't find all the right people I get so many alerts from so many security systems I can't work out what's going on and the conversation now is how do I deploy a platform we call it the security fabric now I don't deploy that fabric across my network I'm not saying you should go from 30 vendors to one vendor that would be nice of course but I what I'm saying as you go from 30 vendors down to maybe five or six platform the platform's perform multiple functions it could be they're out there you attach a platform a designer platform just birth protector or a particular organization or part of the network and so the platform allows you then to build automation and the automation allows you to see things more quickly and react to things more quickly and do things without manual intervention the platform approach it's absolutely starting to resonate yes you've still got very very large customers who put everything into segments of a C's Exedra book most customers now moving towards a yeah I think you know as you see and again back to that collision with the end of the intersection we have integrated policies if you're gonna do any integration which is the data problem so we talk about all the time to a lot of different tools can create silos and there's a use case for that but also creates problematic situations I mean a platform gives you a much more robust capability to be adaptive to be real time to program and automate yeah it's it's it's an issue if you've got 30 vendors and just be honest it's also an issue in the industry so I mean networking the story kind of worked out how to work together you can use the same different vendor switches and routers and they roughly work together with cybersecurity they've all been deal you know built totally separately not to even work and that's why you've got these multiple layers you've got a product the security problem then this got its own analytics engine and manager then you've got a manager of managers and an analyzer of analyzers and the sim system and then a saw I mean just goes on it makes it so complex for people and that's why I think they look into something a bit more simplified but most importantly the platform must be friendly from a consumption model you must be able to do an appliance where you need to do virtual machine SAS cloud native container whatever it may be because that network has changed in those ages as those edges move you've got them to have a platform that adaptable to the consumption model require you know I had a great cartridge with Phil Quaid you see your seaso over there and we were chatting around you know this idea of I won't say customization but there's no one turnkey monolithic application it seems to these platforms tend to be enabling where the seaso trend is to have teams building ok and and and almost a customized but building software to automate to solve their use case for their outcome so enabling that is a trend we're seeing so I think you guys are on the right track there any comment on your take on this enabling platform is that something that you guys are seeing that CSIS is looking at more in-house development more use case focus because they have the data they got real-time they need to be building on a platform not told what they could do yeah I think you've always had this this network team trying to build things fast and open and the security team trying to post things down and make it more secure you know it becomes even more problematic if you kind of go to the cloud where you've got pockets a developer's kind of thing do things in the DevOps way really as fast as possible and sometimes the controls are not put in place in fact no the big as I said the biggest issue for the cloud is not so much you know malware it it's more about miss configuration that's why you're seeing the big breaches and that's more of a customer thing to do and so I think what the seaso is trying to do is make sure they apply the controls appropriately and again their job has become much harder now we've got all the multitude of endpoints that they didn't have before they've got now there when that's not just the closed MPLS network is old off different types of broadband 5 G's coming towards the end of this year next year as well the data centers may have decreased a bit but they've still got datacenter capacity and they're probably got 5 or 6 hours and 20 different SAS applications that put a deal with and they've got to deal with developers in there so it's a harder job for them and they need to melt or add those tools but come back to that single point of management great stuff John Madison CMO EVP great insight there it's almost a master class right there you laid it all out on what's going on a final question any change is what any other news updates on the four net front I know you guys got some answer I didn't see the breakouts of the session I had something else going on I think I've been walking dog and do some other things but you know being at home and to take care of things what's new what's what's out that people might have missed that's coming out of for today you're telling me you didn't have 60 hour a breakout on dedicated I don't think yeah we've you know we've have a lot going on you know we have a big R&D team here in North America and Canada and with a lot of products coming out this time of the year we bring out our 40 OS network operating system with 6.4 over 300 new features inside there including new orchestration systems for sp1 and then also we actually launched on network processor seven and the board gate already 200 F powered by four network processor sevens it's some system out there and provide over 800 gigs of fire or capacities but in bill V explain acceleration they can do things like elephant flows huge flows of data so there's always there's always new products coming out of 14 it sure those are the two big ones for this quarter you guys certainly are great interviews to talk to great a lot of expertise there final final question you know everyone every company's got their culture Moore's laws cadence of Moore's laws Intel faster cheaper smaller what's the for Annette culture if you had to kind of boil it down what's it you guys are always pushing great products out there all high quality I'll see security you got to be buttoned up and have good ops and controls but you still need to push the envelope and have stadia what's the culture if you had to kind of boil the culture down for Porter net what would it be that's always an interesting question and so the company's been going since 2000 okay the founders are still there NZ's CEO and Michael Z's the CTO and I think that one of the philosophies is that listen to the customer very closely because you can get distracted by shiny objects all over the place I want to go and do this oh yeah let's build this what about this and in the end the customer and and what they want may get lost and so we listen very closely we use you know we have a very high content of technology people who can translate the customer use case into what we should build and so I think that's the culture we have and maintain that so we're very close to our customers we've been building very quickly for them make sure it works it needs tweaking then we'll look at it again a very very customer driven always great to hear from the founders you guys had a great event accelerate 20 that's the hashtag some great highlights on Twitter some commentary there and of course go to Ford a net site to check out the replays Sean man so thanks for taking the time to share your insights here on the cube conversation I really appreciate it thank you okay it's cube concert here in Palo Alto we're bringing you all the interviews during this time we have our quarantine crew the cube is virtual we'll do whatever it takes to get the interviews out there and get the stories out there and the people behind the tech making it happen I'm John Fourier thanks for watching [Music]
SUMMARY :
of the lifestyle we now live in so you
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
John Fourier | PERSON | 0.99+ |
five | QUANTITY | 0.99+ |
Palo Alto | LOCATION | 0.99+ |
Barcelona | LOCATION | 0.99+ |
John Maddison | PERSON | 0.99+ |
5 | QUANTITY | 0.99+ |
AT&T | ORGANIZATION | 0.99+ |
30 vendors | QUANTITY | 0.99+ |
Florida | LOCATION | 0.99+ |
May 2020 | DATE | 0.99+ |
30 vendors | QUANTITY | 0.99+ |
200 | QUANTITY | 0.99+ |
5,000 | QUANTITY | 0.99+ |
San Jose | LOCATION | 0.99+ |
Michael Z | PERSON | 0.99+ |
Canada | LOCATION | 0.99+ |
John | PERSON | 0.99+ |
North America | LOCATION | 0.99+ |
thirty thirty-two thousand | QUANTITY | 0.99+ |
6 hours | QUANTITY | 0.99+ |
ten thousand | QUANTITY | 0.99+ |
two | QUANTITY | 0.99+ |
200 F | QUANTITY | 0.99+ |
10,000 | QUANTITY | 0.99+ |
60 hour | QUANTITY | 0.99+ |
John Madison | PERSON | 0.99+ |
twenty thousand people | QUANTITY | 0.99+ |
three | QUANTITY | 0.99+ |
over 20,000 people | QUANTITY | 0.99+ |
last week | DATE | 0.99+ |
50,000 | QUANTITY | 0.99+ |
Fortinet | ORGANIZATION | 0.99+ |
Boston | LOCATION | 0.99+ |
one vendor | QUANTITY | 0.99+ |
Sean | PERSON | 0.99+ |
second point | QUANTITY | 0.99+ |
Ben Mars | PERSON | 0.99+ |
five point | QUANTITY | 0.98+ |
2000 | DATE | 0.98+ |
eight | QUANTITY | 0.98+ |
Phil Quaid | PERSON | 0.98+ |
40 OS | QUANTITY | 0.98+ |
Intel | ORGANIZATION | 0.98+ |
millions of edges | QUANTITY | 0.98+ |
two forces | QUANTITY | 0.98+ |
three thousand people | QUANTITY | 0.98+ |
six platform | QUANTITY | 0.98+ |
over eighty thousand people | QUANTITY | 0.98+ |
15% | QUANTITY | 0.98+ |
2020 | DATE | 0.97+ |
a week | QUANTITY | 0.97+ |
three thousand | QUANTITY | 0.97+ |
New York Mexico | LOCATION | 0.97+ |
first thing | QUANTITY | 0.97+ |
one | QUANTITY | 0.97+ |
over 800 gigs | QUANTITY | 0.97+ |
this week | DATE | 0.97+ |
each | QUANTITY | 0.97+ |
pandemic | EVENT | 0.96+ |
one week | QUANTITY | 0.96+ |
ten-point | QUANTITY | 0.96+ |
billions of edges | QUANTITY | 0.96+ |
eCampus | ORGANIZATION | 0.96+ |
5% | QUANTITY | 0.95+ |
today | DATE | 0.95+ |
end of this year next year | DATE | 0.95+ |
end of last year | DATE | 0.94+ |
this year | DATE | 0.93+ |
two ISP | QUANTITY | 0.93+ |
6.4 | QUANTITY | 0.93+ |
Ford | ORGANIZATION | 0.93+ |
DevOps | TITLE | 0.92+ |
300 new features | QUANTITY | 0.92+ |
forty | QUANTITY | 0.92+ |
st Wynn | LOCATION | 0.91+ |
CSIS | ORGANIZATION | 0.91+ |
single policy | QUANTITY | 0.9+ |
one system | QUANTITY | 0.89+ |
one force | QUANTITY | 0.88+ |
Palo Alto Studios | ORGANIZATION | 0.88+ |
PlayBook | TITLE | 0.87+ |
14 | QUANTITY | 0.87+ |
Annette | PERSON | 0.86+ |
John Maddison & Hilton Sturisky | CUBEConversation, October 2019
our Studios in the heart of Silicon Valley Palo Alto California this is a cute conversation hey welcome back here ready Jeff Rick here with the cube we're in our pal 2 studios today for a cube conversation to talk about a pretty interesting topic right which is the security issue that is pervasive and needs to be baked in all over the place and combining that with networking and software to find networking which is often talked about as kind of the last area of really software-defined execution and a lot of activity around SD win so we're happy to have with us today from Fortin at John Madison he's the CMO and EVP of products for fortinet John great to see you you too and also joining us from Atlanta is Hilton styrsky he is the CIO of Crawford & Company Hilton great to see you as well so let's just jump into it big issue right Crawford & Company Hilton give us a little bit of the which you guys are and more importantly kind of what a distributed company that you are y SD win and when particularly is a pretty important piece of the equation absolutely SD wins very important to us as we look at growth so I'm a confident company we are 77 year old you asked in management's claims company we we haven't focus on restoring and enhancing lives businesses in communities in 2018 we processed about one and a half million claims they are translated into north of fifteen billion dollars in payments but more importantly when you think about the insurance space and really any highly transactional organization will go through a digital disruption and korfin and company is no difference and in particular with the culture of innovation that we have a profiling company we looking at all facets of the business to disrupt and that's our basic infrastructure all the way to the business process applications that interact with our customers and when we think about the network that's the lifeblood of our organization span in seven countries with almost 9,000 employees and NATO it touches every facet of our organization and our business and being on an innovative modern technology enables us to support the Scanlan growth that's invariably coming down the pipes in this industry thank you thanks for that summary and John over to you you know we got a lot of conferences as we go to your guys conference we go to RSA and security the topic because all these security needs to bake be baked in throughout the process it can't just be added on at the end and you guys have taken that to heart so tell us a little bit about you know your guys solution in this SD win space and how you're approaching it slightly differently yes he'll concern just about every company's going through this digital disruption and that means they really need to make sure that network is of high quality high speed can access the applications but most importantly is secure so what we do is make sure with all my networking gear and SDRAM being a specific example that security is totally integrated within that solution and you do it in a different way - right you're not just doing it with software but you've actually introduced you know a hardware component into this into this equation as well yeah well now obviously the software is still very important to make sure you can orchestrate and you've got the feature set but earlier this year we announced the the world's first sd1 ASIC which allows us to get that performance of the networking stack and security stack on a single appliance we're talking about five to 10 X performance and again allows the customer such as Crawford to run and networking and their security in that single appliance so help I'm curious from your perspective I have to say I feel sorry for CIOs cuz that you know as again we go to all these shows we walk around there's so much technology and in security specifically when you walk around RSA as the the granddaddy of all those conferences you know there's hundreds and hundreds and hundreds of vendors and I think my goodness how do you go through how do you evaluate so you know what do you do when you're looking for technology partners among this giant sea of potential opportunities and people telling you to do this that and the other you got to find a partner that's going to help you absolutely so I mean they're number of facets that come to that but first and foremost we take security and privacy not just security extremely or seriously hope it ends because of that we rely on our cyber team to help us make decisions and drive those discussion so these relationships are not just you know come about because of benefits that we see on white papers or interactions with the PIO they really are driven from our cyber organization in the indian research that they do envy attend products we're not just looking for a sexy brands name to put in our our branches in our data centers but we're really looking for a tried and tested product and it wasn't a network that really came down to our cyber team because of the integrated nature of the ESD way and the security applies it to em i'm curious in terms of the changing kind of government regulations you know ii had gdpr we've got the California Privacy Act has that impacted your you know kind of prioritization of security and privacy or has that always just been a top priority and that's just you know kind of another box to check yeah man it's always been there we haven't seen it impacted from a sigh from a networking perspective tea to date but as we think about applications we're looking for the flexibility in the application stack to adhere to GT bernini quite frankly any other regulatory control been in the insurance industry we are highly regulated and that type of scale and flexibility is something that we look to as we build new products more modern future and John to you I'm just curious you know some of the advantages of bringing these two things together to really bake the security and the SD win appliance what is that enable you to do that you couldn't do so much before well it's all about supporting the business and the applications so corporate for example you know obviously voice is very important to me they speak to a lot of people and branch offices video training their applications in the cloud and so bringing mass security and that networking together and accelerating it means they get a high quality of service to all the applications which are important to their business so what's next John what are some of the the things as you look forward and you see this this market to continuing to evolve you guys are really starting to take a real leadership position what are some of your priorities as you as you look forward and we're gonna flip the calendar here in just a few short months you know and definitely you know sd-1 an application on our appliance has exploded we just announced we're actually in the top three in terms of sd-1 benders globally what's coming next well I think what we call cloud on-ramp isn't very important where we provide specific routes and information to make sure we have even higher QoS of devices and users getting to the applications and I knew that on the land side of it was starting to roll out something called ST branch which gives you the same kind of fabric topology view control and workflow of access from Wi-Fi from Ethernet switching and we've also integrated nak network access control which gives you that visibility control of IOT devices great so I want it I want to give you the last word you know to share with your peers as they're going through this journey a lot of talk about digital transformation but when the rubber hits the road right you actually got to do do the things and do the small things that make a difference as you've gone through this and you've dealt the security you got a lot of remote branches this continuation around hybrid cloud and and distributed infrastructure what are some of the things on your top of mind and what would you share with some of your peers as they you know start to look at some of these technologies well you've got to have an open mindset and obviously like anything it's okay to fail as long as you learn from your mistakes but as we think specifically about our network and coordinate in particular I think trying to reference some of the technologies and that that requires a lot of data so you need to understand what the future looks like and provide a scale and flexible solution for our customers and John also reference Borden ACK we are in the process of deploy in that and it's all about having that single pane of glass in an integrated solution and makes it easier for a smaller supports team to manage and ultimately Triberr you and Ally investments and other parts of their company well Hilton I know we're up against it on the time I want to thank you for for taking some time out of your busy day and lovely Atlanta and sharing your story and John you know nothing but continued success to you and fortunate we've really been happy to be part of the story and share it and come to the conference's and just another step on that on that journey to success thank you thanks a lot all right thanks gentlemen all right you've been watching the cube from our Palo Alto studios thanks for watching we'll see you next time [Music]
**Summary and Sentiment Analysis are not been shown because of improper transcript**
ENTITIES
Entity | Category | Confidence |
---|---|---|
2018 | DATE | 0.99+ |
Crawford & Company | ORGANIZATION | 0.99+ |
California Privacy Act | TITLE | 0.99+ |
John | PERSON | 0.99+ |
Jeff Rick | PERSON | 0.99+ |
Atlanta | LOCATION | 0.99+ |
October 2019 | DATE | 0.99+ |
Silicon Valley | LOCATION | 0.99+ |
NATO | ORGANIZATION | 0.99+ |
Crawford | ORGANIZATION | 0.99+ |
John Maddison | PERSON | 0.99+ |
today | DATE | 0.99+ |
Fortin | ORGANIZATION | 0.98+ |
two things | QUANTITY | 0.97+ |
Palo Alto | LOCATION | 0.97+ |
77 year old | QUANTITY | 0.96+ |
ESD | TITLE | 0.96+ |
10 X | QUANTITY | 0.95+ |
seven countries | QUANTITY | 0.95+ |
single appliance | QUANTITY | 0.94+ |
about one and a half million claims | QUANTITY | 0.94+ |
first | QUANTITY | 0.93+ |
hundreds and | QUANTITY | 0.93+ |
earlier this year | DATE | 0.92+ |
almost 9,000 employees | QUANTITY | 0.92+ |
Palo Alto California | LOCATION | 0.91+ |
-1 | OTHER | 0.89+ |
Ally | ORGANIZATION | 0.87+ |
hundreds of vendors | QUANTITY | 0.87+ |
Borden ACK | ORGANIZATION | 0.83+ |
Triberr | ORGANIZATION | 0.83+ |
north of fifteen billion dollars | QUANTITY | 0.81+ |
lot of data | QUANTITY | 0.81+ |
single pane | QUANTITY | 0.8+ |
Scanlan | ORGANIZATION | 0.79+ |
Hilton Sturisky | PERSON | 0.78+ |
top three | QUANTITY | 0.77+ |
Hilton | ORGANIZATION | 0.71+ |
lot of people | QUANTITY | 0.68+ |
hundreds | QUANTITY | 0.68+ |
korfin | ORGANIZATION | 0.65+ |
sd1 | COMMERCIAL_ITEM | 0.65+ |
Hilton styrsky | PERSON | 0.64+ |
2 studios | QUANTITY | 0.64+ |
short months | QUANTITY | 0.58+ |
John Madison | PERSON | 0.58+ |
about five | QUANTITY | 0.56+ |
CUBEConversation | EVENT | 0.53+ |
ASIC | TITLE | 0.4+ |
RSA | ORGANIZATION | 0.39+ |
John Maddison, Fortinet | Fortinet Accelerate 2019
live from Orlando Florida it's the cube covering accelerate nineteen brought to you by important welcome back to the cubes continuing coverage of forty net accelerate 2019 live from Orlando Florida Lisa Martin with Peter verse and we're pleased to welcome back to the key one of our alumni John Madison the executive vice president of products and solutions from forty met John it's great to have you back on the cube it's great to be here again lots of momentum that forty minutes coming into 2019 with I can't believe we're in April already lots of growth in revenue product revenue was up you guys talked about the expansion of the partner network we've had some of your fabric ready partners on already today yeah you talked about this third generation and security how fourteen it is is uniquely delivering that for our viewers who were didn't have the opportunity to attend your keynote kind of talk to us about that in this hybrid world how is putting that delivering this third generation what makes you guys different yeah so we talk about the third generation now everyone has different generations that's fine we call it what we are the security driven networking and it's really the genesis of 14f for a long time in bringing together networking and security into one place I think these days or in the past people have built out the networks with a network layer then they try and connect users and applications I think oh wait a minute and this put some security over here and a bit over here and over there in our minds start with both start with a security driven networking concept make sure it works end to end and that will be the most sophisticated most secure application and network you can have and what enables porting that to deliver this uniquely because a number of times today and Ken's keynote I think patrice as well and i can't recall if yours competition came up where the audience was shown the strength in numbers that 14 that has so what makes you guys unique and what you're delivering what are key differentiators from the start has been making sure we can run routing stacks sometimes today referred to as st wayne stacks also security stacks in a very small footprint and to do you need to spend a lot of money what we call security processes which go inside our appliances to make sure that runs very fast but having said that I definitely think customers are gonna be in a high weight world forever for a long time at least anyway we're not only appliances but also personal machines an API security and we also talk about this fabric concept they're able to cover the complete digital attack surface so there's a very important point and we're finding a lot of customers now agree that they want to consolidate they want to make it simpler they need to move faster to this digital world and the only way you have to do that is through a consolidated approach so let's build on this they want to consolidate they want to make it simpler more common and how they in policies and management now along comes the edge what's the dynamic there what's happening is all people refer to the perimeter disappearing okay that's happening to a certain extent because data is moving into cloud you've got different one implementations but what's happening when you do that is you're creating new edges a really good example is sd1 which used to be very closed off the wound used to be something that connects branch offices back to the data center but nobody got involved in that well now you're opening up that when two different types of transport mechanism you're creating an edge I always refer to these edges as being created by different trust levels there is a may be a secure trust level here less trust here it creates an edge and you absolutely need to protect all those edges but give us an example of that so for example when you say differentiated trust levels my edge might be at a customer location is that kind of what versus my edge might be at a branch office is that what you mean by a different trust level push that concept force you know it's more for example if I got a branch office and I've got one connectivity going back to my data center that's encrypted and secure but I've also opened up connectivity to the internet the trust level between that encrypted link and my connection to the to the internet is very different the Internet's open anyone can see there so that trust level between those two is very different and that's what creates the edge and so therefore that becomes a key feature in how we design diff edge implementations it is it's also a key requirement on what type of deployment mode you use we have appliances we have virtual machines we have clouds containers API is going forward I'm finding that customers are still very reluctant to put software implementations of firewalls against the Internet appliances are harden they run faster having said that inside the cloud obviously inside software-defined data centers virtuals fine what are some of those customer concerns that you're hearing well I think what happens is you know if you putting a piece of software against the internet it's open to all sorts of attack it's the same as giving IP addresses to anything it's like a factory that creates an edge as well and you need to harm that edge against that phone how can st when helped why is this such a crucial component of digital transformation you know sometimes markets are overhyped I remember that the Cosby marketplace a few years ago it just was a feature to be honest I think sd1 is extremely important the reason it's important is the SD one controller that controller eventually tells users and devices how to get to the applications and so I tell customers that investment for you is extremely important you need to own it you need to make sure it's flexible you need to make sure it's secure and so I think the SD web marketplace or one edge is the kind of larger term for it is extremely important investment for customers do you anticipate that I mean you guys invested you guys put forward a lot of products we made a number of different announcements again going back to that notion of simplicity that notion of consolidation what is the breaking point for your typical IT group in terms of the complexity of that they can accommodate and absorb when we start adding additional function within the overall network especially from a security standpoint well I think it's a bit broken already they're really struggling to keep up from one perspective no today we announced our forty OS 6.2 is our major operating system and what we try and do is consolidate functionality as much as possible inside our fabric through a single console so there were single operations capability so it's easier for the operations people for the security people to implement things and we're also implementing automated mechanisms like security ratings which do a background run of best practices for example that make it gain easier for those cut those teams to run a full analysis of what's going on so was it about three hundred features roughly laughs I counted them individually okay good yeah well do a recount of a tremendous amount of feature addition to forty OS announced today what are some of the things business outcomes Peter and I we're talking about outcomes with several of our guests earlier business outcomes new revenue streams new products going to market faster the also being able to become less reactive maybe more proactive in terms of security cuts can you walk us through some of the outcomes that 14 that customers can expect to achieve from some of the OS announcements and enhancements yeah I already talked about one which was the consolidation which means they can do multiple things with the single platform that's an important one for them also some of those some of the cost savings around that some of the operational cost savings I think also for our partners for example they like the fact that we're keep that we keep adding services on top of that fabric they can take those services then apply them to their customers and make sure they can add value inside there as well so there's two angles to it the one is making sure our customers are better protected they can consolidate save money invest better training and then to our partners so that they can provide more value to their customers so one of the things we were talking to Ken about is the fact that you have invested in a six and security processing units and content processing units etc that are capable of accelerating the rate of which these crucial security algorithms run that opens up that creates additional capacity to add more function both for you as well as your partners are you starting to see some of your ecosystem grow faster as they better exploit that inherent power and performance that you have within your appliances and devices definitely I think we're seeing new partners come from new areas it also fragments a bit and that's why we announced this new partner initiative going forward which is a bit more customizable but I you know I do think that going forward both our customers and our partners are looking for more of an architecture approach you know again if you go back five years here's a box and off you go and there's install it and we're good and again when you saw those security threats yes we produce a point solution to fix it normal we keep moving on there now looking at architectures over the next five years a known only just cyber security architectures but networking architecture storage architectures and all coming together so we definitely need to train our partners I think here we had over fifty of our what we call networks a network security expert eight it's the highest level of architecture and half and the partners but going forward we see much more partner involvement in an architecture approach and our customers want that because they don't want to have a point solution that's out-of-date in a year's time or a new threat comes along and makes it redundant so how are you you mentioned you mentioned network security and storage what other things are starting to inform that architectural approach that you're taking it's everything now so we know the factories now are completely automated all the different utilities have IP addresses are running almost all the way down to the end point just everything has more flexibility and is more open and so definitely all of that informations bouncing around inside IOT devices inside the wires like data centers and all that data needs protecting that's the key of protecting the data and to do that again we keep saying you need to have an integrated approach to networking and security how does the customer work with 40 net and your partner ecosystem to achieve that integrated approach assuming that there's a you know an enterprise out there that's got a spectrum of hybrid multi cloud environment with a spectrum of security Point solutions pointed it you know different components of an infrastructure how do you help them on that journey of taking the many disparate security solutions and leveraging the power of cortina and your partners to get that integrated truly integrated consolidate consolidated view it's a couple of steps maybe maybe many steps the first one is customers don't want to throw everything else straight away and so what they want to do is be able to integrate and connect and so we have some of our partners here for example of fabric ready partners we have connectors we build into their platforms and orchestration systems and that's their first step once they get there they start looking across to see what they can consolidate so can they take a specific solution from this and I'm bringing inside and then eventually they start to look at the long-term architecture if they're moving apps to the cloud or they want to open up their where or they want to provide kind of SD functionality inside their branch but so it's definitely a phase approached I don't see many customers some customers would take an application and create from scratch inside the cloud they can't do that with their infrastructure they can't just completely wipe it clean start again it's definitely more of a phased approach so as you think about the phase approach and you talked we heard from we heard from the sales port side the notion that the SPS the service providers want greater customization the enterprise wants a different level of access to the core technologies so that they can do not customization not exactly I remember exactly what the term was but what degree will customers retain control over how that architecture gets implemented versus what degree is it going to get baked into the stack itself a bit of both I think you know for most customers they're running towards a digital platform and they need to own that digital platform if they give up complete control you know how do they control that their destiny going forward so they want to own the digital platform but they haven't got the resources to do everything so they'll outsource some to service providers and carriers some of the partners for example but again I keep coming back to this they want to get to a point in five years time where they've got a digital footprint it's very flexible but they also want to make sure it's very secure because as you open up that digital footprint you're opening up all these different edges inside the network and it's coherent which is the architected approach yes because if they don't have a coherent approach to doing it they don't know what the interfaces are or are not competent and that includes interfaces with partners yeah they have to look forward and say I'm gonna implement X amount in the cloud I'm now gonna have some edge compute going on here I want to shape make sure my branches have the best quality of service for these certain applications that go back to this so they look at all those parameters and then architect something from there so I know that security network security app security info security cloud security is in our imperatives for every industry but I didn't notice that the breakouts today feature I think there's a couple of vertical features healthcare financial services retail I'm just curious are those just great use cases that show the potential and the power of 14x technologies or are those industries that are either early adopters or maybe more leading-edge because they have such a tremendous amount of data that needs to be secured as their ecosystem does this yeah so the industry verticals I think I think for the very large ones they're very similar all of them have IOT that's expanding or don't want to have a flexible wand system all them I've got something some compute power and the cloud and the edge going forward so I know there's differences in industries for the very large enterprises it's the problem seems the same these huge organizations and they have all of these things going on in each trying corner I'd you come down to mid enterprise I think there's more reason to consolidate but then you see more differences in the way they approach things like a healthcare they're really focused on that healthcare kind of security of devices inside the hospitals etc education oh they need to connect in these big data banks and transfer the research information so big organizations I say pretty much the same problem midsize organizations become more relevant to a specific industry well John thank you so much for carving out some time speak with Peter and me today we appreciate that and it's exciting to see and feel the momentum that 49 is bringing into 2019 wealth I'm say inviting me our pleasure we want to thank you for your time as well for Peter Burris I am Lisa Martin you're watching the cube [Music]
SUMMARY :
the data and to do that again we keep
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Lisa Martin | PERSON | 0.99+ |
Peter Burris | PERSON | 0.99+ |
2019 | DATE | 0.99+ |
Lisa Martin | PERSON | 0.99+ |
John | PERSON | 0.99+ |
John Madison | PERSON | 0.99+ |
Peter | PERSON | 0.99+ |
two angles | QUANTITY | 0.99+ |
first step | QUANTITY | 0.99+ |
John Maddison | PERSON | 0.99+ |
forty minutes | QUANTITY | 0.99+ |
Fortinet | ORGANIZATION | 0.99+ |
April | DATE | 0.99+ |
Orlando Florida | LOCATION | 0.99+ |
Ken | PERSON | 0.99+ |
first one | QUANTITY | 0.98+ |
Peter verse | PERSON | 0.98+ |
five years | QUANTITY | 0.98+ |
today | DATE | 0.98+ |
two | QUANTITY | 0.98+ |
six | QUANTITY | 0.98+ |
forty OS 6.2 | TITLE | 0.97+ |
both | QUANTITY | 0.97+ |
single platform | QUANTITY | 0.97+ |
third generation | QUANTITY | 0.96+ |
over fifty | QUANTITY | 0.96+ |
14 | QUANTITY | 0.96+ |
nineteen | QUANTITY | 0.92+ |
single console | QUANTITY | 0.92+ |
about three hundred features | QUANTITY | 0.92+ |
40 net | QUANTITY | 0.91+ |
third generation | QUANTITY | 0.91+ |
each | QUANTITY | 0.89+ |
half | QUANTITY | 0.89+ |
forty OS | TITLE | 0.87+ |
a year | QUANTITY | 0.86+ |
single | QUANTITY | 0.86+ |
49 | ORGANIZATION | 0.85+ |
one | QUANTITY | 0.84+ |
fourteen | QUANTITY | 0.83+ |
few years ago | DATE | 0.82+ |
eight | QUANTITY | 0.81+ |
couple of steps | QUANTITY | 0.81+ |
14x | QUANTITY | 0.79+ |
Cosby | ORGANIZATION | 0.78+ |
executive vice president | PERSON | 0.73+ |
forty | QUANTITY | 0.71+ |
one edge | QUANTITY | 0.69+ |
one perspective | QUANTITY | 0.68+ |
lot of customers | QUANTITY | 0.67+ |
lot | QUANTITY | 0.64+ |
money | QUANTITY | 0.61+ |
five years | DATE | 0.61+ |
couple | QUANTITY | 0.46+ |
patrice | PERSON | 0.46+ |
next | QUANTITY | 0.41+ |
Peter Doggart, Symantec & John Maddison, Fortinet | Fortinet Accelerate 2019
>> live from Orlando, Florida It's the que covering Accelerate nineteen. Brought to you by Ford. >> Hey, welcome back to the Cube. We are live at forty nine. Accelerate twenty nineteen in noisy Orlando, Florida, and Lisa Martin welcoming to Guest to the program one you know and love Well, John Madison, the executive vice president of Products and Solutions at fourteen. That and gentle Mary, please toe also welcome Peter Jogger, the vice president of business development from Symantec. Welcome back. Welcome. >> Thank you. >> So, guys, Partnerships, symbiotic partnerships. We've been talking about partnerships all day. Now we want to talk about what's new? Fortinet and semantic. You guys just announced a couple months ago an expansive partnership. Peter, let's go ahead and start with you. You guys just like we're gonna partner to deliver the most robust and comprehensive cloud security service. Why did semantic decide to partner and collaborate with forty minutes and why now? >> Absolutely. So when we think about what our customers they're going through, they're going through a digital transformation to Billy to the cloud on DH. We wanted to make sure that we perform the best possible technology for our customers. We chose fortunate way were great partners. Actually, before this whole thing started, we looked the technology that they had to offer repaired it with what we had in our Web security service. There was a fantastic fit, and so far with the show today and accelerate, we made the right choice. >> That's always good, right to get some validation there talks to us about the from from Maybe from a customer's perspective, what were some of the drivers saying, Hey, guys, this partnership could be really beneficial for your doing part. Customers, partners and each company. Yeah, well, they think it's >> a very expensive relationship. Peter just talked about having our next year firewall inside their cloud, providing security there. There's also opportunity at the end point for sound. Full semantic is the largest endpoint hundred seventy five million or something. In points out, there were the largest network security vendor in terms of implementation. Some four million firewalls out there what customs they're saying they want their security solutions to work together there, one the end point to see the network. They want the networks to the end point one exchange information, so one of the other integration points is between the end point on our next generation firewalls providing policy exchange, providing the ability to exchange information. So if I'm a large customer and I've got a very all encompassing degree off implementation ofthe semantic endpoint separate think it's called on DH, they've got Fortinet taken. Simply connect those two together, provide a very comprehensive solution. So we get some great feedback from our customers around them. >> Talk to me a little bit more about that. Are you seeing this adoption on? You know, both semantic and forty eight have customers in every industry of many sizes, but in terms of some of the successes that you're seeing, I know this is still really early on. What are some of those that really excite you? That, like Peter, you said we've made the right choice. >> Yeah, I'll just follow on from a comment you made Whether you're a medium size customer, the largest financial customer, security is a very tough thing to solve on. What you don't do is add complexity to that problem. You also wanna make sure you don't cost as well. So the really cool thing we're doing here is through the collaboration through the integrations that John spoke about between the employment network and secure rst. One of the fabric we're actually solving those problems in very intuitive ways is seamless for the customer. It just clicks together. That's what it should be like. We don't have any complexity here, and that's you know, that's what we're doing this, right? >> Yeah, and I think, think for customers Every time they need toe, add a security solution, it makes more complex. It's more costs, more operational overhead. So if they've got existing vendors like Semantic at the end, point off a cloud security and they've got Fortinet in there for SD when our next fire war, if >> we could >> simply switch on the connectivity policy exchange threat, intelligent exchange between those two things is great for the customer because they instantly get a better solution is more secure. It's more cost effective, >> of course, customers. You mentioned you guys both mentioned a couple of words that every customer wants seamless wanted to click in kind of plug and play. Obviously, it's it's a cut ostensible undertaking to integrate your solutions talked to us since this was just announced a few months ago. Where are you in terms of integrating the technologies. I think we saw the next Gen firewall integrated into semantics. Web security service and semantics. Endpoint solutions integrated into the security fabric. Where are you guys on the faces of those integrations? >> Well, let people talk about the WSSC. >> Yes, eso I think one big yellow into this as I just mentioned Wass Web security service. We have data centers around the planet on what we're doing is we're taking the virtual Forget solutions were installing them. Now in all of our data pods Andi were in the We're starting the rollout phase this summer. Andi will be probably finished done with it as we get into the fall season around the planet and we'LL be switching that that that on and they really cool bit about This is it's going to be one single interface. The customer just simply switches on five walling i ps Next one firewall. It's completely seamless >> from a management perspective policy upside looking through one crystal ball, >> one cloud security says service. >> Yes, on the end points mourners to develop. So we have to develop this connector of our election and firewall into the end point. And we're looking probably toward the end of this port early Q three. To do that on we'LL start rolling that out across are different operating systems. >> Talk to me about part about the channel, so I know forty nine is very much dedicated to the channel we've had with a number of your partner's on. I know you've Got John both coming up next and Facebooking with him for several years. Saw a lot of statistics, a lot of revenue growth, front of growth, affording that driven by the channel. One of the main kind of pillars that was discussed in the keynotes this morning was education. Talked about technology, talked about equal system collaboration. Education. How are you guys working together to educate your joint partners? Teo. Understand that the impact potential that Fortinet and Cemented customers are about to have? >> Yeah, from a training perspective. Obviously we have our own individual training programs, and as I was saying earlier, I think one thing that's very important to customers is more of an architectural approach. I want to look at an architecture of a four or five years. I don't make sure all these pieces are integrated inside there, so one of things we do initially for something, something like this for our partners. This produced boats are fast track. A fast track is a small module. Off training was focused on hands on training off both components to make sure that all our partners understand how to integrate. How to make that work as soon as possible. Then, before I followed that up with some more detailed training on on both solutions. >> Excellent. And from a relative perspective, this is something that's going to be going global by the way it's >> gonna go fast. It's going to start next week. So and the nice thing is when we map out our channel party because semantic is a channel very channel friendly company as well. We've got some great overlap, but there's also a ton of white space there for a partner, too. So I think it's going to really help both, obviously, our fields, but also our channel partners engaged, group broader and grow deeper into opportunities, >> and we need that. Security is a pan industry challenge, as every organization now lives and successful lives in this hybrid multi cloud world, millions of connected devices every industry has to react otherwise every business in every industry. Otherwise they face going out of business. I noticed that, though, that there were a couple of tracks here. John. Some sessions focused on a couple of verticals healthcare financial services. Retail, for example. Are you expecting to see any leading edge industries joint customers that really are ripe for this integrated solution? >> Maybe. But I also think that smacked. It's got a huge footprint across all the verticals across all the segments, the same as us. And so I think initially, you'LL see some of the larger companies who have these huge footprints of M points and network security. Implement these connectors, implement the cloud security and, as you see that roll down into the segments as well. >> So we're at the event today in the last couple days. What is that? Some of the feedback been from partners, but from also and user customers. Since there's about about four thousand people here today, John, what are some of the things that you're hearing? >> Well, we've been talking to some of our customers before here, obviously on DH overwhelmingly positive feedback from the large customers I spoke to some partners to hear today as well. They really like the ability to bring together on M point leading edge endpoint solution on network solution with cloud attached to it as well. So it's not often, actually I've done a partner announcement and I've seen so much excitement, not only with some of our some of the customers, all the customers on all the partners, but also both organizations. We announced it to ourselves. Organizations were doing that with semantics later on. That's right this week and I see a lot of excitement. So I think that bodes well going forward. >> And I imagine, Peter, you're hearing similar feedback from semantics and Sol days. >> Yeah, I mean, it's just been tremendous. This show for me has cemented the fact this is gonna be a very special partnership. The feedback I've been hearing from potential customers, our own customers coming to us, who say, Hey, I've got these solutions. It's fantastic. You doing this now to our partners saying, You know, this is this is truly amazing what you're doing it is very rare. You find these two companies that could come together in a meaningful way that can actually really impact what we're all trying to do here is find the adversary. >> Yeah, I mean, you look at that. Both companies that are big companies Cyrus critic companies think semantics. Probably enterprise in the top two. Top Juan we're in the top five easy, huge companies on our footprints. From a part of perspective is a bit of overlap here and there, but not really. Which makes is exciting, I think, for our partners for both companies, I think, yes, we you know, I see these relationships where it's a local exchange or we'LL do a bit of this integration on this AP I hear this is a truly very integrate solution for both our channel partners on our customers. >> And let's talk about competition that came up a lot during the general session this morning where just a few times a few people mentioned it, you know, in past saying on giant slides with arrows pointing, No, I'm kidding, but really what? What was very clear, I think, from not only the general session this morning, but also somatic that we've heard on the Cube today is the industry leadership, the product leadership that forty nine is demonstrating, but also, you know, telephoto networks Cisco some of your other competitors where really proudly showing this is where we are in relation even so far as the number of Gardner Insight partner appearance I reviews that Fortinet has gotten vs your competitors. So let's start with you, Peter. Talk to us about the competitive advantage that Symantec sees this partnership being able to generate. >> So the the way the way we look at it, is we're going to come to market now. We're both way with love technology. I think we can agree that we're both very much technology forward, very research forward, bringing this pieces together. When you do that, you're goingto win. Andi. If you do that in a way that is highly integrated, you're going to be. The competition is going to have a clear advantage. We're going to do text a faster. We're going to respond to start faster. It's just going to show Ray very well on DH. I'm not going to appoint a particular competitors. Don't mention the name way. We're obviously very large player in industry, but way like this a lot again. We think that if you make a very big impact, so let's see where it goes >> and John any predictions on what those graphs might look like it accelerate twenty, twenty, >> twenty twenty. That's a long time away from now, but I You know what? We continue to grow as a company. We take marketshare. We're aligning with some of the big players, such a semantic in the marketplace. So those graphs definitely up until the right, is that the right direction? >> That's the right direction. And last question is, we talked a lot about data sharing on a number of our segments. Today is semantic and forty that sharing threat intelligence and if so, why? Is that a good thing? Why is that >> important? Where where she, both founders of the cyber threat, aligns the C t a way already share way did that for two years ago. At least I know we're expanding. That strong was staying with really time on the ground. Three intelligence sharing between our products between the fabrics that would happen just automatically. >> It's important that you got the global sharing through the T A, but also going for because of targeted attacks. You have the local sharing, so we'LL have global sharing with big amounts of threat intelligence and data, but at the local level between the end points on the network's puree will have threat sharing there as well. >> But this is important to do that fast Security changes by the second. If you don't react to something quickly, If you don't share the intelligence that's actionable on relevant, you may as well just give up. You're gonna be fast, responsive >> and lasting. Last question is you mentioned the word react and we talked about that a lot today, as well as how and I'll ask you both thiss Peter, we'LL start with you. How is this partnership going to enable your joint customers to eventually go from being reactive to proactive to predictive? >> They're for sure. Well, I thinks of these integrations we're working on is all about being proactive. So is an example. If we see something in our network we've seen in a corner case, we can automatically give it over Too fortunate they'LL be inoculated everywhere around the planet in every single device. Advice first. So, unfortunately, something in their network that we've never seen before we can inoculate all ofher own points. All of our customers, that's been truly proactive. That's how you get ahead. >> Yeah, it's all about showing that threat intelligence is fastest possible across much of the attack surface is possible, and that's where the relationship >> Well, guys, thanks so much for stopping by the Cuban sharing with us a little bit more about the partnership with semantic and Fortinet. We look forward to hearing what comes in this year ahead, and we'LL talk to you next year. You look, we want to thank you for watching the Cube. I'm Lisa Martin Live from Fortinet. Accelerate twenty nineteen. Thanks for watching.
SUMMARY :
Brought to you by Ford. you know and love Well, John Madison, the executive vice president of Products and Solutions at fourteen. Why did semantic decide to and so far with the show today and accelerate, we made the right choice. That's always good, right to get some validation there talks to us about the from from Maybe from a customer's one the end point to see the network. but in terms of some of the successes that you're seeing, I know this is still really early on. One of the fabric we're Yeah, and I think, think for customers Every time they need toe, add a security solution, simply switch on the connectivity policy exchange threat, intelligent exchange between Endpoint solutions integrated into the We have data centers around the planet Yes, on the end points mourners to develop. a lot of revenue growth, front of growth, affording that driven by the channel. How to make that work as soon as possible. And from a relative perspective, this is something that's going to be going global by So and the nice thing is when millions of connected devices every industry has to react otherwise It's got a huge footprint across all the Some of the feedback been from partners, positive feedback from the large customers I spoke to some partners to hear today as well. This show for me has cemented the fact this Probably enterprise in the top two. from not only the general session this morning, but also somatic that So the the way the way we look at it, is we're going to come to market now. We continue to grow as a company. That's the right direction. Three intelligence sharing between our products between the fabrics that would happen just automatically. You have the local sharing, so we'LL have global sharing with big amounts of threat But this is important to do that fast Security changes by the second. going to enable your joint customers to eventually go from being reactive to around the planet in every single device. Well, guys, thanks so much for stopping by the Cuban sharing with us a little bit more about the partnership with semantic
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Lisa Martin | PERSON | 0.99+ |
John | PERSON | 0.99+ |
Peter | PERSON | 0.99+ |
Peter Jogger | PERSON | 0.99+ |
John Madison | PERSON | 0.99+ |
Symantec | ORGANIZATION | 0.99+ |
Fortinet | ORGANIZATION | 0.99+ |
Cisco | ORGANIZATION | 0.99+ |
forty minutes | QUANTITY | 0.99+ |
next year | DATE | 0.99+ |
Orlando, Florida | LOCATION | 0.99+ |
two companies | QUANTITY | 0.99+ |
Today | DATE | 0.99+ |
both companies | QUANTITY | 0.99+ |
2019 | DATE | 0.99+ |
next week | DATE | 0.99+ |
five years | QUANTITY | 0.99+ |
two | QUANTITY | 0.99+ |
two things | QUANTITY | 0.99+ |
today | DATE | 0.99+ |
Mary | PERSON | 0.99+ |
both | QUANTITY | 0.99+ |
four | QUANTITY | 0.99+ |
Both companies | QUANTITY | 0.99+ |
hundred seventy five million | QUANTITY | 0.99+ |
Accelerate | ORGANIZATION | 0.98+ |
both solutions | QUANTITY | 0.98+ |
forty | QUANTITY | 0.98+ |
Ford | ORGANIZATION | 0.98+ |
Semantic | ORGANIZATION | 0.98+ |
both components | QUANTITY | 0.98+ |
each company | QUANTITY | 0.98+ |
One | QUANTITY | 0.98+ |
Peter Doggart | PERSON | 0.98+ |
Andi | PERSON | 0.98+ |
this week | DATE | 0.97+ |
two years ago | DATE | 0.97+ |
both organizations | QUANTITY | 0.96+ |
this morning | DATE | 0.96+ |
second | QUANTITY | 0.96+ |
about four thousand people | QUANTITY | 0.96+ |
John Maddison | PERSON | 0.95+ |
Billy | PERSON | 0.95+ |
forty eight | QUANTITY | 0.95+ |
twenty | QUANTITY | 0.95+ |
Lisa Martin Live | TITLE | 0.95+ |
one | QUANTITY | 0.95+ |
this summer | DATE | 0.94+ |
Juan | PERSON | 0.93+ |
Teo | PERSON | 0.93+ |
this year | DATE | 0.93+ |
Gardner Insight | ORGANIZATION | 0.92+ |
forty nine | QUANTITY | 0.92+ |
twenty nineteen | QUANTITY | 0.91+ |
first | QUANTITY | 0.91+ |
millions of connected devices | QUANTITY | 0.91+ |
Cube | TITLE | 0.91+ |
one single interface | QUANTITY | 0.9+ |
one thing | QUANTITY | 0.9+ |
Ray | PERSON | 0.9+ |
executive vice president | PERSON | 0.89+ |
John Maddison, Fortinet | Fortinet Accelerate 2019
>> live from Orlando, Florida It's the que covering accelerate nineteen. By important, >> Welcome back to the cubes. Continuing coverage of Fortinet Accelerate twenty nineteen. Live from Orlando, Florida Lisa Martin with Peter Births and we're pleased to welcome back to the Cube. One of our alumni. John Madison, the executive vice president of Products and Solutions from Fortinet. John, It's great to have you back on The Cube >> is great to be here again. >> Lots of momentum. That fourteen that is coming into twenty nineteen with I can't believe we're in April. Already, lots of growth in revenue product revenue was up. You guys talked about the expansion of the partner network with some of your fabric ready partners on already today. You talked about this third generation and security. How fortunate is uniquely delivering that for our viewers who you weren't didn't have the opportunity to attend. Your keynote kind of talked to us about that in this hybrid world. How is supporting that delivering this third generation? What makes you guys difference? >> Yeah, so we talk about the third generation now. Everyone has different generations. That's fine. We call it the security driven networking, and it's really the Genesis ofthe forty nine for a long time in bringing together networking and security into one place. I think these days or in the past, people have built out the networks, the network layer. Then they try and connect users and applications. And they go, Wait a minute, this person security over here in a bit, over here and over there in our mind, start with both. Start with a security driven networking concept. Make sure it works end to end, and that will be the most sophisticated, most secure application and network you can have. >> And what enable supporting that to deliver this unique. Because a number of times today and Ken's key nodes, I think Patrice as well. I can't recall if yours competition came up where the audience was shown the strength in numbers that fourteen that has what makes us unique and what you're delivering. One of >> the key differentiators from the start is being making sure we can run a routing stacks. Sometimes today he referred to as ehs tea. When Stax or so security stacks in a very small footprint, and to do that, you need to spend a lot of money on what we call security processes which go inside our appliances, but to make sure that runs very fast. But having said that, I definitely think customer is going to be in a hybrid world forever for a very long time, at least anyway, where not only appliances but also virtual machines and FBI security. We also talk about this fabric concept that ables to cover the incomplete digital attack surface. So there's a very important point, and we find a lot of customers now agreed that they want to consolidate. They want to make it simpler. They need to move faster to this digital world, and anyway, you have to do that is through a consolidated >> approach. So let's build on this. They want to consolidate. They want to make it simpler, more common, and how the policies and management now along comes. Yet what's the dynamic there? >> But what's happening is that all the people referred to the perimeter disappearing. Okay, that's happening to a certain extent because data's moving into cloud. You've got different one implementations, but what's happening when you do that is to creating New Edge is a really good example, a zesty wherein which used to be very closed off. The one used to be something that connects branch offices back to the data center, but nobody got involved in that. Well, now you're opening up that when two different types of transport mechanism you're creating an edge I always refer to these edges is being created by different trust levels. There is a maybe a secure trust level here, less trust here. It creates an edge, and you absolutely need to protect all those edges. >> Would give us an example that So, for example, when you say differentiated trust levels, my edge might be at a customer location. Is that kind of what versus my edge might be in a branch office? Is that what you mean by different trust level? Push that concept for >> you know, It's more, for example, if I got a branch office and I've got one connective ity going back to my data center that's encrypted and secure. But I've also opened up connected to the Internet, the trust level between that encrypted link on my connection to the to the Internet's very different Internets open. Anyone can see they're so that trust level between those two is very different. and that's what creates the edge. >> And so, therefore, that becomes a key feature in how we design different edge implementations. It >> is. It's also a key requirement on what type of deployment Mody use have appliances have virtual machines. We have clouds, containers. AP eyes going forward. I'm finding that customers are still very reluctant to put software implementations of firewalls against the Internet. Appliances are hardened. They run faster. Having said that, inside the cloud, obviously, and inside software defined data centers virtual fine. >> Where some of those customer concerns that you're hearing >> well, I think what happens is, you know, if you putting a piece of software against the Internet, it's open to all sorts of attack. It's the same as giving I P addresses to anything. It's like a factory that creates an edge as well, and you need to harm that age against that. >> And how can Estevez When How Why is this such a crucial component of digital transformation? >> You know, sometimes markets are over hyped. I remember the Casby marketplace a few years ago. It just was a feature. To be honest, I think sd one extremely important. The reason is important is the SD one controller. That controller eventually tells users and devices how to get to the applications. And so I tell customers that investment for you is extremely important. You need to own it. You need to make sure it's flexible. Need to make sure it's secure. And so I think the SD, where marketplace or one edge is the kind of larger term for it is extremely important investment for customers. Do >> you anticipate that? I mean, you guys invested. You guys put forward a lot of products, made a number of different announcements again, going back to that notion of simplicity, that notion of consolidation. What is the breaking point for your typical group in terms of the complexity of that they can accommodate and absorbed? When we start adding additional function within the overall network, especially from a security standpoint, >> well, I think it's a bit broken already. They're really struggling to keep up from our perspective. No, today we announced our forty or sixty twos are major operating system, and what we try and do is consolidate functionality as much as possible. Inside our fabric through a single console, there was single operations capability, so it's easier for the operations people. For this critique people to implement things and find information. Ross implementing order made in mechanisms like security ratings. We should do a background run off best practices, for example, that make it again easier for those those teams to run a full analysis. What's going on? >> So was it about three hundred features roughly roughly >> accountable individually? >> Okay, good. We'LL do a recount of that, but a tremendous amount of feature addition to forty OS announced today. What are some of the things business outcomes? Peter and I were talking about outcomes with several of our guests earlier. Business outcomes, New revenue streams New product's going to market faster, the also being able to become less reactive, maybe more proactive in terms of security codes. Can you walk us through some of the outcomes that fourteen customers can expect to achieve from some of the O. S announcement in the handsome? It's already >> talked about one, which was the consolidation, which means they can do multiple things with single platform us, an important one for them. Also, some of the some of the cost savings around that's on the operational cost savings. I think also for our partners. For example, they like the fact that we're keeping that we keep adding services on top of that fabric. They can take those services, then apply them to their customers and make sure they can add value inside as well. So there's two angles to it. The one is making sure our customers are better protected. They can consolidate, save money, invest better training and then to our partners so that they can provide more value to their customers. >> So one of the things we're talking about is the fact that you have invested in a six it's and security processing units and content processing units, etcetera, that are capable of accelerating the rate at which these crucial security algorithms run. That opens up That creates additional capacity to add more function both for you as well as your partners. Are you starting to see some of your ecosystem grow faster as they better exploit that inherent power and performance that you have within your appliances and devices? >> Definitely. I think we're seeing new partners come from new areas. It also fragments of it, and that's why we announced this new partner initiative going forward, which is a bit more customizable, but but I, you know, I do think that going forward, both our customers and our partners are looking for more of an architecture approach again. If you go back five years, here's a box and off you go and install it, and we're good on again When you saw the security threats. Yes, we produce a point solution to fix the normal way. Keep moving on. They're now looking at architectures over the next five years, known only just cybersecurity architectures but Network Inc architectures, storage architectures and all coming together. So we definitely need to train our partners. I think here we had over fifty of are what we call Network's network security expert. Eight. It's the highest level of architecture and half of the partners, But going forward, we see much more partner involvement in architecture approach on. Our customers want that because they don't want to have a point solution that's out of date in a year's time or a new threat comes along and makes it redundant. >> So how are you? You mentioned you mentioned network security and storage. What other things are starting to inform that architectural approach that you're taking. >> It's everything now. So we know the factories now a completely automated all that. If utilities of I P addresses are running almost all the way down to the end point, just everything has more flexibility and more open eso. Definitely All that information's bouncing around inside I ot devices inside the wire inside data centers on all that data needs protecting. That's the key of protecting the data. And to do that again, we keep saying you need tohave. An integrated approach to networking and security >> Has the customer work with forty Net and your partner ecosystem to achieve that integrated approach. Assuming that there is a, you know, an enterprise out there that's got a spectrum of hybrid multiplied environment with the spectrum of Security point Solutions pointed it in a different components of an infrastructure. How do you help them on that journey of taking the many disparate security solutions and leveraging the power of fourteen and your partners to get that integrated, truly integrated, consolidate consolidated view? It's a couple >> of steps, maybe, maybe many steps. The first one is, oh, customers don't want to throw everything else straightaway. So what they want to do is build to integrating Connect. So we have some of our partners. Here, for example, are fabric ready partners way have connectors. We build into their platforms and orchestration systems, and that's their first step. Once they get there, they start looking across to see what they can to consolidate. So can they take a specific solution from this and I'm bringing inside? And then eventually they start to look at the long term architecture if they're moving APS to the cloud or they want to open up their wear or the one who provide kind of SD functionality inside their branch, So it's definitely a phase approached. I don't see many customers. Some customers would take an application and created from scratch inside the cloud. They can't do that with their infrastructure, the kind just completely wipe it clean. Start again. It's definitely more of a phase approach. >> So if you think about the face approach on you, talk way heard from, uh, we heard from the sales of sport side the notion that the S P s the service providers want greater customization. The enterprise wants a different level of access to the core technologies, so that they could do not customization. Not exactly remember Jack with the term was what What degree will customers retain control over how that architecture gets implemented versus what degree is going to get baked into the stack itself? A >> bit of >> both, I think, you know, for most customers, they're running towards a digital platform on. They need to own the digital powerful. If they give up complete control, how do they control that destiny going forward? So they want to own the digital platform, but they haven't got the resources to do everything. So that allows saw some to service providers and carriers. Some of the partners, for example. But I'm going to keep coming back to this. They want to get to a point in five years time, but they've got a digital footprint, is very flexible, but they also want to make sure it's very secure because as you open up that digital footprint, you opening up all these different edges. Inside the network, >> it's coherent, which is the are contested approach. Yes, because if they don't have a coherent approach to doing it, they don't know what interfaces are or are not competent, and that includes interfaces with partners. >> Yeah, they have to look forward and say I'm gonna implement X amount in the cloud. Arnot gonna have some edge compute going on here. I want to shake. Make sure my branches have the best quality of service for these certain applications that go back to this. So they would look at all those parameters and an architect, something from there. >> So we know that security network, security app, security info, security cloud security is our imperatives for every industry. But I didn't notice that the breakouts today feature. I think there's a couple of vertical features healthcare, financial services, retail. I was just curious. Are theirs just great use cases that show the potential power of forty nets technologies? Or are those industries that are either early adopters or maybe more leading edge? Because they have such a tremendous amount of data that needs to be secured as their ecosystem does this? >> Yeah. So the industry verticals, I think I think for the very large ones, they're very similar. All of them have I ot this expanding order and wanna have a flexible land system. Almost got something. Some computer power in the cloud and the edge going forward. So I know there's differences and industries. For the very large enterprises, it's the problem. Seems the same. This huge organizations, and they have all of these things going on in the right corner at you. Calm down, Toa mid enterprise. I think there's more reason to consolidate. But you seymour differences in the way the approach, things like health care that really, really focused on that healthcare kind of security of devices inside hospitals, et cetera. Education. Oh, they need to connect in these big data banks. Transfer the research information. So big organizations, I say pretty much the same problem. Midsize organizations become more relevant to the specific industry. >> Well, John, thank you so much for carving out some time to speak with Peter and need Today. We appreciate that. And it's exciting to see and feel the mo mentum the forty Niners bringing into twenty nineteen. >> Well, thanks for inviting me. >> Our pleasure. We want to thank you for your time is well for Peter. Boris. I'm Lisa Martin. You're watching the Cube
SUMMARY :
live from Orlando, Florida It's the que covering John, It's great to have you back on The Cube of the partner network with some of your fabric ready partners on already today. it the security driven networking, and it's really the Genesis ofthe forty nine the audience was shown the strength in numbers that fourteen that has what We also talk about this fabric concept that ables to cover the incomplete more common, and how the policies and management now along comes. to be very closed off. Is that what you mean by different trust level? the trust level between that encrypted link on my connection to the to the Internet's very different And so, therefore, that becomes a key feature in how we design different edge implementations. of firewalls against the Internet. It's the same as giving I P addresses to anything. And so I tell customers that investment for you is extremely made a number of different announcements again, going back to that notion of simplicity, for example, that make it again easier for those those teams to run a full New revenue streams New product's going to market faster, the also being able then apply them to their customers and make sure they can add value inside as well. So one of the things we're talking about is the fact that you have invested in a six it's and security It's the highest level of architecture and half of the partners, What other things are starting to inform that architectural And to do that again, we keep saying you need tohave. Assuming that there is a, you know, an enterprise out there that's got a spectrum of hybrid they start to look at the long term architecture if they're moving APS to the cloud or they want to open up their wear or level of access to the core technologies, so that they could do not So that allows saw some to service providers and carriers. Yes, because if they don't have a coherent approach to doing it, Yeah, they have to look forward and say I'm gonna implement X amount in the cloud. amount of data that needs to be secured as their ecosystem does this? I think there's more reason to consolidate. And it's exciting to see and feel the mo mentum the forty Niners bringing into twenty We want to thank you for your time is well for Peter.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Lisa Martin | PERSON | 0.99+ |
Boris | PERSON | 0.99+ |
Peter | PERSON | 0.99+ |
Peter Births | PERSON | 0.99+ |
John Madison | PERSON | 0.99+ |
John | PERSON | 0.99+ |
April | DATE | 0.99+ |
Fortinet | ORGANIZATION | 0.99+ |
forty | QUANTITY | 0.99+ |
Orlando, Florida | LOCATION | 0.99+ |
Network Inc | ORGANIZATION | 0.99+ |
two angles | QUANTITY | 0.99+ |
Eight | QUANTITY | 0.99+ |
Jack | PERSON | 0.99+ |
two | QUANTITY | 0.99+ |
Ken | PERSON | 0.99+ |
today | DATE | 0.99+ |
fourteen customers | QUANTITY | 0.99+ |
first step | QUANTITY | 0.99+ |
five years | QUANTITY | 0.99+ |
fourteen | QUANTITY | 0.99+ |
forty OS | QUANTITY | 0.99+ |
sixty | QUANTITY | 0.99+ |
Today | DATE | 0.99+ |
third generation | QUANTITY | 0.99+ |
2019 | DATE | 0.99+ |
One | QUANTITY | 0.99+ |
Patrice | PERSON | 0.99+ |
both | QUANTITY | 0.98+ |
six | QUANTITY | 0.98+ |
one | QUANTITY | 0.98+ |
first one | QUANTITY | 0.97+ |
Estevez | PERSON | 0.97+ |
FBI | ORGANIZATION | 0.96+ |
about three hundred features | QUANTITY | 0.96+ |
over fifty | QUANTITY | 0.96+ |
single console | QUANTITY | 0.95+ |
single platform | QUANTITY | 0.94+ |
one place | QUANTITY | 0.94+ |
half | QUANTITY | 0.93+ |
Casby | ORGANIZATION | 0.92+ |
forty nets technologies | QUANTITY | 0.9+ |
twenty nineteen | QUANTITY | 0.88+ |
few years ago | DATE | 0.85+ |
forty Niners | QUANTITY | 0.85+ |
Fortinet Accelerate | ORGANIZATION | 0.84+ |
forty Net | ORGANIZATION | 0.84+ |
Stax | TITLE | 0.81+ |
John Maddison | PERSON | 0.8+ |
minute | QUANTITY | 0.78+ |
two different types | QUANTITY | 0.78+ |
one edge | QUANTITY | 0.76+ |
single operations | QUANTITY | 0.75+ |
twenty | QUANTITY | 0.75+ |
twos | QUANTITY | 0.69+ |
one implementations | QUANTITY | 0.69+ |
a year | QUANTITY | 0.69+ |
executive vice president | PERSON | 0.66+ |
money | QUANTITY | 0.63+ |
nineteen | QUANTITY | 0.59+ |
Cube | ORGANIZATION | 0.59+ |
next five years | DATE | 0.57+ |
Ross | ORGANIZATION | 0.54+ |
lot | QUANTITY | 0.51+ |
nine | QUANTITY | 0.48+ |
nineteen | TITLE | 0.39+ |
Eric Kohl, Ingram Micro | Fortinet Accelerate 2018
(upbeat music) >> Live from Las Vegas, it's theCUBE. Covering Fortinet Accelerate 18. Brought to you by Fortinet. >> Welcome back to theCUBEs continuing coverage of Fortinet Accelerate 2018. I'm Lisa Martin here in Las Vegas with my co-host Peter Burris and we're excited to welcome a Cuba alumni back to theCUBE, please welcome Eric Kohl, the VP of Advanced Solutions from Ingram Micro. Welcome back! >> Thank you, thanks for having me back. Excited to be here. >> Yes, we're very excited. So tell us, what's new? We talked to you last year at this event, what's new and Ingram? Tell us about your role there and the things that are all exciting Ingram Micro. >> Yeah, brand-new for me. I'm in my 20th year at Ingram Micro. I lead our security practice for Ingram Micro U.S. and I have responsibility for sales, vendor management, strategy and execution on behalf of our manufacturer partners. It's a ever evolving space. It's such a great space to be in, I love watching the news every day. You know there's going to be some big logo but just as much fun as I have watching those, that's some of these small breaches that you don't hear about and it's just fascinating. So much more exciting than virtualization. (laughs) >> Some might argue with that. So tell us about the partnership that you guys have with Fortinet. How has that evolved over your time there? >> Yeah so been at Ingram for 10 and I've been working with Fortinet for, I'm sorry I've been at Ingram for 20 and been with Fortinet for over 10, back to when we signed the contract together. Just a very great partnership. They're our security partner of the year, last year. Good friends, excited to see John Bove back leading channels back to Fortinet and you know, we both invest in each other's success and so I think that's pretty unique. Huge investment for them here, having an event like this. Not every company does it but to bring everybody together where you can have security conversations get on the same page, it's extremely valuable, huge investment, and we're proud to be a sponsor. >> I'd love to chat about a little bit of the evolution that you've seen at Fortinet in the last 10 years as we look at, you mentioned breaches. I mean, there were some very notable things that happened in 2017. How have you seen the evolution from them on a security transformation standpoint as it relates to your customers and digital transformation. >> Yeah, so I mean it's something that we see every day from you know, as you know we sell to and through partners but you know, one thing obviously is their breath of solutions has expanded. But you know, also things that partners are asking us today is how is this technology being consumed? And in the face of digital transformation, that's a huge value point because ultimately we want to help our partners to architect, recommend the right technology to solve that business problem and then how do you want to consume it? How does your want to your client want to consume that? So I think that's one of the biggest kind of trends that we're seeing right now. >> So as you think about where you've come from to where you are and we'll talk a little bit about where you think might go, what were the stories you told about security 10 years ago? And how are they different from the stories you're telling about security today? >> I would say it's changed from my perspective because at Ingram, we have never ever been a services company like we are today. And so what I mean by that is, we wrap our services, partner services around the Fortinet solution to make it stronger. 10 years ago I would say we are living more in the traditional distribution role of hey, how do we get a box from here to there? Certainly channel enablement, we've been doing that for a long time but our offering of services to help drive demand is incredibly strong. You know, we work with Fortinet for example, on their threat assessment program and we have an engineer that can go and help. Our partners understand to do that, it's a huge partner ecosystem and so we've got to help them with all those channel enablement efforts. >> What are some of the biggest security challenges that you're hearing, say in the last year or so through the channel, that your partnership with Fortinet can help address? >> You know, it's all around complexity and that as you have likely heard that the shortage of folks that can get out and do some of these services have limitations. There's incredibly high demand for services, you know we're serving a channel ecosystem of roughly 12,000 companies that are buying security technology from us, all with varying degrees of capability and so we've really got to help them understand, hey, how can we help you deploy these services, etc. >> So as you imagine then the steps associated with helping the customer, the roles and relationships between Fortinet, Ingram, and your partners also must be evolving. So how is, as a person responsible for ensuring that that stays bound together in a coherent way for customers, how are you seeing that changing? >> Well you know, look it's a three-legged stool. (laughs) It's us, it's Fortinet and that's our partner community and we're reliant on each other to go and be successful in the market. Look, we couldn't be as great as we are working with our Fortinet channel ecosystem if we didn't have the support of Fortinet, the investments they make, the team that they have wrapped around our business, the team we've put in place wrapped around their business so that's kind of what I'm seeing there. >> They shared a lot of momentum not only in the keynotes this morning but also a number of the guests that we've had on the show today in terms of what Fortinet achieved last year. 1.8 billion in billing, nearly 18 thousand new customers acquired, a lot of momentum, a lot of numbers, I love that theme of the event today. So if we look at some of the things that were shared by Kenzie this morning for example, like I mentioned that the customer numbers and even talking about what they're doing to protect 90% of customers in the global S&P 100 and showed some some big brands there. Tell us a little bit about the partnership and how you're leveraging the momentum of what Fortinet is able to do in terms of capturing customers. How does that momentum translate and really kind of maybe fuel Ingram and what you're able to do? >> Well look, I mean there's incredible demand in security today. There was a slide that they showed this morning and I think it was the perfect storm. I like to call the security space a beautiful disaster. It's a mess, it's complicated, it's scary, the threat attacks are you know new and different and they're never going to stop but it again comes back to hey, how do we work together to kind of harness this? How do we go and there's a great partner community here, lots of our friends are here but they can't all be here. So we want to be able to help take that message out to our channel partners that were not here. Things like that. >> What are some of, oh sorry, go ahead Peter. >> I was going to say so Ingram, Ingram itself has changed. You said you've now, are now introducing security or you're introducing more services. So how is that.. How is security leading that charge to move from a more of a product and a distributor to now services? Is security one of the reasons why Ingram is going in that direction? >> It's one of them. I joked on virtualization but there's a lot of services that we can wrap around and I think, obviously there's a high demand of services and we will lead with Fortinet services and solutions where we can. We want our partners to lead with theirs but really we've hired people to go out do assessments. We have a partner ecosystem where, hey I can't get down to New Mexico to do an install. We have a partner network where they can tap into that and make sure that everything is installed correctly, all the features are turned on. You think about all these breaches that happen in the news, it's not that they didn't have the technology, they missed an alert or they didn't have it all deployed. We want to be able to help our partners solve for that. >> Along the partnership front, what are some of the things that excite you about the Fabric-Ready Partner Program and the announcements they've made today? >> Yeah, love it. Look Fortinet has built comprehensive end-to-end solutions within their Fortinet, I'm sorry, for their Fabric ecosystem but they've also recognized that they can't do it all alone and so they've introduced a lot of partners into that. And so what's exciting for me, leading our security category is, hey how do we bring new partners into our ecosystem too? Because it is a differentiator for Ingram to be able to provide multi-vendor solutions. To have somebody you can go to to say, how does SentinelOne work with for Fortinet Fabric? Those types of things, those conversations are happening all the time. >> Another thing that was announced today was what they're doing with with AI. Tell us a little bit about that and how are you seeing what they're going to be able to do with AI as an advantage for your partners and customers. >> Again the artificial intelligence, machine learning, it all goes back to making the technology easier to use. I still think, you think intelligence and I think back to the human factor. Some of these big breaches, look the threat actors are going to get in but how you recover from a breach, I think if we could inject some artificial intelligence into some of these companies that haven't figured out how to successfully pivot. You know paying your hacker a hundred thousand dollars to keep quiet is not the answer but I think that some of these machine learning things are going to make it easier. It's going to be easier to manage the alerts that are happening every day. So anything that helps eliminate, as they said today, the enemy of security is complexity. Things that help to discover these threats and remediate against them, all good stuff for our partners. >> On the enablement side, when we were talking with the channel chief, John Bove, earlier today and talking about sort of this long history of partner focused culture at Fortinet. Tell us about that in terms of the enablement that you're able to glean from them and then pass on to your channels in terms of selling strategies, marketing to, marketing through. What are some of the things that-- >> Look, we have an amazing team. John Bove, Curt Stratton, the folks that really spent so much time working with Ingram and then we've built an amazing team. I think we have 12 people from our company here at this event to make sure we're making the most out of it but you know. If you heard, we're at The Cosmo. They have Secret Pizza, have you been there? Have you heard about it? >> Lisa: No, Secret Pizza? >> Yeah, it's amazing, it's pretty good, okay. (laughs) >> You didn't bring any, I noticed that but continue. >> I didn't but it's secret not-so-secret pizza but we have some secret not so secret weapons. Jenna Tombolesi an NSE 7. She's one of the highest certified engineers on the planet and she works for Ingram Micro helping to technically enable some of our partners. We've got a guy by the name of Will The Thrill Sharland and The Thrill is out talking to partners every single day, helping them to be more profitable, trusted security advisors helping them through anything you can imagine from a channel enablement perspective. And then just huge teams of people that we go to serve this big market together. >> Are you seeing any vertical specificities? When Ken was sharing some slides this morning, they were talking about, they showed some verticals from a kind of market share perspective but I'm curious some of the verticals that kind of come to mind where security is concerned that maybe are a little bit more elevated than some of the others in terms of risk or health care education and financial services. Maybe Fed, SLED, are you seeing any verticals in particular, maybe those that are really going to be kind of having to be leading-edge, where security transformation is concerned? >> They have to be. Think about health care and when they're big ransomware attack hit last year. There's guys on CNN saying, they had to postpone my surgery because ransomware head. I mean that's life-and-death stuff there but I don't think there's any vertical that's immune to what's going on today. So I think you know regardless of your vertical, you have to be prepared, you have to choose the right technology, and choose the right partner to help you implement it. >> If you imagine where Ingram's going to go with this relationship, what kinds of things are you looking to be able to do as a consequence of great strong partnership with Fortinet. >> Look, the way that companies want to consume technology is changing in the space of digital transformation. Once we work with Fortinet and the partner to recommend the right technology and I mentioned this, like how do you want to consume it? Is it public cloud, is it AWS, or Azure? We have an answer for that today is that hey, it's on premise but I need some creative financing to help close this deal to solve a budget constraint. We have an answer for that. There's several variations of that but however that technology wants to be consumed, we have an answer together. So I think that's a testament to the strength of our relationship. >> And I think one of the words that I saw in, at least one of the press releases, was adaptability. Adaptability of some of the technologies and even John Madison was kind of talking about how customers can go, I've got 20-plus security products, how do I start this Fabric? And that word adaptability kind of jumped out at me as how do you enable adaptability when your customers, through the channel, have so many technologies in place and how does Fortinet help that adaptation? >> I would say they're placing bets like we are on top partners that are going to lead with that technology. They've got to go be the experts in that field and really start driving that. Events like this help get everybody on the same page, understand the new offerings. I mentioned Jenna, she was locked in a room all day yesterday all excited about all these things. She's been running around all day but look we've just got to help the channel understand what the new technologies are, what are the new offerings, and hey, how do we go solve that customer problem together. >> So are there any particular new approaches or tactics or techniques that you're using to get the channels to understand better? >> I don't think that there's anything necessarily new. We're all driving towards the same common goal. Having a security conversation today is easier than ever before so you know, I think we're we're going to continue doing what we've been doing. It's been very successful for us but that's, you know. >> What are some of the things, kind of wrapping up here, that you're looking forward to throughout the rest of 2018? We're kind of still in the first quarter calendar, some big announcements from your partner here today. What are some of the things that excite you at Ingram about the year of 2018? >> Look, it's a market that's that's really ripe right now and I think that when you talk about their new technologies, when you talk about the machine learning, there's a lot of these things happening out there. It's just look, we've got a huge market. The potential is unlimited and I think one area where we're really going to drill down this year is down market, down SMB in mid market because they need enterprise grade technology and Fortinet delivers that and has a history of delivering that. So I think we're going to double click down there together this year and John and his team have been great around putting some programs together for us to go and tackle that together. >> Excellent, well we thank you so much Eric for stopping by theCUBE again. >> Yes and I'll bring pizza next time. >> Please do. >> All right. >> Yes and maybe some beverages so we don't have dry throats. >> Of course, yes. >> So we wish you and Ingram the best of luck in this next year and we look forward to talking to you next year, if not sooner. >> Sounds good. Great, thank you. >> We want to thank you for watching theCUBE's continuing coverage of Fortinet Accelerate 2018. For Peter Burris, I'm Lisa Martin, after the short break we'll be right back. (upbeat music)
SUMMARY :
Brought to you by Fortinet. a Cuba alumni back to theCUBE, Excited to be here. We talked to you last year at this event, that you don't hear about that you guys have with Fortinet. and you know, we both invest in each other's success as we look at, you mentioned breaches. to and through partners but you know, around the Fortinet solution to make it stronger. and that as you have likely heard So as you imagine then the steps associated and be successful in the market. like I mentioned that the customer numbers and they're never going to stop How is security leading that charge to move and we will lead with Fortinet services To have somebody you can go to to say, Tell us a little bit about that and how are you and I think back to the human factor. and then pass on to your channels I think we have 12 people from our company here Yeah, it's amazing, it's pretty good, okay. and The Thrill is out talking to partners every single day, that kind of come to mind where security is concerned and choose the right partner to help you implement it. are you looking to be able to do and I mentioned this, like how do you want to consume it? and how does Fortinet help that adaptation? and hey, how do we go solve that customer problem together. It's been very successful for us but that's, you know. What are some of the things that excite you at Ingram and I think that when you talk about their new technologies, Excellent, well we thank you so much Eric to talking to you next year, if not sooner. We want to thank you for watching theCUBE's
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
John | PERSON | 0.99+ |
Jenna Tombolesi | PERSON | 0.99+ |
Eric Kohl | PERSON | 0.99+ |
Peter Burris | PERSON | 0.99+ |
Lisa Martin | PERSON | 0.99+ |
Fortinet | ORGANIZATION | 0.99+ |
2017 | DATE | 0.99+ |
New Mexico | LOCATION | 0.99+ |
Ingram Micro | ORGANIZATION | 0.99+ |
Eric | PERSON | 0.99+ |
John Bove | PERSON | 0.99+ |
Ken | PERSON | 0.99+ |
Curt Stratton | PERSON | 0.99+ |
Jenna | PERSON | 0.99+ |
Ingram | ORGANIZATION | 0.99+ |
next year | DATE | 0.99+ |
1.8 billion | QUANTITY | 0.99+ |
John Madison | PERSON | 0.99+ |
Las Vegas | LOCATION | 0.99+ |
CNN | ORGANIZATION | 0.99+ |
last year | DATE | 0.99+ |
AWS | ORGANIZATION | 0.99+ |
20th year | QUANTITY | 0.99+ |
12 people | QUANTITY | 0.99+ |
today | DATE | 0.99+ |
Peter | PERSON | 0.99+ |
Lisa | PERSON | 0.99+ |
2018 | DATE | 0.99+ |
Ingram | PERSON | 0.99+ |
one | QUANTITY | 0.99+ |
10 years ago | DATE | 0.99+ |
20 | QUANTITY | 0.98+ |
Kenzie | PERSON | 0.98+ |
10 | QUANTITY | 0.98+ |
first quarter | DATE | 0.98+ |
The Thrill | ORGANIZATION | 0.97+ |
Fed | ORGANIZATION | 0.97+ |
Cuba | LOCATION | 0.97+ |
this year | DATE | 0.97+ |
20-plus | QUANTITY | 0.97+ |
yesterday | DATE | 0.97+ |
Will The Thrill Sharland | ORGANIZATION | 0.97+ |
SentinelOne | ORGANIZATION | 0.96+ |
Fortinet Fabric | ORGANIZATION | 0.96+ |
three-legged | QUANTITY | 0.95+ |
this morning | DATE | 0.95+ |
Mykola Konrad, Ribbon Communications | Fortinet Accelerate 2018
>> (announcer) Live from Las Vegas, it's the Cube. Covering Fortinet Accelerate '18. Brought to you by Fortinet. (upbeat music) >> Welcome back to the Cube. We are live at Fortinet Accelerate 2018. I'm Lisa Martin, with my co-host, Peter Burris. And we're excited to be joined by Myk Conrad, the VP of Product Management at Ribbon Communications. Myk, welcome to the Cube. >> Well, thank you very much, and it's great to be here. >> So tell us about Ribbon, your Technology Alliance's partner. Tell us about Ribbon Communications, and what you guys do with Fortinet. >> Okay, so a few things. Ribbon Communications, we basically are a security and cloud company, in the voice and video space. So what does that practically mean? That means we sell something called a session border controller, which is a voice and video firewall, into both service providers and into enterprises. So an example would be, when you make a mobile call, with AT&T, or Verizon, or Deutsche Tel, or British Talk, I mean, whoever your particular service provider is, that voice session becomes an IP packet, wends its way through the network, and as it's wending its way through the network, it has to be potentially encrypted, it has to be protected, denial service attacks, all of that stuff, that's what we do. Now how does that work into what Fortinet does? We are a part of their cloud security fabric, and we have the ability, with a new product that we're launching, or have launched this week, or announced this week. It will be actually GA and available in the summer. It will be included in passing information into the security fabric. So we protect voice and video, Fortinet protects data, web, email, you know, everything that they do very well. What we are, what this new product that we call Ribbon Protect is, is going to be a bridge between the voice and video world of IP communications, and the data world that Fortinet works with. And we're going to be passing information and talking between those two worlds, and therefore adding an extra layer of security to that. So that's how we work with them. >> (Peter) So voice and video have some certain special communications requirements, and basically, you're bringing the capacity to do voice video security, and the special requirements associated therein into the Fortinet ecosystem. >> (Mykola) Yeah, so a great example is, so let's use an enterprise as an example, alright? So let's say you're a big bank, somebody along the lines of a Bank of America, and I'm not saying it's Bank of America, or Wells Fargo. I'm not naming anyone, but just along those lines. Big bank. You probably have a SIP trunk, which is an IP trunk, and IP packets for communications coming into a data center, or multiple data centers around the world, and into individual branches of all your retail locations. And those are voice and video packets. And your tellers, or your contact center agents, are picking up the phone, and that's all IP audio and video. Or they might be using a handset, and again, that's all IP to the laptop, or to the handset. And they're having these conversations. You may want to encrypt those conversations. You definitely want to make sure, if a contact center is up, and it's doing mortgage calls, it's taking individual requests for checking account balances, that that contact center stays up. In the world of IP, especially in SIP communications, it's very easy to send a denial service attack against, for example, a contact center, and bring that down. So nothing keeps somebody from generating, from a single laptop, 20 gigabytes, 30 gigabytes, or petabytes worth of calls into a contact center. And that will bring down the infrastructure, unless you're protecting that infrastructure with a download service type of device. Similar, very analogous to what you would see is in a DDoS device that, for example, Fortinet sells, on the data side, to protect your web servers and your email servers, and all the other things, except on the voice side. So that's what we do. And now, with Ribbon Protect, we're going to be taking all the information that we're gleaning, as these ports are being opened and closed, and as we are getting attacked on the voice and video side. so an IP address comes in. We've decided that there's a lot of bad calls coming in from that side of the fence. We blacklist that. We will then pass that information over to the data side of the house. Through the security fabric, we will pass through, and then Fortinet can, on their side, say, "Hey, this is now blacklisted also." So any packets coming from that IP address that are doing something else, that have nothing to do with voice and video, because it's two separate networks, typically, will now be protected. So now the bank has an added level of security. >> (Peter) And Fortinet propagates that, cascades it throughout. >> Cascades it throughout their entire partner ecosystem. >> Right. >> So that's what we do. And we have deep visibility into SIP. So one of the things, as an example, firewalls are very good at opening and closing ports. And the default for most firewalls is port closed. The problem is with SIP it's a phone call. Ports are typically closed. A call comes in, and it's ringing. You answer, and when you answer the UDP port has to be open, so that a media stream can come through and cut through the call, so you can actually have a conversation. Otherwise, the packets will get blocked, and there will be no conversation. You'll get one-way audio, or no audio. We have very good visibility into which ports are being assigned the duration of that call, so when somebody says, "Okay, bye." Hang up, click, and you kill that packet stream, that port will get closed automatically. A lot of firewalls don't do that. They keep the ports open, because they don't know at that SIP level that a call's coming through right this very second for Myk, open the port for three minutes because he's talking to his mom, conversation's over, close the port, because they don't go to that depth of information on the SIP application level. We do, because that's our job. And we then pass that information, say, "Listen, you should be closing this port, or opening this port." We have a lot of visibility that firewalls just don't have. And now, as part of the security fabric, we're going to be passing that information onwards. So now we're going to have a stronger security perimeter for enterprises as well as service providers that are using the combination of our session border controllers, Ribbon Protect, the new product that's coming out, and the Fortinet panoply of products. >> So if I'm a CSO at a bank, and we were speaking with Fortinet's CSO earlier today, and kind of talking about the evolution of that. We talked as well, I think with John Madison, about the security architect. If I'm the CSO at a bank, or a service provider, what is my material value that this technology alliance is going to give to my organization? >> (Mykola) That's a good question. So there's a couple different aspects of this. So let me talk about Ribbon Protect. We frame Ribbon Protect in three different value propositions: one is for telephony fraud, or communications fraud, another one is in cybersecurity threats, and a third one is network visibility. So I'm going to start with network visibility and work my way back up that chain. So there's a value proposition, not necessarily for the CSO, but for the CIO and the people running the communications network, in having really good visibility into the communications network, an end-to end view across multiple different disparate items. So let me give you an example. Typical bank will have Cisco, they might have Juniper, they might also have an Avia system, when it comes to communications, they might have an old Nortel system, they might have some cloud communications from a Vonage, or a Fuse, or Verizon. All these disparate systems, all under this one CIO, and a call comes in, and nothing works. For some reason it's not routing correctly, the contact center agent isn't getting the call. You know, have you ever called, and you get transferred, and you get dropped? That's the problem. And then when they try to troubleshoot that, it's very hard, because there's so many disparate elements. So the first thing you need is visibility. So from a CIO perspective this product, Ribbon Protect, will give you visibility into the network, and that will allow you to troubleshoot and bring the network up. Then you go into the next level. So once you have visibility. So you can't provide security until you have visibility into a network, so now that you've got this N10 visibility, now let's talk about security. Two different types of security threats that our customers are seeing when it comes to communications. One is sort of robo dialing, toll fraud. And I would even put denial service attacks sort of in there. Denial service attacks also go to the next level, which is cybersecurity. But robo dialing: how many of you are getting calls all the time now? I'm getting them on my mobile, literally, I get like three or four a day on my mobile phone from a different random number, because they know my area code and they think if they mask it, it's a friend of mine, and I'll answer the call. That's becoming more and more prevalent. Now think about if you're an enterprise, and if you're a CSO, and now you're tasked with keeping these employees productive, but they're starting to get all these random calls, your contact center agent. And we've actually had this happen to customers of ours, where they picked up the phone and they were getting random garbled noise on the other end. And you're a contact center agent, your job is to sit there, and you hear these weird noises in your earphone, you hang up, next one comes in, it's weird noises. Third one comes in, it's actually a person that is asking about their mortgage. Great. That's your job. But then the next one is some weird ... It brings productivity way down. So there's that one area. And then there's toll fraud, which is in the billions of dollars, now, of cost to both enterprises and service providers, where people are doing things like calling Zambia, or weird little countries, and routing through enterprise networks. So that's another aspect that a CSO would be worried about. And lastly, and the most important one, is the cybersecurity issue. Packet-based denial service attacks across your entire system, that can not only take down your web server and your email server, but also your communications, your real-time communications, but also exfiltration of data. So what we've seen is the following: a hacker comes in through the data side and understands the network typology, puts in some malware, but because they're using something from Fortinet or somebody else, they can't do anything with that information. There's no way out. But here's the SIP network, this UC network, sitting in the system, and it's sort of unguarded, not that there's no guards there in place, but the data side, if you look at everything that Fortinet and others have been putting out, that side of the fence is getting a lot of attention. And over the last few years even more attention, as hacks have taken place, and PII has been stolen. But on the SIP side of the fence, that hasn't really happened as much. And so we believe that's the weakest chain right now, or will soon be the weakest chain. And hackers will use the open ports, because if your just using a firewall, those ports are open. The range of UDP ports to put media through is wide open. It has to be, otherwise it won't work. And so they can exfiltrate data through that. So they use some other means to find the typology of the network, get in, and then they can pass data out through that. And it might look like a good media stream, like a video call, and we've actually seen examples where people have sent video and embedded, underneath that, data inside the video. >> They piggyback. >> And they piggyback it. So you're going to see, the value to the CSO is, listen, if you're concerned about people finding a different way into your network, you're protected against, or you think you're protected against malware, you're protected against email, you're protected against web server attacks. Well have you really thought about the UC side? So if I'm a CSO, I should be really worried about securing that side of my fence, because I haven't been worried about it for the last three or four years, and there's been an increase in attacks, or increasing amount of attacks on that side of the fence. And then there's these other values of Ribbon Protect that hit other aspects of the IT chain. So we believe that there's a, sort of three core value propositions, two that really affect the CSO, and one that's more of a CIO issue. >> Well, look, once a port's open it's open. >> Correct, yeah. >> And video and voice do have characteristics that if a device is set up to introspect it and understand it, then it can recognize it. But as you said, your general-purpose firewall typically is not looking at that. And you don't want to introduce an entirely distinct and separate management platform, and paying, if you don't have to. So the CSO gets to see the same paying, while the CIO gets to ensure that voice and video happens without being hit? >> (Myk) And works. Yes. >> And at the same time, that the CSO is getting the paying that they need, so they have some visibility into what's going on with the network. >> (Myk) Exactly, and that's the entire purpose of this product. We believe it meshes nicely with what Fortinet's talking about, in that they have their Fortiguard Artificial Intelligence product that they've been talking about, and how it's detecting what's going on in the network, and millions of nodes, and features, and really actually quite sophisticated stuff. I just sat through an entire presentation on it. We are doing the same thing with Ribbon Protect, where we have an artificial intelligence layer that would sit inside the company, but it's specifically looking at the communications pathways, what's normal communications, what's abnormal communications. what's normal packet flows on the communications side, and abnormal communication flows. And putting two and two together, and doing machine learning, similar analogous things to what they're doing on the data side, and on the virus malware detection side, is what we're doing on the communications side, and putting together our own database, again, similar to what they have, where they have a database, and they apply that database of known bad, known good, to their ... And we're doing the same thing, and then we're going to share that information into the Fortinet fabric. >> So you're really collaborating and, it sounds like complimentary technologies. >> (Peter) Yeah, you're complimenting. >> That the customer benefits from. We've got about a minute left, but I'd love for you to share, maybe at a super high level, an example of a joint Fortinet/Ribbon customer, where the CIO and the CSO are being very happy with the technologies that you are delivering in this collaboration. >> I can't name any names, unfortunately, but we are talking with a large service provider right now, that is very enamored of Fortinet, and uses them extensively on the data side, to provide services to their customers, meaning: as a service provider, you're providing data and managed services to your enterprise customers. And they also use us today to provide voice services - >> (Peter) To secure voice. >> To secure voice services to the same set of customers. And so now what we're talking about is marrying the two, not sending data to Fortinet, and what is getting this service provider very excited is to be able to offer a differentiated service to their enterprise customer base, something that the other service providers can't, because they either aren't using Fortinet, or aren't using us. They need somebody that is using both, and this particular one happens to be using both of us, so we can put Ribbon Protect into their environment, into their network, and it'll start sharing their information, and what that will allow them to do is market to their customers at a higher level of security, and even to the point where they might be able to go out and say things like, "The most secure voice video system in the world today." >> (Peter) Yeah. They're expanding the scope of a common security footprint, and thereby allowing a new class of services to be provided to, whether CSO or CIO. >> And they view it as a differentiator for themselves. >> (Lisa) That's exactly what I was thinking - >> Which is why, when they're talking to the CSO or the CIO, why should you use us versus the other three guys you're probably talking to right now, well here's one reason. There's probably a few others, but here's at least one reason. >> Differentiation, a key fundamental for digital transformation. Well Myk, Mykola, thank you so much for joining us on the Cube. You're now a Cube alumni. >> Thank you very much, happy to be an alumni. >> (Lisa) Excellent. We want to thank you for watching the Cube's continuing coverage of Accelerate 2018. I'm Lisa Martin. For my co-host, Peter Burris, stick around. We've got great interviews coming up next. (upbeat music)
SUMMARY :
(announcer) Live from Las Vegas, it's the Cube. the VP of Product Management at Ribbon Communications. and what you guys do with Fortinet. and the data world that Fortinet works with. and the special requirements associated therein on the data side, to protect your web servers (Peter) And Fortinet propagates that, and the Fortinet panoply of products. and kind of talking about the evolution of that. So the first thing you need is visibility. or increasing amount of attacks on that side of the fence. So the CSO gets to see the same paying, (Myk) And works. And at the same time, that the CSO is getting the paying and on the virus malware detection side, So you're really collaborating and, That the customer benefits from. and managed services to your enterprise customers. and this particular one happens to be using both of us, and thereby allowing a new class of services why should you use us versus the other three guys Well Myk, Mykola, thank you so much We want to thank you
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Peter Burris | PERSON | 0.99+ |
Lisa Martin | PERSON | 0.99+ |
Mykola | PERSON | 0.99+ |
Fortinet | ORGANIZATION | 0.99+ |
Verizon | ORGANIZATION | 0.99+ |
Ribbon | ORGANIZATION | 0.99+ |
John Madison | PERSON | 0.99+ |
Myk Conrad | PERSON | 0.99+ |
Myk | PERSON | 0.99+ |
Cisco | ORGANIZATION | 0.99+ |
Deutsche Tel | ORGANIZATION | 0.99+ |
Ribbon Communications | ORGANIZATION | 0.99+ |
three minutes | QUANTITY | 0.99+ |
Wells Fargo | ORGANIZATION | 0.99+ |
AT&T | ORGANIZATION | 0.99+ |
Peter | PERSON | 0.99+ |
Cube | ORGANIZATION | 0.99+ |
20 gigabytes | QUANTITY | 0.99+ |
Las Vegas | LOCATION | 0.99+ |
two | QUANTITY | 0.99+ |
three | QUANTITY | 0.99+ |
30 gigabytes | QUANTITY | 0.99+ |
Lisa | PERSON | 0.99+ |
Bank of America | ORGANIZATION | 0.99+ |
this week | DATE | 0.99+ |
both | QUANTITY | 0.99+ |
Mykola Konrad | PERSON | 0.99+ |
British Talk | ORGANIZATION | 0.99+ |
one reason | QUANTITY | 0.99+ |
Zambia | LOCATION | 0.99+ |
One | QUANTITY | 0.99+ |
three guys | QUANTITY | 0.98+ |
two worlds | QUANTITY | 0.98+ |
Two different types | QUANTITY | 0.98+ |
two separate networks | QUANTITY | 0.98+ |
today | DATE | 0.98+ |
billions of dollars | QUANTITY | 0.97+ |
Juniper | ORGANIZATION | 0.97+ |
Fortiguard | ORGANIZATION | 0.96+ |
Third one | QUANTITY | 0.96+ |
one-way | QUANTITY | 0.96+ |
one | QUANTITY | 0.95+ |
one area | QUANTITY | 0.94+ |
third one | QUANTITY | 0.94+ |
Ribbon Protect | ORGANIZATION | 0.93+ |
Fuse | ORGANIZATION | 0.91+ |
first thing | QUANTITY | 0.91+ |
four a day | QUANTITY | 0.85+ |
millions of nodes | QUANTITY | 0.84+ |
single laptop | QUANTITY | 0.84+ |
three core | QUANTITY | 0.83+ |
both enterprises | QUANTITY | 0.81+ |
GA | LOCATION | 0.8+ |
Kickoff | Fortinet Accelerate 2018
>> Announcer: Live from Las Vegas, it's theCUBE, covering Fortinet Accelerate 18, brought to you by Fortinet. (upbeat techno music) >> Welcome to Fortinet 20... Welcome to Fortinet Accelerate 2018. I haven't had enough caffeine today. I'm Lisa Martin. I'm joined by my co-host, Peter Burris. Peter, it's theCUBE's second time here at Fortinet Accelerate. We were here last year. Great to be back with you. Some exciting stuff we have heard in the keynote this morning. Cyber security is one of those topics that I find so interesting, 'cause it's so transformative. It permeates every industry, everybody, and we heard some interesting things about what Fortinet is doing to continue their leadership in next generation security. Some of the themes that popped up really speak to the theme of this year's event, which is Strength in Numbers. Ken Xie, their CEO, shared some great, very strong numbers for them. 2017, they reached 1.8 billion in billing, which is a huge growth over the previous year. They acquired nearly 18,000 new customers in 2017, and another thing that I thought was very intriguing was that they protect 90% of the global S&P 100. They have over 330,000 customers, and they share great logos: Apple, Oracle, Coca Cola, et cetera. So, great trajectory that they're on. From a security perspective, digital transformation, security transformation, they have to play hand in hand. What are some of the things that you are seeing and that you're looking forward to hearing on today's show? >> Well, I always liked this show. This is the second year, as you said, that we've done this. One of the reasons I like it is because security is very complex, very hard, highly specialized, and Fortinet does a pretty darn good job of bringing it down to Earth and simplifying it so that people could actually imagine themselves becoming more secure, as a consequence of taking actions along the lines of what Fortinet's doing. So, there's clearly a strong relationship between the notion of digital business and the notion of digital security. The way we describe the difference between a business and digital business is that a digital business uses its data assets differently, and in many respects, it is through security concepts and constructs that you go about privatizing, or making unique, your data, so that it doesn't leave your network when you don't want it to, so it can't be subject to ransomware, so that it isn't compromised in some way by a bad actor. So there's a very, very strong relationship between how we think about digital assets and how we think about security, and what Fortinet's overall approach is is to say, "Look, let's not focus just on the device. "Let's look at the entire infrastructure "and what needs to happen to collect data, "to collect information, across the whole thing," what we call a broad approach as opposed to a deep approach. A broad approach to looking at the problem, with partnerships and working with customers in a differentiated way, so that we can help our clients very quickly recognize, attend, and make problems go away. >> One of the things, too, that is interesting is, you know, we hear so much talk at many other shows about digital transformation, DX, everyone's doing it. They're on some journey. There's now such amorphous environments with Multi-Cloud, IoT, opens the-- It spreads the attack surface. I thought they did a great job this morning of really articulating that very well. I'd love to hear your perspective, and we have some of their customers that are going to be talking to us today, but what is the mix of security transformation as a facilitator or an enabler of true digital business transformation? How do companies do that when, as we were talking earlier, companies, and even Ken said, Ken Xie, the CEO, that lot of companies have 20 to 30 different disparate security products in place that are pointed at different things that aren't integrated. How does a company kind of reconcile security transformation to-- as an enabler of digital business transformation? >> Yeah, and I think that's going to be one of the major themes we hear today, is the process that customers are, in 2018, going to have to accelerate. Does that ring a bell? (laughs) Accelerate... >> Lisa: That's genius. Somebody should use that. >> This journey (laughs)... Accelerate this journey... >> Yeah. >> To employing security and security-related technologies and services, much more effectively within their business. There's so many ways of answering that question, Lisa, but one of the-- Let's start with a simple one. That, increasingly, a company is providing its value proposition to its customer bases, whether they're small, residential, whether they're a consumer, or whether they're other businesses, through a digital mechanism, and that could be e-commerce, as pedestrian as e-commerce, or perhaps recommendation engines, or it could be increasingly digital services that are providing, effectively, a digital twin in the home, and, so, your security, your ability to provide those services and those capabilities that consumers want, if those fundamental, or those services are fundamentally insecure, then your brand, no matter how good the service is, your brand's going to take a hit. So, when you think about what Google's trying to do with Nest, if you think about, you know, in the home, a lot of the things that are going into the home, Amazon Alexa, there is an enormous amount of attention being paid to, is our platform, is our fabric a source of differentiation-- security fabric a source of differentiation in our business? Are we going to be able to look a consumer in the eye, or a B2B company in the eye, and say, "You'll be able to do things with us "that you can't do with others, "because of our security profile." And, increasingly, that's got to be the way that boards of directors and CEOs, and IT professionals need to think, "What can we do differently and better "than our competitors because of our security profile "and the security assets that we've invested in?" That's not the way a lot of people are thinking today. >> Why do you think that is? Because, I think you're spot on with providing security capabilities as a differentiator. There's a lot of competition, especially in the detection phase. Ken Xie talked about that this morning, and there's a lot of of coopetition that needs to happen to help companies with myriad disparate products, but why do you think that is that this security capability as a differentiator hasn't yet, kind of, boiled up to the surface? >> I think it's a number of reasons. Some good, some, obviously, not so good, but the main one is, is that, historically, when a CFO or anybody looked at the assets, they looked at tangible assets of the company, and data was, kind of, yeah, was out there, and it was, yeah, secure that data, but we were still more worried about securing the devices, because the devices were hard assets. We were worried about securing the server, securing the routers, securing, you know, whatever else, the repeaters, whatever else is in your organization, or securing your perimeters. Well, now, as data moves, because of mobile, and Ken told us, that 90% of the traffic now inside of a typical enterprise is through mobile, or through wireless types of mechanisms as opposed to wired, well, it means, ultimately, that the first step that every business has to take is to recognize data as an asset, and understanding what what we're really trying to secure is the role the data's playing in the business. How we're using it to engage customers, how we're using it to engage other businesses, how employees are using it, and very importantly, whether the security products themselves are sharing data in a way that makes all that better, and in a secure way, themselves, because the last thing you want is a vulnerability inside your security platform. >> Yes. >> So, the main reason is is that the industry, in most businesses, they talk a great game about digital business, but they haven't gotten down to that fundamental. It's about your data, and how you treat data as an asset, and how you institutionalize work around that data asset, and how you invest to improve the value, accrete value to that data asset over an extended period of time. >> Something that I'm interested in understanding, and we've got Phil Quade, their CSO, on, later today. >> Peter: Smart guy. >> How the role of the CSO has had to evolve, and I'd love to hear... And you asked a little bit about this earlier, the Fortinet on the Fortinet story. What are you doing, internally, to secure and provide security that all elements of your business need? Because I imagine a customer would want to understand, "Well, tell us how you're doing it. "If you're the leader in this, "in providing the products and the technologies, "are you doing this internally?" >> Well, I think, look, I think going back to what I was just talking about, and we had a great... We had a great conversation with Ken Xie that's going to show up in the broadcast today, it is... I think every technology executive increasingly needs to look at their potential customers, their peers, and their customers, and say, "Here's what I can do, as a consequence of using my stuff, "that you can't do, because you're not using my stuff." And Phil, Phil Quade, needs to look at other CSOs and say, "Here's what I can do "as a CSO, because I use Fortinet, "that you cannot do as a CSO, because you don't." Now, the role of the CSO is changing pretty dramatically, and there's a lot of reasons for that, but if we think about the number of individuals that, again, we go back to this notion of data as an asset and how we organize our work around that data. We're hearing about how the CIO's role is changing and how the chief digital officer's changing, or the chief data officer or the CSO. We've got a lot of folks that are kind of circling each other about what really and truly is the fundamental thing that we're trying to generate a return on. >> Lisa: Right. >> When I think about the job of a chief, the job of a chief is to take capital from the board, capital from the ownership, and create net new value, and whether it's a CIO doing that, or anybody. And, so, what Phil's job, or what the CSO's job is is to also find ways to show how investments in the business's security is going to create a differentiating advantage over time. Working with the chief digital officer, the chief data officers and others, but there's a lot of complexity in who does what, but at the end of the day, the CSO's job is to make sure that the data and access to the data is secure, and that the data and the ability to share the data supports the business. >> You mentioned the word "complexity" in the context of the CSO and some of the senior roles, where data is concerned. One of the things I'm interested to hear from some of our guests today, those at Fortinet, and we've got the CSO on we mentioned, and we've also got John Madison, their Senior Vice President of Products and Solutions. We've got their global strategist on security, Derek Manky, but we also have some customers. One from Tri-City, and another from Clark County School District, which is here in Vegas, and I'm curious to understand how they're dealing with complexity in their infrastructure. You know, we talked so much about, and they... have already started today, about Cloud, IoT, multi-cloud, mobile, as you talked about. As the infrastructure complexity increases, how does that change the role of the C-Suite to facilitate the right changes and the right evolution to manage that complexity in a secure way. So I'm very interested to hear how that internal complexity on the infrastructure side is being dealt with by the guys and the gals at the top who need to ensure that, to your point, their data and information assets are protected. We've got some great examples, I think, we're going to hear today, in three verticals in particular: education, healthcare, and financial services. And education really intrigued me because it's been a long time since I've been in college, but there's this massive evolution of smart classrooms, it's BYOD, right? And, there's so many vulnerabilities that are being brought into a school district, so I'd love to understand how do you protect data in that sense when you have so many devices that are connecting to an environment that just drives up complexity, and maybe opens... Perforates their perimeter even more. >> Well, I mean, you know, one of the... We're as a nation, we are living through a recent experience of some of the new tensions that a lot of the school districts are facing, and it could very well be, that voice or facial recognition or other types of things become more important, so I, look. Large or small, well-funded, not well-funded, young or old, consumer or business, all companies are going to have to understand and envision what their digital footprint's going to look like. And as they envision what that digital footprint, companies or institutions, as they envision what that digital footprint's going to look like and what they want to achieve with that digital footprint, they're going to have to make commensurate investments in security, because security used to be, as Ken said when he talked about the three stages, security used to be about perimeter. So, it was analogous to your building. You're either in your building or you're not in your building. You're in your network, or you're not in your network. But, today, your value proposition is how do you move data to somebody else? Today, your security profile is who is inside your building right now? Are they doing things that are good or bad? It's not a "I know everybody, I know where they are, "and I know what they're doing." We are entering into the world where digital business allows us to envision or to execute a multitude of more complex behaviors, and the security platform has to correspondingly evolve and adjust, and that is a hard problem. So, listening to how different classes of companies and different classes of institutions are dealing with this given different industries, different budgets, different levels of expertise, is one of the most important things happening in the technology industry right now. >> Yeah, it's that, how do you get balance between enabling what the business needs to be profitable and grow and compete, and managing the risk? >> And, how... and what is a proper level of investment? Do I have too many vendors, do I have not enough vendors? All those... all of those issues, it's increasing, we have to get-- We have to make our security capacity, our security capabilities, dramatically more productive. And that is going to be one of the major gates on how fast all of these technologies evolve. Can we introduce new AI? Can we introduce faster hardware? Can we introduce new ways of engaging? Can we bring biology and kind of that bio-to-silicon interface and start building things around that? Well, there's a lot of things that we can do, but if we can't secure it, we probably shouldn't do it. >> Lisa: Absolutely. >> So, a security profile is going to be one of the very natural and necessary, reasonable gates on how fast the industry evolves over the next 20-30 years. And that's going to have an enormous bearing and impact on how well we can solve some of the complex problems that we face. >> Well, I'm excited to co-host today with you, Peter. I think we're going to have some great, very informative conversations from some of Fortinet's leaders, to their customers, to their channel partners, and really get a great sense of the things that they're seeing in the field and how that's going to be applied internally to really have security be that enabler of true business transformation. >> Peter: Excellent. >> Alright. Well, stick around. I'm Lisa Martin. Let's hope I don't screw up the outro. Hosting with Peter all day. We're excited that you're joining us live from Fortinet Accelerate 2018. Stick around. We'll be right back. (upbeat techno music)
SUMMARY :
brought to you by Fortinet. Some of the themes that popped up and the notion of digital security. that are going to be talking to us today, the major themes we hear today, Lisa: That's genius. Accelerate this journey... a lot of the things that coopetition that needs to happen that the first step is is that the industry, and we've got Phil Quade, and the technologies, and how the chief digital and that the data and the and the right evolution to manage and the security platform And that is going to be So, a security profile is going to be and how that's going to We're excited that you're
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Ken Xie | PERSON | 0.99+ |
Lisa Martin | PERSON | 0.99+ |
Peter Burris | PERSON | 0.99+ |
Ken | PERSON | 0.99+ |
Derek Manky | PERSON | 0.99+ |
Apple | ORGANIZATION | 0.99+ |
Peter | PERSON | 0.99+ |
Lisa | PERSON | 0.99+ |
Oracle | ORGANIZATION | 0.99+ |
Fortinet | ORGANIZATION | 0.99+ |
20 | QUANTITY | 0.99+ |
2018 | DATE | 0.99+ |
2017 | DATE | 0.99+ |
Phil Quade | PERSON | 0.99+ |
Vegas | LOCATION | 0.99+ |
Phil | PERSON | 0.99+ |
Coca Cola | ORGANIZATION | 0.99+ |
90% | QUANTITY | 0.99+ |
John Madison | PERSON | 0.99+ |
Today | DATE | 0.99+ |
1.8 billion | QUANTITY | 0.99+ |
last year | DATE | 0.99+ |
Amazon | ORGANIZATION | 0.99+ |
Earth | LOCATION | 0.99+ |
Las Vegas | LOCATION | 0.99+ |
ORGANIZATION | 0.99+ | |
second time | QUANTITY | 0.99+ |
over 330,000 customers | QUANTITY | 0.99+ |
today | DATE | 0.99+ |
first step | QUANTITY | 0.99+ |
One | QUANTITY | 0.98+ |
nearly 18,000 new customers | QUANTITY | 0.98+ |
one | QUANTITY | 0.98+ |
second year | QUANTITY | 0.97+ |
Fortinet Accelerate | ORGANIZATION | 0.97+ |
three stages | QUANTITY | 0.97+ |
this morning | DATE | 0.94+ |
Fortinet 20 | ORGANIZATION | 0.93+ |
Fortinet Accelerate | EVENT | 0.87+ |
later today | DATE | 0.87+ |
Nest | ORGANIZATION | 0.86+ |
theCUBE | ORGANIZATION | 0.85+ |
Alexa | TITLE | 0.82+ |
CSO | ORGANIZATION | 0.8+ |
three verticals | QUANTITY | 0.8+ |
this year | DATE | 0.77+ |
previous year | DATE | 0.77+ |
30 different | QUANTITY | 0.75+ |
Clark County School District | ORGANIZATION | 0.74+ |
those | QUANTITY | 0.74+ |
Tri-City | ORGANIZATION | 0.73+ |
S&P 100 | TITLE | 0.67+ |
AI for Good Panel - Precision Medicine - SXSW 2017 - #IntelAI - #theCUBE
>> Welcome to the Intel AI Lounge. Today, we're very excited to share with you the Precision Medicine panel discussion. I'll be moderating the session. My name is Kay Erin. I'm the general manager of Health and Life Sciences at Intel. And I'm excited to share with you these three panelists that we have here. First is John Madison. He is a chief information medical officer and he is part of Kaiser Permanente. We're very excited to have you here. Thank you, John. >> Thank you. >> We also have Naveen Rao. He is the VP and general manager for the Artificial Intelligence Solutions at Intel. He's also the former CEO of Nervana, which was acquired by Intel. And we also have Bob Rogers, who's the chief data scientist at our AI solutions group. So, why don't we get started with our questions. I'm going to ask each of the panelists to talk, introduce themselves, as well as talk about how they got started with AI. So why don't we start with John? >> Sure, so can you hear me okay in the back? Can you hear? Okay, cool. So, I am a recovering evolutionary biologist and a recovering physician and a recovering geek. And I implemented the health record system for the first and largest region of Kaiser Permanente. And it's pretty obvious that most of the useful data in a health record, in lies in free text. So I started up a natural language processing team to be able to mine free text about a dozen years ago. So we can do things with that that you can't otherwise get out of health information. I'll give you an example. I read an article online from the New England Journal of Medicine about four years ago that said over half of all people who have had their spleen taken out were not properly vaccinated for a common form of pneumonia, and when your spleen's missing, you must have that vaccine or you die a very sudden death with sepsis. In fact, our medical director in Northern California's father died of that exact same scenario. So, when I read the article, I went to my structured data analytics team and to my natural language processing team and said please show me everybody who has had their spleen taken out and hasn't been appropriately vaccinated and we ran through about 20 million records in about three hours with the NLP team, and it took about three weeks with a structured data analytics team. That sounds counterintuitive but it actually happened that way. And it's not a competition for time only. It's a competition for quality and sensitivity and specificity. So we were able to indentify all of our members who had their spleen taken out, who should've had a pneumococcal vaccine. We vaccinated them and there are a number of people alive today who otherwise would've died absent that capability. So people don't really commonly associate natural language processing with machine learning, but in fact, natural language processing relies heavily and is the first really, highly successful example of machine learning. So we've done dozens of similar projects, mining free text data in millions of records very efficiently, very effectively. But it really helped advance the quality of care and reduce the cost of care. It's a natural step forward to go into the world of personalized medicine with the arrival of a 100-dollar genome, which is actually what it costs today to do a full genome sequence. Microbiomics, that is the ecosystem of bacteria that are in every organ of the body actually. And we know now that there is a profound influence of what's in our gut and how we metabolize drugs, what diseases we get. You can tell in a five year old, whether or not they were born by a vaginal delivery or a C-section delivery by virtue of the bacteria in the gut five years later. So if you look at the complexity of the data that exists in the genome, in the microbiome, in the health record with free text and you look at all the other sources of data like this streaming data from my wearable monitor that I'm part of a research study on Precision Medicine out of Stanford, there is a vast amount of disparate data, not to mention all the imaging, that really can collectively produce much more useful information to advance our understanding of science, and to advance our understanding of every individual. And then we can do the mash up of a much broader range of science in health care with a much deeper sense of data from an individual and to do that with structured questions and structured data is very yesterday. The only way we're going to be able to disambiguate those data and be able to operate on those data in concert and generate real useful answers from the broad array of data types and the massive quantity of data, is to let loose machine learning on all of those data substrates. So my team is moving down that pathway and we're very excited about the future prospects for doing that. >> Yeah, great. I think that's actually some of the things I'm very excited about in the future with some of the technologies we're developing. My background, I started actually being fascinated with computation in biological forms when I was nine. Reading and watching sci-fi, I was kind of a big dork which I pretty much still am. I haven't really changed a whole lot. Just basically seeing that machines really aren't all that different from biological entities, right? We are biological machines and kind of understanding how a computer works and how we engineer those things and trying to pull together concepts that learn from biology into that has always been a fascination of mine. As an undergrad, I was in the EE, CS world. Even then, I did some research projects around that. I worked in the industry for about 10 years designing chips, microprocessors, various kinds of ASICs, and then actually went back to school, quit my job, got a Ph.D. in neuroscience, computational neuroscience, to specifically understand what's the state of the art. What do we really understand about the brain? And are there concepts that we can take and bring back? Inspiration's always been we want to... We watch birds fly around. We want to figure out how to make something that flies. We extract those principles, and then build a plane. Don't necessarily want to build a bird. And so Nervana's really was the combination of all those experiences, bringing it together. Trying to push computation in a new a direction. Now, as part of Intel, we can really add a lot of fuel to that fire. I'm super excited to be part of Intel in that the technologies that we were developing can really proliferate and be applied to health care, can be applied to Internet, can be applied to every facet of our lives. And some of the examples that John mentioned are extremely exciting right now and these are things we can do today. And the generality of these solutions are just really going to hit every part of health care. I mean from a personal viewpoint, my whole family are MDs. I'm sort of the black sheep of the family. I don't have an MD. And it's always been kind of funny to me that knowledge is concentrated in a few individuals. Like you have a rare tumor or something like that, you need the guy who knows how to read this MRI. Why? Why is it like that? Can't we encapsulate that knowledge into a computer or into an algorithm, and democratize it. And the reason we couldn't do it is we just didn't know how. And now we're really getting to a point where we know how to do that. And so I want that capability to go to everybody. It'll bring the cost of healthcare down. It'll make all of us healthier. That affects everything about our society. So that's really what's exciting about it to me. >> That's great. So, as you heard, I'm Bob Rogers. I'm chief data scientist for analytics and artificial intelligence solutions at Intel. My mission is to put powerful analytics in the hands of every decision maker and when I think about Precision Medicine, decision makers are not just doctors and surgeons and nurses, but they're also case managers and care coordinators and probably most of all, patients. So the mission is really to put powerful analytics and AI capabilities in the hands of everyone in health care. It's a very complex world and we need tools to help us navigate it. So my background, I started with a Ph.D. in physics and I was computer modeling stuff, falling into super massive black holes. And there's a lot of applications for that in the real world. No, I'm kidding. (laughter) >> John: There will be, I'm sure. Yeah, one of these days. Soon as we have time travel. Okay so, I actually, about 1991, I was working on my post doctoral research, and I heard about neural networks, these things that could compute the way the brain computes. And so, I started doing some research on that. I wrote some papers and actually, it was an interesting story. The problem that we solved that got me really excited about neural networks, which have become deep learning, my office mate would come in. He was this young guy who was about to go off to grad school. He'd come in every morning. "I hate my project." Finally, after two weeks, what's your project? What's the problem? It turns out he had to circle these little fuzzy spots on these images from a telescope. So they were looking for the interesting things in a sky survey, and he had to circle them and write down their coordinates all summer. Anyone want to volunteer to do that? No? Yeah, he was very unhappy. So we took the first two weeks of data that he created doing his work by hand, and we trained an artificial neural network to do his summer project and finished it in about eight hours of computing. (crowd laughs) And so he was like yeah, this is amazing. I'm so happy. And we wrote a paper. I was the first author of course, because I was the senior guy at age 24. And he was second author. His first paper ever. He was very, very excited. So we have to fast forward about 20 years. His name popped up on the Internet. And so it caught my attention. He had just won the Nobel Prize in physics. (laughter) So that's where artificial intelligence will get you. (laughter) So thanks Naveen. Fast forwarding, I also developed some time series forecasting capabilities that allowed me to create a hedge fund that I ran for 12 years. After that, I got into health care, which really is the center of my passion. Applying health care to figuring out how to get all the data from all those siloed sources, put it into the cloud in a secure way, and analyze it so you can actually understand those cases that John was just talking about. How do you know that that person had had a splenectomy and that they needed to get that pneumovax? You need to be able to search all the data, so we used AI, natural language processing, machine learning, to do that and then two years ago, I was lucky enough to join Intel and, in the intervening time, people like Naveen actually thawed the AI winter and we're really in a spring of amazing opportunities with AI, not just in health care but everywhere, but of course, the health care applications are incredibly life saving and empowering so, excited to be here on this stage with you guys. >> I just want to cue off of your comment about the role of physics in AI and health care. So the field of microbiomics that I referred to earlier, bacteria in our gut. There's more bacteria in our gut than there are cells in our body. There's 100 times more DNA in that bacteria than there is in the human genome. And we're now discovering a couple hundred species of bacteria a year that have never been identified under a microscope just by their DNA. So it turns out the person who really catapulted the study and the science of microbiomics forward was an astrophysicist who did his Ph.D. in Steven Hawking's lab on the collision of black holes and then subsequently, put the other team in a virtual reality, and he developed the first super computing center and so how did he get an interest in microbiomics? He has the capacity to do high performance computing and the kind of advanced analytics that are required to look at a 100 times the volume of 3.2 billion base pairs of the human genome that are represented in the bacteria in our gut, and that has unleashed the whole science of microbiomics, which is going to really turn a lot of our assumptions of health and health care upside down. >> That's great, I mean, that's really transformational. So a lot of data. So I just wanted to let the audience know that we want to make this an interactive session, so I'll be asking for questions in a little bit, but I will start off with one question so that you can think about it. So I wanted to ask you, it looks like you've been thinking a lot about AI over the years. And I wanted to understand, even though AI's just really starting in health care, what are some of the new trends or the changes that you've seen in the last few years that'll impact how AI's being used going forward? >> So I'll start off. There was a paper published by a guy by the name of Tegmark at Harvard last summer that, for the first time, explained why neural networks are efficient beyond any mathematical model we predict. And the title of the paper's fun. It's called Deep Learning Versus Cheap Learning. So there were two sort of punchlines of the paper. One is is that the reason that mathematics doesn't explain the efficiency of neural networks is because there's a higher order of mathematics called physics. And the physics of the underlying data structures determined how efficient you could mine those data using machine learning tools. Much more so than any mathematical modeling. And so the second thing that was a reel from that paper is that the substrate of the data that you're operating on and the natural physics of those data have inherent levels of complexity that determine whether or not a 12th layer of neural net will get you where you want to go really fast, because when you do the modeling, for those math geeks in the audience, a factorial. So if there's 12 layers, there's 12 factorial permutations of different ways you could sequence the learning through those data. When you have 140 layers of a neural net, it's a much, much, much bigger number of permutations and so you end up being hardware-bound. And so, what Max Tegmark basically said is you can determine whether to do deep learning or cheap learning based upon the underlying physics of the data substrates you're operating on and have a good insight into how to optimize your hardware and software approach to that problem. >> So another way to put that is that neural networks represent the world in the way the world is sort of built. >> Exactly. >> It's kind of hierarchical. It's funny because, sort of in retrospect, like oh yeah, that kind of makes sense. But when you're thinking about it mathematically, we're like well, anything... The way a neural can represent any mathematical function, therfore, it's fully general. And that's the way we used to look at it, right? So now we're saying, well actually decomposing the world into different types of features that are layered upon each other is actually a much more efficient, compact representation of the world, right? I think this is actually, precisely the point of kind of what you're getting at. What's really exciting now is that what we were doing before was sort of building these bespoke solutions for different kinds of data. NLP, natural language processing. There's a whole field, 25 plus years of people devoted to figuring out features, figuring out what structures make sense in this particular context. Those didn't carry over at all to computer vision. Didn't carry over at all to time series analysis. Now, with neural networks, we've seen it at Nervana, and now part of Intel, solving customers' problems. We apply a very similar set of techniques across all these different types of data domains and solve them. All data in the real world seems to be hierarchical. You can decompose it into this hierarchy. And it works really well. Our brains are actually general structures. As a neuroscientist, you can look at different parts of your brain and there are differences. Something that takes in visual information, versus auditory information is slightly different but they're much more similar than they are different. So there is something invariant, something very common between all of these different modalities and we're starting to learn that. And this is extremely exciting to me trying to understand the biological machine that is a computer, right? We're figurig it out, right? >> One of the really fun things that Ray Chrisfall likes to talk about is, and it falls in the genre of biomimmicry, and how we actually replicate biologic evolution in our technical solutions so if you look at, and we're beginning to understand more and more how real neural nets work in our cerebral cortex. And it's sort of a pyramid structure so that the first pass of a broad base of analytics, it gets constrained to the next pass, gets constrained to the next pass, which is how information is processed in the brain. So we're discovering increasingly that what we've been evolving towards, in term of architectures of neural nets, is approximating the architecture of the human cortex and the more we understand the human cortex, the more insight we get to how to optimize neural nets, so when you think about it, with millions of years of evolution of how the cortex is structured, it shouldn't be a surprise that the optimization protocols, if you will, in our genetic code are profoundly efficient in how they operate. So there's a real role for looking at biologic evolutionary solutions, vis a vis technical solutions, and there's a friend of mine who worked with who worked with George Church at Harvard and actually published a book on biomimmicry and they wrote the book completely in DNA so if all of you have your home DNA decoder, you can actually read the book on your DNA reader, just kidding. >> There's actually a start up I just saw in the-- >> Read-Write DNA, yeah. >> Actually it's a... He writes something. What was it? (response from crowd member) Yeah, they're basically encoding information in DNA as a storage medium. (laughter) The company, right? >> Yeah, that same friend of mine who coauthored that biomimmicry book in DNA also did the estimate of the density of information storage. So a cubic centimeter of DNA can store an hexabyte of data. I mean that's mind blowing. >> Naveen: Highly done soon. >> Yeah that's amazing. Also you hit upon a really important point there, that one of the things that's changed is... Well, there are two major things that have changed in my perception from let's say five to 10 years ago, when we were using machine learning. You could use data to train models and make predictions to understand complex phenomena. But they had limited utility and the challenge was that if I'm trying to build on these things, I had to do a lot of work up front. It was called feature engineering. I had to do a lot of work to figure out what are the key attributes of that data? What are the 10 or 20 or 100 pieces of information that I should pull out of the data to feed to the model, and then the model can turn it into a predictive machine. And so, what's really exciting about the new generation of machine learning technology, and particularly deep learning, is that it can actually learn from example data those features without you having to do any preprogramming. That's why Naveen is saying you can take the same sort of overall approach and apply it to a bunch of different problems. Because you're not having to fine tune those features. So at the end of the day, the two things that have changed to really enable this evolution is access to more data, and I'd be curious to hear from you where you're seeing data come from, what are the strategies around that. So access to data, and I'm talking millions of examples. So 10,000 examples most times isn't going to cut it. But millions of examples will do it. And then, the other piece is the computing capability to actually take millions of examples and optimize this algorithm in a single lifetime. I mean, back in '91, when I started, we literally would have thousands of examples and it would take overnight to run the thing. So now in the world of millions, and you're putting together all of these combinations, the computing has changed a lot. I know you've made some revolutionary advances in that. But I'm curious about the data. Where are you seeing interesting sources of data for analytics? >> So I do some work in the genomics space and there are more viable permutations of the human genome than there are people who have ever walked the face of the earth. And the polygenic determination of a phenotypic expression translation, what are genome does to us in our physical experience in health and disease is determined by many, many genes and the interaction of many, many genes and how they are up and down regulated. And the complexity of disambiguating which 27 genes are affecting your diabetes and how are they up and down regulated by different interventions is going to be different than his. It's going to be different than his. And we already know that there's four or five distinct genetic subtypes of type II diabetes. So physicians still think there's one disease called type II diabetes. There's actually at least four or five genetic variants that have been identified. And so, when you start thinking about disambiguating, particularly when we don't know what 95 percent of DNA does still, what actually is the underlining cause, it will require this massive capability of developing these feature vectors, sometimes intuiting it, if you will, from the data itself. And other times, taking what's known knowledge to develop some of those feature vectors, and be able to really understand the interaction of the genome and the microbiome and the phenotypic data. So the complexity is high and because the variation complexity is high, you do need these massive members. Now I'm going to make a very personal pitch here. So forgive me, but if any of you have any role in policy at all, let me tell you what's happening right now. The Genomic Information Nondiscrimination Act, so called GINA, written by a friend of mine, passed a number of years ago, says that no one can be discriminated against for health insurance based upon their genomic information. That's cool. That should allow all of you to feel comfortable donating your DNA to science right? Wrong. You are 100% unprotected from discrimination for life insurance, long term care and disability. And it's being practiced legally today and there's legislation in the House, in mark up right now to completely undermine the existing GINA legislation and say that whenever there's another applicable statute like HIPAA, that the GINA is irrelevant, that none of the fines and penalties are applicable at all. So we need a ton of data to be able to operate on. We will not be getting a ton of data to operate on until we have the kind of protection we need to tell people, you can trust us. You can give us your data, you will not be subject to discrimination. And that is not the case today. And it's being further undermined. So I want to make a plea to any of you that have any policy influence to go after that because we need this data to help the understanding of human health and disease and we're not going to get it when people look behind the curtain and see that discrimination is occurring today based upon genetic information. >> Well, I don't like the idea of being discriminated against based on my DNA. Especially given how little we actually know. There's so much complexity in how these things unfold in our own bodies, that I think anything that's being done is probably childishly immature and oversimplifying. So it's pretty rough. >> I guess the translation here is that we're all unique. It's not just a Disney movie. (laughter) We really are. And I think one of the strengths that I'm seeing, kind of going back to the original point, of these new techniques is it's going across different data types. It will actually allow us to learn more about the uniqueness of the individual. It's not going to be just from one data source. They were collecting data from many different modalities. We're collecting behavioral data from wearables. We're collecting things from scans, from blood tests, from genome, from many different sources. The ability to integrate those into a unified picture, that's the important thing that we're getting toward now. That's what I think is going to be super exciting here. Think about it, right. I can tell you to visual a coin, right? You can visualize a coin. Not only do you visualize it. You also know what it feels like. You know how heavy it is. You have a mental model of that from many different perspectives. And if I take away one of those senses, you can still identify the coin, right? If I tell you to put your hand in your pocket, and pick out a coin, you probably can do that with 100% reliability. And that's because we have this generalized capability to build a model of something in the world. And that's what we need to do for individuals is actually take all these different data sources and come up with a model for an individual and you can actually then say what drug works best on this. What treatment works best on this? It's going to get better with time. It's not going to be perfect, because this is what a doctor does, right? A doctor who's very experienced, you're a practicing physician right? Back me up here. That's what you're doing. You basically have some categories. You're taking information from the patient when you talk with them, and you're building a mental model. And you apply what you know can work on that patient, right? >> I don't have clinic hours anymore, but I do take care of many friends and family. (laughter) >> You used to, you used to. >> I practiced for many years before I became a full-time geek. >> I thought you were a recovering geek. >> I am. (laughter) I do more policy now. >> He's off the wagon. >> I just want to take a moment and see if there's anyone from the audience who would like to ask, oh. Go ahead. >> We've got a mic here, hang on one second. >> I have tons and tons of questions. (crosstalk) Yes, so first of all, the microbiome and the genome are really complex. You already hit about that. Yet most of the studies we do are small scale and we have difficulty repeating them from study to study. How are we going to reconcile all that and what are some of the technical hurdles to get to the vision that you want? >> So primarily, it's been the cost of sequencing. Up until a year ago, it's $1000, true cost. Now it's $100, true cost. And so that barrier is going to enable fairly pervasive testing. It's not a real competitive market becaue there's one sequencer that is way ahead of everybody else. So the price is not $100 yet. The cost is below $100. So as soon as there's competition to drive the cost down, and hopefully, as soon as we all have the protection we need against discrimination, as I mentioned earlier, then we will have large enough sample sizes. And so, it is our expectation that we will be able to pool data from local sources. I chair the e-health work group at the Global Alliance for Genomics and Health which is working on this very issue. And rather than pooling all the data into a single, common repository, the strategy, and we're developing our five-year plan in a month in London, but the goal is to have a federation of essentially credentialed data enclaves. That's a formal method. HHS already does that so you can get credentialed to search all the data that Medicare has on people that's been deidentified according to HIPPA. So we want to provide the same kind of service with appropriate consent, at an international scale. And there's a lot of nations that are talking very much about data nationality so that you can't export data. So this approach of a federated model to get at data from all the countries is important. The other thing is a block-chain technology is going to be very profoundly useful in this context. So David Haussler of UC Santa Cruz is right now working on a protocol using an open block-chain, public ledger, where you can put out. So for any typical cancer, you may have a half dozen, what are called sematic variance. Cancer is a genetic disease so what has mutated to cause it to behave like a cancer? And if we look at those biologically active sematic variants, publish them on a block chain that's public, so there's not enough data there to reidentify the patient. But if I'm a physician treating a woman with breast cancer, rather than say what's the protocol for treating a 50-year-old woman with this cell type of cancer, I can say show me all the people in the world who have had this cancer at the age of 50, wit these exact six sematic variants. Find the 200 people worldwide with that. Ask them for consent through a secondary mechanism to donate everything about their medical record, pool that information of the core of 200 that exactly resembles the one sitting in front of me, and find out, of the 200 ways they were treated, what got the best results. And so, that's the kind of future where a distributed, federated architecture will allow us to query and obtain a very, very relevant cohort, so we can basically be treating patients like mine, sitting right in front of me. Same thing applies for establishing research cohorts. There's some very exciting stuff at the convergence of big data analytics, machine learning, and block chaining. >> And this is an area that I'm really excited about and I think we're excited about generally at Intel. They actually have something called the Collaborative Cancer Cloud, which is this kind of federated model. We have three different academic research centers. Each of them has a very sizable and valuable collection of genomic data with phenotypic annotations. So you know, pancreatic cancer, colon cancer, et cetera, and we've actually built a secure computing architecture that can allow a person who's given the right permissions by those organizations to ask a specific question of specific data without ever sharing the data. So the idea is my data's really important to me. It's valuable. I want us to be able to do a study that gets the number from the 20 pancreatic cancer patients in my cohort, up to the 80 that we have in the whole group. But I can't do that if I'm going to just spill my data all over the world. And there are HIPAA and compliance reasons for that. There are business reasons for that. So what we've built at Intel is this platform that allows you to do different kinds of queries on this genetic data. And reach out to these different sources without sharing it. And then, the work that I'm really involved in right now and that I'm extremely excited about... This also touches on something that both of you said is it's not sufficient to just get the genome sequences. You also have to have the phenotypic data. You have to know what cancer they've had. You have to know that they've been treated with this drug and they've survived for three months or that they had this side effect. That clinical data also needs to be put together. It's owned by other organizations, right? Other hospitals. So the broader generalization of the Collaborative Cancer Cloud is something we call the data exchange. And it's a misnomer in a sense that we're not actually exchanging data. We're doing analytics on aggregated data sets without sharing it. But it really opens up a world where we can have huge populations and big enough amounts of data to actually train these models and draw the thread in. Of course, that really then hits home for the techniques that Nervana is bringing to the table, and of course-- >> Stanford's one of your academic medical centers? >> Not for that Collaborative Cancer Cloud. >> The reason I mentioned Standford is because the reason I'm wearing this FitBit is because I'm a research subject at Mike Snyder's, the chair of genetics at Stanford, IPOP, intrapersonal omics profile. So I was fully sequenced five years ago and I get four full microbiomes. My gut, my mouth, my nose, my ears. Every three months and I've done that for four years now. And about a pint of blood. And so, to your question of the density of data, so a lot of the problem with applying these techniques to health care data is that it's basically a sparse matrix and there's a lot of discontinuities in what you can find and operate on. So what Mike is doing with the IPOP study is much the same as you described. Creating a highly dense longitudinal set of data that will help us mitigate the sparse matrix problem. (low volume response from audience member) Pardon me. >> What's that? (low volume response) (laughter) >> Right, okay. >> John: Lost the school sample. That's got to be a new one I've heard now. >> Okay, well, thank you so much. That was a great question. So I'm going to repeat this and ask if there's another question. You want to go ahead? >> Hi, thanks. So I'm a journalist and I report a lot on these neural networks, a system that's beter at reading mammograms than your human radiologists. Or a system that's better at predicting which patients in the ICU will get sepsis. These sort of fascinating academic studies that I don't really see being translated very quickly into actual hospitals or clinical practice. Seems like a lot of the problems are regulatory, or liability, or human factors, but how do you get past that and really make this stuff practical? >> I think there's a few things that we can do there and I think the proof points of the technology are really important to start with in this specific space. In other places, sometimes, you can start with other things. But here, there's a real confidence problem when it comes to health care, and for good reason. We have doctors trained for many, many years. School and then residencies and other kinds of training. Because we are really, really conservative with health care. So we need to make sure that technology's well beyond just the paper, right? These papers are proof points. They get people interested. They even fuel entire grant cycles sometimes. And that's what we need to happen. It's just an inherent problem, its' going to take a while. To get those things to a point where it's like well, I really do trust what this is saying. And I really think it's okay to now start integrating that into our standard of care. I think that's where you're seeing it. It's frustrating for all of us, believe me. I mean, like I said, I think personally one of the biggest things, I want to have an impact. Like when I go to my grave, is that we used machine learning to improve health care. We really do feel that way. But it's just not something we can do very quickly and as a business person, I don't actually look at those use cases right away because I know the cycle is just going to be longer. >> So to your point, the FDA, for about four years now, has understood that the process that has been given to them by their board of directors, otherwise known as Congress, is broken. And so they've been very actively seeking new models of regulation and what's really forcing their hand is regulation of devices and software because, in many cases, there are black box aspects of that and there's a black box aspect to machine learning. Historically, Intel and others are making inroads into providing some sort of traceability and transparency into what happens in that black box rather than say, overall we get better results but once in a while we kill somebody. Right? So there is progress being made on that front. And there's a concept that I like to use. Everyone knows Ray Kurzweil's book The Singularity Is Near? Well, I like to think that diadarity is near. And the diadarity is where you have human transparency into what goes on in the black box and so maybe Bob, you want to speak a little bit about... You mentioned that, in a prior discussion, that there's some work going on at Intel there. >> Yeah, absolutely. So we're working with a number of groups to really build tools that allow us... In fact Naveen probably can talk in even more detail than I can, but there are tools that allow us to actually interrogate machine learning and deep learning systems to understand, not only how they respond to a wide variety of situations but also where are there biases? I mean, one of the things that's shocking is that if you look at the clinical studies that our drug safety rules are based on, 50 year old white guys are the peak of that distribution, which I don't see any problem with that, but some of you out there might not like that if you're taking a drug. So yeah, we want to understand what are the biases in the data, right? And so, there's some new technologies. There's actually some very interesting data-generative technologies. And this is something I'm also curious what Naveen has to say about, that you can generate from small sets of observed data, much broader sets of varied data that help probe and fill in your training for some of these systems that are very data dependent. So that takes us to a place where we're going to start to see deep learning systems generating data to train other deep learning systems. And they start to sort of go back and forth and you start to have some very nice ways to, at least, expose the weakness of these underlying technologies. >> And that feeds back to your question about regulatory oversight of this. And there's the fascinating, but little known origin of why very few women are in clinical studies. Thalidomide causes birth defects. So rather than say pregnant women can't be enrolled in drug trials, they said any woman who is at risk of getting pregnant cannot be enrolled. So there was actually a scientific meritorious argument back in the day when they really didn't know what was going to happen post-thalidomide. So it turns out that the adverse, unintended consequence of that decision was we don't have data on women and we know in certain drugs, like Xanax, that the metabolism is so much slower, that the typical dosing of Xanax is women should be less than half of that for men. And a lot of women have had very serious adverse effects by virtue of the fact that they weren't studied. So the point I want to illustrate with that is that regulatory cycles... So people have known for a long time that was like a bad way of doing regulations. It should be changed. It's only recently getting changed in any meaningful way. So regulatory cycles and legislative cycles are incredibly slow. The rate of exponential growth in technology is exponential. And so there's impedance mismatch between the cycle time for regulation cycle time for innovation. And what we need to do... I'm working with the FDA. I've done four workshops with them on this very issue. Is that they recognize that they need to completely revitalize their process. They're very interested in doing it. They're not resisting it. People think, oh, they're bad, the FDA, they're resisting. Trust me, there's nobody on the planet who wants to revise these review processes more than the FDA itself. And so they're looking at models and what I recommended is global cloud sourcing and the FDA could shift from a regulatory role to one of doing two things, assuring the people who do their reviews are competent, and assuring that their conflicts of interest are managed, because if you don't have a conflict of interest in this very interconnected space, you probably don't know enough to be a reviewer. So there has to be a way to manage the conflict of interest and I think those are some of the keypoints that the FDA is wrestling with because there's type one and type two errors. If you underregulate, you end up with another thalidomide and people born without fingers. If you overregulate, you prevent life saving drugs from coming to market. So striking that balance across all these different technologies is extraordinarily difficult. If it were easy, the FDA would've done it four years ago. It's very complicated. >> Jumping on that question, so all three of you are in some ways entrepreneurs, right? Within your organization or started companies. And I think it would be good to talk a little bit about the business opportunity here, where there's a huge ecosystem in health care, different segments, biotech, pharma, insurance payers, etc. Where do you see is the ripe opportunity or industry, ready to really take this on and to make AI the competitive advantage. >> Well, the last question also included why aren't you using the result of the sepsis detection? We do. There were six or seven published ways of doing it. We did our own data, looked at it, we found a way that was superior to all the published methods and we apply that today, so we are actually using that technology to change clinical outcomes. As far as where the opportunities are... So it's interesting. Because if you look at what's going to be here in three years, we're not going to be using those big data analytics models for sepsis that we are deploying today, because we're just going to be getting a tiny aliquot of blood, looking for the DNA or RNA of any potential infection and we won't have to infer that there's a bacterial infection from all these other ancillary, secondary phenomenon. We'll see if the DNA's in the blood. So things are changing so fast that the opportunities that people need to look for are what are generalizable and sustainable kind of wins that are going to lead to a revenue cycle that are justified, a venture capital world investing. So there's a lot of interesting opportunities in the space. But I think some of the biggest opportunities relate to what Bob has talked about in bringing many different disparate data sources together and really looking for things that are not comprehensible in the human brain or in traditional analytic models. >> I think we also got to look a little bit beyond direct care. We're talking about policy and how we set up standards, these kinds of things. That's one area. That's going to drive innovation forward. I completely agree with that. Direct care is one piece. How do we scale out many of the knowledge kinds of things that are embedded into one person's head and get them out to the world, democratize that. Then there's also development. The underlying technology's of medicine, right? Pharmaceuticals. The traditional way that pharmaceuticals is developed is actually kind of funny, right? A lot of it was started just by chance. Penicillin, a very famous story right? It's not that different today unfortunately, right? It's conceptually very similar. Now we've got more science behind it. We talk about domains and interactions, these kinds of things but fundamentally, the problem is what we in computer science called NP hard, it's too difficult to model. You can't solve it analytically. And this is true for all these kinds of natural sorts of problems by the way. And so there's a whole field around this, molecular dynamics and modeling these sorts of things, that are actually being driven forward by these AI techniques. Because it turns out, our brain doesn't do magic. It actually doesn't solve these problems. It approximates them very well. And experience allows you to approximate them better and better. Actually, it goes a little bit to what you were saying before. It's like simulations and forming your own networks and training off each other. There are these emerging dynamics. You can simulate steps of physics. And you come up with a system that's much too complicated to ever solve. Three pool balls on a table is one such system. It seems pretty simple. You know how to model that, but it actual turns out you can't predict where a balls going to be once you inject some energy into that table. So something that simple is already too complex. So neural network techniques actually allow us to start making those tractable. These NP hard problems. And things like molecular dynamics and actually understanding how different medications and genetics will interact with each other is something we're seeing today. And so I think there's a huge opportunity there. We've actually worked with customers in this space. And I'm seeing it. Like Rosch is acquiring a few different companies in space. They really want to drive it forward, using big data to drive drug development. It's kind of counterintuitive. I never would've thought it had I not seen it myself. >> And there's a big related challenge. Because in personalized medicine, there's smaller and smaller cohorts of people who will benefit from a drug that still takes two billion dollars on average to develop. That is unsustainable. So there's an economic imperative of overcoming the cost and the cycle time for drug development. >> I want to take a go at this question a little bit differently, thinking about not so much where are the industry segments that can benefit from AI, but what are the kinds of applications that I think are most impactful. So if this is what a skilled surgeon needs to know at a particular time to care properly for a patient, this is where most, this area here, is where most surgeons are. They are close to the maximum knowledge and ability to assimilate as they can be. So it's possible to build complex AI that can pick up on that one little thing and move them up to here. But it's not a gigantic accelerator, amplifier of their capability. But think about other actors in health care. I mentioned a couple of them earlier. Who do you think the least trained actor in health care is? >> John: Patients. >> Yes, the patients. The patients are really very poorly trained, including me. I'm abysmal at figuring out who to call and where to go. >> Naveen: You know as much the doctor right? (laughing) >> Yeah, that's right. >> My doctor friends always hate that. Know your diagnosis, right? >> Yeah, Dr. Google knows. So the opportunities that I see that are really, really exciting are when you take an AI agent, like sometimes I like to call it contextually intelligent agent, or a CIA, and apply it to a problem where a patient has a complex future ahead of them that they need help navigating. And you use the AI to help them work through. Post operative. You've got PT. You've got drugs. You've got to be looking for side effects. An agent can actually help you navigate. It's like your own personal GPS for health care. So it's giving you the inforamation that you need about you for your care. That's my definition of Precision Medicine. And it can include genomics, of course. But it's much bigger. It's that broader picture and I think that a sort of agent way of thinking about things and filling in the gaps where there's less training and more opportunity, is very exciting. >> Great start up idea right there by the way. >> Oh yes, right. We'll meet you all out back for the next start up. >> I had a conversation with the head of the American Association of Medical Specialties just a couple of days ago. And what she was saying, and I'm aware of this phenomenon, but all of the medical specialists are saying, you're killing us with these stupid board recertification trivia tests that you're giving us. So if you're a cardiologist, you have to remember something that happens in one in 10 million people, right? And they're saying that irrelevant anymore, because we've got advanced decision support coming. We have these kinds of analytics coming. Precisely what you're saying. So it's human augmentation of decision support that is coming at blazing speed towards health care. So in that context, it's much more important that you have a basic foundation, you know how to think, you know how to learn, and you know where to look. So we're going to be human-augmented learning systems much more so than in the past. And so the whole recertification process is being revised right now. (inaudible audience member speaking) Speak up, yeah. (person speaking) >> What makes it fathomable is that you can-- (audience member interjects inaudibly) >> Sure. She was saying that our brain is really complex and large and even our brains don't know how our brains work, so... are there ways to-- >> What hope do we have kind of thing? (laughter) >> It's a metaphysical question. >> It circles all the way down, exactly. It's a great quote. I mean basically, you can decompose every system. Every complicated system can be decomposed into simpler, emergent properties. You lose something perhaps with each of those, but you get enough to actually understand most of the behavior. And that's really how we understand the world. And that's what we've learned in the last few years what neural network techniques can allow us to do. And that's why our brain can understand our brain. (laughing) >> Yeah, I'd recommend reading Chris Farley's last book because he addresses that issue in there very elegantly. >> Yeah we're seeing some really interesting technologies emerging right now where neural network systems are actually connecting other neural network systems in networks. You can see some very compelling behavior because one of the things I like to distinguish AI versus traditional analytics is we used to have question-answering systems. I used to query a database and create a report to find out how many widgets I sold. Then I started using regression or machine learning to classify complex situations from this is one of these and that's one of those. And then as we've moved more recently, we've got these AI-like capabilities like being able to recognize that there's a kitty in the photograph. But if you think about it, if I were to show you a photograph that happened to have a cat in it, and I said, what's the answer, you'd look at me like, what are you talking about? I have to know the question. So where we're cresting with these connected sets of neural systems, and with AI in general, is that the systems are starting to be able to, from the context, understand what the question is. Why would I be asking about this picture? I'm a marketing guy, and I'm curious about what Legos are in the thing or what kind of cat it is. So it's being able to ask a question, and then take these question-answering systems, and actually apply them so that's this ability to understand context and ask questions that we're starting to see emerge from these more complex hierarchical neural systems. >> There's a person dying to ask a question. >> Sorry. You have hit on several different topics that all coalesce together. You mentioned personalized models. You mentioned AI agents that could help you as you're going through a transitionary period. You mentioned data sources, especially across long time periods. Who today has access to enough data to make meaningful progress on that, not just when you're dealing with an issue, but day-to-day improvement of your life and your health? >> Go ahead, great question. >> That was a great question. And I don't think we have a good answer to it. (laughter) I'm sure John does. Well, I think every large healthcare organization and various healthcare consortiums are working very hard to achieve that goal. The problem remains in creating semantic interoperatability. So I spent a lot of my career working on semantic interoperatability. And the problem is that if you don't have well-defined, or self-defined data, and if you don't have well-defined and documented metadata, and you start operating on it, it's real easy to reach false conclusions and I can give you a classic example. It's well known, with hundreds of studies looking at when you give an antibiotic before surgery and how effective it is in preventing a post-op infection. Simple question, right? So most of the literature done prosectively was done in institutions where they had small sample sizes. So if you pool that, you get a little bit more noise, but you get a more confirming answer. What was done at a very large, not my own, but a very large institution... I won't name them for obvious reasons, but they pooled lots of data from lots of different hospitals, where the data definitions and the metadata were different. Two examples. When did they indicate the antibiotic was given? Was it when it was ordered, dispensed from the pharmacy, delivered to the floor, brought to the bedside, put in the IV, or the IV starts flowing? Different hospitals used a different metric of when it started. When did surgery occur? When they were wheeled into the OR, when they were prepped and drapped, when the first incision occurred? All different. And they concluded quite dramatically that it didn't matter when you gave the pre-op antibiotic and whether or not you get a post-op infection. And everybody who was intimate with the prior studies just completely ignored and discounted that study. It was wrong. And it was wrong because of the lack of commonality and the normalization of data definitions and metadata definitions. So because of that, this problem is much more challenging than you would think. If it were so easy as to put all these data together and operate on it, normalize and operate on it, we would've done that a long time ago. It's... Semantic interoperatability remains a big problem and we have a lot of heavy lifting ahead of us. I'm working with the Global Alliance, for example, of Genomics and Health. There's like 30 different major ontologies for how you represent genetic information. And different institutions are using different ones in different ways in different versions over different periods of time. That's a mess. >> Our all those issues applicable when you're talking about a personalized data set versus a population? >> Well, so N of 1 studies and single-subject research is an emerging field of statistics. So there's some really interesting new models like step wedge analytics for doing that on small sample sizes, recruiting people asynchronously. There's single-subject research statistics. You compare yourself with yourself at a different point in time, in a different context. So there are emerging statistics to do that and as long as you use the same sensor, you won't have a problem. But people are changing their remote sensors and you're getting different data. It's measured in different ways with different sensors at different normalization and different calibration. So yes. It even persists in the N of 1 environment. >> Yeah, you have to get started with a large N that you can apply to the N of 1. I'm actually going to attack your question from a different perspective. So who has the data? The millions of examples to train a deep learning system from scratch. It's a very limited set right now. Technology such as the Collaborative Cancer Cloud and The Data Exchange are definitely impacting that and creating larger and larger sets of critical mass. And again, not withstanding the very challenging semantic interoperability questions. But there's another opportunity Kay asked about what's changed recently. One of the things that's changed in deep learning is that we now have modules that have been trained on massive data sets that are actually very smart as certain kinds of problems. So, for instance, you can go online and find deep learning systems that actually can recognize, better than humans, whether there's a cat, dog, motorcycle, house, in a photograph. >> From Intel, open source. >> Yes, from Intel, open source. So here's what happens next. Because most of that deep learning system is very expressive. That combinatorial mixture of features that Naveen was talking about, when you have all these layers, there's a lot of features there. They're actually very general to images, not just finding cats, dogs, trees. So what happens is you can do something called transfer learning, where you take a small or modest data set and actually reoptimize it for your specific problem very, very quickly. And so we're starting to see a place where you can... On one end of the spectrum, we're getting access to the computing capabilities and the data to build these incredibly expressive deep learning systems. And over here on the right, we're able to start using those deep learning systems to solve custom versions of problems. Just last weekend or two weekends ago, in 20 minutes, I was able to take one of those general systems and create one that could recognize all different kinds of flowers. Very subtle distinctions, that I would never be able to know on my own. But I happen to be able to get the data set and literally, it took 20 minutes and I have this vision system that I could now use for a specific problem. I think that's incredibly profound and I think we're going to see this spectrum of wherever you are in your ability to get data and to define problems and to put hardware in place to see really neat customizations and a proliferation of applications of this kind of technology. >> So one other trend I think, I'm very hopeful about it... So this is a hard problem clearly, right? I mean, getting data together, formatting it from many different sources, it's one of these things that's probably never going to happen perfectly. But one trend I think that is extremely hopeful to me is the fact that the cost of gathering data has precipitously dropped. Building that thing is almost free these days. I can write software and put it on 100 million cell phones in an instance. You couldn't do that five years ago even right? And so, the amount of information we can gain from a cell phone today has gone up. We have more sensors. We're bringing online more sensors. People have Apple Watches and they're sending blood data back to the phone, so once we can actually start gathering more data and do it cheaper and cheaper, it actually doesn't matter where the data is. I can write my own app. I can gather that data and I can start driving the correct inferences or useful inferences back to you. So that is a positive trend I think here and personally, I think that's how we're going to solve it, is by gathering from that many different sources cheaply. >> Hi, my name is Pete. I've very much enjoyed the conversation so far but I was hoping perhaps to bring a little bit more focus into Precision Medicine and ask two questions. Number one, how have you applied the AI technologies as you're emerging so rapidly to your natural language processing? I'm particularly interested in, if you look at things like Amazon Echo or Siri, or the other voice recognition systems that are based on AI, they've just become incredibly accurate and I'm interested in specifics about how I might use technology like that in medicine. So where would I find a medical nomenclature and perhaps some reference to a back end that works that way? And the second thing is, what specifically is Intel doing, or making available? You mentioned some open source stuff on cats and dogs and stuff but I'm the doc, so I'm looking at the medical side of that. What are you guys providing that would allow us who are kind of geeks on the software side, as well as being docs, to experiment a little bit more thoroughly with AI technology? Google has a free AI toolkit. Several other people have come out with free AI toolkits in order to accelerate that. There's special hardware now with graphics, and different processors, hitting amazing speeds. And so I was wondering, where do I go in Intel to find some of those tools and perhaps learn a bit about the fantastic work that you guys are already doing at Kaiser? >> Let me take that first part and then we'll be able to talk about the MD part. So in terms of technology, this is what's extremely exciting now about what Intel is focusing on. We're providing those pieces. So you can actually assemble and build the application. How you build that application specific for MDs and the use cases is up to you or the one who's filling out the application. But we're going to power that technology for multiple perspectives. So Intel is already the main force behind The Data Center, right? Cloud computing, all this is already Intel. We're making that extremely amenable to AI and setting the standard for AI in the future, so we can do that from a number of different mechanisms. For somebody who wants to develop an application quickly, we have hosted solutions. Intel Nervana is kind of the brand for these kinds of things. Hosted solutions will get you going very quickly. Once you get to a certain level of scale, where costs start making more sense, things can be bought on premise. We're supplying that. We're also supplying software that makes that transition essentially free. Then taking those solutions that you develop in the cloud, or develop in The Data Center, and actually deploying them on device. You want to write something on your smartphone or PC or whatever. We're actually providing those hooks as well, so we want to make it very easy for developers to take these pieces and actually build solutions out of them quickly so you probably don't even care what hardware it's running on. You're like here's my data set, this is what I want to do. Train it, make it work. Go fast. Make my developers efficient. That's all you care about, right? And that's what we're doing. We're taking it from that point at how do we best do that? We're going to provide those technologies. In the next couple of years, there's going to be a lot of new stuff coming from Intel. >> Do you want to talk about AI Academy as well? >> Yeah, that's a great segway there. In addition to this, we have an entire set of tutorials and other online resources and things we're going to be bringing into the academic world for people to get going quickly. So that's not just enabling them on our tools, but also just general concepts. What is a neural network? How does it work? How does it train? All of these things are available now and we've made a nice, digestible class format that you can actually go and play with. >> Let me give a couple of quick answers in addition to the great answers already. So you're asking why can't we use medical terminology and do what Alexa does? Well, no, you may not be aware of this, but Andrew Ian, who was the AI guy at Google, who was recruited by Google, they have a medical chat bot in China today. I don't speak Chinese. I haven't been able to use it yet. There are two similar initiatives in this country that I know of. There's probably a dozen more in stealth mode. But Lumiata and Health Cap are doing chat bots for health care today, using medical terminology. You have the compound problem of semantic normalization within language, compounded by a cross language. I've done a lot of work with an international organization called Snowmed, which translates medical terminology. So you're aware of that. We can talk offline if you want, because I'm pretty deep into the semantic space. >> Go google Intel Nervana and you'll see all the websites there. It's intel.com/ai or nervanasys.com. >> Okay, great. Well this has been fantastic. I want to, first of all, thank all the people here for coming and asking great questions. I also want to thank our fantastic panelists today. (applause) >> Thanks, everyone. >> Thank you. >> And lastly, I just want to share one bit of information. We will have more discussions on AI next Tuesday at 9:30 AM. Diane Bryant, who is our general manager of Data Centers Group will be here to do a keynote. So I hope you all get to join that. Thanks for coming. (applause) (light electronic music)
SUMMARY :
And I'm excited to share with you He is the VP and general manager for the And it's pretty obvious that most of the useful data in that the technologies that we were developing So the mission is really to put and analyze it so you can actually understand So the field of microbiomics that I referred to earlier, so that you can think about it. is that the substrate of the data that you're operating on neural networks represent the world in the way And that's the way we used to look at it, right? and the more we understand the human cortex, What was it? also did the estimate of the density of information storage. and I'd be curious to hear from you And that is not the case today. Well, I don't like the idea of being discriminated against and you can actually then say what drug works best on this. I don't have clinic hours anymore, but I do take care of I practiced for many years I do more policy now. I just want to take a moment and see Yet most of the studies we do are small scale And so that barrier is going to enable So the idea is my data's really important to me. is much the same as you described. That's got to be a new one I've heard now. So I'm going to repeat this and ask Seems like a lot of the problems are regulatory, because I know the cycle is just going to be longer. And the diadarity is where you have and deep learning systems to understand, And that feeds back to your question about regulatory and to make AI the competitive advantage. that the opportunities that people need to look for to what you were saying before. of overcoming the cost and the cycle time and ability to assimilate Yes, the patients. Know your diagnosis, right? and filling in the gaps where there's less training We'll meet you all out back for the next start up. And so the whole recertification process is being are there ways to-- most of the behavior. because he addresses that issue in there is that the systems are starting to be able to, You mentioned AI agents that could help you So most of the literature done prosectively So there are emerging statistics to do that that you can apply to the N of 1. and the data to build these And so, the amount of information we can gain And the second thing is, what specifically is Intel doing, and the use cases is up to you that you can actually go and play with. You have the compound problem of semantic normalization all the websites there. I also want to thank our fantastic panelists today. So I hope you all get to join that.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Diane Bryant | PERSON | 0.99+ |
Bob Rogers | PERSON | 0.99+ |
Kay Erin | PERSON | 0.99+ |
John | PERSON | 0.99+ |
David Haussler | PERSON | 0.99+ |
China | LOCATION | 0.99+ |
six | QUANTITY | 0.99+ |
Chris Farley | PERSON | 0.99+ |
Naveen Rao | PERSON | 0.99+ |
100% | QUANTITY | 0.99+ |
Bob | PERSON | 0.99+ |
10 | QUANTITY | 0.99+ |
Ray Kurzweil | PERSON | 0.99+ |
Intel | ORGANIZATION | 0.99+ |
London | LOCATION | 0.99+ |
Mike | PERSON | 0.99+ |
John Madison | PERSON | 0.99+ |
American Association of Medical Specialties | ORGANIZATION | 0.99+ |
four | QUANTITY | 0.99+ |
ORGANIZATION | 0.99+ | |
three months | QUANTITY | 0.99+ |
HHS | ORGANIZATION | 0.99+ |
Andrew Ian | PERSON | 0.99+ |
20 minutes | QUANTITY | 0.99+ |
$100 | QUANTITY | 0.99+ |
first paper | QUANTITY | 0.99+ |
Congress | ORGANIZATION | 0.99+ |
95 percent | QUANTITY | 0.99+ |
second author | QUANTITY | 0.99+ |
UC Santa Cruz | ORGANIZATION | 0.99+ |
100-dollar | QUANTITY | 0.99+ |
200 ways | QUANTITY | 0.99+ |
two billion dollars | QUANTITY | 0.99+ |
George Church | PERSON | 0.99+ |
Health Cap | ORGANIZATION | 0.99+ |
Naveen | PERSON | 0.99+ |
25 plus years | QUANTITY | 0.99+ |
12 layers | QUANTITY | 0.99+ |
27 genes | QUANTITY | 0.99+ |
12 years | QUANTITY | 0.99+ |
Kay | PERSON | 0.99+ |
140 layers | QUANTITY | 0.99+ |
first author | QUANTITY | 0.99+ |
one question | QUANTITY | 0.99+ |
200 people | QUANTITY | 0.99+ |
20 | QUANTITY | 0.99+ |
First | QUANTITY | 0.99+ |
CIA | ORGANIZATION | 0.99+ |
NLP | ORGANIZATION | 0.99+ |
Today | DATE | 0.99+ |
two questions | QUANTITY | 0.99+ |
yesterday | DATE | 0.99+ |
Pete | PERSON | 0.99+ |
Medicare | ORGANIZATION | 0.99+ |
Legos | ORGANIZATION | 0.99+ |
Northern California | LOCATION | 0.99+ |
Echo | COMMERCIAL_ITEM | 0.99+ |
Each | QUANTITY | 0.99+ |
100 times | QUANTITY | 0.99+ |
nervanasys.com | OTHER | 0.99+ |
$1000 | QUANTITY | 0.99+ |
Ray Chrisfall | PERSON | 0.99+ |
Nervana | ORGANIZATION | 0.99+ |
Data Centers Group | ORGANIZATION | 0.99+ |
Global Alliance | ORGANIZATION | 0.99+ |
Global Alliance for Genomics and Health | ORGANIZATION | 0.99+ |
millions | QUANTITY | 0.99+ |
intel.com/ai | OTHER | 0.99+ |
four years | QUANTITY | 0.99+ |
Stanford | ORGANIZATION | 0.99+ |
10,000 examples | QUANTITY | 0.99+ |
today | DATE | 0.99+ |
one disease | QUANTITY | 0.99+ |
Two examples | QUANTITY | 0.99+ |
Steven Hawking | PERSON | 0.99+ |
five years ago | DATE | 0.99+ |
first | QUANTITY | 0.99+ |
two sort | QUANTITY | 0.99+ |
both | QUANTITY | 0.99+ |
One | QUANTITY | 0.99+ |
first time | QUANTITY | 0.99+ |