DockerCon 2022 | Knox Anderson
(upbeat bright music) >> Hello, welcome back to theCUBE's main stage coverage of DockerCon 2022. I'm John for your host of theCUBE. We have Knox Anderson, vice president of Product Management, Sysdig. Knox, welcome to theCUBE. >> Thanks for having me. Glad to be back. >> So IAC containers is going crazy madness in terms of adoption, standard, even mainstream enterprise, IT and cloud are all containerized. It's only getting better, and it increases the complications when you start thinking about scale and supportability. This is a huge discussion, and it ranges from how do you support, how do you run operations, how do you secure in the supply chain. All this is happening, and with the growth of cloud and server (indistinct) seeing Kubernetes at the center of everything. So I got to ask you, how has Kubernetes changed how you secure cloud infrastructure? >> Yeah, so Kubernetes is really the modern operating system for the cloud. And with that, you get a lot of facilities. So you get things like Kubernetes' network policies, you can use things like admission controllers. And with that, you're securing multiple layers, whether it's the control plane, individual workloads. And so there's a nice mixture of built-in tools, and part of the Kubernetes platform that then you can leverage to do prevention, auditing, and things like that. But it really requires an entire rethink of your stack and the tools you bring in alongside your people and processes. And so it's an exciting time because it gives you an opportunity to be more secure, but really have to rethink your approach there. >> And I want to get into the whole observability trend here 'cause you start thinking about the mobility, what containers enables. And getting all the data is everything. And then also that feeds into kind of having a good sense of what is going on. And when you hear about shift left and data as code, you know, developers don't want to get stopped coding, right? And then have to come back and go dig into things that they thought they had taken care of. So you kind of got this kind of flywheel going in the wrong direction. So that's causing teams to be disrupted. So how do teams keep up with the changes to the containerized applications or what to prioritize around that? Because if I shift left, am I done or what? And these are the things that come up all the time. >> Yeah. You have to shift left but also watch the right. Like, shifting left is a little bit harder from a people and process perspective. Like you put a tool in place, then it's a gating factor for getting in. And so that runtime context on the right is equally as important. And it's often easier to roll out a runtime tool just because you're not going in and introducing new processes. And that runtime visibility can also make shift left much better. If you're scanning a container image, you might get a thousand different vulnerabilities that you need to address, but only three of those are in packages that are actually executed at runtime. And so we recently released a feature called risk spotlight which does that exact feedback loop. And that's something that's important whether you're addressing vulnerabilities, misconfigurations, or responding to event. What's on the right, what's on the left, and then tie those together. >> Yeah, it's like left, right, it's like driving training here in the United States. You got a stop sign, you want to be moving, always be moving. I got to ask you what are some of the side effects of infrastructure automation and the result in code artifacts? >> Yeah, it's really, like, Kubernetes is nice because it's a declarative system, but it doesn't always work out that way. Like, someone might have a Helm chart and then someone else changes it in production. So understanding what is drift is really important in these environments. And then it also has enabled real remediation workflows. I think previously, you might patch something, a week later there's a new deploy, that patch gets written over. And so because Kubernetes and the rise of IAC, it's now easier to see a misconfiguration in production, open a poll request, and then fix that at source, which provides that full kind of visibility across those different environments. And it allows you to actually fix issues versus constantly being in that kind of whack-a-mole of patching things and moving on. >> Yeah, I mean this is all about cloud native development, and you look at, you know, some of the things going on, you're starting to see best practices developed. What do you guys see as a best practice for getting started with designing and securing cloud native applications? What are some of the tools that people should look at for beginners and for the entry-level position? And then as they get traction, what does that turn into? >> Yeah, so the pattern we've often seen is like someone gets started on the open source side, whether you're using Open Policy Agent or Falco, which Laurice who've you met with before created. And so really when you're starting, choose kind of the open source option. Learn from that. And then often what we've seen with customers is at scale, there's some companies like if you're in Uber, or Snapchat, and Apple, you can maybe build something around open source, but a lot of other people start to really consolidate platforms that are built on top of those open source technologies, and trying to get that really single view into what's happening in their environment, what are those events. And the thing that I would say, process wise, is most important is build that container center of excellence, that cloud center of excellence, whatever you call it, that brings together people from your ops team, your infrastructure team, your dev team, your security team. Everyone's got to have a seat at the table to have containers be successful. It's a big shift, and if you do it right, it really takes off, but each team really needs to be included there. >> Yeah, there's a lot of operational discussions going on around the devs, and the devs are being pulled to the front lines. We've been saying this for a decade, but now when you got edge computing, you got cloud native operations, on-premises, you start to see that they're getting pulled even further to the frontline. So, you know, what are you guys up to Sysdig? You know, they got a lot of developers here at DockerCon, what's in it for them? Why Sysdig, why should they care? What would you say to the old developers that are watching? What's in it for them? >> Yeah, we really make it easier for you to prioritize what to fix and what to address in your environment. I know I've built something before and like, my test suite or my scanner just lights up like a Christmas tree, and you just want to move to another task because it's just too much to deal with at that time. And so we really help you focus on what matters and get the most bang for your buck. Everyone has way too much time or too many things going on and not enough time. And so being able to understand effective risk, your different vulnerabilities, what to fix, is really key to delivering secure software. >> I mean, it's like a doctor needs to know what to work on with the patient, if you will, when to, and what's important, and then the dependencies, and you got, a system's mindset, you got to know what the consequences. So it sounds easy, just knock down a list of things, but isn't that easy. You got to want to hit things that you know that will be, to have an impact right away. That seems to be the big aha moment here. >> Yeah, definitely. >> So we're going to be at KubeCon in Europe, you guys going to have booth there, what's the quick plug for the company? Give a shout out to what's happening at Sysdig and cloud native world. >> Yeah, really excited to be in Valencia. We have a ton of people at, sorry, at DockerCon with, giving a couple different talks here. So the first is Master Your Container Security Model and then Software Supply Chain Security and Standards. On the supply chain one, we're getting deep into SBOMs. So if that's a topic that's important to you, please join that one. >> Awesome, and then that's a big topic supply chain. We've got a minute and a half left. What's the most important thing people should pay attention to as open source continues to grow in prominence, not just from a code standpoint, but as a social environment, as people's doing ventures and venture capitalists are mining the area, what should they pay attention to as supply chain becomes important, what's the big thing? >> There's a lot of companies I think going around the SBOM space, and kind of trying to certify like where did this come from, and have that providence across the entire supply chain. We, under the hood, use those SBOMs to understand kind of what have you built, what packages are used, and then tie that with that runtime data. So a lot of the things that we talked around before with RiskSpotlight is based on that deep SBOM knowledge. And that's something that, I think the standards are still getting kind of worked out where there's CycloneDX, SBX. And so people really are saying, "Hey, I need to generate SBOMs," and we're regenerating them, but there's going to be more and more applications on "Okay what do you do with that? How does it integrate with other tools?" So it's kind of I think in the little bit of the early data lake phases where it's like, "I've taken all my data, I put it here. Now I need to do more with it." And so that's where I think we'll start to see some pretty exciting things over the next year or two. >> It's super exciting. On one hand you got the attackers, and that's a zero trust environment, and you get the builders, the developers where trust is everything. You got to know what it's in the code. It's really interesting time and super important to scale. So Knox, thanks for for coming on theCUBE and sharing the Sysdig update. Appreciate it, thanks for coming on. Now back to you at the DockerCon main stage, this is theCUBE. I'm John for your host. Thanks for watching. (upbeat bright music)
SUMMARY :
of DockerCon 2022. Glad to be back. and it ranges from how do you support, And with that, you get And then have to come back And so that runtime context on the right I got to ask you what are And it allows you to actually fix issues and you look at, you know, and if you do it right, and the devs are being and you just want to move to another task and you got, you guys going to have booth there, Yeah, really excited to be in Valencia. Awesome, and then that's kind of what have you built, Now back to you at the
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Laurice | PERSON | 0.99+ |
John | PERSON | 0.99+ |
Apple | ORGANIZATION | 0.99+ |
Europe | LOCATION | 0.99+ |
Sysdig | ORGANIZATION | 0.99+ |
Uber | ORGANIZATION | 0.99+ |
Knox Anderson | PERSON | 0.99+ |
Valencia | LOCATION | 0.99+ |
Knox | PERSON | 0.99+ |
DockerCon | EVENT | 0.99+ |
each team | QUANTITY | 0.99+ |
Snapchat | ORGANIZATION | 0.99+ |
a week later | DATE | 0.99+ |
United States | LOCATION | 0.98+ |
DockerCon | ORGANIZATION | 0.98+ |
first | QUANTITY | 0.98+ |
theCUBE | ORGANIZATION | 0.97+ |
DockerCon 2022 | EVENT | 0.96+ |
next year | DATE | 0.96+ |
three | QUANTITY | 0.96+ |
zero trust | QUANTITY | 0.95+ |
Kubernetes | TITLE | 0.95+ |
one | QUANTITY | 0.94+ |
single | QUANTITY | 0.93+ |
Christmas | EVENT | 0.9+ |
IAC | ORGANIZATION | 0.88+ |
CycloneDX | TITLE | 0.85+ |
Open Policy Agent | TITLE | 0.81+ |
IAC | TITLE | 0.81+ |
kSpotlight | ORGANIZATION | 0.81+ |
SBX | TITLE | 0.79+ |
Kubernetes' | TITLE | 0.79+ |
Ris | ORGANIZATION | 0.74+ |
KubeCon | EVENT | 0.74+ |
a decade | QUANTITY | 0.74+ |
SBOM | ORGANIZATION | 0.66+ |
a minute and a half | QUANTITY | 0.65+ |
Falco | ORGANIZATION | 0.64+ |
thousand different vulnerabilities | QUANTITY | 0.61+ |
SBOMs | ORGANIZATION | 0.58+ |
two | QUANTITY | 0.54+ |
Sysdig | PERSON | 0.54+ |
theCUBE | TITLE | 0.52+ |
Knox Anderson, Sysdig | AWS Startup Showcase
(upbeat music) >> Welcome to the Q3 AWS Startup Showcase. I'm Lisa Martin. I'm pleased to welcome Knox Anderson, the VP of Product Management, from Sysdig, to the program. Knox, welcome. >> Thanks for having me, Lisa. >> Excited to uncover Sysdig. Talk to me about what you guys do. >> So Sysdig, we are a secure DevOps platform, and we're going to really allow customers to secure the entire lifecycle of an application from source to production. So give you the ability to scan IAC for security best practices, misconfiguration, help you facilitate things like image scanning as part of the build process, and then monitor runtime behavior for compliance or threats, and then finish up with incident response, so that you can respond to and recover from incidents quickly. >> What are some of the main challenges that you're solving and have those changed in the last 18 months? >> I'd say the main challenge people face today is a skills gap with Kubernetes. Everyone wants to use Kubernetes, but the amount of people that can operate those platforms is really difficult. And then getting visibility into the apps, that's running in those environments is also a huge challenge. So with Sysdig, we provide just an easy way to get your Kubernetes clusters instrumented, and then provide strong coverage for threat detection, compliance, and then observability for those environments. >> One of the things that we've seen in the last 18 months is a big change in the front landscape. So, I'm very curious to understand how you're helping customers navigate some of the major dynamics that are going on. >> Yeah, I'd say, the adoption of cloud and the adoption of Kubernetes have, have changed drastically. I'd say every single week, there's a different environment that has a cryptomining container. That's spun up in there. Obviously, if the price of a Bitcoin and things like that go up, there's more and more people that want to steal your resources for mining. So, we're seeing attacks of people pulling public images for Docker hub onto their clusters, and there's a couple of different ways that we'll help customers see that. We have default Falco rules, better vetted by the open source community to detect cryptomining. And then we also see a leading indicator of this as some of the metrics we, we collect for resource abuse and those types of things where you'll see the CPU spike, and then can easily identify some workload that could have been compromised and is now using your resources to mine Bitcoin or some other alt-coin. >> Give me a picture of a Sysdig customer. Help me understand the challenges they had, why they chose you and some of the results that they're achieving. >> Yeah, I used to say that we were very focused on financial services, but now everyone is doing Kubernetes. Really where we get introduced to an organization is they have their two or three clusters that are now in production and I'm going through a compliance audit, or it's now a big enough part of my estate that I need to get security for this Kubernetes and cloud environment. And, so we come in to really provide kind of the end-to-end tools that you would need for that compliance audit or to meet your internal security guidelines. So they'll usually have us integrated within their Dev pipelines so that developers are getting actionable data about what they need to do to make sure their workloads are as secure as possible before they get deployed to production. So that's part of that shift, left mindset. And then the second main point is around runtime detection. And that's where we started off by building our open source tool Falco, which is now a CNCF project. And that gives people visibility into the common things like, who's accessing my environment? Are there any suspicious connections? Are my workloads doing what they expected? And, those types of things. >> Since the threat landscape has changed so much in the last year and a half, as I mentioned. Are the conversations you're having with customers changing? Is this something at the C-suite or the board level from a security and a visibility standpoint? >> I think containers and Kubernetes and cloud adoption under the big umbrella of digital transformation is definitely at board level objective. And then, that starts to trickle down to, okay, we're taking this app from my on-prem data center, it's now in the cloud and it has to meet the twenty security mandates have been meeting for the last fifteen years. What am I going to do? And so definitely there's practitioners that are coming in and picking tools for different environments. But, I would definitely say that cloud adoption and Kubernetes adoption are something that everyone is trying to accelerate as quickly as possible. >> We've seen a lot of acceleration of cloud adoption in the last eighteen months here, right? Now, something that I want to get into with you is the recent executive order, the White House getting involved. How is this changing the cybersecurity discussion across industries? >> I really like how they kind of brought better awareness to some of the cybersecurity best practices. It's aligned with a lot of the NIST guidance that's come out before, but now cloud providers are picking, private sector, public sector are all looking at this as kind of a new set of standards that we need to pay attention to. So, the fact that they call out things like unauthorized access, you can look at that with Kubernetes audit logs, cloud trail, a bunch of different things. And then, the other term that I think you're going to hear a lot of, at least within the federal community and the tech community, over the next year, is this thing called an 'S bomb', which is for, which is a software bill of materials. And, it's basically saying, "as I'm delivering software to some end user, how can I keep track of everything that's in it?" A lot of this probably came out of solar winds where now you need to have a better view of what are all the different components, how are those being tracked over time? What's the life cycle of that? And, so the fact that things like S bombs are being explicitly called out is definitely going to raise a lot of the best practices as organizations move. And then the last point, money always talks. So, when you see AWS, Azure, Google all saying, we're putting 10, 10 billion plus dollars behind this for training and tooling and building more secure software, that's going to raise the cybersecurity industry as a whole. And so it's definitely driving a lot of investment and growth in the market. >> It's validation. Absolutely. Talk to me about some of the, maybe some of the leading edges that you're seeing in private sector versus public sector of folks and organizations who are going alright, we've got to change. We've got to adopt some of these mandates because the landscape is changing dramatically. >> I think Kubernetes at auction goes hand in hand with that, where it's a declarative system. So, the way you define your infrastructure and source code repost is the same way that runs in production. So, things like auditing are much easier, being able to control what's in your environment. And then containers, it's much easier to package it once and then deploy it wherever you want. So container adoption really makes it easier to be more secure. It's a little tricky where normally like you move to something that's bleeding edge, and a lot of things become much harder. And there's operational parts that are hard about Kubernetes. But, from a pure security perspective, the apps are meant to do one thing. It should be easy to profile them. And so definitely I think the adoption of more modern technology and things like cloud services and Kubernetes is a way to be more secure as you move into these environments. >> Right? Imagine a way to be more secure and faster as well. I want to dig in now to the Sysdig AWS partnership. Talk to me about that. What do you guys do together? >> AWS is a great partner. We, as a company, wouldn't be able to deliver our software without AWS. So we run our SAS services on Amazon. We're in multiple regions around the globe. So we can deliver that to people in Europe and meet all the GDPR requirements and those kinds of things. So from a, a vendor partnership perspective, it's great there. And then on a co-development side, we've had a lot of success and a fun time working with the Fargate team, Fargate is a service on Amazon, that makes it easier for you to run your containers without worrying about the underlying compute. And so they faced the challenge about a year and a half ago where customers didn't want to deploy on Fargate because they couldn't do deeper detection and incident response. So we worked together to figure out different hooks that Amazon could provide to open source tools like Falco or commercial products like Sysdig. So then customers could meet those incident response needs, and those detection needs for Fargate. And really, we're seeing more and more Fargated option as kind of more and more companies are moving to the cloud. And, you don't want to worry about managing infrastructure, a service like Fargate is a great place to get started there. >> Talk to me a little bit about your joint. Go to mark. Is there a joint go-to-market? I should say. >> Yeah, we sell through the AWS marketplace. So customers can procure Sysdig software directly though AWS. It'll end up on your AWS bill. You can kind of take some of your committed spend and draw it down there. So that's a great way. And then we also work closely with different solutions architects teams, or people who are more boots on the ground with different AWS customers trying to solve those problems like PCI-compliance and Fargate, or just building a detection and response strategy for EKS and those types of things. >> Let's kind of shift gears now and talk about the role of open source, in security. What is Sysdig's perspective? >> Yeah, so the platform, open source is a platform, is something that driving more and more adoption these days. So, if you look at like the fundamental platform like Kubernetes, it has a lot of security capabilities baked in there's admission controllers, there's network policies. And so you used to buy a firewall or something like that. But with Kubernetes, you can enforce services, service communication, you put a service mesh on top of that, and you can almost pretend it's a WAF sometimes. So open source is building a lot of fundamental platform level security, and by default. And then the second thing is, we're also seeing a rise of just open source tools that traditionally had always come from commercial products. So, there's things like OPA, which handle authorization, which is becoming a standard. And then there's also projects like Falco, that provide an easy way for people to do IDS use cases and auditing use cases in these environments. >> Last question for you. Talk to me about some of the things that you're most excited about. That's coming down here. We are at, this is the, our Q3 AWS Startup Showcase, but what are some of the things that you're most excited about in terms of being able to help customers resolve some of those challenges even faster? >> I think there's more and more Kubernetes standardization that's going on. So a couple of weeks ago, Amazon released EKS Anywhere, which allows companies who still have an on-prem footprint to run Kubernetes locally the same way that they would run it in the cloud. That's only going to increase cloud adoption, because once you get used to just doing something that matches the cloud, the next question you're going to answer is, okay, how fast can I move that to the cloud? So that's something I'm definitely really excited about. And then, also, the different, or AWS is putting a lot of investment behind tools like security hub. And we're doing a lot of native integrations where we can publish different findings and events into security hubs, so that different practitioners who are used to working in the AWS console can remediate those quickly without ever kind of leading that native AWS ecosystem. And that's a trend I expect to see more and more of over time, as well. >> So a lot of co-innovation coming up with AWS. Where can folks go to learn more information? Is there a specific call to action that you'd like to point them to? >> The Sysdig blog is one of the best sources that I can recommend. We have a great mixture of technical practitioner content, some just one-oh-one level, it's, I'm starting with container security. What do I need to know? So I'd say we do a good job of touching the different areas and then really the best way to learn about anything is to get hands-on. We have a SAS trial. Most of the security vendors have something behind a paywall. You can come in, get started with us for free and start uncovering what's actually running in your infrastructure. >> Knox, let's talk about the secure DevOps movement. As we see that DevOps is becoming more and more common, how is it changing the role of security? >> Yeah, so a lot of traditional security requirements are now getting baked into what a DevOps team does day-to-day. So the DevOps team is doing things like implementing IAC. So your infrastructure is code, and no changes are manually made to environments anymore. It's all done by a Terraform file, a cloud formation, some code that's representing what your infrastructure looks at. And so now security teams, or sorry, these DevOps teams have to bake security into that process. So they're scanning their IAC, making sure there's not elevated privileges. It's not doing something, it shouldn't. DevOps teams, also, traditionally, now are managing your CI/CD Pipeline. And so that's where they're integrating scanning tools in as well, to go in and give actionable feedback to the developers around things like if there's a critical vulnerability with a fix, I'm not going to push that to my registry. So it can be deployed to production. That's something a developer needs to go in and change. So really a lot of these kind of actions and the day-to-day work is driven by corporate security requirements, but then DevOps has the freedom to go in and implement it however they want. And this is where Sysdig adds a lot of value because we provide both monitoring and security capabilities through a single platform. So that DevOps teams can go into one product, see what they need for capacity planning, chargebacks, health monitoring, and then in the same interface, go in and see, okay, is that Kubernetes cluster meeting my SOC 2 controls? How many images have my developers submitted to be scanned over the past day? And all those kinds of things without needing to learn to how to use four or five different tools? >> It sounds to me like a cultural shift almost in terms of the DevOps, the developers working with security. How does Sysdig help with that? If that's a cultural shift? >> Yeah, it's definitely a cultural shift. I see some people in the community getting angry when they see oh we're hiring for a Head of DevOps. They're like DevOps is a movement, not a person. So would totally agree with that there, I think the way we help is if you're troubleshooting an issue, if you're trying to uncover what's in your environment and you are comparing results across five different products, it always turns into kind of a point the finger, a blame game. There's a bunch of confusion. And so what we think, how we help that cultural shift, is by bringing different teams and different use cases together and doing that through a common lens of data, user workflows, integrations, and those types of things. >> Excellent. Knox, thank you for joining me on the program today, sharing with us, Sysdig, what you do, your partnership with AWS and how customers can get started. We appreciate your information. - Thank you. For Knox Anderson. I'm Lisa Martin. You're watching the cube.
SUMMARY :
from Sysdig, to the program. Talk to me about what you guys do. the ability to scan IAC for but the amount of people that One of the things that we've source community to detect cryptomining. results that they're achieving. of my estate that I need to has changed so much in the last And then, that starts to to get into with you is the and growth in the market. Talk to me about some of the, So, the way you Talk to me about that. to run your containers without Talk to me a little bit the ground with different now and talk about the role of Yeah, so the platform, Talk to me about some of the how fast can I move that to the cloud? So a lot of co-innovation Most of the security vendors how is it changing the role of security? So it can be deployed to production. It sounds to me like a of a point the finger, me on the program today,
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Lisa Martin | PERSON | 0.99+ |
AWS | ORGANIZATION | 0.99+ |
Europe | LOCATION | 0.99+ |
two | QUANTITY | 0.99+ |
Amazon | ORGANIZATION | 0.99+ |
Knox | PERSON | 0.99+ |
Lisa | PERSON | 0.99+ |
White House | ORGANIZATION | 0.99+ |
ORGANIZATION | 0.99+ | |
Knox Anderson | PERSON | 0.99+ |
Falco | ORGANIZATION | 0.99+ |
Sysdig | ORGANIZATION | 0.99+ |
four | QUANTITY | 0.98+ |
Sysdig | PERSON | 0.98+ |
Fargate | ORGANIZATION | 0.98+ |
second thing | QUANTITY | 0.98+ |
both | QUANTITY | 0.98+ |
DevOps | TITLE | 0.98+ |
five different products | QUANTITY | 0.98+ |
One | QUANTITY | 0.98+ |
five different tools | QUANTITY | 0.97+ |
SOC 2 | TITLE | 0.97+ |
three clusters | QUANTITY | 0.96+ |
last year and a half | DATE | 0.96+ |
one | QUANTITY | 0.96+ |
today | DATE | 0.96+ |
Kubernetes | TITLE | 0.95+ |
Q3 | EVENT | 0.94+ |
single platform | QUANTITY | 0.94+ |
SAS | ORGANIZATION | 0.94+ |
second main point | QUANTITY | 0.94+ |
one thing | QUANTITY | 0.93+ |
one product | QUANTITY | 0.92+ |
a year and a half ago | DATE | 0.92+ |
last 18 months | DATE | 0.9+ |
next year | DATE | 0.88+ |
GDPR | TITLE | 0.87+ |
10, 10 billion plus | QUANTITY | 0.86+ |
EKS | ORGANIZATION | 0.86+ |
Q3 AWS Startup Showcase | EVENT | 0.85+ |
NIST | ORGANIZATION | 0.85+ |
Fargated | ORGANIZATION | 0.84+ |
a couple of weeks ago | DATE | 0.82+ |
Kubernetes | ORGANIZATION | 0.82+ |
IAC | TITLE | 0.81+ |
about | DATE | 0.8+ |
last fifteen years | DATE | 0.8+ |
twenty security mandates | QUANTITY | 0.8+ |
single week | QUANTITY | 0.76+ |
last eighteen months | DATE | 0.75+ |
EKS Anywhere | TITLE | 0.74+ |
Knox Anderson, Sysdig | CUBE Conversation
(soft electronic music) >> Welcome to this CUBE Conversation. I'm Lisa Martin. This conversation is part of our third AWS Startup Showcase for this year. I'm pleased to welcome Knox Anderson, the VP of Product Management at Sysdig. Knox, welcome to the program. >> Thanks for having me, Lisa. >> Talk to me a little bit about Sysdig, secure DevOps for containers, Kubernetes, and cloud. Give the audience an overview of what you guys do. >> So Sysdig is this secure DevOps platform that provides observability, security, and compliance functions for anyone that's adopting Kubernetes and Cloud. We really secure the entire lifecycle from source to production, so do things like scan your ISE for misconfiguration, monitor your runtime environments for threats and operational best practices. We provide a lot of capabilities around Prometheus Monitoring, as well, and then also let organizations perform incident response and compliance audits against these environments. >> So founded in 2013, talk to me about the gap in the market that you guys saw then and what some of the key challenges are that you saw for your customers. >> Yeah so we came to market around the same time as containers and Kubernetes and I'd say 2015 to 2018 we kept on saying it's the year of Kubernetes, it's the year of Kubernetes, it's the year of Kubernetes. And then really during the last year and a half in the COVID pandemic, Kubernetes has gone gangbusters. Every major cloud is seeing a huge adoption in their Kubernetes services so that's really our wedge into a lot of organizations. They're changing their platform to take advantages of containers and Kubernetes and you really have to rethink all of your security tooling, and that's when a company like Sysdig comes in. >> Talk to me about customers in terms of, especially in the last year and a half when things have been so dynamic, we've seen so much too, on the threat landscape front changing. Give me an example of a customer or two that you're really helped with solving some of their major challenges, here. >> Yeah, a great customer that we work with is SAP Concur and they kind of encompass a lot of the things that are nice about modern DevOps. So it's a DevOps team that's running a Kubernetes platform that thousands of developers are building their apps and deploying those onto. And they chose Sysdig because really it's not scalable to have every single data team ping that DevOps team and say what's the performance of my service, how is it responding, how can I get scanning integrated with that and so they use Sysdig as a platform that allows developers to easily onboard onto their Kubernetes clusters and then ensure that they're meeting compliance needs and FedRAMP needs for that platform that they deliver their core business apps on. >> Let's talk about the Sysdig's commitment to opensource on the Falco project. >> So Falco is a opensource project that we started at Sysdig, it's built on top of our core system core instrumentation. And so Falco meets a lot of your IDS or your file integrity monitoring requirements that you might have as you move to Kubernetes. And really, it's something we started at about 2016. In 2019, we donated that project to the CMCS which is the same governance body behind Kubernetes, Prometheus, and other kind of core building blocks of the climate of ecosystem. Since then, it's grown immensely. Companies like Shopify are using it to make sure that their PCI apps that they run Kubernetes are fully compliant. And so it's something that we are constantly contributing to the community also from even companies like AWS is a core contributor to the Falco project. And I'm really excited to see where it goes over the next year as Falco extends to also cover some cloud security use cases. >> What can you tell me about the relationship that Sysdig and AWS have? >> They've been a great partner. We internally run our SaaS on AWS so we're using AWS services to deliver our product to our customers. And then we've also really worked closely around how you can provide better security for services like Fargate. So we did working sessions with their engineering teams, learned what we could do to get the visibility that we need for tools like Falco and Sysdig to work seamlessly in Fargate environments. And last April we were able to kind of, AWS released that new functionality, Sysdig built on top of that, and we've already seen great adoption of customers using the Sysdig product on top of Fargate. >> Excellent. Well thank you very much, Knox, for stopping by theCUBE telling us about Sysdig, what you guys are doing ahead of the AWS Startup Showcase. We appreciate your time and your information. >> Thanks for having me. >> For Knox Anderson, I'm Lisa Martin. You're watching this CUBE Conversation. (soft electronic music)
SUMMARY :
I'm pleased to welcome Knox Anderson, Talk to me a little bit about Sysdig, We really secure the entire in the market that you and I'd say 2015 to 2018 in the last year and a that allows developers to easily onboard to opensource on the Falco project. that project to the CMCS get the visibility that we need ahead of the AWS Startup Showcase. (soft electronic music)
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Lisa Martin | PERSON | 0.99+ |
AWS | ORGANIZATION | 0.99+ |
2013 | DATE | 0.99+ |
2019 | DATE | 0.99+ |
Knox | PERSON | 0.99+ |
two | QUANTITY | 0.99+ |
Lisa | PERSON | 0.99+ |
2018 | DATE | 0.99+ |
Sysdig | ORGANIZATION | 0.99+ |
Knox Anderson | PERSON | 0.99+ |
2015 | DATE | 0.99+ |
Sysdig | PERSON | 0.99+ |
last April | DATE | 0.99+ |
next year | DATE | 0.99+ |
Shopify | ORGANIZATION | 0.98+ |
Kubernetes | TITLE | 0.98+ |
Falco | ORGANIZATION | 0.98+ |
thousands of developers | QUANTITY | 0.97+ |
COVID pandemic | EVENT | 0.97+ |
Sysdig | TITLE | 0.96+ |
CMCS | ORGANIZATION | 0.96+ |
Prometheus | TITLE | 0.96+ |
last year and a half | DATE | 0.94+ |
last year and a half | DATE | 0.89+ |
Startup Showcase | EVENT | 0.85+ |
FedRAMP | ORGANIZATION | 0.82+ |
this year | DATE | 0.79+ |
DevOps | TITLE | 0.78+ |
Cloud | TITLE | 0.77+ |
argate | ORGANIZATION | 0.76+ |
ISE | TITLE | 0.74+ |
2016 | DATE | 0.74+ |
single | QUANTITY | 0.73+ |
SAP Concur | ORGANIZATION | 0.72+ |
third | QUANTITY | 0.65+ |
about | DATE | 0.63+ |
CUBE | TITLE | 0.59+ |
Fargate | ORGANIZATION | 0.58+ |
Fargate | TITLE | 0.34+ |
Stewart Knox V1
>>from around the globe. It's the Cube covering space and cybersecurity. Symposium 2020 hosted by Cal Poly. Yeah, Lauren, Welcome to the Space and Cybersecurity Symposium 2020 put on by Cal Poly and hosted with Silicon Angle acute here in Palo Alto, California for a virtual conference. Couldn't happen in person this year. I'm John for a year. Host the intersection of space and cybersecurity. I'll see critical topics, great conversations. We got a great guest here to talk about the addressing the cybersecurity workforce gap, and we have a great guest, a feature speaker. Stewart Knox, the undersecretary with California's Labor and Workforce Development Office. Stewart Thanks for joining us today. >>Thank you so much, John. Appreciate your time today and listening to a little bit of our quandaries with making sure that we have the security that's necessary for the state of California and making sure that we have the work force that is necessary for cybersecurity in space. >>Great, I'd love to get started. I got a couple questions for you, but first take a few minutes for an opening statement to set the stage. >>Sure, realizing that in California we lead the nation in much of cybersecurity based on Department of Defense contractors within the Santa California leading the nation with over $160 billion within the industry just here in California alone and having over 800,000 bus workers. Full time employment in the state of California is paramount for us to make sure that we face, um, defense manufacturers approximate 700,000 jobs that are necessary to be filled. There's over 37,000 vacancies that we know of in California, just alone in cybersecurity. And so we look forward to making sure that California Workforce Development Agency is leading the charge to make sure that we have equity in those jobs and that we are also leading in a way that brings good jobs to California and to the people of California, a good education system that is developed in a way that those skills are necessarily met for the for the employers here in California and the nation, >>One of the exciting things about California is obviously look at Silicon Valley, Hewlett Packard in the garage, storied history space. It's been a space state. Many people recognize California. You mentioned defense contractors. It's well rooted with with history, um, just breakthroughs bases, technology companies in California. And now you've got technology. This is the cybersecurity angle. Um, take >>them into >>Gets more commentary to that because that's really notable. And as the workforce changes, these two worlds are coming together, and sometimes they're in the same place. Sometimes they're not. This is super exciting and a new dynamic that's driving opportunities. Could you share, um, some color commentary on that dynamic? >>Absolutely. And you're so correct. I think in California we lead the nation in the way that we developed programs that are companies lead in the nation in so many ways around, uh, cyberspace cybersecurity, Uh, in so many different areas for which in the Silicon Valley is just, uh, such a leader in those companies are good qualified companies to do so. Obviously, one of the places we play a role is to make sure that those companies have a skilled workforce. Andi, also that the security of those, uh, systems are in place for our defense contractors onda For the theater companies, those those outlying entities that are providing such key resource is to those companies are also leading on the cutting edge for the future. Also again realizing that we need to expand our training on skills to make sure that those California companies continue to lead is just, um, a great initiative. And I think through apprenticeship training programs on By looking at our community college systems, I think that we will continue to lead the nation as we move forward. >>You know, we've had many conversations here in this symposium, virtually certainly around. The everyday life of consumer is impacted by space. You know, we get our car service Uber lyft. We have maps. We have all this technology that was born out of defense contracts and r and D that really changed generations and create a lot of great societal value. Okay, now, with space kind of on the next generation is easier to get stuff into space. The security of the systems is now gonna be not only paramount for quality of life, but defending that and the skills are needed in cybersecurity to defend that. And the gap is there. What >>can we >>do to highlight the opportunities for career paths? It used to be the day when you get a mechanical engineering degree or aerospace and you graduated. You go get a job. Not anymore. There's a variety of of of paths career wise. What can we do to highlight this career path? >>Absolutely correct. And I think it starts, you know, k through 12 system on. I know a lot of the work that you know, with this bow and other entities we're doing currently, uh, this is where we need to bring our youth into an age where they're teaching us right as we become older on the uses of technology. But it's also teaching, um, where the levels of those education can take them k through 12. But it's also looking at how the community college system links to that, and then the university system links above and beyond. But it's also engage in our employers. You know, One of the key components, obviously, is the employers player role for which we can start to develop strategies that best meet their needs quickly. I think that's one of the comments we hear the most labor agency is how we don't provide a change as fast as we should, especially in technology. You know, we buy computers today, and they're outdated. Tomorrow it's the same with the technology that's in those computers is that those students are going to be the leaders within that to really develop how those structures are in place. S O. K. Through 12 is probably primary place to start, but also continuing. That passed the K 12 system and I bring up the employers and I bring them up in a way, because many times when we've had conversations with employers around what their skills needs were and how do we develop those better? One of the pieces that of that that I think is really should be recognized that many times they recognized that they wanted a four year degree, potentially or five year, six year degree. But then, when we really looked at the skill sets, someone coming out of the community college system could meet those skill sets. And I think we need to have those conversations to make sure not that they shouldn't be continue their education. They absolutely should. Uh, but how do we get those skill sets built into this into 12 plus the two year plus the four year person? >>You know, I love the democratization of these new skills because again. There's no pattern matching because they weren't around before, right? So you gotta look at the exposure to your point K through 12 exposure. But then there's an exploration piece of whether it's community, college or whatever progression. And sometimes it's nonlinear, right? I mean, people are learning different ways, combining the exposure and the exploration. That's a big topic. Can you share your view on this because this now opens up mawr doors for people choice. You got new avenues. You got online clock and get a cloud computing degree now from Amazon and walk in and help. I could be, you know, security clearance, possibly in in college. So you know you get exposure. Is there certain things you see? Is it early on middle school? And then I'll see the exploration Those air two important concepts. Can you unpack that a little bit exposure and exploration of skills? >>Absolutely. And I think this takes place, you know, not only in in the K 12 because somebody takes place in our community colleges and universities is that that connection with those employers is such a key component that if there's a way we could build in internships where experiences what we call on the job training programs apprenticeship training pre apprenticeship training programs into a design where those students at all levels are getting an exposure to the opportunities within the Space and Cybersecurity Avenue. I think that right there alone will start to solve a problem of having 37 plus 1000 openings at any one time in California. Also, I get that there's there's a burden on employers. Thio do that, and I think that's a piece that we have to acknowledge. And I think that's where education to play a larger role That's a place we had. Labor, Workforce, Development Agency, player role With our apprenticeship training programs are pre apprenticeship training programs. I could go on all day of all of our training programs that we have within the state of California. Many of the list of your partners on this endeavor are partners with Employment Training Panel, which I used to be the director of the Brown administration of um, That program alone does incumbent worker training on DSO. That also is an exposure place where ah worker, maybe, you know, you know, use the old adage of sweeping the floors one day and potentially, you know, running a large portion of the business, you know, within years. But it's that exposure that that employee gets through training programs on band. Acknowledging those skill sets and where their opportunities are, is what's valid and important. I think that's where our students we need to play a larger role in the K 12. That's a really thio Get that pushed out there. >>It's funny here in California you're the robotics clubs in high school or like a varsity sport. You're seeing kids exposed early on with programming. But you know, this whole topic of cybersecurity in space intersection around workforce and the gaps and skills is not just for the young. Certainly the young generations gotta be exposed to the what the careers could be and what the possible jobs and societal impact and contributions what they could be. But also it's people who are already out there. You know, you have retraining re Skilling is plays an important role. I know you guys do a lot of thinking on this is the under secretary. You have to look at this because you know you don't wanna have a label old and antiquated um systems. And then a lot of them are, and they're evolving and they're being modernized by digital transformation. So what does the role of retraining and skill development these programs play? Can you share what you guys are working on in your vision for that? >>Absolutely. That's a great question. And I think that is where we play a large role, obviously in California and with Kobe, 19 is we're faced with today that we've never seen before, at least in my 27 years of running program. Similar Thio, of course, in economic development, we're having such a large number of people displaced currently that it's unprecedented with unemployment rates to where we are. We're really looking at How do we take? And we're also going to see industries not return to the level for which they stood at one point in time. Uh, you know, entertainment industries, restaurants, all the alike, uh, really looking at how do we move people from those jobs that were middle skill jobs, topper skilled jobs? But the pay points maybe weren't great, potentially, and there's an opportunity for us to skill people into jobs that are there today. It may take training, obviously, but we have dollars to do that generally, especially within our K 12 and are que 14 systems and our universities. But we really wanna look at where those skill sets are are at currently. And we want to take people from that point in time where they said today, and try to give them that exposure to your point. Earlier question is, how do we get them exposed to a system for which there are job means that pay well with benefit packages with companies that care about their employees? Because that's what our goal is. >>You know. You know, I don't know if you have some visibility on this or ah opinion, but one observation that I've had and talking to whether it's a commercial or public sector is that with co vid uh, there have been a lot of awareness of the situation. We're adequately prepared. There's, um, readiness. But as everyone kind of deals with it, they're also starting to think about what to do. Post covert as we come out of it, Ah, growth strategy for a company or someone's career, um, people starting to have that on the top of their minds So I have to ask you, Is there anything that you see that they say? Okay, certain areas, maybe not doubling down on other areas. We're gonna double down on because we've seen some best practices on a trajectory of value for coming out of co vid with, you know, well, armed skills or certain things because you because that's what a lot of people are thinking right now. It's probably cyber is I mean, how many jobs are open? So you got well, that that's kind of maybe not something double down on here are areas we see that are working. Can you share your current visibility to that dynamic? >>Absolutely. Another great question. One of the key components that we look at Labor Workforce Development Agency. And so look at industries and growth modes and ones that are in decline boats. Now Kobe has changed that greatly. We were in a growth rate for last 78 years. We saw almost every industry might miss a few. You know that we're all in growth in one way or enough, obviously, that has changed. Our landscape is completely different than we saw 67 months ago. So today we're looking at cybersecurity, obviously with 30 plus 1000 jobs cos we're looking at Defense Department contractor is obviously with federal government contracts. We were looking at the supply chains within those we're looking at. Health care, which has always been one, obviously are large one of our large entities that has has grown over the years. But it's also changed with covered 19. We're looking at the way protective equipment is manufactured in the way that that will continue to grow over time. We're looking at the service industry. I mean, it will come back, but it won't come back the way we've seen it, probably in the past, but where the opportunities that we develop programs that we're making sure that the skill sets of those folks are transferrable to other industries with one of the issues that we face constant labor and were forced moment programs is understanding that over the period of time, especially in today's world again, with technology that people skill sets way, don't see is my Parents Day that you worked at a job for 45 years and you retired out of one job. Potentially, that is, that's been gone for 25 years, but now, at the pace for which we're seeing systems change. This is going to continue to amp up. I will stay youth of today. My 12 year old nephew is in the room next door to me on a classroom right now online. And so you know, there. It's a totally different atmosphere, and he's, you know, enjoying actually being in helping learning from on all online system. I would not have been able to learn that way, but I think we do see through the K Through 12 system where we're moving, um, people's interest will change, and I think that they will start to see things in a different way than we have in the past. They were forced systems. We are an old system been around since the thirties. Some even will say prior to the thirties came out of the Great Depression in some ways, and that system we have to change the way we develop our programs are should not be constant, and it should be an evolving system. >>It's interesting a lot of the conversation between the private and public partnerships and industry. You're seeing an agile mind set where it's a growth mindset. It's also reality based mindset and certainly space kind of forces. This conversation with cyber security of being faster, faster, more relevant, more modern. You mentioned some of those points, and with co vid impact the workforce development, it's certainly going to put a lot of pressure on faster learning. And then you mentioned online learning. This has become a big thing. It's not just putting education online per se. There's new touch points. You know you got APS, you got digital. This digital transformation is also accelerating. How do you guys view the workforce development? Because it's going to be open. It's gonna be evolving. There's new data coming in, and maybe kids don't want to stare at a video conference. Is there some game aspect to it? Is there how do you integrate thes new things that are coming really fast? And it's happening kind of in real time in front of our eyes. So I love to get your thoughts on how you guys see that, because it will certainly impact their ability to compete for jobs and or to itself learn. >>I think one of the key components of California's our innovation right and So I think one of the things that we pride ourselves in California is around that, um that said, that is the piece that I think the Silicon Valley and there's many areas in California that that have done the same, um, or trying to do the same, at least in their economy, is to build in innovation. And I think that's part of the K through 12 system with our with our our state universities and our UCS is to be able to bridge that. I think that you we see that within universities, um, that really instill an innovative approach to teaching but also instill innovation within their students. I'm not sure there yet with our fully with our K 12 system. And I think that's a place that either our community colleges could be a bridge, too, as well. Eso that's one component of workforce development I think that we look at as being a key. A key piece you brought up something that's really interesting to me is when you talk about agile on day, one of the things that even in state government on this, is gonna be shocking to you. But we have not been an agile system, Aziz. Well, I think one of the things that the Newsome administration Governor Newsom's administration has brought is. And when I talk about agile systems, I actually mean agile systems. We've gone from Kobol Systems, which are old and clunky, still operating. But at the same time, we're looking at upgrading all of our systems in a way that even our technology in the state of California should be matching the technology that our great state has within our our state. So, um, there in lies. It's also challenges of finding the qualified staff that we need in the state of California for all of our systems and servers and everything that we have. Um, currently. So you know, not only are we looking at external users, users of labor, workforce development, but we're looking at internal users that the way we redevelop our systems so that we are more agile in two different ways. >>You just got me. I triggered with COBOL. I programmed in the eighties with COBOL is only one credit lab in college. Never touched it again. Thank God. But this. But this >>is the >>benefit of cloud computing. I think this is at the heart, and this is the undertone of the conference and symposium is cloud computing. You can you can actually leverage existing resource is whether there legacy systems because they are running. They're doing a great job, and they do a certain work load extremely well. Doesn't make sense to replace what does a job, but you can integrate it in this. What cloud does this is Opening up? Can mawr more and more capabilities and workloads? This is kind of the space industry is pointing to when they say we need people that can code. And that could solve data problems. Not just a computer scientist, but a large range of people. Creative, um, data, science, everything. How does California's workforce solve the needs of America's space industry? This is because it's a space state. How do you see that? Let your workforce meeting those needs. >>Yeah, I think I think it's an investment. Obviously, it's an investment on our part. It's an investment with our college partners. It's an investment from our K 12 system to make sure that that we are allocating dollars in a way through meeting the demand of industry Onda, we do look at industry specific around there needs. Obviously, there's a large one. We wanna be very receptive and work with our employers and our employee groups to make sure that we need that demand. I think it's putting our money where our mouth is and and designing and working with employer groups to make sure that the training meets their needs. Um, it's also working with our employer groups to make sure that the employees are taken care of. That equity is built within the systems, Um, that we keep people employed in California on their able to afford a home, and they're able to afford a life here in California. But it's also again, and I brought up the innovation component. I think it's building an innovation within systems for which they are employers but are also our incoming employees are incumbent workers. And you brought this up earlier. People that already employed and people that are unemployed currently with the skill set that might match up, is how do we bridge those folks into employment that they maybe have not thought about. We have a whole career network of systems out throughout the city, California with the Americans job Centers of California on day will be working, and they already are working with a lot of dislocated workers on day. One of the key components of that is to really look at how do we, um, take what their current skills that might be and then expose them to a system for which we have 37 plus 1000 job openings to Andi? How do we actually get those books employed? It's paying for potentially through those that local Workforce Innovation Opportunity Act, funding for Americans job centers, um, to pay for some on the job, training it Z to be able to pay for work experiences. It's to be able to pay for internships for students, um, to get that opportunity with our employers and also partner with our employers that they're paying obviously a percentage of that, too. >>You know, one of the things I've observed over my, um, career 54 times around the sun is you know, in the old days when I was in college in school, you had career people have longer jobs, as you mentioned. Not like that anymore. But also I knew someone I'm gonna be in line to get that job, maybe nepotism or things of that nature. Now the jobs have no historical thing or someone worked longer in a job and has more seniority. Ah, >>lot of these >>jobs. Stewart don't HAVA requirements like no one's done them before. So the ability for someone who, um, is jumping in either from any college, there's no riel. It's all level set. It's like complete upside down script here. It's not like, Oh, I went to school. Therefore I get the job you could be Anyone could walk into these careers because the jobs air so new. So it's not where you came from or what school you went to or your nationality or gender. The jobs have been democratized. They're not discriminating against people with skills. So this opens up mawr. How >>do you >>see that? Because this really is an opportunity for this next generation to be more diverse and to be mawr contributed because diversity brings expertise and different perspectives. Your thoughts on that? >>Absolutely. And that was one of the things we welcome. Obviously we want to make sure that that everybody is treated equally and that the employers view everyone as employer employer of choice but an employee of choices. Well, we've also been looking at, as I mentioned before on the COVITZ situation, looking at ways that books that are maybe any stuck in jobs that are don't have a huge career pathway or they don't have a pathway out of poverty. I mean, we have a lot of working for people in the state of California, Um, that may now do to cope and lost their employment. Uh, this, you know, Let's let's turn back to the old, you know? Let's try, eliminate, eliminate, eliminate. How do we take those folks and get them employed into jobs that do have a good career pathway? And it's not about just who you knew or who you might have an in with to get that job. It is based on skills, I think, though that said there we need to have a better way to actually match those jobs up with those employers. And I think those are the long, ongoing conversations with those employer groups to make sure that one that they see those skill sets is valid and important. Um, they're helping design this crew sets with us, eh? So that they do match up and that were quickly matching up those close skills. That so that we're not training people for yesterday skills. >>I think the employer angles super important, but also the educators as well. One of the things that was asked in another question by the gas they they said. She said The real question to ask is, how early do you start exposing the next generation? You mentioned K through 12. Do you have any data or insight into or intuition or best practice of where that insertion point is without exposure? Point is, is that middle school is a elementary, obviously high school. Once you're in high school, you got your training. Wheels are off, you're off to the races. But is there a best practice? What's your thoughts? Stewart On exposure level to these kinds of new cyber and technical careers? >>Sure, absolutely. I I would say kindergarten. We San Bernardino has a program that they've been running for a little bit of time, and they're exposing students K through 12 but really starting in kindergarten. One is the exposure Thio. What a job Looks like Andi actually have. I've gone down to that local area and I've had three opportunity to see you know, second graders in a health care facility, Basically that they have on campus, built in on dear going from one workstation as a second grader, Uh, looking at what those skills would be and what that job would entail from a nurse to a Dr Teoh physician's assistant in really looking at what that is. Um you know, obviously they're not getting the training that the doctor gets, but they are getting the exposure of what that would be. Andi, I think that is amazing. And I think it's the right place to start. Um, it was really interesting because I left. This was pre covet, but I jumped on the plane to come back up north. I was thinking to myself, How do we get this to all school district in California, where we see that opportunity, um, to expose jobs and skill sets to kids throughout the system and develop the skill set so that they do understand that they have an opportunity. >>We're here at Cal Poly Space and Cybersecurity Symposium. We have educators. We have, um, students. We have industry and employers and government together. What's your advice to them all watching and listening about the future of work. Let's work force. What can people do? What do you think you're enabling? What can maybe the private sector help with And what are you trying to do? Can you share your thoughts on that? Because we have a range from the dorm room to the boardroom here at this event. Love to get your thoughts on the workforce development view of this. >>Yeah, absolutely. I think that's the mix. I mean, I think it's going to take industry to lead A in a lot of ways, in terms of understanding what their needs are and what their needs are today and what they will be tomorrow. I think it takes education, toe listen, and to understand and labor and workforce development also listen and understand what those needs will look like. And then how do we move systems? How do we move systems quickly? How do we move systems in a way that meets those needs? How do we, uh, put money into systems where the most need is, but also looking at trends? What is that trend going to look like in two years? What does that train gonna look like in five years. But that's again listening to those employers. Um, it's also the music community based organizations. I think, obviously some of our best students are also linked to CBS. And one way or another, it may be for services. It maybe for, uh, faith based. It may be anything, but I think we also need to bring in the CBS is Well, ah, lot of outreach goes through those systems in conjunction with, but I think that's the key component is to make sure that our employers are heard on. But they sit at the table like you said to the boardroom of understanding, and I think bringing students into that so that they get a true understanding of what that looks like a well, um, is a key piece of this. >>So one of the things I want to bring up with you is maybe a bit more about the research side of it. But, um, John Markoff, who was a former New York Times reporter with author of the book What the Dormouse, said It was a book about the counter culture of the sixties and the computer revolution, and really there was about how government defense spending drove the computer revolution that we now saw with Apple and PC, and then the rest is history in California has really participated. Stanford, uh, Berkeley and the University of California School system and all the education community colleges around it. That moment, the enablement. And now you're seeing space kind of bringing that that are a lot of research coming in and you eat a lot of billionaires putting money in. You got employers playing a role. You have this new focus space systems, cybersecurity, defending and making it open and and not congested and peaceful is going to enable quickly new inflection points for opportunities. E want to get your thoughts on that? Because California is participate in drove these revolutions that created massive value This next wave seems to be coming upon us. >>Yeah, absolutely. And again, Nazis covered again as too much of ah starting point to this. But I think that is also an opportunity to actually, because I think one of the things that we were seeing seven months ago was a skill shortage, and we still see the skills shortage, obviously. But I think a key piece to that is we saw people shortage. Not only was it skills shortage, but we didn't have enough people really to fill positions in addition to and I think that people also felt they were already paying the bills and they were making ends meet and they didn't have the opportunities. Thio get additional skills This again is where we're looking at. You know that our world has changed. It changed in the sixties based on what you're you're just expressing in terms of California leading the way. Let's like California lead the way again in developing a system from which labor, workforce development with our universities are, you know, are amazing universities and community college system and structure of how do we get students back into school? You know, a lot of graduates may already have a degree, but how do they now take a skill so that they already have and develop that further with the idea that they those jobs have changed? Whales have a lot of folks that don't have a degree, and that's okay. But how do we make that connection to a system that may have failed? Ah, lot of our people over the years, um, and our students who didn't make it through the school system. How do we develop in adult training school? How do we develop contract education through our community college system with our employer sets that we developed cohorts within those systems of of workers that have amazing talents and abilities to start to fill these needs? And I think that's the key components of hearing Agency, Labor, Workforce Development Agency. We work with our community. Colleges are UCS in our state universities t develop and figure that piece out, and I think it is our opportunity for the future. >>That's such a great point. I want to call that out This whole opportunity to retrain people that are out there because these air new jobs, I think that's a huge opportunity, and and I hope you keep building and investing in those programs. That's that's really worth calling out. Thank you for doing that. And, yeah, it's a great opportunity. Thes jobs they pay well to cyber security is a good job, and you don't really need to have that classical degree. You can learn pretty quickly if you're smart. So again, great call out there question for you on geography, Um, mentioned co vid we're talking about Covic. Virtualization were virtual with this conference. We couldn't be in person. People are learning virtually, but people are starting to relocate virtually. And so one observation that I have is the space state that California is there space clusters of areas where space people hang out or space spaces and whatnot. Then you got, like, the tech community cybersecurity market. You know, Silicon Valley is a talented in these hubs, and sometimes cyber is not always in the same hubs of space. Maybe Silicon Valley has some space here, Um, and some cyber. But that's not generally the case. This is an opportunity potentially to intersect. What's your thoughts on this? Because this is This is something that we're seeing where your space has historical, you know, geography ease. Now, with borderless communication, the work boat is not so much. You have to move the space area. You know what I'm saying? So okay. What's your thoughts on this? How do you guys look at this? Is on your radar On how you're viewing this this dynamic? >>It's absolute on our radar, Like you said, you know, here we are talking virtually on and, you know, 75% of all of our staff currently in some of our department that 80% of our staff are now virtual. Um you know, seven months ago, uh, we were not were government again being slow move, we quickly transitioned. Obviously, Thio being able to have a tele work capacity. We know employers move probably even quickly, more quickly than we did, but we see that as an opportunity for our rural areas. Are Central Valley are north state um, inland Empire that you're absolutely correct. I mean, if you didn't move to a city or to a location for which these jobs were really housed, um, you didn't have an opportunity like you do today. I think that's a piece that we really need to work with our education partners on of to be able to see how much this has changed. Labor agency absolutely recognizes this. We are investing funding in the Central Valley. We're investing funding in the North State and empire to really look a youth populations of how the new capacity that we have today is gonna be utilized for the future for employers. But we also have to engage our universities around. This is well, but mostly are employers. I know that they're already very well aware. I know that a lot of our large employers with, um, Silicon Valley have already done their doing almost 100% tele work policies. Um, but the affordability toe live in rural areas in California. Also, it enables us to have, ah, way thio make products more affordable is, well, potentially in the future. But we want to keep California businesses healthy and whole in California. Of course, on that's another way we can We can expand and keep California home to our 40 plus million people, >>most to a great, great work. And congratulations for doing such a great job. Keep it up. I gotta ask about the governor. I've been following his career since he's been office. A za political figure. Um, he's progressive. He's cutting edge. He likes toe rock the boat a little bit here and there, but he's also pragmatic. Um, you're starting to see government workers starting to get more of a tech vibe. Um um just curious from your perspective. How does the governor look at? I mean, the old, almost the old guard. But like you know, used to be. You become a lawyer, become a lawmaker Now a tech savvy lawmaker is a premium candidates, a premium person in government, you know, knowing what COBOL is. A start. I mean, these are the things. As we transform and evolve our society, we need thinkers who can figure out which side the streets, self driving cars go on. I mean, who does that? I mean, it's a whole another generation off thinking. How does the Governor how do you see this developing? Because this is the challenge for society. How does California lead? How do you guys talk about the leadership vision of Why California and how will you lead the future? >>Absolutely no governor that I'm aware of that I've been around for 26 27 years of workforce development has led with an innovation background, as this governor has a special around technology and the use of technology. Uh, you know, he's read a book about the use of technology when he was lieutenant governor, and I think it's really important for him that we, as his his staff are also on the leading edge of technology. I brought a badge. I'll systems. Earlier, when I was under the Brown administration, we had moved to where I was at a time employment training panel. We moved to an agile system and deported that one of the first within within the state to do that and coming off of an old legacy system that was an antique. Um, I will say it is challenging. It's challenging on a lot of levels. Mostly the skill sets that are folks have sometimes are not open to a new, agile system to an open source system is also an issue in government. But this governor, absolutely. I mean, he has established three Office of Digital Innovation, which is part of California and department technology, Um, in partnership with and that just shows how much he wants. Thio push our limits to make sure that we are meeting the needs of Californians. But it's also looking at, you know, Silicon Valley being at the heart of our state. How do we best utilize systems that already there? How do we better utilize the talent from those those folks is well, we don't always pay as well as they dio in the state. But we do have great benefit packages. Everybody does eso If anybody's looking for a job, we're always looking for technology. Folks is well on DSO I would say that this governor, absolute leads in terms of making sure that we will be on cutting edge of technology for the nation, >>you know, and, you know, talk about pay. I mean, I know it's expensive to live in some parts of California, but there's a huge young population that wants a mission driven job and serving, um, government for the governments. Awesome. Ah, final parting question for you, Stuart, is, as you look at, um, workforce. Ah, lot of people are passionate about this, and it's, you know, you you can't go anywhere without people saying, You know, we got to do education this way and that way there's an opinion everywhere you go. Cybersecurity is a little bit peaked and focused, but there are people who are paying attention to education. So I have to ask you, what creative ways can people get involved and contribute to workforce development? Whether it's stem underrepresented minorities, people are looking for new, innovative ways to contribute. What advice would you give these people who have the passion to contribute to the next cyber workforce. >>Yeah, I appreciate that question, because I think is one of the key components. But my secretary, Julie Sue, secretary of Labor and Workforce Development Agency, talks about often, and a couple of us always have these conversations around. One is getting people with that passion to work in government one or on. I brought it up community based organizations. I think I think so many times, um, that we didn't work with our CBS to the level of in government we should. This administration is very big on working with CBS and philanthropy groups to make sure that thing engagement those entities are at the highest level. So I would say, You know, students have opportunities. Thio also engage with local CBS and be that mission what their values really drives them towards Andi. That gives them a couple of things to do right. One is to look at what ways that we're helping society in one way or another through the organizations, but it also links them thio their own mission and how they could develop those skills around that. But I think the other piece to that is in a lot of these companies that you are working with and that we work with have their own foundations. So those foundations are amazing. We work with them now, especially in the new administration. More than we ever have, these foundations are really starting to help develop are strategies. My secretary works with a large number of foundations already. Andi, when we do is well in terms of strategy, really looking at, how do we develop young people's attitudes towards the future but also skills towards the future? >>Well, you got a pressure cooker of a job. I know how hard it is. I know you're working hard, appreciate you what you do and and we wish you the best of luck. Thank you for sharing this great insight on workforce development. And you guys working hard. Thank you for what you do. Appreciate it. >>Thank you so much. Thistle's >>three cube coverage and co production of the space and cybersecurity supposed in 2020 Cal Poly. I'm John for with silicon angle dot com and the Cube. Thanks for watching
SUMMARY :
We got a great guest here to talk about the addressing the cybersecurity workforce sure that we have the work force that is necessary for cybersecurity in space. the stage. leading the charge to make sure that we have equity in those jobs and that we are One of the exciting things about California is obviously look at Silicon Valley, Hewlett Packard in the garage, And as the workforce changes, I think that we will continue to lead the nation as we move forward. of life, but defending that and the skills are needed in cybersecurity to defend that. What can we do to highlight this career path? I know a lot of the work that you know, with this bow and other entities we're doing currently, I could be, you know, security clearance, possibly in in is such a key component that if there's a way we could build in internships where experiences I know you guys do a lot of thinking on this is the under secretary. And I think that is where we play a large role, obviously in California and with Kobe, but one observation that I've had and talking to whether it's a commercial or public sector is One of the key components that we look at Labor Workforce Development Agency. It's interesting a lot of the conversation between the private and public partnerships and industry. challenges of finding the qualified staff that we need in the state of California I programmed in the eighties with COBOL is only one credit lab in This is kind of the space industry is pointing to when they say we need people that can code. One of the key components of that is to really look at how do we, um, take what their current skills around the sun is you know, in the old days when I was in college in school, Therefore I get the job you could be Anyone could walk into Because this really is an opportunity for this next generation to be more diverse and And I think those are the long, ongoing conversations with those employer groups to make sure One of the things that was asked And I think it's the right place to start. What can maybe the private sector help with And what are you trying to do? I mean, I think it's going to take industry to lead So one of the things I want to bring up with you is maybe a bit more about the research side of it. But I think a key piece to that is we saw And so one observation that I have is the space state that California is there I think that's a piece that we really need to work with our education partners on of How does the Governor how do you see this developing? But it's also looking at, you know, You know, we got to do education this way and that way there's an opinion everywhere you go. But I think the other piece to that is in a lot of these companies that you are working with and that we work And you guys working hard. Thank you so much. I'm John for with silicon angle dot com and the Cube.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
John Markoff | PERSON | 0.99+ |
California | LOCATION | 0.99+ |
John | PERSON | 0.99+ |
Stuart | PERSON | 0.99+ |
CBS | ORGANIZATION | 0.99+ |
37 | QUANTITY | 0.99+ |
Amazon | ORGANIZATION | 0.99+ |
Cal Poly | ORGANIZATION | 0.99+ |
25 years | QUANTITY | 0.99+ |
Stewart Knox | PERSON | 0.99+ |
45 years | QUANTITY | 0.99+ |
Hewlett Packard | ORGANIZATION | 0.99+ |
Julie Sue | PERSON | 0.99+ |
University of California School | ORGANIZATION | 0.99+ |
six year | QUANTITY | 0.99+ |
27 years | QUANTITY | 0.99+ |
five year | QUANTITY | 0.99+ |
Stanford | ORGANIZATION | 0.99+ |
Stewart | PERSON | 0.99+ |
four year | QUANTITY | 0.99+ |
two year | QUANTITY | 0.99+ |
Tomorrow | DATE | 0.99+ |
75% | QUANTITY | 0.99+ |
over $160 billion | QUANTITY | 0.99+ |
12 | QUANTITY | 0.99+ |
Central Valley | LOCATION | 0.99+ |
Apple | ORGANIZATION | 0.99+ |
Santa California | LOCATION | 0.99+ |
Silicon Valley | LOCATION | 0.99+ |
80% | QUANTITY | 0.99+ |
Palo Alto, California | LOCATION | 0.99+ |
California Workforce Development Agency | ORGANIZATION | 0.99+ |
What the Dormouse | TITLE | 0.99+ |
tomorrow | DATE | 0.99+ |
today | DATE | 0.99+ |
five years | QUANTITY | 0.99+ |
54 times | QUANTITY | 0.99+ |
first | QUANTITY | 0.99+ |
Aziz | PERSON | 0.99+ |
seven months ago | DATE | 0.99+ |
Teoh | PERSON | 0.99+ |
one | QUANTITY | 0.99+ |
one job | QUANTITY | 0.99+ |
40 plus million people | QUANTITY | 0.99+ |
Kobol Systems | ORGANIZATION | 0.99+ |
Governor | PERSON | 0.99+ |
Thio | PERSON | 0.98+ |
over 37,000 vacancies | QUANTITY | 0.98+ |
Lauren | PERSON | 0.98+ |
Office of Digital Innovation | ORGANIZATION | 0.98+ |
One | QUANTITY | 0.98+ |
Labor Workforce Development Agency | ORGANIZATION | 0.98+ |
26 27 years | QUANTITY | 0.98+ |
Stewart Knox V1
>> Announcer: From around the globe, it's theCUBE! Covering Space and Cybersecurity Symposium 2020. Hosted by Cal Poly. >> Hello everyone. Welcome to the Space and Cybersecurity Symposium 2020, put on by Cal Poly and hosted with SiliconANGLE theCUBE here in Palo Alto, California for a virtual conference. Couldn't happen in person this year, I'm John Furrier, your host. The intersection of space and cybersecurity, obviously critical topics, great conversations. We've got a great guest here to talk about the addressing the cybersecurity workforce gap. And we have a great guest, and a feature speaker, Stewart Knox, the undersecretary with California's Labor and Workforce Development Office. Stewart, thanks for joining us today. >> Thank you so much, John. I appreciate your time today and listening to a little bit of our quandaries with making sure that we have the security that's necessary for the state of California and making sure that we have the workforce that is necessary for cybersecurity in space. >> Great. I'd love to get started. I've got a couple of questions for you, but first take a few minutes for an opening statement to set the stage. >> Sure, realizing that in California, we lead the nation in much of cybersecurity based on Department of Defense contractors within the state of California, leading the nation with over 160 billion dollars within the industry just here in California alone and having over 800,000 plus workers full time employment in the state of California is paramount for us to make sure that we face defense manufacturers, approximately 700,000 jobs that are necessary to be filled. There's over 37,000 vacancies that we know of in California, just alone in cybersecurity. And so we look forward to making sure that California Workforce Development Agency is leading the charge to make sure that we have equity in those jobs and that we are also leading in a way that brings good jobs to California and to the people of California, a good education system that is developed in a way that those skills are necessarily met for the employers here in California, and the nation. >> One of the exciting things about California is obviously look at Silicon Valley, Hewlett Packard and the garage story, history, space, it's been a space state, many people recognize California. You mentioned defense contractors. It's well rooted with history, just breakthroughs, bases, technology companies in California. And now you've got technology. This is the cybersecurity angle. Take a minute to give some more commentary to that because that's really notable, and as the workforce changes, these two worlds are coming together and sometimes they're in the same place, sometimes they're not. This is super exciting and a new dynamic that's driving opportunities. Could you share some color commentary on that dynamic? >> Absolutely. And you're so correct. I think in California, we lead the nation in the way that we develop programs, that our companies lead in the nation in so many ways around cyberspace, cybersecurity in so many different areas, for which in the Silicon Valley is just such a leader and those companies are good, qualified companies to do so. Obviously one of the places we play a role is to make sure that those companies have a skilled workforce. And also that the security of those systems are in place for our defense contractors and for the feeder companies, those outlying entities that are providing such key resources to those companies are also leading on a cutting edge for the future. Also again, realizing that we need to expand our training and skills to make sure that those California companies continue to lead, is just such a great initiative. And I think through apprenticeship training programs, and looking at our community college systems, I think that we will continue to lead the nation as we move forward. >> You know, we've had many conversations here in this symposium virtually, certainly around the everyday life of a consumer is impacted by space. You know, we get our car service, Uber, Lyft, we have maps, we have all this technology that was born out of defense contracts and R and D that really changed generations and created a lot of great societal value. Okay, now with space kind of going to the next generation, it's easier to get stuff into space. The security of the systems is now going to be not only paramount for quality of life, but defending that, and the skills are needed in cybersecurity to defend that. And the gap is there. What can we do to highlight the opportunities for career paths? It used to be the day where you get a mechanical engineering degree or aerospace and you graduate and you go get a job, not anymore. There's a variety of paths, career-wise. What can we do to highlight this career path? >> Absolutely correct. And I think it starts, you know, K through 12 system. And I know a lot of the work that (indistinct) and other entities are doing currently. This is where we need to bring our youth into an age where they're teaching us, right, as we become older, on the uses of technology, but it's also teaching where the levels of those education can take them, K through 12, but it's also looking at how the community college system links to that. And then the university system links above and beyond, but it's also engaging our employers. You know, one of the key components, obviously as the employers play a role, for which we can start to develop strategies that best meet their needs quickly. I think that's one of the comments we hear the most, at Labor Agency is how we don't provide a change as fast as we should, especially in technology. You know, we buy computers today and they're outdated tomorrow. It's the same with the technology that's in those computers is that those students are going to be the leaders within that to really develop how those structures are in place. So K through 12 is probably our primary place to start, but also continuing that past the K-12 system. And I bring up the employers and I bring them up in a way, because many times when we've had conversations with employers around what their skills needs were and how do we develop those better? One of the pieces of that, that I think really should be recognized, many times they recognize that they wanted a four year degree, potentially, or a five year or six year degree. But then when we really looked at the skillsets, someone coming out of the community college system could meet those skillsets. And I think we need to have those conversations to make sure, not that they shouldn't be continuing their education. They absolutely should. But how do we get those skillsets built into this into a K-12 plus the two year plus the four year person? >> Yeah, I love the democratization of these new skills, because again, there's no pattern matching 'cause they weren't around before, right? So you got to look at the exposure, to your point, K through 12 exposure, but then there's an exploration piece of it, whether it's community college or whatever progression, and sometimes it's nonlinear, right? I mean, people are learning different ways, combining the exposure and the exploration. That's a big topic. Can you share your view on this? Because this now opens up more doors for people, choice, you got new avenues, you got online, I can get a cloud computing degree now from Amazon and walk in and help. I can be, you know, security clearance possibly in college. So, you know, you get exposure. Is there certain things you see, is it early on? Middle school? And then obviously the exploration, those are two important concepts. Can you unpack that a little bit, exposure and exploration of skills? >> Absolutely, and I think this takes place not only in the K-12 system, but it takes place in our community colleges and our four year universities is that, that connection with those employers is such a key component, that if there's a way we could build in internships, work experiences, what we call on the job training programs, apprenticeship training, pre-apprenticeship training programs, into a design where those students at all levels are getting an exposure to the opportunities within the space and cybersecurity avenue. I think that right there alone will start to solve a problem of having 37 plus thousand openings at any one time in California. Also, I get that there's a burden on employers to do that. And I think that's a piece that we have to acknowledge, and I think that's where education can play a larger role. That's a place we at Labor Workforce Development Agency play a role with our apprenticeship training programs, our pre-apprenticeship training programs. I could go on all day of all of our training programs that we have within the state of California. Many of the list of your partners on this endeavor are partners with Employment Training Panel, which I used to be the director of the Brown administration of. That program alone does incumbent worker training. And so that also is an exposure place where a worker may be, you know, I use the old adage of sweeping the floors one day and potentially writing a large portion of the business, within years. But it's that exposure that that employee gets through training programs, and acknowledging those skill sets and where their opportunities are, is what's valid and important. I think that's where our students, we need to play a larger role than the K-12 system, really, to get that pushed out there. >> It's funny, here in California, you were the robotics clubs in high school are like a varsity sport, you're seeing kids exposed early on with programming, but it's, you know, this whole topic of cybersecurity and space intersection around workforce, and the gaps in the skills, it's not just for the young, certainly the young generation's got to be exposed to what the careers could be and what the possible jobs and societal impact and contributions, what they could be, but also it's people who are already out there. You know, you have retraining, re-skilling, this plays an important role. I know you guys do a lot of thinking on this as the undersecretary, you have to look at this because you know, you don't want to have a label "old and antiquated" systems. And a lot of them are, and they're evolving and they're being modernized by digital transformation. So what does the role of retraining and skill development for these programs play? Can you share what you guys are working on and your vision for that? >> Absolutely. That's a great question. 'Cause I think that is where we play a large role, obviously in California and with COVID-19 is we are faced with today that we've never seen before. At least in my 27 years of running programs, similar to all workforce and economic development, we are having such a large number of people displaced currently that it's unprecedented, we've got employment rates to where we are. We're really looking at how do we take, and we're also going to see industries not return to the level for which they stood at one point in time, you know, entertainment industries, restaurants, all of the alike, really looking at how do we move people from those jobs that were middle skill jobs to upper skill jobs, but the pay points maybe weren't great, potentially. And there's an opportunity for us to skill people into jobs that are there today. It may take training, obviously, but we have dollars to do that, generally, especially within our K-12 and our K-14 systems and our universities. But we really want to look at where those skillsets are at, currently. And we want to take people from that point in time where they sit today, and try to give them that exposure to your point earlier question is how do we get them exposed to a system for which there are job with means that pay well, with benefit packages, with companies that care about their employees. 'Cause that's what our goal is. >> You know, I don't know if you have some visibility on this or an opinion, but one of the observations that I've had and talk to whether it's a commercial or public sector, is that with COVID, there's been a lot of awareness of the situation. We're adequately prepared. There's some readiness, but as everyone kind of deals with it, they're also starting to think about what to do post-COVID as we come out of it, a growth strategy for a company or someone's career. People are starting to have that on the top of their minds. So I have to ask you, is there anything that you see that they say, "Okay, certain areas, maybe not doubling down on other areas, we're going to double down on because we've seen some best practices on a trajectory of value for coming out of COVID with, you know, well-armed skills or certain things." 'Cause that's what a lot of people are thinking right now. And certainly cyber is, I mean, how many jobs are open? So you got "Well that that's kind of maybe not something to double down on, here are areas we see that are working." Can you share your current visibility into that dynamic? >> Absolutely. Another great question. One of the key components that we look at at Labor Workforce Development Agency is to look at the industries in growth modes and ones that are in decline modes. Now COVID has changed that greatly. We were in a growth mode for the last seven, eight years. We saw almost every industry, minus a few, that were all in growth in one way or another, but obviously that has changed. Our landscape is completely different than we saw six, seven months ago. So today we're looking at cybersecurity, obviously with 30 plus thousand job openings, we are looking at Defense Department contractors, obviously, with federal government contracts. We are looking at the supply chains within those. We are looking at healthcare, which has always been one of obviously our large, one of our large entities that has grown over the years. But it's also changed with COVID-19. We're looking at the way protective equipment is manufactured and the way that that will continue to grow over time, we're looking at the service industry. I mean, it will come back, but it won't come back the way we've seen it probably in the past, but where are the opportunities that we develop programs that we are making sure that the skill sets of those folks are transferable to other industries. We have one of the issues that we face constantly in Labor and Workforce Development programs is understanding that over the period of time, especially in today's world, again, with technology, that people's skillsets, we don't see as in my parents' day that you worked at a job for 45 years and you retired at one job potentially. That's been gone for 25 years, but now at the pace for which we are seeing systems change, this is going to continue to amp up, and I will say, youth of today, my 12 year old nephew is in the room next door to me, in a classroom right now online. And so, you know, it's a totally different atmosphere and he's enjoying actually being at home and learning from an all online system. I would not have been able to learn that way, but I think we do see through the K through 12 system, the way we're moving, people's interests will change. And I think that they will start to see things in a different way than we have in the past. They were forced systems. We are an old system, been around since the 30s. Some even we'll say prior to the 30s, came out of the Great Depression in some ways. And that system, we have to change the way we develop our programs. It should not be constant and it should be an evolving system. >> It's interesting. A lot of the conversations between the private and public partnerships and industry, you're seeing an agile mindset where it's a growth mindset, it's also a reality-based mindset and certainly space kind of forces this conversation with cybersecurity of being faster, faster, more relevant, more modern. And you mentioned some of those points, and with COVID impact, the workforce development is certainly going to put a lot of pressure on faster learning. And then you mentioned online learning. This has become a big thing. It's not just putting education online per se. There's new touchpoints. You know, you've got apps, you've got digital. This digital transformation is also accelerating. How do you guys view the workforce development? Because it's going to be open. It's going to be evolving. There's new data coming in and maybe kids don't want to stare at a video conference. Is there some game aspect to it? Is there, how do you integrate these new things that are coming really fast, and it's happening kind of in real time in front of our eyes. So I'd love to get your thoughts on how you guys see that because it'll certainly impact their ability to compete for jobs and/or to self-learn. >> Well, I think one of the key components of California is our innovation, right? And so I think one of the things that we pride ourselves in California is around that. That said, that is the piece that I think the Silicon Valley, and then there's many areas in California that have done the same, or tried to do the same, at least in their economy is to build in innovation. And I think that's part of the K through 12 system, with our state universities and our UCs is to be able to bridge that. I think that you, we see that within universities that really instill an innovative approach to teaching, but also instill innovation within their students. I'm not sure we're there yet fully, with our K-12 system, and I think that's a place that either our community colleges could be a bridge to as well. So that's one component of workforce development I think that we look at as being a key piece. You brought up something that's really interesting to me is when you talk about agile, and one of the things that even in state government, this is going to be shocking to you, but we have not been an agile system as well. I think one of the things that the Newsom administration, Governor Newsom's administration has brought is, and when I talk about agile systems, I actually mean agile systems. We've gone from COBOL systems, which are old and clunky, still operating, but at the same time, we're looking at upgrading all of our systems in a way that even in our technology, in the state of California should be matching, the technology that our great state has within our state. So therein lies, it's also challenges of finding the qualified staff that we need in the state of California for all of our systems and servers and everything that we have currently. So, you know, not only are we looking at external users of labor workforce development, but we're looking at internal users, that the way we redevelop our systems so that we are more agile in two different ways. >> You just got me triggered with COBOL. I programmed in the 80s with COBOL, only one credit lab in college. Never touched it again, thank God. But this is the benefit of cloud computing. I think this is at the heart and this is the undertone of the conference and symposium is cloud computing, you can actually leverage existing resources, whether they're legacy systems, because they are running, they're doing a great job and they do a certain workload extremely well. Doesn't make sense to replace if it does a job. You can integrate it and that's what cloud does. This is opening up more and more capabilities and workloads. This is kind of what the space industry is pointing to when they say "We need people that can code and that can solve data problems," not just the computer scientists, but a large range of people, creative, data, science, everything. How does California's workforce solve the needs of America's space industry? This is because it's a space state. How do you see the labor workforce meeting those needs? >> Yeah, I think it's an investment. Obviously it's an investment on our part. It's an investment with our college partners. It's an investment from our K-12 system to make sure that we are allocating dollars in a way through meeting the demand of industry. And we do look at industry-specific around their needs, obviously this is a large one. We want to be very receptive, and work with our employers and our employee groups to make sure that we meet that demand. I think it's putting our money where our mouth is and designing and working with employer groups to make sure that the training meets their needs. It's also working with our employer groups to make sure that the employees are taken care of and that equity is built within the systems, that we keep people employed in California, and they're able to afford a home and they're able to afford a life here in California, but it's also again and I brought up the innovation component. I think it's building an innovation within systems for which they are employers, but are also our incoming employees and our incumbent workers. And you brought those up earlier, people that are already employed and people that are unemployed currently with a skill set that might match up is how do we bridge those folks into employment that they maybe have not thought about? We have a whole career network of systems out throughout The City of California with the America's Job Centers of California, and they will be working, and they already are working with a lot of dislocated workers. And one of the key components of that is to really look at how do we take what their current skillset might be, and then expose them to a system for which we have 37 plus thousand job openings, too, and how do we actually get those folks employed? It's paid for potentially through that local Workforce Innovation and Opportunity Act funding through our America's Job Centers, to pay for some on the job training. It's to be able to pay for work experiences, it's to be able to pay for internships for students to get that opportunity with our employers and also partnering with our employers that they're paying, obviously a percentage of that too. >> You know, one of the things I've observed over my career, 54 times around the sun is, you know, in the old days, when I was in college and school, you had career, people had the longer jobs, as you mentioned it's not like that anymore. But also I knew someone I'm going to to be in line to get that job, maybe nepotism or things of that nature. Now the jobs have no historical thing or someone worked longer in a job and has more seniority. A lot of these jobs, Stewart, don't have requirements, like no one's done them before. So the ability for someone who is jumping in, either from any college, there's no real, it's all level set, it's a complete upside down script here. It's not like, "Oh, I went to school, therefore I get the job." It can be, anyone can walk into these careers because the jobs are so new. So it's not where you came from or what school you went to or your nationality or gender. The jobs have been democratized. They're not discriminating against people with skills. This opens up more. How do you see that? Because this really is an opportunity for this next generation to be more diverse and to be more contributive because diversity brings expertise and different perspectives. Your thoughts on that. >> Absolutely, and that was one of the things we welcome, obviously. We want to make sure that that everybody is treated equally and that the employers view everyone as an employer of choice, but an employee of choice as well. We've also been looking at, as I mentioned before on the COVID situation, looking at ways that folks that are maybe stuck in jobs that don't have a huge career pathway, or they don't have a pathway out of poverty. I mean, we have a lot of working poor people in the state of California that may now due to COVID lost their employment. This, you know, let's turn back to the old adage, let's turn lemons into lemonade. How do we take those folks and get them employed into jobs that do have a good career pathway? And it's not about just who you knew, or who you might have an in with to get that job. It is based on skills. I think though, that said, we need to have a better way to actually match those jobs up with those employers. And I think those are the ongoing conversations with those employer groups to make sure that, one, that they see those skill sets as valid and important. They're helping design those career sets with us so that they do match up and that we're quickly matching up those close skillsets so that we're not training people for yesterday's skills. >> I think the employer angle's super important, but also the educators as well. One of the things that was asked in another question by the guest, they said, she said, the real question to ask is, how early do you start exposing the next generation? You mentioned K through 12, do you have any data or insight into or intuition or best practice of where that insertion point is, that exposure point? Is it middle school? Is it elementary, honestly, high school, once you're in high school, you got your training wheels are off, you're off to the races, but is there a best practice? What's your thoughts, Stewart, on exposure level to these kinds of new cyber and technical careers? >> Sure, absolutely. I would say kindergarten. We, San Bernardino has a program that they've been running for a little bit of time, and they're exposing students K through 12, but really starting in kindergarten. One is the exposure to what a job looks like. And then actually I've gone down to that local area and I've had the opportunity to see, you know, second graders in a healthcare facility, basically, that they have on campus built-in. And they're going from one workstation as a second grader, looking at what those skills would be and what that job would entail from a nurse to a doctor, to a physician's assistant, and really looking at what that is. You know, obviously they're not getting the training that a doctor gets, but they are getting the exposure of what that would be. And I think that is amazing. And I think it's the right place to start. It was really interesting 'cause as I left, this was pre-COVID, but as I jumped on the plane to come back up north, I was thinking to myself, "How do we get this to all school districts in California where we see that opportunity to expose jobs and skill sets to kids throughout the system and develop those skill sets so that they do understand that they have an opportunity?" >> We are here at Cal Poly Space and Cybersecurity Symposium. We have educators, we have students, we have industry and employers and government together. What's your advice to them all watching and listening about the future of work, this workforce, what can people do? What do you think you're enabling? What can maybe the private sector help with and what are you trying to do? Can you share your thoughts on that? Because we have a range from the dorm room to the boardroom here at this event. I'd love to get your thoughts on the workforce development view of this. >> Yeah, absolutely. And I think that's the mix. I mean, I think it's going to take industry to lead, in a lot of ways in terms of understanding what their needs are and what their needs are today and what they will be tomorrow. I think it takes education to listen, and to understand, and labor and workforce development to also listen and understand what those needs will look like. And then how do we move systems? How do we move systems quickly? How do we move systems in a way that meets those needs? How do we put money into systems where the most need is, but also looking at trends? What is that trend going to look like in two years? What is that trend going to look like in five years, (indistinct), again, listening to those employers, it's also listening to the community-based organizations. I think obviously some of our best students are also linked to CBOs in one way or another. It may be for services, it may be for faith-based, it may be anything, but I think we also need to bring in the CBOs as well. A lot of outreach goes through those systems in conjunction with, but I think that's the key component is to make sure that our employers are heard and that they sit at the table, like you said, to the boardroom of understanding, and I think bringing students into that so that they get a true understanding of what that looks like as well, is a key piece of this. >> Stu, one of the things I want to bring up with you is maybe a little bit more about the research side of it, but John Markoff, who was a former New York times reporter, but author of the book, "What the Dormouse Said," it was a book about the counterculture of the 60s and the computer revolution. And really it was about how government defense spending drove the computer revolution that we now saw with Apple and PC. And then the rest is history in California, has really participated, Stanford, the Berkeley, and the University of California school system, and all the education community colleges around it. That moment, the enablement, and now you're seeing space kind of bringing that, a lot of research coming in, need a lot of billionaires putting money in, you've got employers playing a role. You have this new focus, space systems, cybersecurity defending and making it open and, not congested and peaceful, is going to enable quickly, new inflection points for opportunities. I want to get your thoughts on that because California's participated and drove those revolutions, that's created massive value. This next wave seems to be coming upon us. >> Yeah, absolutely. And again, not to use COVID again as too much of a starting point to this, but I think that is also an opportunity to actually, 'cause I think one of the things that we were seeing seven months ago was a skill shortage, and we still see the skill shortage, obviously. But I think a key piece to that is we saw a people shortage. Not only was it skill shortage, but we didn't have enough people really to fill positions in addition, too, and I think that people also felt they were already paying the bills and they were making ends meet and they didn't have the opportunities to get additional skills. This again is where we're looking at, you know, our world has changed. It changed in the 60s based on what you're just expressing in terms of California leading the way. Let's let California lead the way again in developing a system for which labor workforce development with our universities, our amazing universities and community college system structure, of how do we get students back into school? You know, a lot of graduates may already have a degree, but how do they now take a skill set that they already have and develop that further with the idea that those jobs have changed? We also have a lot of folks that don't have a degree, and that's okay, but how do we make that connection to a system that may have failed a lot of our people over the years, and our students who didn't make it through the school system, how do we develop an adult training school? How do we develop contract education through our community college system with our employer sets, that we develop cohorts within the systems of workers that have amazing talents and abilities to start to fill these needs. And I think that's the key components that here at Labor Workforce Development Agency, we work with our community colleges, our UCs and our state universities to develop and figure that piece out. And I think it is our opportunity for the future. >> That's such a great point. I want to call that out, this whole opportunity to retrain people that are out there because these are new jobs. I think that's a huge opportunity and, I hope you keep building and investing in those programs. That's really worth calling out. Thank you for doing that. And yeah, it's a great opportunity to gain these jobs. They pay well, too, cybersecurity's a good job and you don't really need to have that classical degree. You can learn pretty quickly if you're smart. So again, great call out there. A question for you on geography. You mentioned COVID, we're talking about COVID, virtualization, we're virtual with this conference. We couldn't be in person. People are learning virtually, but people are starting to relocate virtually. And so one observation that I have is the space state that California is, there's space clusters of areas where space people hang out, or space spaces and whatnot. Then you got like the tech community, the cybersecurity market, you know, Silicon Valley, you know, the talent is in these hubs. And sometimes cyber's not always in the same hubs as space. Maybe Silicon Valley has some space here, and some cyber, but that's not generally the case. This is an opportunity potentially to intersect. What's your thoughts on this? Because this is something that we're seeing, where space has historical, you know, geographies. Now with borderless communication, the work mode is not so much "You have to move to this space area." You know what I'm saying? So what's your thoughts on this? How do you guys look at, this is on your radar, and how you're viewing this dynamic. >> It's absolutely on our radar. Like you said, you know, here we are, talking virtually, and you know, 75% of all of our staff currently, in some of our departments, it's 80% of our staff, are now virtual. Seven months ago, we were not. Government, again, being slow move, we quickly transitioned, obviously, to being able to have a telework capacity. We know employers moved probably even more quickly than we did, but we see that as an opportunity for our rural areas, our Central Valley, our Northstate, Inland Empire. That you're absolutely correct. I mean, if you didn't move to a city or to a location for which these jobs were really housed, you didn't have an opportunity like you do today. I think that's a piece that we really need to work with our education partners on, to be able to see how much this has changed. Labor Agency absolutely recognizes this. We are investing funding in the Central Valley. We're investing funding in the Northstate and Inland Empire to really look at youth populations, of how the new capacity that we have today is going to be utilized for the future for employers. But we also have to engage our universities around this as well, but mostly our employers. I know that they're already very well aware. I know that a lot of our large employers within Silicon Valley have already done it. They're doing almost 100% telework policies, but the affordability to live in rural areas in California, also enables us to have a way to make products more affordable as well, potentially in the future. But we want to keep California businesses healthy and whole in California, of course. And that's another way we can expand and keep California home to our 40 plus million people. >> Well Stewart, great work and congratulations for doing such a great job. Keep it up. I got to ask you about the governor. I've been following his career since he's been in office as a political figure. He's progressive, he's cutting edge. He likes to rock the boat a little bit here and there, but he's also pragmatic. You're starting to see government workers starting to get more of a tech vibe. Just curious from your perspective, how does the governor look at, I mean, the old, I won't say "old guard," but like, you know, it used to be, you become a lawyer, you become a lawmaker. Now a tech savvy lawmaker is a premium candidate, is a premium person in government. Knowing what COBOL is, is a start. I mean, these are the things that as we transform and evolve our society, we need thinkers who can figure out which side of the streets self driving cars go on. I mean, who does that? It's a whole nother generation of thinking. How does the governor, how do you see this developing? Because this is the challenge for society. How does California lead? How do you guys talk about the leadership vision of why California and how will you lead the future? >> Absolutely. No governor that I'm aware of, and I've been around for 26, 27 years of workforce development, has led with an innovation background as this governor has, especially around technology and the use of technology. You know, he's wrote a book about the use of technology when he was lieutenant governor. And I think it's really important for him that we, as his staff are also on the leading edge of technology. I brought up agile systems earlier. When I was under the Brown administration, we had moved to where I was at the time, Employment Training Panel, we moved to an agile system and deployed that. One of the first within the state to do that and coming off of an old legacy system that was an antique. I will say it is challenging. It's challenging on a lot of levels. Mostly the skill sets that our folks have, sometimes are not open to a new agile system, to an open source system is also an issue in government. But this governor absolutely, I mean, he has established the Office of Digital Innovation, which is part of California Department of Technology, in partnership with, and that just shows how much he wants to push our limits to make sure that we are meeting the needs of Californians. But it's also looking at, you know, Silicon Valley being at the heart of our state, how do we best utilize systems that are already there? How do we better utilize the talent from those folks as well? We don't always pay as well as they do in the state, but we do have great benefit packages, everybody knows. So if anybody's looking for a job, we're always looking for technology folks as well. And so I would say that this governor absolutely leads in terms of making sure that we will be on cutting edge technology for the nation. >> And, you know, talk about pay, I mean, I know it's expensive to live in some parts of California, but there's a huge young population that wants a mission-driven job, and serving the government for the government, it's awesome. A final parting question for you, Stewart, is as you look at the workforce, a lot of people are passionate about this and it's, you know, you can't go anywhere without people saying, you know, "We've got to do education this way, and that way," there's an opinion everywhere you go. Cybersecurity, obviously a little bit peaked and focused, but there are people who are paying attention to education. So I have to ask you what creative ways can people get involved and contribute to workforce development, whether it's STEM, underrepresented minorities, people are looking for new, innovative ways to contribute. What advice would you give these people who have the passion to contribute to the next cyber workforce? >> Yeah, I appreciate that question because I think it's one of the key components that my secretary, Julie Su, secretary of Labor and Workforce Development Agency, talks about often. And a couple of us always have these conversations around one is getting people with that passion to work in government, one, or, and I brought it up community-based organizations. I think so many times that we didn't work with our CBOs to the level that in government, we should, this administration is very big on working with CBOs and philanthropy groups to make sure that the engagement of those entities are at the highest level. So I would say, students have opportunities to also engage with local CBOs and be that mission, what their values really drives them towards. And that gives them a couple of things to do, right? One is to look at ways that we're helping society in one way or another through those organizations, but it also links them to their own mission and how they can develop those skills around that. But I think the other piece to that is in a lot of these companies that you are working with and that we work with, have their own foundations. So those foundations are amazing. We work with them now, especially in the Newsom administration, more than we ever have. These foundations are really starting to help develop our strategies. My secretary works with a large number of foundations already, and we do as well in terms of strategy, really looking at how do we develop young people's attitudes towards the future, but also skills towards the future? >> Well, you got a pressure cooker of a job. I know how hard it is. I know you're working hard and appreciate what you do. And, and we wish you the best of luck, thank you for sharing this great insight on workforce development. And you guys are working hard. Thank you for what you do. Appreciate it. >> Great. Thank you so much. I appreciate it. >> This is theCUBE coverage and co-production of the Space and Cybersecurity Symposium 2020 with Cal Poly. I'm John Furrier with siliconangle.com and theCUBE. Thanks for watching. (calm music)
SUMMARY :
the globe, it's theCUBE! the undersecretary with California's and making sure that we have the workforce for an opening statement to set the stage. is leading the charge to and as the workforce changes, And also that the and the skills are needed in And I know a lot of the work that and the exploration. Many of the list of your and the gaps in the skills, all of the alike, really looking at that on the top of their minds. One of the key components that we look at A lot of the conversations that the way we redevelop our systems I programmed in the 80s with COBOL, is to really look at how do we take and to be more contributive that may now due to COVID the real question to ask is, One is the exposure to and what are you trying to do? and that they sit at the table, and the University of But I think a key piece to that but that's not generally the case. of how the new capacity that we have today I got to ask to make sure that we are meeting and serving the government for and that we work with, And, and we wish you the best of luck, Thank you so much. of the Space and Cybersecurity
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
John Markoff | PERSON | 0.99+ |
California | LOCATION | 0.99+ |
Stewart | PERSON | 0.99+ |
Julie Su | PERSON | 0.99+ |
Stanford | ORGANIZATION | 0.99+ |
John | PERSON | 0.99+ |
John Furrier | PERSON | 0.99+ |
Cal Poly | ORGANIZATION | 0.99+ |
80% | QUANTITY | 0.99+ |
Stewart Knox | PERSON | 0.99+ |
25 years | QUANTITY | 0.99+ |
Amazon | ORGANIZATION | 0.99+ |
Silicon Valley | LOCATION | 0.99+ |
Uber | ORGANIZATION | 0.99+ |
45 years | QUANTITY | 0.99+ |
University of California | ORGANIZATION | 0.99+ |
27 years | QUANTITY | 0.99+ |
six year | QUANTITY | 0.99+ |
What the Dormouse Said | TITLE | 0.99+ |
Hewlett Packard | ORGANIZATION | 0.99+ |
Apple | ORGANIZATION | 0.99+ |
four year | QUANTITY | 0.99+ |
five year | QUANTITY | 0.99+ |
Office of Digital Innovation | ORGANIZATION | 0.99+ |
75% | QUANTITY | 0.99+ |
two year | QUANTITY | 0.99+ |
Workforce Innovation and Opportunity Act | TITLE | 0.99+ |
tomorrow | DATE | 0.99+ |
California Department of Technology | ORGANIZATION | 0.99+ |
Palo Alto, California | LOCATION | 0.99+ |
54 times | QUANTITY | 0.99+ |
Lyft | ORGANIZATION | 0.99+ |
California Workforce Development Agency | ORGANIZATION | 0.99+ |
Seven months ago | DATE | 0.99+ |
Newsom | ORGANIZATION | 0.99+ |
over 160 billion dollars | QUANTITY | 0.99+ |
approximately 700,000 jobs | QUANTITY | 0.99+ |
Central Valley | LOCATION | 0.99+ |
one | QUANTITY | 0.99+ |
today | DATE | 0.99+ |
COVID-19 | OTHER | 0.99+ |
One | QUANTITY | 0.99+ |
Labor Workforce Development Agency | ORGANIZATION | 0.99+ |
one day | QUANTITY | 0.99+ |
seven months ago | DATE | 0.99+ |
six | DATE | 0.99+ |
Defense Department | ORGANIZATION | 0.99+ |
first | QUANTITY | 0.99+ |
COVID | ORGANIZATION | 0.99+ |
two years | QUANTITY | 0.98+ |
five years | QUANTITY | 0.98+ |
over 37,000 vacancies | QUANTITY | 0.98+ |
Knox Anderson, Amit Gupta, & Loris Degioanni | KubeCon + CloudNativeCon NA 2019
(upbeat music) [Reporter] - Live from San Diego, California it's theCUBE covering Goodcloud and Cloud- Native cloud. Brought to you by Red Hat the Cloud-Native computing foundation. and its ecosystem partners. >> Welcome back, we're here at Kubecon Cloud-Native con 2019 in San Diego, I'm Stu Miniman. We've got over 12,000 in attendance here and we have a three guest lineup of Kubecon veterans here. To my right is Loris Degioanni who's the CTO and founder of Sysdig. To his right, representing the Tiger is Amit Gupta who's vice president of business development and Product Management at Tigera, and also Knox Anderson who's Director of Product Management. We know from the Octopus, Amit, that also means that he's with Sysdig. So gentlemen, thank you all for joining. [Loris]- Octopus and Tiger >> Octopus and Tiger, bringing it all together on the tube. We have a menagerie as it were. So Loris, let's start as they said, you know all veterans, you've been here, you've almost been to every single one, something about a you know, a child being born made you miss one. [Loris] - The very first one. >> So, why don't you bring us in kind of what's so important about this ecosystem, why it's growing so fast and Sysdig's relationship with the community? >> Yeah, I mean, you can just look around, right? Kubecon is growing year after year, it's becoming bigger and bigger and this just a reflection of the community getting bigger and bigger every year, right? It's really looks like we are, you know, here with this community creating the next step, you know? For computing, for cloud computing, and really, you know, Kubernetes is becoming the operating system powering, you know, the cloud and the old CNC ecosystem around it is really becoming, essentially the ecosystem around it. And the beauty of it is it's completely open this time, right? For the first time in history. >> All right, so since you are the founder, I need to ask, give me the why? So we've been saying you know, we've been starting this program almost 10 years ago and the big challenge of our time is you know building software for distributed systems. Cloud's doing that, Edge is taking that even further. Bring us back to that moment of the birth of Sysdig and how that plays into all the open source and that growth you're talking about. >> Yeah, I mean, Sysdig was born, so first of all, a little bit of background of me. I've been working in open source and networking for my whole career. My previous company was the business behind washer, then it took on a live service, so, a huge open source community and working with enterprises all around the world, essentially to bring visibility over their neighbors. And then I started realizing the stack was changing radically, right? With the event of cloud computing. With the event of containers and Docker. With the event of Kubernetes. It, legacy ways of approaching the problem were just not working. Were not working the technical level because, you need to create something completely new for the new stack but they were also not working at the approach level. Every thing was proprietary. Every thing was in silos, right? So the approach now is much more, like inclusive and community first, and that's why I decided to start Sysdig. >> All right. so Amit, we know things are changing all the time. One thing that does not ever change is security is paramount. I really say, I go back 10 or 15 years you know, they've got a lot of lip service around security. Today, it's a board level discussion. Money, development, especially here in the Cloud-Native space it's really important so, talk about Tigera relationship with Sysdig and very much focused on the Kubernetes ecosystems. >> Absolutely. So I couldn't agree with you more, Stu. I mean, security is super critical and more so now as folks are deploying more and more mission critical applications on the Kubernetes based platform. So, Sysdig is a great partner for us. Tigera provides networking and network security aspects of that Kubernetes deployment. And if you think about it how modern applications are built today, you've taken a big large model and decomposed into hundreds of micro services so there's procedural cause that were happening inside the code and now API calls on the network so you've got a much bigger network with that service a highly distributed environment. So the traditional architectures where you manage the security typically with the firewall or a gateway, it's not sufficient. It's important, it's needed and that's really where, as people design their architecture, they have to think about how do you design security across that entire infrastructure in a distributed fashion or done in the early stages of your projects. >> Knox, help us understand the relationship here, how it fits into Sysdig's product with Tigera. >> Yeah, so we're great partners with Tigera. Tigera lives at the network security level. Sysdig's secure in that the product we built extends the instrumentation that Loris started off with our open source tool, to provide security across the entire container lifecycle. So at build time, making sure your images are properly configured, free of vulnerabilities at run time, looking at all the activity that's happening and then the big challenge in the Kubernetes space is around incident response and audit. So if something happens in that pod, Kubernetes is going to kill it before anyone can investigate and Sysdig helps you with those work flows. >> Maybe it would help, we all throw around those terms, Cloud-Native a lot and it's a term I've heard for a number of years. But the definition like cloud itself is one that you know matures over time and when we get there so, maybe if we focus in a little bit on Cloud-Native security. You know, what is it we're hearing from customers, what does it mean to really build Cloud-Native Security. What makes that different from the security we've been building in our data centers, in clouds for years? >> Well I thought Cloud-Native was just a buzzword. Does it actually mean something? (laughs) >> Well hopefully it's more than just a buzzword and that's what I'm hoping you could explain. >> Yeah, so again, the way I see it is the real change that you are witnessing is how software is being written. And we're touching a little bit on it at this point. Software intended to be architected as big monoliths now is being splayed into smaller components. And this is just a reflection of software development teams in a general way being much more efficient when you can essentially, break the problem into sub-problems and break the responsibilities into sub-responsibilities. This is perhaps something that is extremely beneficial especially in terms of productivity. But also, sort of revolutionizes the way you write software, you run software, you maintain software, CICD, you know continues development, continues integration, pipelines, the reliance on GIT and suppository to store everything. And this also means that, securing, monitoring, troubleshooting infrastructures becomes much different. And one of things we are seeing is legacy two's don't work anymore and the new approaches like Calico Networking or like Falco and runtime security or like Sysdig secure, for the lifecycle and security of containers are something bubbling up as alternatives to the old way of doing things. >> I would add to that I agree with you. I would add that if you're defining a Cloud-Native security the Cloud-Native means it's a distributed architecture. So your security architecture has got to be distributed as well, absolutely got a plan for that. And then to your point, you have to automate the security as part of the various aspects of your lifecycle. Security can not be an afterthought you have to design for that right from the beginning and then one last thing I would add is just like your applications are being deployed in an automated fashion your security has to be done in that fashion so, policy is good, infrastructure is good and the security is just baked in as part of that process. It's critical you design that way to get the best outcomes. >> Yeah, and I'd say the asset landscape has completely changed. Before you needed to surface finding against a host or an IP. Now you need to surface vulnerabilities and findings against clusters, name spaces, deployments, pods, services and that huge explosion of assets is making it much harder for teams to triage events, vulnerabilities and it's really changing the process in how the sock works. >> And I think that the landscape of the essence is changing also is reflected on the fact that the persona landscape is changing. So, the separation between attempts and operation people is becoming thinner and thinner and more and more security becomes a responsibility of the operation team, which is the team in charge of essentially owning the infrastructure and taking care of it, not only for the operational point of view but also from the security. >> Yeah, I think I've heard the point that you've made a many times. Security can't be a bolt on or an afterthought. It's really something fundamental, we talk about DevOps is, it needs to be just baked into the process, >> Yeah. >> It's, as I've heard chanted at some conferences, you know, security is everyone's responsibility, >> Correct. >> make sure you step up. We're talking a lot about open source here. There's a couple of projects you mentioned, Falco and Calico, you're partners with Red hat. I remember going to the Red Hat show years ago and they'd run these studies and be like, people are worried that open source and security couldn't go side by side, but no, no you could actually, you know open source is secure but taking the next step and talking about building security products with open source give us, where that stands today and how customers are you know embracing that? And how can it actually keep up with the ever expanding threat surfaces and attacks that are coming out? >> Yeah. First of all as we know open source is actually more secure and we're getting proof of that you know, pretty much on a daily basis including you know, the fact that tools like Kubernetes are regularly scrutinized by the security ecosystem and the vulnerabilities are found early on and disclosed. In particular, Sysdig is the original creator of Falco which is an open source, CNCF phased anomaly detection system that is based on collecting high granular data from a running Kubernetes environment. For example, through the capture of the system calls and understanding the activity of the containers and being able to alert about the anomalous behavior. For example, somebody being able to break into your container, extricating data or modifying binaries, or you know perpetrating an attack or stuff like that. We decided to go with an approach that is open source first because, first of all, of course, we believe into participating with the community and giving something as an inclusive player to the community. But also we believe that you really achieve better security by being integrated in the stack, right? It's very hard , for example, to have, I don't know, security in AWS that is deeply integrated with the cloud stack upon us, alright? Because this it's propietary. Why would Kubernetes solutions like Falco or even like Calico, we can really work with the rest of the community to have them really tightly coupled and so much more effective than we could do in the past. >> You know, I mean I would make one additional point to your question. It's not only that users are adopting open source security. It's actually very critical that security solutions are available as an open source, because, I mean, look around us here this is a community of open source people, they're building and distributing infrastructure platform from that is all open source so we're doing this service if we don't offer a good set of security tools to them, not an open source. So that's really our fundamental model that's why Calico provides two key problems networking and network security for our users, you deploy your clusters, your infrastructures, and you have all the bells and whistles you need to be able to run a highly secure, highly performing cluster in your environment and I believe that's very critical for this community. >> Yeah, and I'd say that and now with open source, prevention has moved into the platform. So, with network policy and things like Calico or in our 3.0 launch we incorporated the ability to automate tests and apply pod security policies. And those types of prevention mechanisms weren't available on your platforms before. >> Okay, I often find if you've got any customer examples, talk about, you know, how they're running this production kind of the key, when they use your solutions you know, the benefits that they're having? >> Yeah, I'll take a few examples. I mean, today it is probably fair to say Calico from the partial phone home data we get a 100,000 plus customers across the globe, some of the, I can't take the actual names of the customers but, so the largest banks are using Calico for their enterprise networking scenarios and essentially, the policies, the segmentation inside the clusters should be able to manage the security for those workloads inside their environments. So that's how I would say. >> Yeah, and Sysdig, we, have an open core base with Falco, and then we offer a commercial product called Sysdig secure, in particular, last week we release version 3.0 of our commercial product which is another interesting dynamic because if we can offer the open core essentially to the community but then offer additional features with our commercial product. And Falco is installed in many, many thousands extension of platforms. and Sysdig secure you know secures, and offers visibility to the biggest enterprises in the world. We have deployments that are at a huge scale with the biggest banks, insurance companies, media companies, and we tend to fall to cover the full life cycle of applications because as the application and as the software moves in the CICD pipeline so security needs to essentially accompany the application through the different stages. >> All right, well thank you all three of you for providing the update. Really appreciate you joining us in the program and have a great rest of the week >> Thank you very much. >> Thank you. >> Thank you. >> We'll be back with more coverage here from Kubecon, Cloud-Nativecon. I'm Stu Miniman and thanks for watching theCUBE. (upbeat music)
SUMMARY :
Brought to you by Red Hat and we have a three guest lineup of Kubecon veterans here. So Loris, let's start as they said, you know the operating system powering, you know, the cloud and how that plays into all the open source So the approach now is much more, like inclusive I really say, I go back 10 or 15 years you know, So I couldn't agree with you more, Stu. how it fits into Sysdig's product with Tigera. Sysdig's secure in that the product we built What makes that different from the security we've Does it actually mean something? and that's what I'm hoping you could explain. But also, sort of revolutionizes the way you write software, and the security is just baked in as part of that process. Yeah, and I'd say the asset landscape is changing also is reflected on the fact that the DevOps is, it needs to be just baked into the process, and attacks that are coming out? and being able to alert about the anomalous behavior. you deploy your clusters, Yeah, and I'd say that and now with open source, and essentially, the policies, and as the software moves in the CICD pipeline for providing the update. I'm Stu Miniman and
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Loris | PERSON | 0.99+ |
Falco | ORGANIZATION | 0.99+ |
Loris Degioanni | PERSON | 0.99+ |
Stu Miniman | PERSON | 0.99+ |
Amit Gupta | PERSON | 0.99+ |
Calico | ORGANIZATION | 0.99+ |
San Diego, California | LOCATION | 0.99+ |
Red Hat | ORGANIZATION | 0.99+ |
San Diego | LOCATION | 0.99+ |
Knox Anderson | PERSON | 0.99+ |
Sysdig | ORGANIZATION | 0.99+ |
last week | DATE | 0.99+ |
Amit | PERSON | 0.99+ |
Tigera | ORGANIZATION | 0.99+ |
today | DATE | 0.99+ |
AWS | ORGANIZATION | 0.99+ |
10 | QUANTITY | 0.99+ |
Kubecon | ORGANIZATION | 0.99+ |
15 years | QUANTITY | 0.99+ |
KubeCon | EVENT | 0.98+ |
one | QUANTITY | 0.98+ |
100,000 plus customers | QUANTITY | 0.98+ |
Calico Networking | ORGANIZATION | 0.98+ |
Red hat | ORGANIZATION | 0.98+ |
three | QUANTITY | 0.97+ |
Sysdig | PERSON | 0.97+ |
first time | QUANTITY | 0.97+ |
Today | DATE | 0.96+ |
Kubernetes | TITLE | 0.96+ |
Cloud-Native | TITLE | 0.95+ |
three guest | QUANTITY | 0.95+ |
First | QUANTITY | 0.95+ |
over 12,000 | QUANTITY | 0.94+ |
first one | QUANTITY | 0.94+ |
Tiger | PERSON | 0.94+ |
Tiger | ORGANIZATION | 0.93+ |
hundreds of micro services | QUANTITY | 0.92+ |
One thing | QUANTITY | 0.92+ |
Goodcloud | ORGANIZATION | 0.9+ |
two key problems | QUANTITY | 0.9+ |
Kubernetes | ORGANIZATION | 0.9+ |
Cloud-Nativecon | ORGANIZATION | 0.89+ |
DevOps | TITLE | 0.88+ |
one additional point | QUANTITY | 0.87+ |
CloudNativeCon NA 2019 | EVENT | 0.86+ |
two | QUANTITY | 0.86+ |
CNCF | ORGANIZATION | 0.85+ |
first | QUANTITY | 0.85+ |
almost | DATE | 0.84+ |
version 3.0 | OTHER | 0.84+ |
10 years ago | DATE | 0.83+ |
Cloud-Native con 2019 | EVENT | 0.82+ |
Jules Johnston, Global Channels, Equinix | Dell Technologies World 2022
>> Announcer: theCUBE presents "Dell Technologies World," brought to you by Dell. >> Hey, everyone. Welcome back to theCUBE's coverage of day one of "Dell Technologies World 2022" live from the Venetian in Las Vegas. They're excited. I dunno if you heard that, a group behind me very excited to be here. Lisa Martin, Dave Vellante. We're very pleased to welcome Jules Johnston, the SVP of channel from Equinix. Jules, welcome to the program. >> Thank you for having me. I appreciate it. >> And those people back there are very excited, if you heard that big applause when we went live. (Jules laughing) So the vibe here is fantastic for the first live "Dell Technologies World" since 2019. A lot of people here, this Expo Hall is packed. A lot of momentum here, but there's also a lot of momentum at Equinix. Talk to us about what's going on. >> Well, so many exciting things for Equinix and this partnership of Dell sort of gives us a chance to share that with partners here throughout the conference. So we are very excited, as you said about and we just were named to the Fortune 500 this year, 77 quarters of growth consecutively. But underpinning that is having made huge investments in what is the world's largest footprint of global data centers, 240 of them on six continents in 66 markets but then interconnecting them. So they have the connections that Dell customers need to the clouds. They have the connections that they need to all of the future SaaS providers. So that foresight to put together that interconnection network across our footprint has set us on the path we're on today, which we're very grateful to be at in. And really, the things that are happening with Equinix and Dell together couldn't be more of the moment. >> Talk to me about the last two years. The moments of the last two years have been very challenging >> They have. >> For everyone. How has the partnership evolved in that time? >> Well, we, together, Dell and Equinix, what we're doing is really helping our shared interface customers navigate the complexities of their digital transformation. And digital transformation is hard. It's not a one and done and it's not an overnight solution. And so, what we are doing is partnering with Dell to think about putting a dedicated Dell IT stack in an Equinix data center to give customers that sovereign adjacency so that they can have that security proximate to all the clouds and everything else they need to participate in the ecosystem. And then pairing that with these interconnected enterprises. So, Dell and we are helping customers then be able to have some of their solution on-prem, some of their solution in the cloud, access public clouds and use that collectively to define what we're calling the intelligent edge, together. And that intelligent edge means so many different things to customers but it is really our honor to work together with Dell to help each customer define that for themselves. >> Equinix is an amazing company. Like you said, it's... I didn't realize it was that many consecutive quarters but it's a 60 billion plus market cap. If you look at the stock chart, it'll blow your mind. Really incredibly successful. And part of the reason... It's funny, 10, 15 years ago, people thought, well... Or, 10 years ago, anyway, the cloud is going to hurt companies like Equinix. It was the exact opposite. And that's because Charles Phillips used to joke, "Friends don't let friends build data centers." >> Yes. >> And it's not a good use of capital for most companies, unless you're in the data center business. Now, of course, you have some of your own as a service offerings. >> We do. >> What's the overlap with Dell? How do they compliment each other? >> It's a good question because... And we get that. Are you and Dell in fact competitors? No, we see them as wholly complimentary. And in fact, we're working with Dell to bring to market things like something we call PowerEdge, which involves their servers. And PowerStore, which involves their storage, and then VxRail, which is really the hyper-converged infrastructure. And those are just a few first of a series of offerings we expect to bring to market with Dell. And if you think about Metal, and it's Equinix Metal that people sometimes think is a competitor, but what Metal does for customers is it really allows them to advance, have the equipment placed in our data centers so that they can access that capacity and according to spikes or needs that they have. That equipment in our data centers that's there for them to avail themselves of that capacity is most often Dell equipment. So we are really doing and executing that bare Metal as a service together. >> What are some of the things that you're hearing from your partner community, in terms of the partnership with Dell? Partners must be excited, the momentum there. What's going on in the partner community? >> So, that's what's near and dear to my heart since that's what I'm responsible for, Equinix's global partnerships. And they're just very excited about what we're doing with Dell. And to be honest with you, all of our top partners are also top partners of Dell. So it makes sense that we bring it together. So, big categories of partners like the world's largest global network service providers, some of whom are here and who we'll meet with, AT&T, Orange Business Services, those folks in addition to the world's largest global systems integrators, Kendra, Deloitte, Accenture, WiPro, DXC. All of these are partners that Dell and we will meet with together to further our, what we call Power of Three, that together we're better. Because as much as Dell and Equinix are delivering, the customers most often don't have the experience they need to execute it without a partner. So they are relying on those partners to take what we are doing and make it their own. And so, they're excited about it. You see, it's a big opportunity for them from a... Of revenue services and an opportunity for them to step into a next level trusted advisor status. So partners are excited and we're going to be spending a lot of time with them the next few days. >> Do you see Equinix... 'Cause these partnerships are not bespoke partnerships. It's an ecosystem that's organic and evolving and growing. Are you a dot connector in a way? Can it be a flywheel effect in your ecosystem? >> Well, so our ecosystems that we provide, wide range of those from high frequency trading to connected cars, to the internet of things and content providers, we do see it as our role to the 10,000 and growing customers that are in our 240 data centers on six continents that provide those ecosystems. It is our mission to continue to grow that, enrich it, because that does differentiate us greatly from another data center provider. And it's the combination of the ecosystem that you'd find and the people you can connect to at Equinix. And then also the leverage of our fabric in order to be able to access your future needs. >> And it's a lot of technology underneath these. It's that first layer one, I guess, if you will, of the data center, right? And so, a lot of your customers or your partner's customers, they just don't want to be in that business as we were saying before. I mean, it's just too expensive. The power requirements are going through the roof. So you got to be really good at managing power. >> You do. In fact... So first of all, you're right. It's extremely difficult for them to also be able to make that commitment to keep a data center they would manage themselves at the level that Equinix is able to invest. So it's very difficult for people to do it themselves. But even show... Another point you mentioned actually about the power, is near and dear to our hearts because Equinix is super committed to sustainability. And so we've made a commitment to wholly renewable energy. And it's something that we talk a lot about how we also help partners like Dell meet their initiatives. So partners like AT&T meet their connected climate goals. So we are actually using that and coming together with Dell on that story, and then helping to amplify that with our partners. >> And that's... How do you do that? That's putting data centers where you can cool with ambient air. Is it being near the Columbia River? What's your strategy in that regard? >> On sustainable... I have to be honest to you. I would be out of my depth if I didn't say... >> This is the high level, yeah. >> So we are deploying some of the latest technologies about that and then experts people who, all they do is really help us to reduce the carbon footprint and be able to offset that, be able to use solar, be able to use wind, be able to take advantage of that. And then also to navigate what's available when you're in 240 locations on six continents. It's not the same options to reduce your power consumption and your burden are different in Africa as we just discovered with our main one acquisition than they are in India or than they are in other parts of the world. So it is for us a journey, and we've been assembling a lot of the talent to do that, >> But you're so large now, even a small percentage improvement can really move the needle. >> And I think because we are the largest, it is incumbent upon us to really set the standard and be committed to it. And we do see other people following, which is a good thing for all of us. >> Well, how important is that in your partnership conversations. That partners have that same focus and commitment on ESG that Equinix has. >> Partners care a lot about it, but customers ask us both all the time. We increasingly see a portion of an RFP or scope of work asking, "Before I decide to go with Equinix and Dell, tell me how you're going to impact the environment. Tell me about your commitment." And so, we are committed to it, but customers are demanding it too. >> So it's... >> Where do you... Go ahead please. >> Oh, I was just going to say, it's coming from the voice of the customer, which Equinix is listening to, we know Dell is listening to it as well. >> I'm sorry, one more time. >> That the sustainability, the ESG demand is coming from the customers, as you were saying. >> Both. I mean, we want to do the right thing and we've made commitments to it, but our customers are holding us accountable to it. And sustainability is now a board level priority. It is for us. And it is for companies like Dell and it is for partners and customers. >> It really is... It's up there with security in terms of the board level conversation. Where do you want to see the partner ecosystem in the next let's call it three to five years. In your business you can look out that far. >> Well, I think that our partners and by that I mean Dell's and our mutual partners, We've been listening to customers with Dell to deliver a flexible set of options for how customers would consume Equinix and Dell. So our partners are going to be integrating a variety of those in order to meet the customer where they are in that journey. Whether they want to buy Apex as a service, whether they want to buy Equinix Metal, whether they want to have a partner put together bespoke, do-it-yourself combination with other services. I mean, the customers are going to demand a choice of options. I think partners are going to embrace multiple versions of that so that they can to meet the customer where they are and take them. >> Well. That's incredibly important these days to meet the customer where they are, the customers have a lot of choice. >> It is. >> But everything that we're all doing is for the customer ultimately at the end of the day. >> Yes, it is. And you know, the customers are getting savvier, but we are all still early in this journey as far as the edge. I think we are all still grappling that. Right now we like to say that as customers are looking to define that, the footprint that we offer together with Dell gives them an awfully robust set of choices for now. And then we want to continue to invest and expand to be wherever they need us. >> Well, that's the thing about your business? It's optionality. I mean, the cloud has a lot of stuff, but you can't get everything you want in the cloud. >> Jules: You can, >> And you can put anything in your data center. That's IT. >> You can, but you may not know what you need yet. And so that's one of the things we spend a lot of time having our solutions, architects and our sales to people together, but they'll talk about future proofing, their strategy. So future proofing, that combination of on-prem and in an Equinix data center, and maybe some public and future proofing, leveraging our fabric so that they might elect different SaaS space services or cloud-based services a year to five years from now than they are even thinking about today. And, they may expand their edge over time, because they may see that as at the customer end point. Today, most businesses are still using a footprint like ours as their edge, but that could change. And so we want to be there when it does. >> Yeah. That's a great point because you don't want to necessarily have to rip it out every co couple of years. If you can have an architecture that can grow. Yeah, sure. You might want to upgrade it. >> Well, and that's one of the most appealing things about services like Metal where they also do prevent that sort of rip and replace, but they also help people navigate the supply chain shortages that are going on right now. So this has been a trying two years for supply chain shortages. And being able to take advantage of Dell equipment already staged at an Equinix data center and partners can then bring their customers a quicker immediate response. >> Have you also seen this? You mentioned the supply chain shortages, some of the many challenges that we've experienced in a last few years. How much of a factor has the great resignation been? The labor shortages, the cybersecurity skills gap, on folks coming to Equinix saying, "Help, we don't have the resources here to do this ourselves." >> We have been fortunate to be... If you're asking me how the reservation has affected us as a company. >> No your customers. >> Oh customers it has. Oh, okay I get it. So it is a challenge for them, but it's an opportunity for our partners. So what I see there is it's been challenging for customers to hold onto that talent, but partners are filling that gap. And we with Equinix being forced to hold onto a lot of our best and brightest. And so we put them together with our partners and we try to help customers fill those gaps. >> Well that's the most important thing, filling those gaps. >> You ever been inside one of these ultra modern data centers? >> I have not, not yet. It's pretty cool, isn't it? >> Have you ever had a tour of one? >> I've never had a tour of an Equinix data center, but I've seen some modern data centers that will blow your mind? >> Well, they come with all the requisite biometrics and man traps and all of the sort of bells and whistles that are actually the first slay of physical security, but then once you get into the data center, then we get into the virtual and the digital security that you would expect. >> Yeah, it's good. And you know, it's not like you drive by the data center, and there's a big sign that says, here's the data center. They're trying to stay a little hidden and then like getting in, it's like getting into Fort Knox. It's probably harder. And then, but then the it's like this giant clean room. It's amazingly clean and just huge. It'll blow your mind. >> And inside the data centers, all the world's networks come together and peer, and then we have inside their, the most direct roam reps to the cloud. So you would expect there's a lot of wires and pipes running very neatly through a very secure clean... >> Cooling systems and power systems that are just... >> Pristine environment for sure. >> Amazing engineering. >> It is really. >> We need a tour. >> Do you let people tour your data center? >> I will bring both of you on a tour. >> Awesome. >> Be my guests. >> I would love to. Great. >> Sounds fantastic. Would love to. >> We'll bring a camera. (laughing) Oh, no, we're not allowed. >> Not today. >> No phones, no phones sequester. So what are some of the things that you're excited about seeing and hearing the next couple of days as this is the first time we've all gotten to be together in so long? >> We are excited about the conversations that we're going to have, power of three that I was talking about. So, we really pride ourselves on having that combination add up to more to benefit the customer. And so this will be sort of a coming out party of sorts. Equinix and Dell will meet with almost 20 different global partners that are really important to both of us. So I am most excited about those conversations and about the education I'm going to get on the ways they're thinking about integrating it differently, because that is good choice for the market. That is good choice for the customer set, for the enterprises out there. So that's what I'm most excited about. >> Awesome, sounds like tremendous opportunity, lots going on this week. But thank you for coming on Jules, >> Oh my pleasure, thank you. talking about... >> How Equinix and Dell better together, the way that your channel partner program is growing and of course the momentum of the company. Can't wait to see what happens next year. >> Thank you. Thank you. Well, we will aim to deliver and thank you again for having us. >> Thanks Jules. >> Our pleasure. For Dave Vellante, I'm Lisa Martin and you're watching theCUBE's live coverage day one, "Dell Technologies World" live from Las Vegas. Stick around, we'll be right back with our next guest. (slow upbeat music)
SUMMARY :
brought to you by Dell. Welcome back to theCUBE's Thank you for having me. So the vibe here is fantastic So that foresight to put together The moments of the last two How has the partnership so many different things to customers the cloud is going to hurt And it's not a good use of and according to spikes in terms of the partnership with Dell? the experience they need to and evolving and growing. and the people you can of the data center, right? and then helping to amplify Is it being near the Columbia River? I have to be honest to you. lot of the talent to do that, can really move the needle. and be committed to it. Well, how important is that "Before I decide to go Where do you... it's coming from the is coming from the customers, and it is for partners and customers. it three to five years. so that they can to meet the customer to meet the customer where they are, for the customer ultimately the footprint that we I mean, the cloud has a lot of stuff, And you can put anything And so that's one of the have to rip it out every And being able to take advantage on folks coming to Equinix saying, We have been fortunate to be... And we with Equinix being forced Well that's the most important I have not, not yet. that are actually the first And you know, it's not like the most direct roam reps to the cloud. systems that are just... I would love to. Oh, no, we're not allowed. and hearing the next couple of days and about the education I'm going to get But thank you for coming on Jules, Oh my pleasure, thank you. and of course the momentum of the company. and thank you again for having us. and you're watching theCUBE's
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Lisa Martin | PERSON | 0.99+ |
Dave Vellante | PERSON | 0.99+ |
Jules | PERSON | 0.99+ |
Equinix | ORGANIZATION | 0.99+ |
Dell | ORGANIZATION | 0.99+ |
Jules Johnston | PERSON | 0.99+ |
Africa | LOCATION | 0.99+ |
Deloitte | ORGANIZATION | 0.99+ |
Charles Phillips | PERSON | 0.99+ |
India | LOCATION | 0.99+ |
three | QUANTITY | 0.99+ |
Columbia River | LOCATION | 0.99+ |
60 billion | QUANTITY | 0.99+ |
Orange Business Services | ORGANIZATION | 0.99+ |
Las Vegas | LOCATION | 0.99+ |
DXC | ORGANIZATION | 0.99+ |
AT&T | ORGANIZATION | 0.99+ |
two years | QUANTITY | 0.99+ |
WiPro | ORGANIZATION | 0.99+ |
Global Channels | ORGANIZATION | 0.99+ |
240 data centers | QUANTITY | 0.99+ |
next year | DATE | 0.99+ |
Accenture | ORGANIZATION | 0.99+ |
66 markets | QUANTITY | 0.99+ |
240 | QUANTITY | 0.99+ |
Today | DATE | 0.99+ |
six continents | QUANTITY | 0.99+ |
both | QUANTITY | 0.99+ |
today | DATE | 0.99+ |
Both | QUANTITY | 0.99+ |
240 locations | QUANTITY | 0.99+ |
five years | QUANTITY | 0.99+ |
10 years ago | DATE | 0.98+ |
Dell Technologies World | EVENT | 0.98+ |
one | QUANTITY | 0.98+ |
Douglas Ko, Cohesity & Sabina Joseph | AWS Partner Showcase S1E2
(upbeat music) >> Hello everyone, welcome to the special CUBE presentation of the AWS Partner Showcase season one, episode two. I'm John Furrier, your host of theCUBE. We've got two great guest here. Douglas Ko, Director of product marketing at Cohesity and Sabina Joseph General Manager of AWS, Amazon Web Services. Welcome to the show. >> Thank you for having us. >> Great to see you Sabina and Douglas. Great to see you, congratulations at Cohesity. Loved the shirt, got the colors wearing there on Cohesity, Always good I can't miss your booth at the shows, can't wait to get back in person, but thanks for coming in remotely. I got to say it's super excited to chat with you, appreciate it. >> Yeah, pleasure to be here. >> What are the trends you're seeing in the market when it comes to ransomware threats right now. You guys are in the middle of it right now more than ever. I was hearing more and more about security, cloud scale, cloud refactoring. You guys are in the middle of it. What's the latest trends in ransomware? >> Yeah, I have to say John, it's a pleasure to be here but on the other hand, when you asked me about ransomware, right? The data and the statistics are pretty sobering right now. If we look at what just happened in 2020 to 2021, we saw a tenfold increase in a ransomware attacks. We also saw the prediction of a ransomware attack happening every 11 seconds meaning by the time I finished this sentence there's going to be another company falling victim to ransomware. And it's also expected by 2031 that the global impact of ransomware across businesses will be over $260 billion, right? So, that's huge. And even at Cohesisity, right, what we saw, we did our own survey, and this one actually directly to end users and consumers. And what we found was over 70% of them would reconsider doing business with a company that paid a ransom. So all these things are pretty alarming and pretty big problems that we face today in our industry. >> Yeah, there's so many dimensions to it. I mean, you guys at Cohesity have been doing a while. It's being baked in from day one, security in the cloud and backup recovery, all that is kind of all in one thing now. So to protect against ransomware and other threats is huge Sabina, I got to ask you Amazon's view of ransomware is serious. You guys take it very seriously. What's the posture and specifically, what is AWS doing to protect customers from this threat? >> Yeah, so as Doug mentioned, right, there's no industry that's immune to ransomware attacks. And just as so we all level set, right? What it means is somebody taking control over and locking your data as an individual or as a company, and then demanding a ransom for it, right? According to the NIST, the National Institute of Standards and Technology cybersecurity framework, there are basically five main functions which are needed in order to plan and manage these kind of cybersecurity ransomware attacks. They go across identifying what do you need to protect, actually implementing the things that you need in order to protect yourself, detecting things if there is an attack that's going on, then also responding, how do you get out of this attack? And then bringing things, recovery, right? Bringing things back to where they were before the attack. As we all know, AWS takes security very seriously. We want to make sure that our customer's data is always protected. We have a number of native security solutions, but we are also looking to see how we can work with partners. And this is in fact when in the fall of 2019, the Cohesity CEO, Mohit Aron, myself and a couple of us, we met and we brainstorm, what could we do something that is differentiated in the market? When we built this data management as a service native solution on top of AWS, it's a first of a kind solution, John. It doesn't exist anywhere else in the market, even to even today. And we really focused on using the well architected review, the five pillars of security, reliability, operational excellence, performance, and cost optimization. And we built this differentiated solution together, and it was launched in April, 2020. And then of course from a customer viewpoint, they should use a comprehensive set of solutions. And going back to that security, that cyber security framework that I mentioned, the Cohesity data management as a service solution really falls into that recovery, that last area that I mentioned and solution actually provides, granular management of data, protection of data. Customers can spin up things very quickly and really scale their solution across the globe. And ensure that there is compliance, no matter how many times we do data changes, ads and so on across the world. >> Yeah, Sabina, that's a great point about that because a lot of the ransomware actually got bad actors, but also customers can misconfigure things. They don't follow the best practice. So having that native solutions are super important. So that's a great call out. Douglas, I got to go back to you because you're on the Cohesity side and a the partner of AWS. They have all these best practices that for the good actors, got to pay attention to the best practices and the bad actors also trying to get in creates a two, challenge an opportunity. So how do organizations protect their data against these attacks? And also how do they maintain their best practices? Because that's half the battle too, is the best practices to make sure you're following the guidelines on AWS side, as well as protecting the attacks. What's your thoughts? >> Yeah, absolutely. First and foremost, right? As an organization, you need to understand how ransomware operates and how it's evolved over the years. And when you first look at it, Sabina already mentioned it, they started with consumers, small businesses, attacking their data, right? And some of these, consumers or businesses didn't have any backup. So the first step is just to make sure your data is backed up, but then the criminals kind of went up market, right? They understood that big organizations had big pocket and purses. So they went after them and the larger organizations do have backup and recovery solutions in place. So the criminals knew that they had to go deeper, right? And what they did was they went after the backup systems themselves and went to attack, delete, tamper with those backup systems and make it difficult or impossible to recover. And that really highlighted some solutions is out there that had some vulnerabilities with their data immutability and capabilities around WORM. And those are areas we suggest customers look at, that have immutability and WORM. And more recently again, given the way attacks have happened now is really to add another layer of defense and protection. And that includes, traditionally what we used to call, the 3-2-1 rule. And that basically means, three copies of data on two different sets of media with one piece of that data offsite, right? And in today's world and the cloud, right? That's a great opportunity to kind of modernize your environment. I wish that was all that ransomware guys we're doing right now and the criminals were doing, but unfortunately that's not the case. And what we've seen is over the past two years specifically, we've seen a huge increase in what you would call data theft or data exfiltration. And that essentially is them taking that data, a specific sense of the data and they're threatening to expose it to the dark web or selling it to the highest bidder. So in this situation it's honestly very difficult to manage. And the biggest thing you could do is obviously harden your security systems, but also you need a good understanding about your data, right? Where all that sensitive information is, who has access to it and what are the potential risks of that data being exposed. So that takes another step in terms of leveraging a bunch of technologies to help with that problem set. >> What can businesses do from an architectural standpoint and platform standpoint that you guys see there's key guiding principles around how their mindset should be? What's the examples of other approaches- >> Yeah. >> Approach here? >> No, I think they are both us at Cohesity and I'll speak for Sabina, AWS, we believe in a platform approach. And the reason for that is this a very complicated problem and the more tools and more things you have in there, you add risk of complexity, even potential new attack surfaces that the criminals can go after. So we believe the architecture approach should kind of have some key elements. One is around data resiliency, right? And that again comes from things like data encryption, your own data is encrypted by your own keys, that the data is immutable and has that, right, want to read many or WORM capabilities, so the bad guys can't temper with your data, right? That's just step one. Step two is really understanding and having the right access controls within your environment, right? And that means having multi factor authentication, quorum, meaning having two keys for the closet before you can actually have access to it. But it's got to go beyond there as well too. We got to leverage some newer technologies like AI and machine learning. And that can help you with detection and analysis of both where all your sensitive information is, right? As well as understanding potential anomalies that could signify attack or threat in progress. So, those are all key elements. And the last one of course is I think it takes a village, right? To fight the ransomware war. So we know we can't do it alone so, that's why we partner with people like AWS. That's why we also partner with other people in the security space to ensure you really have a full ecosystem support to manage all those things around that framework. >> That's awesome. Before I get to Sabina, I want to get into the relationship real quick, but I want to come back and highlight what you said about the data management as a service. This is a joint collaboration. This is some of the innovation that Cohesity and AWS are bringing to the market to combat ransomware. Can you elaborate more on that piece 'cause this is important. It's a collaboration that we're going to gather. So it's a partner and you guys were going to take us through what that means for the customer and to you guys. I mean, that's a compelling offering. >> So when we start to work with partners, right? we want to make sure that we are solving a customer problem. That's the whole working backwards from a customer. We are adding something more that the customer could not do. That's why when either my team or me, we start to either work on a new partnership or a new solution, it's always focused on, okay, is this solution enabling our customer to do something that they couldn't do before? And this approach has really helped us, John, in enabling majority of the fortune 500 companies and 90% of the fortune 100 companies use partner solutions successfully. But it's not just focused on innovation and technology, it's also focused on the business side. How are we helping partners grow their business? And we've been scaling our field teams, our AWS sales teams globally. But what we realized is through partner feedback, in fact, that we were not doing a great job in helping our partners close those opportunities and also bring net new opportunities. So in our field, we actually introduced a new role called the ISV Success Manager, ISMs that are embedded in our field to help partners either close existing opportunities, but also bring net new opportunities to them. And then at re:Invent 2020, we also launched the ISB accelerate program, which enables our field teams, the AWS field teams to get incentive to work with our partners. Cohesity, of course, participates in all of these programs and has access to all of these resources. And they've done a great job in leveraging and bringing our field teams together, which has resulted in hundreds of wins for this data management as a service solution that was launched. >> So you're bringing customers to Cohesity. >> Absolutely. >> Okay, I got to get the side. So they're helping you, how's this relationship going? Could you talk about the relationship on the customer side? How's that going? Douglas, what's your take on that? >> Yeah, absolutely. I mean, it's going great. That's why we chose to partner with AWS and to be quite honest, as Sabina mentioned, we really only launched data management and service back in 2020, late 2020. And at that time we launched with just one service then, right, when we first launched with backup as a service. Now about 15 months later, right? We're on the brink of launching four services that are running on AWS cloud. So, without the level of support, both from a go to market standpoint that Sabina mentioned as well as the engineering and the available technology services that are on the AWS Cloud, right? There's no way we would've been able to spin up new services in such a short period of time. >> Is that Fort Knox and Data Govern, those are the services you're talking about Or is that- >> Yeah, so let me walk you through it. Yeah, so we have Cohesity DataProtect, which is our backup as a service solution. And that helps customers back their data to the cloud, on-prem, SaaS, cloud data like AWS, all in a single service and allows you to recover from ransomware, right? But a couple months ago we also announced a couple new services that you're alluding to John. And that is around Fort Knox and DataGovern. And basically Fort Knox, it is basically our SaaS solution for data isolation to a vaulted copy in the AWS cloud. And the goal of that is to really make it very simple for customers, not only to provide data immutability, but also that extra layer of protection by moving that data offsite and keeping it secure and vaulted away from cyber criminals and ransomware. And what we're doing is simplifying the whole process that normally is manual, right? You either do it manually with tapes or you'll manually replicate data to another data center or even to the cloud, but we're providing it as a service model, basically providing a modern 3-2-1 approach, right? For the cloud era. So, that's what's cool about Fort Knox, DataGovern, right? That's also a new service that we announced a few months ago and that really provides data governance and user behavior analytics services that leverages a lot that AI machine learning that everybody's so excited about. But really the application of that is to automate the discovery of sensitive data. So that could be your credit card numbers, healthcare records, a personal information of customers. So understanding where all that data is, is very important because that's the data that the criminals are going to go after and hold you host. So that's kind of step one. And then step two is again, leveraging machine learning, actually looking at how users are accessing and managing that data is also super important because that's going to help you identify potential anomalies, such as people sharing that data externally, which could be a threat. It could be in improper vault permissions, or other suspicious behaviors that could potentially signify data exfiltration or ransomware attack in progress. >> That's some great innovation. You got the data resiliency, of course, the control mechanism, but the AI piece machine learning is awesome. So congratulations on that innovation. Sabina, I'm listening to conversation and hear you talk. And it reminds me of our chat at re:Invent. And the whole theme of the conference was about the innovation and rapid innovations and how companies are refactoring with the cloud and this NextGen kind of journey. This is a fundamental pillar of AWS's rapid innovation concept with your partners. And I won't say it's new, but it's highly accelerated. How are you guys helping partners be with this rapid innovation, 'cause you're seeing benefits can come faster now, Agile is here. What are some of the programs that you're doing? How are you helping customers take advantage of the rapid innovation with the secret sauce of AWS? >> Yeah, so we have a number of leadership principles, John, and one of them, of course, is customer obsession. We are very focused on making sure we are developing things that our customers need. And we look for these very same qualities when we work with partners such as Cohesity. We want to make sure that it's a win-win approach for both sides because that's what will make the partnership durable over time. And this John, our leadership team at AWS, right from our CEO down believes that partners are critical to our success and as partners lean in, we lean in further. And that's why we signed the strategic collaboration agreement with Cohesity in April, 2020, where data management as a service solution was launch as part of that agreement. And for us, we've launched this solution now and as Doug said, what are the next things we could be doing, right? And just to go back a little bit when Cohesity was developing this solution with us, they used a number of our programs. Especially on the technical side, they used our SaaS factory program, which really helped them build this differentiated solution, especially focused around security compliance and cost optimizing the solution. Now that we've launched this solution, just like Doug mentioned, we are now focused on leveraging other services like security, AIML, and also our analytic services. And the reason for that is Cohesity, as we all know, protects, manages this data for the customer, but we want to make sure that the customer is extracting value from this data. That is why we continue to look, what can we do to continue to differentiate this solution in this market. >> That's awesome. You guys did a great job. I got to say, as it gets more scale, there's more needs for this rapid, I won't say prototyping, but rapid innovation and the Cohesity side does was you guys have been always on point on the back and recovery and now with security and the new modern application development, you guys are in the front row seats of all the action. So, I'll give you the final worry what's going on at Cohesity, give an update on what you guys are doing. What's it like over there these days? How's life give a quick plug for Cohesity. >> Yeah, Cohesity is doing great, right? We're always adding folks to the team, on our team, we have a few open racks open both on the marketing side, as well as the technology advocacy side. And of course, some of our other departments too, and engineering and sales and also our partner teams as well, working with AWS partners such as that. So, in our mind, the data delusion and growth is not going to slow down, right? So in this case, I think all tides raises all the boats here and we're glad to be innovative leader in this space and really looking to be really, the new wave of NextGen data management providers out there that leverages things like AI that leverages cybersecurity at the core and has an ecosystem of partners that we're working with, like AWS, that we're building out to help customers better manage their data. >> It's all great. Data is in the mid center of the value proposition. Sabina, great to see you again, thanks for sharing. And Douglas, great to see you too. Thanks for sharing this experience here in theCUBE. >> Thanks, John. >> Okay, this is theCUBE's AWS Partner Showcase special presentation, speeding innovation with AWS. I'm John Furrier your host of theCUBE. Thanks for watching. (upbeat music)
SUMMARY :
of the AWS Partner Showcase Great to see you Sabina and Douglas. You guys are in the middle of And it's also expected by 2031 that Sabina, I got to ask you Amazon's view that is differentiated in the market? is the best practices to make sure So the first step is just to make sure in the security space to and to you guys. and 90% of the fortune 100 companies customers to Cohesity. relationship on the customer side? that are on the AWS Cloud, right? And the goal of that is to And the whole theme of And the reason for that is and the Cohesity side does that leverages cybersecurity at the core And Douglas, great to see you too. Okay, this is theCUBE's
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Sabina | PERSON | 0.99+ |
John | PERSON | 0.99+ |
AWS | ORGANIZATION | 0.99+ |
Douglas | PERSON | 0.99+ |
Doug | PERSON | 0.99+ |
April, 2020 | DATE | 0.99+ |
Amazon | ORGANIZATION | 0.99+ |
John Furrier | PERSON | 0.99+ |
2020 | DATE | 0.99+ |
90% | QUANTITY | 0.99+ |
Douglas Ko | PERSON | 0.99+ |
National Institute of Standards and Technology | ORGANIZATION | 0.99+ |
Cohesity | ORGANIZATION | 0.99+ |
two keys | QUANTITY | 0.99+ |
2021 | DATE | 0.99+ |
Cohesisity | ORGANIZATION | 0.99+ |
Sabina Joseph | PERSON | 0.99+ |
over $260 billion | QUANTITY | 0.99+ |
one | QUANTITY | 0.99+ |
2031 | DATE | 0.99+ |
late 2020 | DATE | 0.99+ |
both sides | QUANTITY | 0.99+ |
one service | QUANTITY | 0.99+ |
over 70% | QUANTITY | 0.99+ |
First | QUANTITY | 0.99+ |
one piece | QUANTITY | 0.99+ |
hundreds | QUANTITY | 0.99+ |
both | QUANTITY | 0.99+ |
tenfold | QUANTITY | 0.98+ |
first | QUANTITY | 0.98+ |
first step | QUANTITY | 0.98+ |
Cohesity | PERSON | 0.98+ |
Amazon Web Services | ORGANIZATION | 0.98+ |
Mohit Aron | PERSON | 0.97+ |
about 15 months later | DATE | 0.97+ |
NIST | ORGANIZATION | 0.97+ |
five pillars | QUANTITY | 0.97+ |
five main functions | QUANTITY | 0.97+ |
One | QUANTITY | 0.97+ |
two different sets | QUANTITY | 0.97+ |
single service | QUANTITY | 0.97+ |
two | QUANTITY | 0.96+ |
Fort Knox | ORGANIZATION | 0.96+ |
Chris Wiborg, Cohesity | AWS re:Invent 2021
>> We're back at AWS reinvent 2021. You're watching theCUBE. We're here live with one of the first live events, very few live events this year. It's the biggest hybrid event really of the year, of the season. Hopefully it portends a great future. We don't know it's a lot of uncertainty, but AWS said they're going to go for it. Close to 30,000 people here, Chris Wiborg is here. He's the VP of product marketing at Cohesity. Chris, great to see you face to face man. >> It's great to see you live again Dave. You understand that. >> Over the last couple of years we've had a lot of virtual meetup, hang out, and we talk every other quarter. >> Yeah. >> So it's great to see. Wow. You know, we were talking before the show. Well, we didn't really know what it was going to be like. I don't think AWS knew. >> No. >> It's like everything these days. >> You know, we did our own virtual event back in October because that was the time. And this is the first thing we've been back to live. And I was wondering, what's going to be like when I show up, but it's great to see all the folks that are here. >> Yeah. So I could see the booth. You know, you guys have had some good traffic. >> We have, yeah. >> A lot of customers here, obviously huge ecosystem. This, you know, the "flywheel keeps going". >> Yeah. You and I had a conversation recently about data management. It's something that you guys have put a stake in the ground. >> Absolutely. >> Saying, you know, we're not just backup, we're a good data management. It's fuzzy to a lot of people, we've had that conversation, but you're really starting to, through customer feedback, hone that message and the product portfolio. So let's start from the beginning. What is data management to cohesity? >> Well, so for us it's about the data lifecycle, right? And you heard a little bit about this actually during the keynote today, right? >> Right. >> When you think about the various services, you need to apply to data along the way to do basic things like protect it, be able to make sure you can recover from disasters, obviously deal with security today given the prevalence of ransomware out there, all the way down to at the end, how do you get more value out of it? And we do that in some cases with our friends from AWS using some of their AIML services. >> So your view of data may mean, it's kind of stops at the database right underneath. There's an adjacency to security that we've talked about. >> Yeah, very much. >> Data protection is now becoming an increasingly important component of a security strategy. >> It is. >> It's not a direct security play, but it's just the same way that it's not just the SecOps team has to worry about security anymore. It's kind of other parts of the organization. Talk about that a little bit. >> Yeah, well, we actually had a customer advisory board about two months or so ago now. And we talked to many of our customers there, and one of them I won't name, a large financial institution. We asked them, you know, where did we stand in your spend these days? And he's able to tell you, a while back about a year ago, having new backup and recovery is a starting point was kind of on the wishlist. And he said today it's number two. And I said, well why? He said well, because of ransomware, right? You'd be able to come back from that and ask, well, great, what's number one? He said, well, endpoint security. So there you are, number one and number two, right? Top of mind for customers these days in dealing with really the scourge that's affecting so many organizations out there. And I think where you're going, you starting to see these teams work together in a way that perhaps they hadn't before, or you've got the SecOps team, you've got the IT operations team. And while exactly your point, we don't position ourselves as just a data security company, that's part of what we do. We are part of that strategy now where if you have to think about the various stages and dealing with that, defending your backups, 'cause that's often the first point of attack now for the bad guys. Being able to detect what's going on through AI and the anomaly detection and such, and then being able to rapidly recover, right? In the recover phase, that's not something that security guys spend time on necessarily, but it's important for the business to be able to bring themselves back when they're subject to an attack, and that's where we come in in spades. >> Yeah. So the security guys are busy trying to figure out, okay, what happened? How do we stop it from happening again? >> There's another business angle which is okay, how do we get back up and running? How much data did we lose? Ideally none. How fast can we get it back up? That's that's another vector that's now becoming part of that broader security stack. >> That's right. I mean, I think if you look at the traditional NIST cybersecurity framework, right? Stage five has always been the recover piece. And so this is where we're working with some of the players in the security space. You may see an announcement we did with Cisco around secure access recently. Where, you know, we're working together, not only to unite two tribes within large organizations. Right? The SecOps and ITOps guys. But then bringing vendors together because it's through that, that really, we think we're going to solve that problem best. >> Before we get into the portfolio, and I want to talk about how you've evolved that, let's talk a little about ransomware, it's in the news. You know, I just wrote a piece recently and just covered some of the payments that have made. I mean, I think the biggest is 40 million, but many tens of millions here and there. And it was, you know, one case, I think it was the Irish health service did not pay, thus far hasn't paid, but it's costing him $600 million to recover as the estimate. So this is serious threat. And as I've said, many times on theCUBE, exactly anybody can be a ransomware as they go on the dark web. >> Ransomware is a service. >> Right, ransomware is a service. Hey, can you set up a help desk for me to help me negotiate? And I'm going to put a stick into a server and you know, I hope that individual gets arrested but you never know. Okay. So now it's top of mind, what are you guys doing? First of all, what are you seeing from customers? How are they responding? What are you guys doing to help? >> Well, I think you're right. First of all, it's just a huge problem. I think the latest stat I saw was something like every 11 seconds there's a new attack because I can go into your point with a credit card, sign up as a service and then launch an attack. And the average payment is around 4.2 million or such, but there's some that are obviously lots bigger. And I think what's challenging is beyond the costs of recovering and invent itself is there's also the issue around brand and reputation, and customer service. And all these downstream effects that I think, you know, the IT guys don't think about necessarily. We talked to one customer or a regional hospital where the gentleman there told me that what he's starting to see after the fact is now, you've actually got class action suits from patients coming after them saying like, "Hey you, you let my data get stolen. Right? Can you imagine no IT guys thinking about that. So the cost is huge. And so it's not just an issue I think that was once upon a time just for ITOps or SecOps through the CIO, even it's even past the board level now if you can imagine. It's something the general public worries about and we actually did a survey recently where we asked people on the consumer side, are you more or less likely to do business with companies if you know they've been subject to ransomware or attacks? And they said, no, we are concerned about that, we are more reticent to do business with people as consumers if they're not doing the right things to defend their business against ransomware. Fascinating. Right? It's long past the tipping point where this is an IT only issue. >> So, high-level strategy. So we talk about things like air gaps, when I talked about your service to ensure immutability, >> Yeah, yeah. >> And at 50,000 foot level, what's the strategy then I want to get into specifics on it. >> Let's talk a little bit about, so the evolution of the attack, nature of attacks, right? So once upon a time, this is in the distant past now, the bad guys that you used to come after your production data, right? And so that was pretty easy to fix with companies like us. It's just restore from backup. They got a little smarter< let's call that ransomware 2.0, right? Where now, they say, let's go after the backup first and encrypt or destroy that. And so there, to your point, you need immutability down to the file system level. So you can't destroy the backup. You got to defend the backup data itself. And increasingly we're seeing people take in isolation in a different way than they used to. So you probably recall the sort of standard three, two, one rule, right? >> Yeah, sure. >> Where the one traditionally meant, take that data offsite on magnetic tape, send it to Iron mountain for example, and then get the data back when I need it. Well, you know, if your business is at risk, trying to recover from tape, it just takes too long. That's just no reason. >> It can be weeks. >> It can be weeks and you've got to locate the tapes, you got to ship them, then you got to do the restore. And just because of the physical media nature, it takes a while. So what we're starting to see now is people figuring out how to use the cloud as a way to do that and be able to have effectively that one copy stored offsite in a different media, and use the cloud for that. And so one of the things we announced actually back in our show in October, was a new service that allows you to do just that. We're calling it for now Project Fort Knox. We're not sure if that name is going to work globally, right? But the idea is a bunker, an isolated copy of the data in the cloud that's there, that can restore quickly. Now, is it as fast as having a local replica copy? Of course not. But, it's way better than tape. And this is a way to really give you that sort of extra layer of insurance on top of what you're already doing probably to protect your data. >> And I think that's the way to think of it. It's an extra layer. It's not like, hey, do this instead of tape, you're still going to do tape, you know. >> There's some that do that for all sorts of reasons, including compliance and governance and regulatory ones. Right? >> Yeah. >> And, you know, even disaster recovery scenarios of the worst case, I hope I never have to go through it. Yeah, you could go to the cloud. >> That's right. >> So, local copy is the best. If that's not there, you've got your air gap copy in the cloud. >> Yap. >> If that's not there for some crazy reason. >> We have a whole matrix we've been sharing with our customers recently with a different options. Right? And it's actually really interesting the conversation that occurs between the IT operations folks, and the SecOps folks back to that. So, you know, some SecOps folks, if they could, they just unplug everything from the network, it's safe. Right? But they can't really do business that way. So it's always a balance of what's the return that you need to meet. And by return I mean, coming back from an attack or disaster versus the security. And so again, think of this as an extra layer that gives you that ability to sleep better at night knowing that you've got a third, a tertiary copy, stored somewhere offsite in a different media, but you can bring it back at the same time. >> How have you evolve your portfolio to deal with both the data management trends that we've talked about and the cyber threats. >> Yeah. Well, a number of things. So amongst the other announcements we made back in October is DR. So DR is not a security thing per se, you know, who gets paged when something goes wrong? It's not the info SEC guys for DR, it's the ITOps guys. And so we've always had that capability, but one of the things we announced is be able to do that to do that to the cloud now in AWS. So, instead of site to site, being able to do it site to cloud, and for some organizations, that is all about being able to maybe eliminate a secondary site, you know, smaller organizations, others that are larger enterprises, they probably have a hybrid strategy where that's a part of their strategy now. And the value there is, it's an OpEx cost, right? It's not CapEx anymore. And so again, you lower your cost of operations. So that's one thing in the data management side. On the security side, another thing we announced was yet another service that runs in AWS, we call Cohesity Data Govern. And this is a way to take a look at your data before something ever occurs. One of the key things in dealing with ransomware is hygiene is prevention, right? And so you sort of have classically security folks that are trying to protect your data, and then another set of folks, certainly a large enterprise that are more on the compliance regulatory front, wanting to know where your PII is, your private sensitive data. And we believe those things need to come together. So this data governance product actually does that. It takes a look at first classifying your data, and then being able to detect anomalies in terms of who's coming in from where to get to it, to help you proactively understand what's at threat, and first of all, you know, where your crown jewels really are and make sure that you're protecting those appropriately and maybe modifying access policies If you have set up in your existing native applications,. So it's a little bit of awareness, a little bit prevention, and then when things start to go wrong, another layer that helps you know what's wrong. >> I love that the other side of the coin, I mean, you going to get privacy as a service along with my data protection as a service, know that's a better model. Tight on time sir, but the last question. >> Sure. >> The ecosystem. >> Yeah. >> So you mentioned endpoint security, I know identity access is cloud security, and since the remote work has really escalated, we talk about the ecosystem and some of the partnerships that you're enabling, API integration. >> Yeah, totally. So, you know, we have this, what we call our threat defense model, has got four layers to it. One is the core, is all about resiliency. You need to assume failure. We have, you know, the ability to fail over, fail back down our file system. It has to be immutable to keep the bad guys out. You have to have encryption, basic things like that. The next layer, particularly in this world of zero trust. Right? Is you have to have various layers access control, obvious things like multifactor authentication, role-based access control, as well as things like quorum features. It's the two keys in the safety deposit box to unlock it. But that's not enough. The third layer is AI powered anomaly detection, and being able to do data classification and stuff and such. But then the fourth layer, and this was beyond just us, is the ability to easily integrate in that ecosystem. Right? So I'll go back to the Cisco example I gave you before. We know that despite having our own admin console, there's no SecOps person that's going to be looking at that. They're going to look at something like a SecureAX, or maybe a Palo Alto XR, and be able to pull signals from different places including endpoints, including firewall. >> You going to feed that. >> Exactly. So we'll send signals over that, they can get a better view and then because we're all API based, they can actually invoke the remedy on their side and initiate the workflow that then triggers us to do the right thing from a data protection standpoint, and recovery standpoint. >> It's great to have you here. Thanks so much for coming on. >> It's good to see you again live today. >> See you in the evolution of cohesity. Yes, absolutely. Hopefully we do this a lot in 2022, Chris. >> Absolutely, looking forward to. >> All right. Me too. All right, thank you for watching this is theCUBE's coverage, AWS reinvent. We are the leader in high tech coverage, we'll be right back.
SUMMARY :
Chris, great to see you face to face man. It's great to see you live again Dave. Over the last couple of years So it's great to see. but it's great to see all So I could see the booth. This, you know, the It's something that you guys So let's start from the beginning. be able to make sure you it's kind of stops at the component of a security strategy. but it's just the same way and then being able to So the security guys are that broader security stack. I mean, I think if you look at And it was, you know, one case, And I'm going to put a stick And the average payment is service to ensure immutability, to get into specifics on it. the bad guys that you used to come Well, you know, if your And so one of the things we announced the way to think of it. There's some that do that of the worst case, I hope I So, local copy is the best. If that's not there and the SecOps folks back to that. and the cyber threats. and first of all, you know, I love that the other side of the coin, and some of the partnerships is the ability to easily and initiate the workflow It's great to have you here. See you in the evolution of cohesity. We are the leader in high tech coverage,
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
AWS | ORGANIZATION | 0.99+ |
Chris Wiborg | PERSON | 0.99+ |
October | DATE | 0.99+ |
Cisco | ORGANIZATION | 0.99+ |
$600 million | QUANTITY | 0.99+ |
Chris | PERSON | 0.99+ |
2022 | DATE | 0.99+ |
40 million | QUANTITY | 0.99+ |
Dave | PERSON | 0.99+ |
today | DATE | 0.99+ |
50,000 foot | QUANTITY | 0.99+ |
two keys | QUANTITY | 0.99+ |
third layer | QUANTITY | 0.99+ |
fourth layer | QUANTITY | 0.99+ |
one copy | QUANTITY | 0.99+ |
two | QUANTITY | 0.98+ |
one customer | QUANTITY | 0.98+ |
Cohesity | ORGANIZATION | 0.98+ |
first point | QUANTITY | 0.98+ |
one case | QUANTITY | 0.98+ |
around 4.2 million | QUANTITY | 0.98+ |
three | QUANTITY | 0.97+ |
2021 | DATE | 0.97+ |
one | QUANTITY | 0.97+ |
One | QUANTITY | 0.97+ |
this year | DATE | 0.97+ |
four layers | QUANTITY | 0.97+ |
two tribes | QUANTITY | 0.96+ |
both | QUANTITY | 0.96+ |
tens of millions | QUANTITY | 0.95+ |
SEC | ORGANIZATION | 0.95+ |
one rule | QUANTITY | 0.95+ |
first | QUANTITY | 0.95+ |
first live events | QUANTITY | 0.95+ |
third | QUANTITY | 0.94+ |
NIST | ORGANIZATION | 0.93+ |
First | QUANTITY | 0.93+ |
one thing | QUANTITY | 0.92+ |
SecOps | ORGANIZATION | 0.92+ |
tertiary copy | QUANTITY | 0.89+ |
zero trust | QUANTITY | 0.89+ |
Project Fort Knox | ORGANIZATION | 0.86+ |
CapEx | ORGANIZATION | 0.86+ |
a year ago | DATE | 0.85+ |
Cohesity Data Govern | ORGANIZATION | 0.84+ |
Invent | EVENT | 0.83+ |
Close to 30,000 people | QUANTITY | 0.83+ |
about | DATE | 0.82+ |
ITOps | ORGANIZATION | 0.81+ |
two months | DATE | 0.78+ |
SecureAX | TITLE | 0.74+ |
last couple of years | DATE | 0.74+ |
Palo Alto | ORGANIZATION | 0.74+ |
first thing | QUANTITY | 0.74+ |
ransomware 2.0 | TITLE | 0.72+ |
every 11 seconds | QUANTITY | 0.68+ |
Iron mountain | LOCATION | 0.68+ |
SecOps | TITLE | 0.65+ |
OpEx | ORGANIZATION | 0.65+ |
theCUBE | ORGANIZATION | 0.64+ |
Stage five | QUANTITY | 0.62+ |
ago | DATE | 0.59+ |
Irish | ORGANIZATION | 0.59+ |
two | OTHER | 0.37+ |
one | OTHER | 0.36+ |
XR | TITLE | 0.29+ |
KC Choi, Samsung | Cloud City Live 2021
(upbeat music) >> Okay, I'm back. I'm John Furrier with theCube. We're here in the middle of the action at Mobile World Congress at Cloud City is where the action is. Danielle Royston and Telco DR. Digital disruption here happening. This next interview I did with Casey Choi, the Executive Vice President at Samsung. I did this remotely. He couldn't be here in person. We wanted to bring him in for a conversation. I had a chance to record this with him. He talks about the intelligent Human Edge or Industry 4.0. It was about Edge computing, Samsung as a leader. Obviously we know what they do. They're part of this IOT revolution, Casey Choi, brilliant executive I really enjoyed my conversation. Take a listen. (upbeat music) Welcome to theCube's coverage of Mobile World Congress, 2021. I'm John Furrier host of theCube. We're here with Cube alumni, Casey Choi's Executive Vice President and GM of the Global Mobile B2B Team, Communications Team at Samsung. Casey, great to see you. Thank you for coming off for the special Remote Mobile World Congress. We're here in person, but also hybrid event. We got a lot of remote interviews. Thank you for taking the time to speak with me. >> John. Great to see you. Great as always to be with you and great to be at least here, virtually with the team and in Barcelona from WC. >> You know, in Samsung, we think about the edge. You are leading a team that's driving this innovation. We've talked in the past about Industry 4.0, but the innovation at the intelligent edge, human edge is a big part of it, with 5G. It's just another G, but it's not just another G you got to have a backbone. You got to have a back haul. You got to have an interconnection. You have commercial, not just consumer technology. So the edge is becoming both this human and device commercial environment. So the industry is quickly moving to this. You call it the 4.0 trend. What do you see happening? This is a clear change over the Telco is not what it used to be. Change is coming fast. A lot of disruption, what's your view? >> Yeah, I think we see a number of things done. And certainly from our perspective, which is, I think we've got somewhat of a unique view on this because of our huge focus really in consumer use and attitudes. And certainly it's been informed by what we've seen, what we've all collectively seen over the last year and a half or so, and are still seeing today. And I think one of the things that we're certainly experiencing is I think the edge is it's expanding further out. I think it's also getting more tightly coupled in many respects to the human factor. And it's not just a set of billions of discrete sensors anymore. And I think the evolution of our thinking around this has changed quite a bit from the IOT Version One variant of this. We put more of what I would call billions of these things, communicating all kinds of information, either to the cloud or the data centers and doing it in a very voluminous way. And what we're saying is with the advent of more the human to machine interface, and certainly the capabilities that we're saying both on the network and the device side, it's really redefining how we're thinking about edge. And certainly here at Samsung and with some of our partners, and we're starting to call this more of the intelligent human edge, where the human factor really begins to play a big role in how we're defining the Internet Of Things. And those things include really people. And this is how we're looking at it. >> I love the theme, the human edge, I think that's very relevant. I want to get a human aspect of here tied into the industry side, because as we emerge from the pandemic and move to a broader economic recovery, you see the psychology of the industry where cloud is one of the shining examples of what the pandemic highlighted cloud speed, cloud agility. And now you're seeing with openness in the Teleco industry, that cloud is coming in, open cloud interoperability. So coming out of the pandemic, cloud is the theme is driving an economic recovery, which is driving the psychology of we're back to real life, we're back to business, but it's not business as usual. The fashion is changing. The attitudes are changing. You mentioned that, and now the disruption of how cloud will be implemented. And it seems to be Telco is where these edge and cloud are just completely radically changing, what was once a kind of a slow moving Telco space. So how do you see the partnerships and coming out of the pandemic, some of the response of cloud impact, cloud technology, public cloud impact on this new Telcom? >> Yeah. Let me try to unpack that a little bit. I think we see two dimensions on this, certainly on the carrier side, the operator's side of the equation, we're certainly partnered with everybody across the globe on that. Certainly there's been a definitive impact around software defined everything, right? So, and this has been accelerated really by the standards that have started to develop around 5G. And even now there's a lot of discussion and I'm sure there'll be a lot of it around WMC about 6G and what is happening there. But I think with the advent of things like O-RAN for example, and some of the activity that we're seeing really around NEC type solutions and opportunities, the traditional role of the carrier and the operator is evolving and has to evolve, right? It is now much more aligned with the provision of these types of services that are very different from the type of data or voice services that we've seen in the past. So certainly we're seeing that transition. The second big transition is really around the notion of hybridity. Now we've been talking about this now in the industry for a while, but I think it's really starting to take firm root the idea of not only multiple clouds, but clouds that are deployed either on prem or certainly, available as a service in its various forms. So I think that combination along with the advances that we're seeing in the technology, and this was both on the connectivity side. So certainly around the ultra reliable, low latency communications, what we're seeing with things like slicing, for example, starting to take root as well as frankly, the devices themselves are getting that much more powerful and compact. This is what we're saying with SOC technologies is what we're seeing with the functions being moved more and more to on device capability. So I think about hybrid, I mean, in my past to think about it more as a small data center. How do you compact it, move it out to somewhere else. Now we're thinking about it more in terms of the type of processing capability that you can put really in the hands of the human or hands of the device. And at that point, you really start to get different use cases, start to emerge from that. So this is how we're thinking about this extension and what I'm talking about more as, an expansion on the edge, further out. >> I love is it splicing or slicing, what's the term? Slicing is the technology? >> Slicing, network slicing. >> Slicing, not splicing cable. >> Yeah. >> Slicing. >> Not splicing cable, no. >> Okay so this come up a lot, so splicing kind of points to this end to end, workflows. You look at some of the modern development, the frameworks of successful, you're seeing these multifunctional teams kind of having an end to end visibility into the modern application workflow from CIC pipeline, whatever. Now, if you take the concept of O-RAN you mentioned Open Radio Access Networks, this kind of brings up this idea of interoperability, because if you're going to have end to end and you add edge to it, you have to have the ability to watch something go end to end, but it's never been like that in the past because you had to traverse multiple networks. So this becomes kind of this hybrid a little bit deeper. Can you share how you see that and how Samsung's working with folks and how you guys are addressing this because you can be at the edge, but ultimately you've got to integrate. So you've got openness, you've got the idea of interoperability issues, and you ultimately have to move around and work with other networks, other clouds and other systems. This is not, it's not always like that. So can you share how this is evolving and how real this is and what is your view on it. >> Yeah, our thinking on this. I mean, let me start by maybe tackling this in a little bit of a different angle. One of the things that we see as one of the barriers around interoperability has really been more on the application side of the equation. And this is actually the third component in making all of this work. And let me just be very clear in what I'm saying here, I think in terms of mobile architectures and really Edge architectures, it has been one of the last bastions, if you will of closed architectures, there've been very much what I would call purpose-built architectures at the edge. Certainly that's been driven by things like the industrial side coming together with more of the commercial side of the equation, but we think it's time really to extend the interoperability of what we are seeing really on the IT side of the equation and really driven by cloud native. This was really in the area of containers. It's in the area of microservices, it's in the area of cloud native development. And if we're really talking about this, we really need to extend that interoperability from the application point of view on the data point of view, really to the end point. And this is where some of the work that we're doing, and we really embarked on in earnest last year with Red Hat and IBM, and with VMware for example, in really opening up that edge architecture to really the open source community, as well as really to the microservices architectures that we have now seen propagate down from the cloud into hybrid architecture. So this has been really one of the key focus areas for us. The network interoperability has really been driven by the standards that we've seen and that have been really adopted by the industry. And when it comes to, for example 5G standards. what we've been more focused on quite honestly, is the interoperability on the application and data side. And we think that by extending, if you will, that write once run many type concepts down into the edge and into the device, that this is going to open up really a wealth of opportunity for us on the application and on the data side. >> That's awesome, I love the openness, love the innovation you guys are doing. I think that's where the action is and that's where the growth is going to be. I do have to ask you how you see edge computing in the IOT era in terms of security. Are we more vulnerable because of it now? And how are you guys addressing the issue of security and data privacy at the edge? What's your opinion on that? What's Samsung doing? >> I mean, we just have to look at the news today, it's obvious that we are more vulnerable, right? There's no doubt that points of vulnerability are being exposed and they're probably being exposed in now industrial areas, right? Certainly with what we've seen, just even recently with some of the attacks that, that have occurred. So a couple of things there, number one, we are relying very heavily on our long history around establishing root of trust in kind of zero trust environments. We've had our Knox platform as an example, we just celebrated, in fact, our 10th year of the product. In fact, it was announced at MWC back about 10 years ago. So this is something that, that we're celebrating, it's an anniversary. Our belief on this is that we really need to ensure that we maintain a hardware-based route across when it comes to the edge. We can't only rely upon software protection at that layer. We can't naturally rely upon some of the network protections that are there. So, we've shipped about 3 billion devices with our Knox Security Suite over the last 10 years. And this is something that we're relying very heavily on. Not only for again, that hardware based root of process. So one of the key solutions, there's our Knox Vault product, which we just released a few months back. This is really a safe within a safe concept, really ensuring that the biometric password and other user data is protected. It's really what drives some of our strategy around making sure that we rely upon something that protects all of the back doors that are resident, not only at the software layer, but at the hardware layer as well. And then management is the other key piece of this, security without the ability of managing these thousands to millions of devices is really somewhat compromised. So we've extended a lot of our Knox management capability at our device level really to address some of those particular attributes, as well as these fleets become more prominent. And they start to take on workloads that are more critical to IOT type workloads. >> Casey, great to have you on. Your insight's awesome. Love what you're doing at Samsung. And again, you're a leader, you've been there, you've seen those cycles of innovation. I have to ask you my final question for you is a personal one and a professional one. The last Mobile World Congress was 2019. In person, last year was canceled a lot's happened in the industry since 20 something months ago. Now we're going to be in person, a lot of hybrid still remotely, but there'll be people in person. The world's changed. What is the big change in the Telco, Telco Cloud, Telco Edge, what's happened in these 20 plus months since the last Mobile World Congress that people should pay attention to? What's the most important thing in your mind? >> Most important? Thank God John. You're putting me on the spot here, right? I think it's wisdom to be quite honest with you. I mean, we've certainly all collectively learned a lot in terms of user patterns and what people need and want. And I hope to think that collective wisdom is going to be a key part of how we drive this going forward. And then if I can just pick one more, I would say re-invention, I think what we're starting to see is that coming out of, again from 2019 to what we're seeing now, we do see this opportunity reinventing and rethinking. And I think that's the difference. And the pace of that is going to really dictate how we look at this and how we collectively solve these challenges. So I hope to think we're wiser and that we're more imaginative coming out of this. And again after being in this industry for 30 years, we've not seen the types of things that we've seen over the last couple. So I hope to think that this is a pivot point for all of us. >> Well, Samsung is certainly a leader in many areas and great to see you on theCube here and the theme in your talks around intelligence, human edge innovation, open. This is a force that's happening. And I think the big change, as you said, the wisdom combined with a reinvention is happening and it's going to be very interesting ride, should be fun to work on. >> It will be John and I thank you for our friendship and our relationship over the years. It's always great to see you and to be with you. And again, we're very optimistic as we always have, coming out of this And again, thanks for the time and have a great MWC. >> You too, Casey Choi, Executive Vice President General Manager of the Global Mobile Business to Business Unit Commercial Unit at Samsung. This is theCube's coverage of Mobile World Congress. I'm John Furrier. Thanks for watching. Okay. We're back here. That was Casey Choi. Talk about wisdom, collective wisdom coming out of the pandemic. Great friend of theCube, great friend of the industry doing great work there. Casey Choi. Like we are doing here on the ground at Mobile World Congress in Cloud City, as well as Adam and the team in the studio. So back to you, Adam and team.
SUMMARY :
and GM of the Global Mobile B2B Team, Great as always to be with you and great So the industry is quickly moving to this. and certainly the capabilities and coming out of the pandemic, and some of the activity but it's never been like that in the past One of the things that we see and data privacy at the edge? that protects all of the in the industry since And the pace of that is going and the theme in your and our relationship over the years. great friend of the industry
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
John | PERSON | 0.99+ |
IBM | ORGANIZATION | 0.99+ |
Telco | ORGANIZATION | 0.99+ |
Samsung | ORGANIZATION | 0.99+ |
Casey Choi | PERSON | 0.99+ |
John Furrier | PERSON | 0.99+ |
Adam | PERSON | 0.99+ |
Casey | PERSON | 0.99+ |
2019 | DATE | 0.99+ |
thousands | QUANTITY | 0.99+ |
last year | DATE | 0.99+ |
30 years | QUANTITY | 0.99+ |
Barcelona | LOCATION | 0.99+ |
10th year | QUANTITY | 0.99+ |
Cloud City | LOCATION | 0.99+ |
today | DATE | 0.99+ |
Cloud City | LOCATION | 0.99+ |
Red Hat | ORGANIZATION | 0.99+ |
2021 | DATE | 0.99+ |
Teleco | ORGANIZATION | 0.99+ |
Mobile World Congress | EVENT | 0.99+ |
One | QUANTITY | 0.99+ |
20 plus months | QUANTITY | 0.99+ |
Telco Cloud | ORGANIZATION | 0.99+ |
third component | QUANTITY | 0.98+ |
Telco Edge | ORGANIZATION | 0.98+ |
two dimensions | QUANTITY | 0.98+ |
KC Choi | PERSON | 0.98+ |
both | QUANTITY | 0.98+ |
one | QUANTITY | 0.98+ |
20 something months ago | DATE | 0.97+ |
about 3 billion devices | QUANTITY | 0.97+ |
Global Mobile B2B Team | ORGANIZATION | 0.97+ |
Cube | ORGANIZATION | 0.96+ |
billions | QUANTITY | 0.96+ |
pandemic | EVENT | 0.96+ |
Danielle Royston | PERSON | 0.96+ |
WC | LOCATION | 0.95+ |
Telcom | ORGANIZATION | 0.95+ |
millions of devices | QUANTITY | 0.94+ |
NEC | ORGANIZATION | 0.93+ |
Executive Vice President | PERSON | 0.92+ |
about 10 years ago | DATE | 0.92+ |
last year and a half | DATE | 0.91+ |
billions of discrete sensors | QUANTITY | 0.88+ |
4.0 | QUANTITY | 0.88+ |
last 10 years | DATE | 0.88+ |
Knox Security Suite | TITLE | 0.87+ |
Global Mobile Business to | ORGANIZATION | 0.84+ |
couple | QUANTITY | 0.8+ |
Knox Vault | ORGANIZATION | 0.8+ |
Knox | TITLE | 0.8+ |
Gil Vega, Veeam | VeeamON 2021
(upbeat music) >> Welcome everybody to VeeamON 2021 you're watching theCUBE. My name is Dave Villante. You know in 2020 cyber adversaries they seize the opportunity to really up their game and target workers from home and digital supply chains. It's become increasingly clear to observers that we're entering a new era of cyber threats where infiltrating companies via so-called Island Hopping and stealthily living off the land meaning they're using your own tools and infrastructure to steal your data. So they're not signaling with new tools that they're in there. It's becoming the norm for sophisticated hacks. Moreover, these well-funded and really sophisticated criminals and nation States are aggressively retaliating against incident responses. In other words, when you go to fix the problem they're not leaving the premises they're rather they're tightening the vice on victims by holding your data ransom and threatening to release previously ex filtrated and brand damaging information to the public. What a climate in which we live today. And with me to talk about these concerning trends and what you can do about it as Gil Vega, the CISO of Veeam Gil great to see you. Thanks for coming on. >> Great to see you, Dave. Thanks for having me. >> Yeah. So, you know, you're hearing my intro. It's probably understating the threat. You are a Veeam's first CISO. So how do you see the landscape right now? >> That's right. Yeah. And I've been with the company for just over a year now, but my background is in financial services and spent a lot of time managing cybersecurity programs at the classified level in Washington DC. So I've gleaned a lot of scar tissue from lots of sophisticated attacks and responses. But today I think what we're seeing is really a one-upmanship by a sophisticated potentially nation state sponsored adversaries, this idea of imprisoning your data and charging you to release it is it's quite frightening. And as we've seen in the news recently it can have devastating impacts not only for the economy, but for businesses. Look at the gas lines in the Northeast right now because of the quality of a pipeline, a ransomware attack. I just, the government just released an executive order this morning, that hopes to address some of the some of the nation's unpreparedness for these sophisticated attacks. And I think it's time. And I think everyone's excited about the opportunity to really apply a whole of government approach, to helping critical infrastructure to helping and partnering with private sector and imposing some risks, frankly, on some of the folks that are engaged in attacking our country. >> A number of years ago, I often tell this story. I had the pleasure of interviewing Robert Gates the former Defense Secretary. And it was a while ago we were talking about cyber and he sits on a number of boards. And we were talking about how it's a board level issue. And, and we're talking about cyber crime and the like and nation States. And I said, well, wait, cyber warfare, even. And I said, "But don't we have the best cyber tech. I mean, can't we go on the offense?" And he goes, "Yeah, we do. And we can, but we have more to lose." And to your point about critical infrastructure, it's not just like, okay, we have the most powerful weapons. It's really we have the most valuable infrastructure and a lot to lose. So it's really a tricky game. And this notion of having to be stealthy in your incident response is relatively new. Isn't it? >> It is. It is. And you know, there are, you mentioned that and I was surprised you mentioned because a lot of people really don't talk about it as you're going into your response your adversaries are watching or watching your every move. You have to assume in these days of perpetual state of compromise in your environments, which means that your adversaries have access to your environment to the point that they're watching your incident responders communicate with one another and they're countering your moves. So it's sort of a perverse spin on the old mutually assured destruction paradigm that you mentioned the United States has the world's largest economy. And quite frankly the world's most vulnerable, critical infrastructure. And I would concur with Director Gates or Secretary Gates rather it is assessment that we've got to be awfully careful and measured in our approach to imposing risks. I think the government has worked for many years on defining red lines. And I think this latest attack on the colonial pipeline affecting the economy and people's lives and potentially putting people's lives at risk is towing also the close to that red line. And I'm interested to see where this goes. I'm interested to see if this triggers even a, you know a new phase of cyber warfare, retaliation, you know proactive defense by the National Security Community of the United States government. Be interesting to see how this plays out. >> Yeah, you're absolutely right though. You've got this sort of asymmetric dynamic now which is unique for the United States as soon as strongest defense in the world. And I wanted to get it to ransomware a bit. And specifically this notion of ransomware as a service it's really concerning where criminals can actually outsource the hack as a service and the bad guys will set up, you know, on the dark web they'll have, you know, help desks and phone lines. They'll do the negotiations. I mean, this is a really concerning trend. And obviously Veeam plays a role here. I'm wondering as a, as a SecOps pro what should we be doing about this? >> Yeah, you mentioned ransomware as a service, whereas RWS it's an incredibly pernicious problem perpetrated by sophisticated folks who may or may not have nation state support or alliances. I think at a minimum certain governments are looking the other way as it relates to these criminal activities. But with ransomware as a service, you're essentially having very sophisticated folks create very complex ransomware code and distributed to people who are willing to pay for it. And oftentimes take a part of the ransom as their payment. The, issue with obviously ransomware is you know the age old question, are you going to pay a ransom or are you not going to pay a ransom? The FBI says, don't do it. It only encourages additional attacks. The Treasury Department put out some guidance earlier earlier in the year, advising companies that they could be subject to civil or criminal penalties. If they pay a ransom and the ransom goes to a sanction density. So there's danger on all sides. >> Wow okay. But so, and then the other thing is this infiltrating via digital supply chains I call it Island Hopping and the like, we saw that with the solar winds hack and the scary part is, you know different malware is coming in and self forming and creating different signatures. Not only is it very difficult to detect, but remediating, you know, one, you know combined self formed malware it doesn't necessarily take care of the others. And so, you know, you've got this sort of organic virus, like thing, you know, create mutating and that's something that's certainly relatively new to me in terms of its prevalence your thoughts on that and how to do it. >> Yeah, exactly right. You know, the advent of the polymorphic code that changes the implementation of advanced artificial intelligence and some of this malware is making our job increasingly difficult which is why I believe firmly. You've got to focus on the fundamentals and I think the best answers for protecting against sophisticated polymorphic code is,are found in the NIST cybersecurity framework. And I encourage everyone to really take a close look at implementing that cybersecurity framework across their environments, much like we've done here, here at Veeam implementing technologies around Zero Trust again assuming a perpetual state of compromise and not trusting any transaction in your environment is the key to combating this kind of attack. >> Well, and you know, as you mentioned, Zero Trust Zero Trust used to be a buzzword. Now it's like become a mandate. And you know, it's funny. I mean, in a way I feel like the crypto guys I know there's a lot of fraud in crypto, but but anybody who's ever traded crypto it's like getting into Fort Knox. I mean, you got to know your customer and you've got to do a little transaction. I mean, it's really quite sophisticated in terms of the how they are applying cybersecurity and you know, most even your bank isn't that intense. And so those kinds of practices, even though they're a bit of a pain in the neck, I mean it's worth the extra effort. I wonder if you could talk about some of the best practices that you're seeing how you're advising your clients in your ecosystem and the role that Veeam can play in helping here. >> Yeah, absolutely. As I mentioned so many recommendations and I think the thing to remember here so we don't overwhelm our small and medium sized businesses that have limited resources in this area is to remind them that it's a journey, right? It's not a destination that they can continually improve and focus on the fundamentals. As I mentioned, things like multi-factor authentication you know, a higher level topic might be micro-segmentation breaking up your environment into manageable components that you can monitor a real time. Real time monitoring is one of the key components to implementing Zero Trust architecture and knowing exactly what good looks like in your environment in a situation where you've got real-time monitoring you can detect the anomalies, the things that shouldn't be happening in your environment and to spin up your response teams, to focus and better understand what that is. I've always been a proponent of identity and access management controls and a key focus. We've heard it in this industry for 25 years is enforcing the concept of least privilege, making sure that your privileged users have access to the things they need and only the things that they need. And then of course, data immutability making sure that your data is stored in backups that verifiably has not been changed. And I think this is where Veeam comes into the equation where our products provide a lot of these very easily configured ransomware protections around data and your ability to the ability to instantly back up things like Office 365 emails, you know support for AWS and Azure. Your data can be quickly restored in the event that an attacker is able to in prison that with encryption and ransom demands. >> Well, and so you've certainly seen in the CISOs that I've talked to that they've had to obviously shift their priorities, thanks to the force march to digital, thanks to COVID, but Identity access management, end point security cloud security kind of overnight, you know, Zero Trust. We talked about that and you could see that in some of these, you know, high flying security stocks, Okta Zscaler, CrowdStrike, they exploded. And so what's in these many of these changes seem to be permanent sort of you're I guess, deeper down in the stack if you will, but you, you compliment these toolings with obviously the data protection approach the ransomware, the cloud data protection, air gaps, immutability. Maybe you could talk about how you fit in with the broader, you know, spate of tools. I mean, your, my eyes bleed when you look at all the security companies that are out there. >> Yeah for sure. You know, I'm just going to take it right back to the NIST cybersecurity framework and the five domains that you really need to focus on. Identify, protect, detect, respond, and recover, you know and until recently security practitioners and companies have really focused on on the protect, identify and protect, right and defend rather where they're focused on building, you know, moats and castles and making sure that they've got this, you know hard exterior to defend against attacks. I think there's been a shift over the past couple of years where companies have recognized that the focus needs to be on and respond and recover activities, right? Assuming that people are going to breach or near breach, your entities is a safe way to think about this and building up capabilities to detect those breaches and respond effectively to those breaches are what's key in implementing a successful cybersecurity program where Veeam fits into this since with our suite of products that that can help you through the recovery process, right? That last domain of the NIST cybersecurity framework it'll allow you to instantaneously. As I mentioned before, restore data in the event of a catastrophic breach. And I think it provides companies with the assurances that while they're protecting and building those Zero Trust components into their environments to protect against these pernicious and well-resourced adversaries there's the opportunity for them to recover very quickly using the VM suite of tools? >> Well, I see, I think there's an interesting dynamic here. You're pointing out Gil. There's not no longer is it that, you know, build a moat the Queen's leaving her castle. I always say, you know there is no hardened perimeter anymore. And so you've seen, you know, the shift obviously from hardware based firewalls and you I mentioned those other companies that are doing great but to me, it's all about these layers and response is a big in recovery is a huge part of that. So I'm seeing increasingly companies like Veeam is a critical part of that, that security cyber data protection, you know, ecosystem. I mean, to me it's just as important as the frontline pieces of even identity. And so you see those markets exploding. I think it's, there's a latent value that's building in companies like Veeam that are a key part of those that data protection layer you think about you know, defense strategies. It's not just you, the frontline it's maybe it's airstrikes, maybe it's, you know, C etcetera. And I see that this market is actually a huge opportunity for for organizations like yours. >> I think you're right. And I think the proof is in, you know in the pudding, in terms of how this company has grown and what we've delivered in version 11 of our suite, including, you know features like continuous data protection, we talked about that reliable ransomware protection support for AWS S3 Glacier and Azure archive the expanded incident recovery, and then support for disaster recovery and backup as a service. You know, what I found most interesting in my year here at Veeam is just how much our administrators the administrators in our company and our customers companies that are managing backups absolutely love our products that ease of use the instant backup capabilities and the support they receive from Veeam. It's almost cultish in terms of how our customers are using these products to defend themselves in today's pretty intense cyber threat environment. >> Well, and you talked about the NIST framework, and again big part of that is recovery, because we talked about earlier about, do you pay the ransom or not? Well, to the extent that I can actually recover from having all my data encrypted then I've got obviously a lot more leverage and in many ways, I mean, let's face it. We all know that it's not a matter of if it's, when you get infiltrated. And so to the extent that I can actually have systems that allow me to recover, I'm now in a much much stronger position in many respects, you know and CISOs again, will tell you this that's where we're shifting our investments >> Right. And you've got to do all of them. It's not just there's no silver bullet, but but that seems to me to be just a a misunderstood and undervalued part of the equation. And I think there's tremendous upside there for companies like yours. >> I think you're right. I think what I'll just add to that is the power of immutability, right? Just verifiably ensuring that your data has not changed because oftentimes you'll have attackers in these low and slow live off the land types of attacks change your data and affect its integrity with the Veeam suite of tools. You're able to provide for immutable or unchanged verifiable data and your backup strategy which is really the first step to recovery after a significant event. >> And that's key because a lot of times the hackers would go right after the backup Corpus you know, they'll sometimes start there is that all the data, you know, but if you can make that immutable and again, it, you know there's best practices there too, because, you know if you're not paying the cloud service for that immutability, if you stop paying then you lose that. So you have to be very careful about, you know how you know, who has access to that and you know what the policies are there, but again, you know you can put in, you know so a lot of this, as you know, is people in process. It's not just tech, so I'll give you the last word. I know you got to jump, but really appreciate.. >> Yeah, sure. >> You know, the only, the only thing that we didn't mention is user awareness and education. I think that is sort of the umbrella key focus principle for any successful cybersecurity program making sure your people understand, you know how to deal with phishing emails. You know, ransomware is a huge threat of our time at 90% of ransomware malware is delivered by phishing. So prepare your workforce to deal with phishing emails. And I think you'll save yourself quite a few headaches. >> It's great advice. I'm glad you mentioned that because because bad user behavior or maybe uninformed user behaviors is the more fair way to say it. It will trump good security every time. Gil, thanks so much for coming to the CUBE and and keep fighting the fight. Best of luck going forward. >> Great. Thank you, Dave. >> All right. And thank you for watching everybody. This is Dave Villante for the CUBEs continuous coverage VeeamON 2021, the virtual edition. We will be right back. (upbeat music)
SUMMARY :
and infrastructure to steal your data. Great to see you, Dave. So how do you see the landscape right now? about the opportunity to really apply And to your point about and I was surprised you mentioned and the bad guys will set and the ransom goes to a sanction density. And so, you know, you've got the key to combating and you know, most even your and to spin up your response teams, in the stack if you will, and the five domains that and you I mentioned those other companies and the support they receive from Veeam. Well, and you talked but but that seems to me to be is the power of immutability, right? and again, it, you know there's you know how to deal with phishing emails. and and keep fighting the fight. And thank you for watching everybody.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Dave Villante | PERSON | 0.99+ |
Dave | PERSON | 0.99+ |
Robert Gates | PERSON | 0.99+ |
25 years | QUANTITY | 0.99+ |
National Security Community | ORGANIZATION | 0.99+ |
FBI | ORGANIZATION | 0.99+ |
Washington DC | LOCATION | 0.99+ |
Gil Vega | PERSON | 0.99+ |
AWS | ORGANIZATION | 0.99+ |
Veeam | ORGANIZATION | 0.99+ |
90% | QUANTITY | 0.99+ |
Gil | PERSON | 0.99+ |
NIST | ORGANIZATION | 0.99+ |
2020 | DATE | 0.99+ |
Treasury Department | ORGANIZATION | 0.99+ |
CrowdStrike | ORGANIZATION | 0.99+ |
first step | QUANTITY | 0.99+ |
today | DATE | 0.98+ |
2021 | DATE | 0.98+ |
Okta Zscaler | ORGANIZATION | 0.98+ |
VeeamON | ORGANIZATION | 0.98+ |
Office 365 | TITLE | 0.98+ |
five domains | QUANTITY | 0.98+ |
Zero Trust | ORGANIZATION | 0.98+ |
Gates | PERSON | 0.97+ |
one | QUANTITY | 0.97+ |
over a year | QUANTITY | 0.97+ |
Secretary | PERSON | 0.97+ |
this morning | DATE | 0.96+ |
COVID | ORGANIZATION | 0.96+ |
RWS | ORGANIZATION | 0.95+ |
Ve | ORGANIZATION | 0.94+ |
Veeam | PERSON | 0.94+ |
Director | PERSON | 0.93+ |
Northeast | LOCATION | 0.9+ |
Veeam Gil | ORGANIZATION | 0.87+ |
Zero Trust Zero Trust | ORGANIZATION | 0.87+ |
CUBE | ORGANIZATION | 0.85+ |
Island Hopping | TITLE | 0.85+ |
first CISO | QUANTITY | 0.82+ |
United States government | ORGANIZATION | 0.8+ |
Defense Secretary | PERSON | 0.76+ |
past couple of years | DATE | 0.75+ |
United States | LOCATION | 0.74+ |
CISO | PERSON | 0.73+ |
number of years ago | DATE | 0.73+ |
version 11 | OTHER | 0.71+ |
while ago | DATE | 0.71+ |
SecOps | ORGANIZATION | 0.69+ |
Azure | ORGANIZATION | 0.68+ |
Azure | TITLE | 0.67+ |
S3 Glacier | TITLE | 0.63+ |
VeeamON | TITLE | 0.63+ |
Fort Knox | TITLE | 0.59+ |
CUBEs | ORGANIZATION | 0.57+ |
KC Choi, Samsung | IBM Think 2021
>> Voiceover: From around the globe, it's theCUBE with digital coverage of IBM Think 2021, brought to you by IBM. >> Hello and welcome back everyone to theCUBE's coverage of IBM Think 2021 virtual. I'm John Furrier, your host of theCUBE. I'm excited to have this next guest, CUBE alumni, K.C. Choi, Corporate EVP, Executive Vice President and General Manager at Samsung Mobile the B2B/B2G Team. K.C., great to see you, how you've been? >> John, it is wonderful to see you and it's been way too long. Great to be back on theCUBE with you looking forward to our conversation and I hope you're safe. >> Yeah and same to you. Great to see you, I'm so excited. One of the things I've really admired about you and our conversations in the past is you've always had your finger on the pulse of the waves and you're always involved with some really great engineering work. And I want to dig into this now because your role is really hitting the industry for that kind of wave which is the confluence of tech, media, entertainment, every vertical, big data, IOT and with the distributed computing now called the Cloud and edge. It really sets the table for what is now going to be the preferred architecture probably for the next 20 plus years. So give us your view on how you see the changing landscape in the industry. >> Yeah, I think you covered all of the major seismic shifts that are happening here. And then as we've all experienced over the last, over a year with the COVID pandemic, that's actually accelerated a lot of the thinking around edge. We've certainly seen news cases proliferate whether it be in things such as healthcare, manufacturing's also taken I think, a real hard look at the applicability of these types of solutions. We've seen things like, for example 5G pickup in these industrial applications as the industrial companies have thought about worker safety, as they've thought about automation, as they thought about utilizing more protocols, as well as bringing these technologies and processes together in a way that will help to reinvent their particular economic base, as well as the learnings that we've seen over the last year, coming from these new safety protocols as well as the need for now with the economies is picking back up, the need for productivity, as well as greater efficiencies coming from these types of solutions. So we've seen that confluence happen. And then certainly on our end, as our network connectivity has become much stronger, lower latency, as well as the endpoint capabilities have increased dramatically over the last few years, as SOC and others have taken root, we've seen the edge, if you will, start be more extreme, in the sense that it's pushing further and further out beyond what we originally envisioned the edge to be. >> And the SOC trend actually highlights that it's not so much about Moore's law as it is more about more chips, more performance. If you look at actual performance, Dave Vellante just put out a report on this, where there's actually more performance now than ever before coming in from the combined energy and combined processing power out there. So it's super, super amazing what you can do at the edge. Before we get into the edge, I want to just clarify what is your new role there? I mean, Samsung is known for obviously the B2C with the phones and everything else, but you have a specific focus, what is your main focus there? >> Yeah, our mission's pretty straightforward. And as everyone knows, Samsung is a powerhouse consumer electronics company. We pride ourselves in obviously our position in that, but we also have a very significant role really in the business to business and in the government and financial services sector space with our mobile devices, as well as with our Knox security platform solution and device management platform. We actually provide a large portion of the security devices for governments worldwide as well as the Knox platform that is built into the majority of our, both, consumer as well as business devices that really allows for that, if you will, that next protective layer on top of the Android OS that allows for things such as, personal and professional profiles. So we produce those solutions out of my team as well as we provide really the go-to-market support, as well as the RnD support for that platform, including an area that's growing rapidly for us which is in the rugged category, which is one of the key products that we're using for some of these edge applications that we'll be talking about. >> Great, let's jump into that. What are you guys doing specifically in the edge computing space? Let's dig into it. >> Yeah, I think maybe the place to start on that is we're really reenvisioning what the edge is. And I mentioned a little earlier that with what's occurring in the performance profile and really the functional profile, what is being produced at the device level. We're talking about in the last few years, the fidelity and the capabilities are in, what I would call the computer class type functions, as well as obviously mobile devices have always been communication gateways for a number of functions, whether they be videos or photos. They're multisensory in nature. And as this has become more practical and the connective tissue has gotten there with 5G as well as all kinds of other fast low latency communications capabilities and Wi-Fi 6, UWB, included within that. What we're finding is that the use case to bring applications especially cloud native and container native applications to these devices to be augmenting the endpoint user, the frontline worker, really the knowledge worker and moving that capability further away from, if you will, an extension to cloud services as well as MEC type services, this is where we see it going. And really what we're trying to work on with IBM and with Red Hat is how do we continue to fortify this, not only from an actual processing AI/ML capability, but also equip these devices so that they can fully participate as part of a multi-hybrid cloud architecture. The endpoint is really one of the last bastions where we have not conquered bringing cloud first container native applications really to that point. And we believe the time is right because of the capabilities that are there along with, again, the connectivity that is becoming much more ubiquitous now to allow for that type of architecture to exist. And we're starting to call this the intelligent human edge as well. We think that the applications that we'll see for this are ones that will make the human operator more productive, safer, certainly more efficient. And we think that this augmentation of that frontline worker is an area that we are, put our stakes on in terms of pioneering, just because of again, our experience in that mobility space and in that consumer space. >> That's great you brought up Red Hat and IBM. Obviously Red Hat was bought by IBM. Arvin, the CEO who I interviewed in 2019 in theCUBE at Red Hat summit, ironically, a couple months later, buys the company and a smile on his face. He likes cloud. >> K.C.: Maybe you had something to do with that, John. >> No, he wanted to, I could see he wanted to say it, but he loves the cloud. Everyone who knows Arvin knows that he's into the cloud in a new way. And this edge piece that you mentioned that you're using Red Hat and IBM for hybrid, this is what the new operating system is going to look like. It's a completely distributed system and the edge is just part of that operating model. This is what their vision is, which I love by the way. I think that redefines what that is. Are you saying that you guys are working with Red Hat and IBM for that hybrid edge piece? How does that work? Can you take me through that? >> Yeah, that's exactly right. I mean, obviously the ecosystem is bigger than that, but IBM and Red Hat really bring the expertise really around container ecosystems, certainly the work that they have done in terms a multi hybrid cloud, certainly the work that OpenShift has brought forward in terms of, you know, multi-platform capability. We really love the concept of develop bonds run, any sort of a construct. And when you think about it, the mobile platforms specifically, you know, ours, as well as others, has really been that last baskin of areas where more of the development is on a particular platform, it's more bespoke. We think that by broaching this, you know in conjunction with IBM and Red Hat this is going to give us the ability to have these device architectures become a full voting member, if you will, of that hybrid cloud architecture and of that microservice container architecture that is becoming much more prevalent. So this is really the work that we're doing. And then obviously we're working at a vertical level to see where are the applicable use cases in places such as the design studio we have in Singapore, where with the Singaporean government we're looking at really bringing a Renaissance to industry 4.0 type applications, smart factory automation, public safety, these areas where we believe that this type of architecture can be deployed. >> That's awesome. And I totally believe that, you know the edge is still going to be pushed farther and further out, honestly, having that open standards of hybrid. So I got to ask you, on the edge just while I got you here, you know, one of the things that you see clearly as the industrial edge, it's called, factories and whatnot. You've mentioned some of those. And then you've got the human piece, which is like people have phones and wearables and other things are going to be happening. So as you start to have those end points, which are then going to be connected into a distributed network, AKA a hybrid cloud, soon to be multiple clouds. But that's the sub system within the cloud construct. The complaint has been, not complaint, but the observation has been and complaint, if you look at it that the edge is limited by power and connectivity, okay. These are like key basic concepts. How is the connectivity option? I know 5G is coming, it's here, we're seeing it being deployed. We got people saying, hey, this is our business application. Clearly got higher throughput, not as much range. Give us your take on this because this becomes important, obviously, power is battery that is driven, it's getting better and better and power is not really that much of a problem, but connectivity seems to be, what's your vision of this? >> Yeah and you know, there's a lot of ways to approach that. I will tell you on the industrial side, at least in some of the deployments and PLCs that we've been involved in over the last a year or two years, connectivity is an issue. And a lot of it has to do with the infrastructure that is available in many of these plants or factories, or points of distribution, they're not necessarily leading edge, in many cases we're dealing with what I would call sub par connectivity. It's not like an office complex where you may have state-of-the-art Wi-Fi capability or 10 gig capability or whatever it might be. So what we've found on that is it requires actually quite a bit of work, in terms of fine tuning, both, on the the network infrastructure side, whatever that might be or we've also found that on the device side, the programmability of the of the device, in terms of tuning it for whatever connective environment would be there. And we've worked with everything from, you know, Bluetooth, UWB to Wi-Fi 6 and everything in between and in many cases or multiple protocols or connectivity methods that are there. So, you know, one thing we've learned is that you can't necessarily assume that in a, especially in a factory environment that those conditions are going to allow for consistency. So you have to engineer around that, you know, in some of the things that we've done are really around making sure that we've got deployable programmability at the device as well as board dynamic network tuning capabilities that will allow for better connectivity and to handle things such as consistency. >> All right, K.C., great insight. Final question for you, why Samsung and IBM? What's the bottom line? >> Yeah, I think the bottom line is really straightforward. I mean, we've had a 30 year history of working together, you know, we've been mutual customers to each other. We do a lot of work for IBM, in regards to foundry type services and semiconductor services. And that we work very closely with them over many years on applications. So number one, there's been a natural relationship, just in the services that we provided to each other. But as we look at really the go-to-market, I mean, IBM brings so much credibility from a vertical market perspective. There's a trusted advisor type status that I think is a very profound and it's been built over many years, you know, delivering on the promises. And on our end, I think what we bring is really this cycle time that is driven by our passion in the consumer space. And when we start to apply that into more of these vertical industrial, you know, vertical sectors, I think that combination is very powerful. The services piece obviously comes into play with IBM. And then really, the Red Hat piece of this really just puts the icing on the cake with really the the market leadership in hybrid cloud and in the container native architecture, so it's just a very powerful combo and the cooperation there has been strong and we continue to look forward to delivering more through that partnership. >> K.C., great to see you, great thing to hear. You know, you got scalable infrastructure, you got modern applications, got the edge, all hybrid. Great partnership. K.C. Choi, Corporate Executive Vice President and General Manager of Samsung Mobile B2B Team. Great to see you and congratulations on your mission and it's an exciting project. Thanks for coming on theCUBE and sharing. >> Great to see you, John, take care of yourself and looking forward to seeing you again. >> Okay, this is theCUBE's coverage IBM Think 2021. I'm John Furrier, your host of theCUBE. Thanks for watching. (soft upbeat music) (melodious music)
SUMMARY :
brought to you by IBM. the B2B/B2G Team. Great to be back on theCUBE with you and our conversations in the past envisioned the edge to be. coming in from the combined energy in the business to business in the edge computing space? and really the functional profile, Arvin, the CEO who I something to do with that, John. and the edge is just part and of that microservice that the edge is limited by that on the device side, What's the bottom line? and the cooperation there has been strong Great to see you and and looking forward to seeing you again. Okay, this is theCUBE's
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
IBM | ORGANIZATION | 0.99+ |
Samsung | ORGANIZATION | 0.99+ |
Dave Vellante | PERSON | 0.99+ |
Singapore | LOCATION | 0.99+ |
John Furrier | PERSON | 0.99+ |
John | PERSON | 0.99+ |
Arvin | PERSON | 0.99+ |
30 year | QUANTITY | 0.99+ |
Red Hat | ORGANIZATION | 0.99+ |
K.C. Choi | PERSON | 0.99+ |
Android | TITLE | 0.99+ |
2019 | DATE | 0.99+ |
10 gig | QUANTITY | 0.99+ |
last year | DATE | 0.99+ |
both | QUANTITY | 0.98+ |
Knox | TITLE | 0.98+ |
K.C. | PERSON | 0.98+ |
Red Hat | EVENT | 0.98+ |
Samsung Mobile | ORGANIZATION | 0.98+ |
Moore | PERSON | 0.97+ |
COVID pandemic | EVENT | 0.96+ |
one | QUANTITY | 0.95+ |
two years | QUANTITY | 0.94+ |
a couple months later | DATE | 0.94+ |
Red Hat | TITLE | 0.93+ |
CUBE | ORGANIZATION | 0.93+ |
over a year | QUANTITY | 0.93+ |
Red Hat | ORGANIZATION | 0.91+ |
one of the key products | QUANTITY | 0.9+ |
OpenShift | ORGANIZATION | 0.9+ |
5G | ORGANIZATION | 0.89+ |
next 20 plus years | DATE | 0.87+ |
theCUBE | ORGANIZATION | 0.86+ |
KC | PERSON | 0.85+ |
Think 2021 | COMMERCIAL_ITEM | 0.84+ |
One | QUANTITY | 0.83+ |
last | DATE | 0.81+ |
Rena | ORGANIZATION | 0.76+ |
Executive Vice President | PERSON | 0.72+ |
first | QUANTITY | 0.71+ |
Singaporean | ORGANIZATION | 0.71+ |
Choi | ORGANIZATION | 0.65+ |
B2B/B2G | ORGANIZATION | 0.62+ |
years | DATE | 0.61+ |
year | DATE | 0.55+ |
President | PERSON | 0.46+ |
5G | QUANTITY | 0.44+ |
IBM20 KC Choi VTT
(melodious music) >> Voiceover: From around the globe, it's theCUBE with digital coverage of IBM Think 2021, brought to you by IBM. >> Hello and welcome back everyone to theCUBE's coverage of IBM Think 2021 virtual. I'm John Furrier, your host of theCUBE. I'm excited to have this next guest, CUBE alumni, K.C. Choi, Corporate EVP, Executive Vice President and General Manager at Samsung Mobile the B2B/B2G Team. K.C., great to see you, how you've been? >> John, it is wonderful to see you and it's been way too long. Great to be back on theCUBE with you looking forward to our conversation and I hope you're safe. >> Yeah and same to you. Great to see you, I'm so excited. One of the things I've really admired about you and our conversations in the past is you've always had your finger on the pulse of the waves and you're always involved with some really great engineering work. And I want to dig into this now because your role is really hitting the industry for that kind of wave which is the confluence of tech, media, entertainment, every vertical, big data, IOT and with the distributed computing now called the Cloud and edge. It really sets the table for what is now going to be the preferred architecture probably for the next 20 plus years. So give us your view on how you see the changing landscape in the industry. >> Yeah, I think you covered all of the major seismic shifts that are happening here. And then as we've all experienced over the last, over a year with the COVID pandemic, that's actually accelerated a lot of the thinking around edge. We've certainly seen news cases proliferate whether it be in things such as healthcare, manufacturing's also taken I think, a real hard look at the applicability of these types of solutions. We've seen things like, for example 5G pickup in these industrial applications as the industrial companies have thought about worker safety, as they've thought about automation, as they thought about utilizing more protocols, as well as bringing these technologies and processes together in a way that will help to reinvent their particular economic base, as well as the learnings that we've seen over the last year, coming from these new safety protocols as well as the need for now with the economies is picking back up, the need for productivity, as well as greater efficiencies coming from these types of solutions. So we've seen that confluence happen. And then certainly on our end, as our network connectivity has become much stronger, lower latency, as well as the endpoint capabilities have increased dramatically over the last few years, as SOC and others have taken root, we've seen the edge, if you will, start be more extreme, in the sense that it's pushing further and further out beyond what we originally envisioned the edge to be. >> And the SOC trend actually highlights that it's not so much about Moore's law as it is more about more chips, more performance. If you look at actual performance, Dave Vellante just put out a report on this, where there's actually more performance now than ever before coming in from the combined energy and combined processing power out there. So it's super, super amazing what you can do at the edge. Before we get into the edge, I want to just clarify what is your new role there? I mean, Samsung is known for obviously the B2C with the phones and everything else, but you have a specific focus, what is your main focus there? >> Yeah, our mission's pretty straightforward. And as everyone knows, Samsung is a powerhouse consumer electronics company. We pride ourselves in obviously our position in that, but we also have a very significant role really in the business to business and in the government and financial services sector space with our mobile devices, as well as with our Knox security platform solution and device management platform. We actually provide a large portion of the security devices for governments worldwide as well as the Knox platform that is built into the majority of our, both, consumer as well as business devices that really allows for that, if you will, that next protective layer on top of the Android OS that allows for things such as, personal and professional profiles. So we produce those solutions out of my team as well as we provide really the go-to-market support, as well as the RnD support for that platform, including an area that's growing rapidly for us which is in the rugged category, which is one of the key products that we're using for some of these edge applications that we'll be talking about. >> Great, let's jump into that. What are you guys doing specifically in the edge computing space? Let's dig into it. >> Yeah, I think maybe the place to start on that is we're really reinvisioning what the edge is. And I mentioned a little earlier that with what's occurring in the performance profile and really the functional profile, what is being produced at the device level. We're talking about in the last few years, the fidelity and the capabilities are in, what I would call the computer class type functions, as well as obviously mobile devices have always been communication gateways for a number of functions, whether they be videos or photos. They're multisensory in nature. And as this has become more practical and the connective tissue has gotten there with 5G as well as all kinds of other fast low latency communications capabilities and Wi-Fi 6, UWB, included within that. What we're finding is that the used case to bring applications especially cloud native and container native applications to these devices to be augmenting the endpoint user, the frontline worker, really the knowledge worker and moving that capability further away from, if you will, an extension to cloud services as well as MEC type services, this is where we see it going. And really what we're trying to work on with IBM and with Red Hat is how do we continue to fortify this, not only from an actual processing AI ML capability, but also equip these devices so that they can fully participate as part of a multi hybrid cloud architecture. The endpoint is really one of the last baskins where we have not conquered bringing cloud first container native applications really to that point. And we believe the time is right because of the capabilities that are there along with, again, the connectivity that is becoming much more ubiquitous now to allow for that type of architecture to exist. And we're starting to call this the intelligent human edge as well. We think that the applications that we'll see for this are ones that will make the human operator more productive, safer, certainly more efficient. And we think that this augmentation of that frontline worker is an area that we are, put our stakes on in terms of pioneering, just because of again, our experience in that mobility space and in that consumer space. >> That's great you brought up Red Hat and IBM. Obviously Red Hat was bought by IBM. Arvin, the CEO who I interviewed in 2019 in theCUBE at Red Hat summit, ironically, a couple months later, buys the company and a smile on his face. He likes cloud. >> K.C.: Maybe you had something to do with that, John. >> No, he wanted to, I could see he wanted to say it, but he loves the cloud. Everyone who knows Arvin knows that he's into the cloud in a new way. And this edge piece that you mentioned that you're using Red Hat and IBM for hybrid, this is what the new operating system is going to look like. It's a completely distributed system and the edge is just part of that operating model. This is what their vision is, which I love by the way. I think that redefines what that is. Are you saying that you guys are working with Red Hat and IBM for that hybrid edge piece? How does that work? Can you take me through that? >> Yeah, that's exactly right. I mean, obviously the ecosystem is bigger than that, but IBM and Red Hat really bring the expertise really around container ecosystems, certainly the work that they have done in terms a multi hybrid cloud, certainly the work that OpenShift has brought forward in terms of, you know, multi-platform capability. We really love the concept of develop bonds run, any sort of a construct. And when you think about it, the mobile platforms specifically, you know, ours, as well as others, has really been that last baskin of areas where more of the development is on a particular platform, it's more bespoke. We think that by broaching this, you know in conjunction with IBM and Red Hat this is going to give us the ability to have these device architectures become a full voting member, if you will, of that hybrid cloud architecture and of that microservice container architecture that is becoming much more prevalent. So this is really the work that we're doing. And then obviously we're working at a vertical level to see where are the applicable use cases in places such as the design studio we have in Singapore, where with the Singaporean government we're looking at really bringing a Renaissance to industry 4.0 type applications, smart factory automation, public safety, these areas where we believe that this type of architecture can be deployed. >> That's awesome. And I totally believe that, you know the edge is still going to be pushed farther and further out, honestly, having that open standards of hybrid. So I got to ask you, on the edge just while I got you here, you know, one of the things that you see clearly as the industrial edge, it's called, factories and whatnot. You've mentioned some of those. And then you've got the human piece, which is like people have phones and wearables and other things are going to be happening. So as you start to have those end points, which are then going to be connected into a distributed network, AKA a hybrid cloud, soon to be multiple clouds. But that's the sub system within the cloud construct. The complaint has been, not complaint, but the observation has been and complaint, if you look at it that the edge is limited by power and connectivity, okay. These are like key basic concepts. How is the connectivity option? I know 5G is coming, it's here, we're seeing it being deployed. We got people saying, hey, this is our business application. Clearly got higher throughput, not as much range. Give us your take on this because this becomes important, obviously, power is battery that is driven, it's getting better and better and power is not really that much of a problem, but connectivity seems to be, what's your vision of this? >> Yeah and you know, there's a lot of ways to approach that. I will tell you on the industrial side, at least in some of the deployments and PLCs that we've been involved in over the last a year or two years, connectivity is an issue. And a lot of it has to do with the infrastructure that is available in many of these plants or factories, or points of distribution, they're not necessarily leading edge, in many cases we're dealing with what I would call sub par connectivity. It's not like an office complex where you may have state-of-the-art Wi-Fi capability or 10 gig capability or whatever it might be. So what we've found on that is it requires actually quite a bit of work, in terms of fine tuning, both, on the the network infrastructure side, whatever that might be or we've also found that on the device side, the programmability of the of the device, in terms of tuning it for whatever connective environment would be there. And we've worked with everything from, you know, Bluetooth, UWB to Wi-Fi 6 and everything in between and in many cases or multiple protocols or connectivity methods that are there. So, you know, one thing we've learned is that you can't necessarily assume that in a, especially in a factory environment that those conditions are going to allow for consistency. So you have to engineer around that, you know, in some of the things that we've done are really around making sure that we've got deployable programmability at the device as well as board dynamic network tuning capabilities that will allow for better connectivity and to handle things such as consistency. >> All right, K.C., great insight. Final question for you, why Samsung and IBM? What's the bottom line? >> Yeah, I think the bottom line is really straightforward. I mean, we've had a 30 year history of working together, you know, we've been mutual customers to each other. We do a lot of work for IBM, in regards to foundry type services and semiconductor services. And that we work very closely with them over many years on applications. So number one, there's been a natural relationship, just in the services that we provided to each other. But as we look at really the go-to-market, I mean, IBM brings so much credibility from a vertical market perspective. There's a trusted advisor type status that I think is a very profound and it's been built over many years, you know, delivering on the promises. And on our end, I think what we bring is really this cycle time that is driven by our passion in the consumer space. And when we start to apply that into more of these vertical industrial, you know, vertical sectors, I think that combination is very powerful. The services piece obviously comes into play with IBM. And then really, the Red Hat piece of this really just puts the icing on the cake with really the the market leadership in hybrid cloud and in the container native architecture, so it's just a very powerful combo and the cooperation there has been strong and we continue to look forward to delivering more through that partnership. >> K.C., great to see you, great thing to hear. You know, you got scalable infrastructure, you got modern applications, got the edge, all hybrid. Great partnership. K.C. Choi, Corporate Executive Vice President and General Manager of Samsung Mobile B2B Team. Great to see you and congratulations on your mission and it's an exciting project. Thanks for coming on theCUBE and sharing. >> Great to see you, John, take care of yourself and looking forward to seeing you again. >> Okay, this is theCUBE's coverage IBM Think 2021. I'm John Furrier, your host of theCUBE. Thanks for watching. (soft upbeat music) (melodious music)
SUMMARY :
brought to you by IBM. the B2B/B2G Team. Great to be back on theCUBE with you and our conversations in the past envisioned the edge to be. coming in from the combined energy in the business to business in the edge computing space? and really the functional profile, Arvin, the CEO who I something to do with that, John. and the edge is just part and of that microservice that the edge is limited by that on the device side, What's the bottom line? and the cooperation there has been strong Great to see you and and looking forward to seeing you again. Okay, this is theCUBE's
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
IBM | ORGANIZATION | 0.99+ |
Samsung | ORGANIZATION | 0.99+ |
Dave Vellante | PERSON | 0.99+ |
John Furrier | PERSON | 0.99+ |
John | PERSON | 0.99+ |
Arvin | PERSON | 0.99+ |
Singapore | LOCATION | 0.99+ |
Red Hat | ORGANIZATION | 0.99+ |
30 year | QUANTITY | 0.99+ |
K.C. Choi | PERSON | 0.99+ |
2019 | DATE | 0.99+ |
Android | TITLE | 0.99+ |
10 gig | QUANTITY | 0.99+ |
both | QUANTITY | 0.98+ |
last year | DATE | 0.98+ |
Red Hat | EVENT | 0.98+ |
COVID pandemic | EVENT | 0.98+ |
Knox | TITLE | 0.97+ |
K.C. | PERSON | 0.96+ |
one | QUANTITY | 0.96+ |
Samsung Mobile | ORGANIZATION | 0.95+ |
Moore | PERSON | 0.94+ |
two years | QUANTITY | 0.94+ |
CUBE | ORGANIZATION | 0.94+ |
one of the key products | QUANTITY | 0.94+ |
next 20 plus years | DATE | 0.92+ |
KC | PERSON | 0.92+ |
theCUBE | ORGANIZATION | 0.9+ |
One | QUANTITY | 0.88+ |
over a year | QUANTITY | 0.88+ |
OpenShift | ORGANIZATION | 0.88+ |
Red Hat | ORGANIZATION | 0.87+ |
a couple months later | DATE | 0.85+ |
5G | ORGANIZATION | 0.85+ |
Singaporean | OTHER | 0.81+ |
Samsung Mobile B2B | ORGANIZATION | 0.8+ |
Hat | TITLE | 0.79+ |
first | QUANTITY | 0.79+ |
Think 2021 | COMMERCIAL_ITEM | 0.74+ |
last | DATE | 0.73+ |
Executive Vice President | PERSON | 0.72+ |
years | DATE | 0.72+ |
Choi | ORGANIZATION | 0.68+ |
Red | ORGANIZATION | 0.59+ |
President | PERSON | 0.57+ |
B2B/B2G | ORGANIZATION | 0.56+ |
year | DATE | 0.51+ |
5G | OTHER | 0.5+ |
years | QUANTITY | 0.44+ |
2021 | DATE | 0.44+ |
IBM20 | ORGANIZATION | 0.43+ |
Think | TITLE | 0.34+ |
IBM20 KC Choi VCUBE
>>from around >>The globe. It's the cube with digital coverage of IBM. Think 2021 brought to you by IBM Hello and welcome back everyone to the cubes coverage of IBM Think 2021 virtual. I'm john for your host of the cube. I'm excited to have this next guest cube alumni Casey choi corporate E V P. Executive vice president and general manager at Samsung Mobile, the B to B and B to G team Casey, great to see you how you been >>john it is wonderful to see you and it's been way too long. Great to be back on the cube with you. Looking forward to our conversation and hope you're safe >>and same to you. Great to see you. I'm so excited. One of the things I've really admired about you and our conversations in the past as you've always had your finger on the pulse of the waves and you've always involved with some really great engineering work and I want to dig into this now because um your role is really hitting the industry four dot oh kind of wave, which is the confluence of tech, media, entertainment, every vertical big data IOT and the the with the distributed computing now called the cloud and edge. It really sets the table for what is now going to be the preferred architecture probably for the next 20 plus years. So give us your view on how you see the the changing landscape in the industry. >>Yeah, I think I think you you covered you know, all of the major seismic shifts that are happening here and then, you know, as we've all experienced over the last, you know, over a year with the covid pandemic, that's actually accelerated a lot of the thinking around the edge. We've certainly seen use cases proliferate whether it be in things such as health care, Manufacturing is also taken. I think a real hard look at the applicability of these types of solutions. Uh we've seen things like for example 5G pick up in these sort of industrial applications as um you know as the industrial companies have thought about worker safety as they thought about automation as they thought about, you know, utilize being more protocols as well as you know, bringing these technologies and processes together in a way that will help to kind of reinvent their their particular economic base as well as kind of the learnings that we've seen over the last year coming from these new uh safety protocols as well as the need for now with the economy is picking back up the need for productivity as well as you know, greater efficiencies coming from these types of solutions. So we've seen that confluence happened and then certainly on our end as our network connectivity has become much stronger, lower latency as well as the endpoint capabilities have increased dramatically over the last few years, as S O C. S and others have taken root. We've seen the edge, if you will start to be more extreme in the sense that it's pushing further and further out beyond what we originally envisioned the edge to be. >>And the S O C trend actually highlights that it's not so much about moore's law as it is more about more chips, more more performance if you look at actual performance, David and they just put out a report on this where there's much more performance now than ever before coming in from the combined energy. So uh and combined processing power out there. So it's super, super amazing what you can do at the edge. Before we get into the edge. I want to just Clarify, what is your new role there? I mean Samsung is known for, I'll see the B2C with the phones and everything else, but you have a specific focus uh what is your main focus there? >>Yeah, our missions pretty straightforward and as everyone knows, you know, Samsung is this uh you know, powerhouse uh consumer electronics company we pride ourselves in and obviously uh our our position in that, but um we also have a very significant role really in the business to business and in the government and financial services sector space uh with our mobile devices as well as with our knock security platform solution and device management platform. We actually provide a large portion of the secure devices for governments worldwide, as well as the Knox platform that is built into the majority of our both consumer as well as business devices uh really allows for uh that uh if you will that next protective layer on top of the android. Os that allows for things such as personal and professional profile. So we produce those solutions out of my team um as well as we provide really the the go to market support as well as the R and D support for that platform, including uh an area that's growing rapidly for us, which is in the rugged category, which is, you know, one of the key products that we're using for some of these edge applications that will be talking about. >>Great, let's jump into that. What are you guys doing specifically on the edge computing space? Let's dig into it. >>Yeah, I think, you know, maybe the place to start on that is uh we're really kind of re envisioning what the edges and uh I mentioned a little earlier that uh with what's occurring in the performance profile and really the functional profile, what is being produced at the device level, You know, we're talking about in the last few years, the fidelity and the capabilities are, you know, in, you know, what I would call the the computer class type uh, functions as well as obviously mobile devices have always been um, communication gateways for a number of functions, whether they be, you know, videos or photos, their multi sensory in nature. And as this has become more practical and the connective tissue has gotten there with five G as well as all kinds of other, you know, fast, low latency communications capabilities and wifi six U w b, you know, included within that. What we're finding is that the use case to bring applications, especially cloud, native and container native applications uh, to these devices to be, you know, augmenting the the endpoint user, the frontline worker, uh really the Knowledge Worker and moving that capability further away from if you will and an extension to cloud services as well as the M E C type services. This is where we see it going and really what we're trying to to work on with IBM and with red hat is how do we, you know, continue to fortify this, not only from a actual processing ai Ml capability, but also equipped these devices so that they can fully participate as part of a multi hybrid cloud architecture. Uh the endpoint is really one of the last baskets where we have not uh kind of conquered bringing uh, you know, cloud first container native applications really to that point and we believe the time is right because of the capabilities that are there along with again, uh the connectivity that is becoming much more ubiquitous now to allow for that type of architecture to exist. And uh, we're starting to call this the intelligent human edge as well. We think that the applications that will see for this are you know, ones that will uh, you know, make the, the human operator more productive, safer, uh certainly more efficient and uh we think that this augmentation of that front line workers is an area that we, we are, you know, put put our, our steaks on in terms of pioneering just because of our experience in that mobility space and in the consumer space. >>That's great. You brought up red hat and IBM obviously red hat was bought by IBM Arvin Arvin Ceo. Well I interviewed in 2019 and the cube that red hat summit, ironically a couple months later by the company just smile on his face. He likes clowns. >>You had something to do with that. You know, >>he wanted to, I could see he wanted to say it, but but he loves the cloud. Everyone who knows Arvin knows that he's into the cloud in a new way in this edge piece that you mentioned that you're using red hat and IBM for hybrid. This is what the new operating system is going to look like. It's a completely distributed system and the edge is just part of that operating model. This is what their vision is, which I love by the way, I think that redefines what that is. Are you saying that you guys are working with red hat and IBM for that hybrid edge piece. How does that work? Can you take me through that? >>Yeah, that's exactly right. I mean this is a obviously the ecosystems bigger than that, but IBM and red Hat really bring the expertise really around uh container ecosystems, certainly the work that they have done in terms of multi hybrid cloud, uh certainly the work that open ship has brought forward in terms of, you know, multi platform capability. We really love the concept of developed once run any sort of a construct. And uh when you think about it, the mobile platforms specifically, you know, ours as well as others has really been that last bastion of, of areas where more of the development is on a particular platform, it's more bespoke. We think that by broaching this uh, you know, in conjunction with IBM and Red Hat, um this is going to give us the ability to have these device architecture has become a full voting member if you will of of that hybrid cloud architecture and of that microservices can contain architecture that is becoming much more prevalent. So this is really the work that we're doing. And then obviously we're working at a vertical level to see where are the applicable use cases in places such as the design studio we have in Singapore, where with the Singaporean government, we're looking at really bringing a renaissance to industry ford auto type application, smart factory automation, public safety. These areas where we believe that this type of architecture can be, can be deployed. >>That's awesome. And totally believe that the edge um it's still gonna be pushed further and further out, honestly having that open, open standards of of hybrid. So I gotta ask you on the edge just well I got you here, you know, one of the things that you see clearly as the industrial edge, it's called factories and whatnot. You mentioned some of those and then you got the human piece, which is like people have phones and wearables and other things are gonna be happening. So as you start to have those endpoints which are then gonna be connected into a distributed network, take a hybrid cloud, so to be multiple clouds. But yeah, that's the subsystem within the cloud construct. The complaint has been not complaint, but the observation has been and complain if you look at it that the edges limited by power and connectivity. Okay. These are like key basic concepts, How is the connectivity option? I know five Gs coming, it's here, we're seeing it being deployed, we got people saying, hey, this is our business application, clearly got higher throughput, not as much range, give us your take on this because this becomes important. I'll see powers battery driven, getting better and better and and power is getting uh is not really that much of a problem, but connectivity seems to be what's your vision of this? >>Yeah, and you know, there's a lot of ways to approach that, I will tell you on the industrial side, at least in some of the deployments and pOC is that we've been involved in over the last year to two years, um connectivity is an issue uh and a lot of it has to do with the infrastructure that is available in many of these uh you know, plants or factories or you know, points of distribution. Uh they're not necessarily, you know, leading edge in many cases we're dealing with uh you know what I would call subpar connectivity, it's not like an office complex where You may have, you know, kind of state of the art wifi capability or you know, 10 gig capability or whatever it might be. Um So what we've, what we've found on that is it requires actually quite a bit of work in terms of fine tuning both on the network infrastructure side, whatever that might be. Uh Or we've also found that on the device side, the program ability of the of the device in terms of tuning it for whatever connective environment would be there. And we worked with everything from, you know, bluetooth, you w b uh to wifi six and everything in between and in many cases they're multiple uh you know, protocols or connectivity methods that are there. So, you know, one thing we've learned is that um you can't you can't necessarily assume that in a especially in a factory environment that those conditions are going to allow for um uh you know, consistency, so you have to engineer around that, you know, and some of the things that we've done are really around making sure that we've got uh, you know, deployable program ability at the device as well as, you know, uh more dynamic network tuning capabilities that will allow for, you know, better connectivity and handle things such as consistency. >>All right, Casey, Great to incite final question for you why Samsung and IBM, what's the bottom line? >>Yeah, I think the bottom line is really straightforward. I mean we've had a, you know, 30 year history of working together, uh you know, we've been mutual customers to each other. We do a lot of work for IBM in regards to foundry type services and semiconductor services and then we work very closely with them over many years on applications. So number one, there's been a natural relationship just in the the the services that we provided to each other. But as as we look at really to go to market, I mean, IBM brings so much credibility from a vertical market perspective. Um there's a trusted advisor type status that I think is is very profound and it's been built over many years, you know, delivering on the promises and on our end. I think what we bring is really this uh this uh cycle time that is driven by our passion in the consumer space. And when we start to apply that into more of these vertical industrial, uh you know, vertical sectors, I think that combination is very powerful. Um the services piece obviously comes into play with IBM and then really the red hat piece of this really just puts the icing on the cake with really the market leadership in uh you know, hybrid cloud and in the container native architecture. So it's just a very powerful combo. And um you know, the cooperation there has been strong and we continue to look forward to delivering more through that partnership. >>Casey great to see a great, great thing to hear. You know, you got scalable infrastructure, you get modern applications at the edge, all of hybrid. Great, great partnership. Casey Choi Executive Vice Corporate Executive Vice President and General Manager of Samsung Mobile B two B team. Great to see you and congratulations on your mission. It's exciting project. Thanks for coming on the cube and sharing. >>Great to see you, jOHn take care of yourself and looking forward to seeing you again. >>Okay, this is the cubes coverage. IBM think 2021. I'm john for your host of the cube. Thanks for watching.
SUMMARY :
team Casey, great to see you how you been john it is wonderful to see you and it's been way too long. One of the things I've really admired about you and our conversations in the past protocols as well as you know, bringing these technologies and processes together in a way that I'll see the B2C with the phones and everything else, but you have a specific focus uh what is you know, one of the key products that we're using for some of these edge applications that will What are you guys doing specifically on the edge computing space? Yeah, I think, you know, maybe the place to start on that is uh we're really kind Well I interviewed in 2019 and the cube that red hat summit, ironically a couple You had something to do with that. knows that he's into the cloud in a new way in this edge piece that you mentioned that you're using uh certainly the work that open ship has brought forward in terms of, you know, So I gotta ask you on the edge just well I got you here, you know, one of the things that of these uh you know, plants or factories or you know, leadership in uh you know, hybrid cloud and in the container native architecture. Great to see you and congratulations on your mission. I'm john for your host of the cube.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
David | PERSON | 0.99+ |
IBM | ORGANIZATION | 0.99+ |
Samsung | ORGANIZATION | 0.99+ |
Singapore | LOCATION | 0.99+ |
Casey Choi | PERSON | 0.99+ |
Arvin | PERSON | 0.99+ |
30 year | QUANTITY | 0.99+ |
Casey choi | PERSON | 0.99+ |
Red Hat | ORGANIZATION | 0.99+ |
Casey | PERSON | 0.99+ |
10 gig | QUANTITY | 0.99+ |
2019 | DATE | 0.99+ |
android | TITLE | 0.99+ |
two years | QUANTITY | 0.99+ |
Samsung Mobile | ORGANIZATION | 0.99+ |
both | QUANTITY | 0.99+ |
one | QUANTITY | 0.98+ |
Think 2021 | COMMERCIAL_ITEM | 0.98+ |
last year | DATE | 0.97+ |
2021 | DATE | 0.97+ |
over a year | QUANTITY | 0.97+ |
covid pandemic | EVENT | 0.96+ |
john | PERSON | 0.96+ |
Knox | TITLE | 0.95+ |
red Hat | ORGANIZATION | 0.95+ |
Samsung Mobile B | ORGANIZATION | 0.95+ |
a couple months later | DATE | 0.93+ |
red hat | ORGANIZATION | 0.92+ |
One | QUANTITY | 0.92+ |
first | QUANTITY | 0.92+ |
Os | TITLE | 0.89+ |
last | DATE | 0.89+ |
next 20 plus years | DATE | 0.88+ |
Executive | PERSON | 0.86+ |
S O C. | TITLE | 0.83+ |
Arvin Ceo | PERSON | 0.74+ |
Singaporean government | ORGANIZATION | 0.73+ |
wave | EVENT | 0.73+ |
years | DATE | 0.72+ |
red hat | COMMERCIAL_ITEM | 0.65+ |
E V P. | ORGANIZATION | 0.63+ |
ture | ORGANIZATION | 0.62+ |
Executive vice president | PERSON | 0.58+ |
Choi | PERSON | 0.56+ |
red hat | EVENT | 0.55+ |
five Gs | COMMERCIAL_ITEM | 0.54+ |
jOHn | PERSON | 0.51+ |
four dot oh | EVENT | 0.5+ |
red | COMMERCIAL_ITEM | 0.5+ |
things | QUANTITY | 0.49+ |
Executive Vice President | PERSON | 0.48+ |
years | QUANTITY | 0.46+ |
two | QUANTITY | 0.43+ |
hat | ORGANIZATION | 0.42+ |
KC | PERSON | 0.42+ |
hat | TITLE | 0.38+ |
Session 8 California’s Role in Supporting America’s Space & Cybersecurity Future
(radio calls) >> Announcer: From around the globe, its theCUBE covering Space & Cybersecurity Symposium 2020, hosted by Cal poly. Hello, welcome back to theCUBE virtual coverage with Cal Poly for the Space and Cybersecurity Symposium, a day four and the wrap up session, keynote session with the Lieutenant Governor of California, Eleni Kounalakis. She's here to deliver her keynote speech on the topic of California's role in supporting America's Cybersecurity future. Eleni, take it away. >> Thank you, John, for the introduction. I am Lieutenant Governor Eleni Kounalakis. It is an honor to be part of Cal Poly Space and Cybersecurity Symposium. As I speak kind of Pierre with the governor's office of business and economic development is available on the chat, too ready to answer any questions you might have. California and indeed the world are facing significant challenges right now. Every day we are faced with the ongoing COVID-19 pandemic and the economic downturn that is ensued. We have flattened the curve in California and are moving in the right direction but it is clear that we're not out of the woods yet. It is also impossible right now to escape the reality of climate change from the fire sparked by exceptionally rare, dry lightening events to extreme heat waves threatening public health and putting a strain on our electricity grid. We see that climate change is here now. And of course we've been recently confronted with a series of brutal examples of institutionalized racism that have created an awakening among people of all walks of life and compelled us into the streets to march and protest. In the context of all this, we cannot forget that we continue to be faced with other less visible but still very serious challenges. Cybersecurity threats are one of these. We have seen cities, companies and individuals paralyzed by attacks costing time and money and creating an atmosphere of uncertainty and insecurity. Our state agencies, local governments, police departments, utilities, news outlets and private companies from all industries are target. The threats around cybersecurity are serious but not unlike all the challenges we face in California. We have the tools and fortitude to address them. That is why this symposium is so important. Thank you, Cal Poly and all the participants for being here and for the important contributions you bring to this conference. I'd like to also say a few words about California's role in America's future in space. California has been at the forefront of the aerospace industry for more than a century through all the major innovations in aerospace from wooden aircraft, to World War II Bombers, to rockets and Mars rovers. California has played a pivotal role. Today, California is the number one state in total defense spending, defense contract spending and total number of personnel. It is estimated the Aerospace and Defense Industry, provides $168 billion in economic impact to our state. And America's best trained and most experienced aerospace and technology workforce lives here in California. The fact that the aerospace and defense sector, has had a strong history in California is no accident. California has always had strong innovation ecosystem and robust infrastructure that puts many sectors in a position to thrive. Of course, a big part of that infrastructure is a skilled workforce. And at the foundation of a skilled workforce is education. California has the strongest system of public higher education in the world. We're home to 10 university of California campuses, 23 California State university campuses and 116 California Community Colleges. All told nearly 3 million students are enrolled in public higher education. We also have world renowned private universities including the California Institute of Technology and Stanford University numbers one and three in the country for aerospace engineering. California also has four national laboratories and several NASA facilities. California possesses a strong spirit of innovation, risk taking and entrepreneurship. Half of all venture capital funding in the United States, goes to companies here in California. Lastly, but certainly no less critical to our success, California is a diverse state. 27% of all Californians are foreign born, 27% more than one in four of our population of 40 million people are immigrants from another country, Europe central and South America, India, Asia, everywhere. Our rich cultural diversity is our strength and helps drive our economy. As I look to the future of industries like cybersecurity and the growing commercial space industry, I know our state will need to work with those industries to make sure we continue to train our workforce for the demands of an evolving industry. The office of the lieutenant governor has a unique perspective on higher education and workforce development. I'm on the UC Board of Regents, the CSU Board of Trustees. And as of about two weeks ago, the Community Colleges Board of Governors. The office of the lieutenant governor is now the only office that is a member of every governing board, overseeing our public higher education system. Earlier in the symposium, we heard a rich discussion with Undersecretary Stewart Knox from the California Labor and Workforce Development Agency about what the state is doing to meet the needs of space and cybersecurity industries. As he mentioned, there are over 37,000 job vacancies in cybersecurity in our state. We need to address that gap. To do so, I see an important role for public private partnerships. We need input from industry and curriculum development. Some companies like Lockheed Martin, have very productive partnerships with universities and community colleges that train students with skills they need to enter aerospace and cyber industries. That type of collaboration will be key. We also need help from the industry to make sure students know that fields like cybersecurity even exist. People's early career interests are so often shaped by the jobs that members of their family have or what they see in popular culture. With such a young and evolving field like cybersecurity, many students are unaware of the job opportunities. I know for my visits to university campuses that students are hungry for STEM career paths where they see opportunities for good paying jobs. When I spoke with students at UC Merced, many of them were first generation college students who went through community college system before enrolling in a UC and they gravitated to STEM majors. With so many job opportunities available to STEM students, cybersecurity ought to be one that they are aware of and consider. Since this symposium is being hosted by Cal Poly, I wanted to highlight the tremendous work they're doing as leaders in the space and cybersecurity industry. Cal Poly California Cybersecurity Institute, does incredible work bringing together academia, industry and government training the next generation of cyber experts and researching emerging cybersecurity issues. As we heard from the President of Cal Poly, Jeff Armstrong the university is in the perfect location to contribute to a thriving space industry. It's close to Vandenberg Air Force Base and UC Santa Barbara and could be home to the future permanent headquarters of US Space Command. The state is also committed to supporting this space industry in the Central Coast. In July, the State of California, Cal poly US-based force and the others signed a memorandum of understanding to develop a commercial space port at Vandenberg Air Force Base and to develop a master plan to grow the commercial space industry in the region. Governor Newsom has made a commitment to lift up all regions of the state. And this strategy will position the Central Coast to be a global leader in the future of the space industry. I'd like to leave you with a few final thoughts, with everything we're facing. Fires, climate change, pandemic. It is easy to feel overwhelmed but I remain optimistic because I know that the people of the State of California are resilient, persistent, and determined to address our challenges and show a path toward a better future for ourselves and our families. The growth of the space industry and the economic development potential of projects like the Spaceport at Vandenberg Air Force Base, our great example of what we can look forward to. The potential for the commercial space industry to become a $3 trillion industry by mid century, as many experts predict is another. There are so many opportunities, new companies are going to emerge doing things we never could have dreamed of today. As Lieutenant General John Thompson said in the first session, the next few years of space and cyber innovation are not going to be a pony ride at the state fair, they're going to be a rodeo. We should all saddle up. Thank you. >> Okay, thank you very much, Eleni. I really appreciate it. Thank you for your participation and all your support to you and your staff. You guys doing a lot of work, a lot going on in California but cybersecurity and space as it comes together, California's playing a pivotal role in leading the world and the community. Thank you very much for your time. >> Okay, this session is going to continue with Bill Britton. Who's the vice president of technology and CIO at Cal Poly but more importantly, he's the director of the cyber institute located at Cal Poly. It's a global organization looking at the intersection of space and cybersecurity. Bill, let's wrap this up. Eleni had a great talk, talking about the future of cybersecurity in America and its future. The role California is playing, Cal Poly is right in the Central Coast. You're in the epicenter of it. We've had a great lineup here. Thanks for coming on. Let's put a capstone on this event. >> Thank you, John. But most importantly, thanks for being a great partner helping us get this to move forward and really changing the dynamic of this conversation. What an amazing time we're at, we had quite an unusual group but it's really kind of the focus and we've moved a lot of space around ourselves. And we've gone from Lieutenant General Thompson and the discussion of the opposition and space force and what things are going on in the future, the importance of cyber in space. And then we went on and moved on to the operations. And we had a private company who builds, we had the DOD, Department Of Defense and their context and NASA and theirs. And then we talked about public private partnerships from President Armstrong, Mr. Bhangu Mahad from the DOD and Mr. Steve Jacques from the National Security Space Association. It's been an amazing conference for one thing, I've heard repeatedly over and over and over, the reference to digital, the reference to cloud, the reference to the need for cybersecurity to be involved and really how important that is to start earlier than just at the employment level. To really go down into the system, the K through 12 and start there. And what an amazing time to be able to start there because we're returning to space in a larger capacity and it's now all around us. And the lieutenant governor really highlighted for us that California is intimately involved and we have to find a way to get our students involved at that same level. >> I want to ask you about this inflection point that was a big theme of this conference and symposium. It was throughout the interviews and throughout the conversations, both on the chat and also kind of on Twitter as well in the social web. Is that this new generation, it wasn't just space and government DOD, all the normal stuff you see, you saw JPL, the Hewlett Foundation, the Defense Innovation Unit, Amazon Web Services, NASA. Then you saw entrepreneurs come in, who were doing some stuff. And so you had this confluence of community. Of course, Cal Poly had participated in space. You guys does some great job, but it's not just the physical face-to-face show up, gets to hear some academic papers. This was a virtual event. We had over 300 organizations attend, different organizations around the world. Being a virtual event you had more range to get more people. This isn't digital. This symposium isn't about Central California anymore. It's global. >> No, it really has gone. >> What really happened to that? >> It's really kind of interesting because at first all of this was word of mouth for this symposium to take place. And it just started growing and growing and the more that we talk to organizations for support, the more we found how interconnected they were on an international scale. So much so that we've decided to take our cyber competition next year and take it globally as well. So if in fact as Major General Shaw said, this is about a multinational support force. Maybe it's time our students started interacting on that level to start with and not have to grow into it as they get older, but do it now and around space and around cybersecurity and around that digital environment and really kind of reduce the digital dividing space. >> Yeah, General Thompson mentioned this, 80 countries with programs. This is like the Olympics for space and we want to have these competitions. So I got great vision and I love that vision, but I know you have the number... Not number, the scores and from the competition this year that happened earlier in the week. Could you share the results of that challenge? >> Yeah, absolutely. We had 83 teams participate this year in the California Cyber Innovation Challenge. And again, it was based around a spacecraft scenario where a spacecraft, a commercial spacecraft was hacked and returned to earth. And the students had to do the forensics on the payload. And then they had to do downstream network analysis, using things like Wireshark and autopsy and other systems. It was a really tough competition. The students had to work hard and we had middle school and high school students participate. We had an intermediate league, new schools who had never done it before or even some who didn't even have STEM programs but were just signing up to really get involved in the experience. And we had our ultimate division which was those who had competed in several times before. And the winner of that competition was North Hollywood. They've been the winning team for four years in a row. Now it's a phenomenal program, they have their hats off to them for competing and winning again. Now what's really cool is not only did they have to show their technical prowess in the game but they also have to then brief and out-brief what they've learned to a panel of judges. And these are not pushovers. These are experts in the field of cybersecurity in space. We even had a couple of goons participating from DefCon and the teams present their findings. So not only are we talking technical, we're talking about presentation skills. The ability to speak and understand. And let me tell you, after reading all of their texts to each other over the weekend adds a whole new language they're using to interact with each other. It's amazing. And they are so more advanced and ready to understand space problems and virtual problems than we are. We have to challenge them even more. >> Well, it sounds like North Hollywood got the franchise. It's likethe Patriots, the Lakers, they've got a dynasty developing down there in North Hollywood. >> Well, what happens when there's a dynasty you have to look for other talent. So next year we're going global and we're going to have multiple states involved in the challenge and we're going to go international. So if North Hollywood pulls it off again next year, it's going to be because they've met the best in the world than defeated >> Okay, the gauntlet has been thrown down, got to take down North Hollywood from winning again next year. We'll be following that. Bill, great to get those results on the cyber challenge we'll keep track and we'll put a plug for it on our site. So we got to get some press on that. My question to you is now as we're going digital, other theme was that they want to hire digital natives into the space force. Okay, the DOD is looking at new skills. This was a big theme throughout the conference not just the commercial partnerships with government which I believe they had kind of put more research and personally, that's my personal opinion. They should be putting in way more research into academic and these environments to get more creative. But the skill sets was a big theme. What's your thoughts on how you saw some of the highlight moments there around skill sets? >> John, it's really interesting 'cause what we've noticed is in the past, everybody thinks skill sets for the engineering students. And it's way beyond that. It's all the students, it's all of them understanding what we call cyber cognizance. Understanding how cybersecurity works whatever career field they choose to be in. Space, there is no facet of supporting space that doesn't need that cyber cognizance. If you're in the back room doing the operations, you're doing the billing, you're doing the contracting. Those are still avenues by which cybersecurity attacks can be successful and disrupt your space mission. The fact that it's international, the connectivities, all of those things means that everyone in that system digitally has to be aware of what's going on around them. That's a whole new thought process. It's a whole new way of addressing a problem and dealing with space. And again it's virtual to everyone. >> That's awesome. Bill, great to have you on. Thank you for including theCUBE virtual, our CUBE event software platform that we're rolling out. We've been using it for the event and thank you for your partnership in this co-creation opening up your community, your symposium to the world, and we're so glad to be part of it. I want to thank you and Dustin and the team and the President of Cal Poly for including us. Thank you very much. >> Thank you, John. It's been an amazing partnership. We look forward to it in the future. >> Okay, that's it. That concludes the Space and Cybersecurity Symposium 2020. I'm John Furrier with theCUBE, your host with Cal Poly, who put on an amazing virtual presentation, brought all the guests together. And again, shout out to Bill Britton and Dustin DeBrum who did a great job as well as the President of Cal poly who endorsed and let them do it all. Great event. See you soon. (flash light sound)
SUMMARY :
and the wrap up session, keynote session and for the important and the community. of the cyber institute the reference to the need for but it's not just the and the more that we talk to This is like the Olympics for space And the students had to do It's likethe Patriots, the Lakers, in the challenge and we're of the highlight moments for the engineering students. and the President of Cal We look forward to it in the future. as the President of Cal poly
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Amazon Web Services | ORGANIZATION | 0.99+ |
John | PERSON | 0.99+ |
DOD | ORGANIZATION | 0.99+ |
NASA | ORGANIZATION | 0.99+ |
Eleni | PERSON | 0.99+ |
Dustin | PERSON | 0.99+ |
Jeff Armstrong | PERSON | 0.99+ |
National Security Space Association | ORGANIZATION | 0.99+ |
Bill Britton | PERSON | 0.99+ |
California | LOCATION | 0.99+ |
Dustin DeBrum | PERSON | 0.99+ |
California Institute of Technology | ORGANIZATION | 0.99+ |
John Furrier | PERSON | 0.99+ |
California Labor and Workforce Development Agency | ORGANIZATION | 0.99+ |
Defense Innovation Unit | ORGANIZATION | 0.99+ |
Lockheed Martin | ORGANIZATION | 0.99+ |
America | LOCATION | 0.99+ |
UC Board of Regents | ORGANIZATION | 0.99+ |
Steve Jacques | PERSON | 0.99+ |
Bill Britton | PERSON | 0.99+ |
United States | LOCATION | 0.99+ |
July | DATE | 0.99+ |
Cal poly | ORGANIZATION | 0.99+ |
Cal Poly | ORGANIZATION | 0.99+ |
Hewlett Foundation | ORGANIZATION | 0.99+ |
$3 trillion | QUANTITY | 0.99+ |
Department Of Defense | ORGANIZATION | 0.99+ |
Asia | LOCATION | 0.99+ |
$168 billion | QUANTITY | 0.99+ |
Bhangu Mahad | PERSON | 0.99+ |
next year | DATE | 0.99+ |
India | LOCATION | 0.99+ |
Cal Poly California Cybersecurity Institute | ORGANIZATION | 0.99+ |
CSU Board of Trustees | ORGANIZATION | 0.99+ |
Bill | PERSON | 0.99+ |
President | PERSON | 0.99+ |
four years | QUANTITY | 0.99+ |
Olympics | EVENT | 0.99+ |
23 | QUANTITY | 0.99+ |
Central Coast | LOCATION | 0.99+ |
JPL | ORGANIZATION | 0.99+ |
Stanford University | ORGANIZATION | 0.99+ |
Pierre | PERSON | 0.99+ |
three | QUANTITY | 0.99+ |
116 | QUANTITY | 0.99+ |
earth | LOCATION | 0.99+ |
27% | QUANTITY | 0.99+ |
South America | LOCATION | 0.99+ |
Vandenberg Air Force Base | LOCATION | 0.99+ |
Community Colleges Board of Governors | ORGANIZATION | 0.99+ |
first session | QUANTITY | 0.99+ |
40 million people | QUANTITY | 0.99+ |
mid century | DATE | 0.99+ |
Lakers | ORGANIZATION | 0.99+ |
California Cyber Innovation Challenge | EVENT | 0.99+ |
Undersecretary | PERSON | 0.99+ |
UC Merced | ORGANIZATION | 0.99+ |
Governor | PERSON | 0.99+ |
Central California | LOCATION | 0.99+ |
Vandenberg Air Force Base | LOCATION | 0.99+ |
North Hollywood | ORGANIZATION | 0.99+ |
this year | DATE | 0.99+ |
US Space Command | ORGANIZATION | 0.99+ |
four national laboratories | QUANTITY | 0.98+ |
10 university | QUANTITY | 0.98+ |
over 300 organizations | QUANTITY | 0.98+ |
80 countries | QUANTITY | 0.98+ |
3 teams | QUANTITY | 0.98+ |
Eleni Kounalakis | PERSON | 0.98+ |
Philippe Courtot, Qualys | Qualys Security Conference 2019
>>From Las Vegas. It's the cube covering Qualis security conference 2019 you buy quality. >>Hey, welcome back. You're ready. Jeff Frick here with the cube. We're in Las Vegas at the Bellagio, at the quality security conference. It's the 19th year they've been doing this. It's our first year here and we're excited to be here and it's great to have a veteran who's been in this space for so long, to give a little bit more of a historical perspective as to what happened in the past and where we are now and what can we look forward to in the future. So coming right off his keynote is Felipe korto, the chairman and CEO of Qualys. Phillip, great to see you. Thank you. Same, same, same for me. Absolutely. So you touched on so many great, um, topics in your conversation about kind of the shifts of, of, of modern computing from the mainframe to the mini. We've heard it over and over and over, but the key message was really about architecture. If you don't have the right architecture, you can't have the right solution. So how has the evolution of architects of architectures impacted your ability to deliver security solutions for your clients? >>So now that's a very good question. And in fact, you know, what happened is that we started in 1999 with a vision that we could use exactly like a salesforce.com this nascent internet technologies and apply that to security. And uh, so, and mod when you have applied that to essentially changing the way CRM was essentially used and deployed in enterprises and with a fantastic success as we know. So for us, the, I can say today that 19 years later the vision was right. It took a significant longer because the security people are not really, uh, warm at the idea of silently, uh, having the data in their view, which was in place that they could not control. And the it people, they didn't really like at all the fact that suddenly they were not in control anymore of the infrastructure. So we had a lot of resistance. >>I, wherever we always, I always believe, absolutely believe that the, the cloud will be the cloud architecture to go back. A lot of people make the confusion. That was part of the confusion that for people it was a cloud, that kind of magical things someplace would you don't know where. And when I were trying to explain, and I've been saying that so many times that well you need to look at the cloud like compute that can architecture which distribute the competing power far more efficiently than the previous one, which was client server, which was distributing the convening power far better than of course the mainframes and the mini computers. And so if you look at their architectures, so the mainframe were essentially big data centers in uh, in Fort Knox, like settings, uh, private lines of communication to a dump terminal. And of course security was not really issue then because it's security was built in by the IBM's and company. >>Same thing with the mini computer, which then was instead of just providing the computing power to the large, very large company, you could afford it. Nelson and the minicomputer through the advanced in semiconductor technology could reduce a foot Frank. And then they'll bring that computing power to the labs and to the departments. And was then the new era of the digital equipment, the prime, the data general, et cetera. Uh, and then kind of server came in. So what client server did, again, if you look at the architecture, different architecture now silently servers, the land or the internal network and the PC, and that was now allowing to distribute the computing power to the people in the company. And so, but then you needed to, so everybody, nobody paid attention to security because then you were inside of the enterprise. So it started inside the walls of the castle if you prefer. >>So nobody paid attention to that. It was more complex because now you have multiple actors. Instead of having one IBM or one digital equipment, et cetera, suddenly you have the people in manufacturing and the servers, the software, the database, the PCs, and on announcer, suddenly there was the complexity, increasing efficiency, but nobody paid attention to security because it wasn't a needed until suddenly we realized that viruses could come in through the front door being installed innocently. You were absolutely, absolutely compromised. And of course that's the era of the antivirus which came in. And then because of the need to communicate more and more now, Senator, you could not stay only in your castle. You needed to go and communicate to your customers, to your suppliers, et cetera, et cetera. And now he was starting to open up your, your castle to the world and hello so now so that the, the bad guy could come in and start to steal your information. >>And that was the new era of the forward. Now you make sure that those who come in, but of course that was a little bit naive because there were so many other doors and windows, uh, that people could come in, you know, create tunnels and create these and all of that trying to ensure your customers because the data was becoming more and more rich and more, more important or more value. So whenever there is a value, of course the bad guys are coming in to try to sell it. And that was that new era of a willing to pay attention to security. The problem has been is because you have so many different actors, there was nothing really central there that was just selling more and more solutions and no, absolutely like 800 vendors bolting on security, right? And boating on anything is short-lived at the end of the day because you put more and more weight and then you also increase the complexity and all these different solutions you need. >>They need to talk together so you have a better context. Uh, but they want the design to talk together. So now you need to put other system where they could communicate that information. So you complicated and complicated and complicated the solution. And that's the problem of today. So now cloud computing comes in and again, if you look at the architecture of cloud computing, it's again data centers, which is not today I've become thanks to the technology having infinite, almost competing power and storage capabilities. And like the previous that I sent her, the are much more fractured because you just one scale and they become essentially a little bit easier to secure. And by the way, it's your fewer vendors now doing that. And then of course the access can be controlled better. Uh, and then of course the second component is not the land and the one, it's now the internet. >>And the internet of course is the web communications extremely cheap and it brings you an every place on the planet and soon in Morris, why not? So and so. Now the issue today is that still the internet needs to be secure. And today, how are we going to secure the internet? Which is very important thing today because you see today that you can spoof your email, you can spoof your website, uh, you can attack the DNS who, yes, there's a lot of things that the bad guys still do. And in fact, they've said that leverage the internet of course, to access everywhere so they take advantage of it. So now this is obviously, you know, I created the, the trustworthy movement many years ago to try to really address that. Unfortunately, the quality's was too small and it was not really our place today. There's all the Google, the Facebook, the big guys, which in fact their business depend on the internet. >>Now need to do that. And I upload or be diabetic, criticized very much so. Google was the first one to essentially have a big initiative, was trying to push SSL, which everybody understand is secret encryption if you prefer. And to everybody. So they did a fantastic job. They really push it. So now today's society is becoming like, okay, as I said, you want to have, as I said it all in your communication, but that's not enough. And now they are pushing and some people criticize them and I absolutely applaud them to say we need to change the internet protocols which were created at a time when security, you were transferring information from universities and so forth. This was the hay days, you know, of everything was fine. There was no bad guys, you know, the, he'd be days, if you like, of the internet. Everybody was free, everybody was up and fantastic. >>Okay. And now of course, today this protocol needs to be upgraded, which is a lot of work. But today I really believe that if you put Google, Amazon, Facebook altogether, and they can fix these internet protocols. So we could forget about the spoofing and who forgot about all these phishing and all these things. But this is their responsibility. So, and then you have now on the other side, you have now very intelligent devices from in a very simple sensors and you know, to sophisticated devices, the phone, that cetera and not more and more and more devices interconnected and for people to understand what is going. So this is the new environment and whether we always believe is that if you adopt an architecture, which is exactly which fits, which is similar, then we could instead of bolting security in, we can now say that the build security in a voting security on, we could build security in. >>And we have been very proud of the work that we've done with Microsoft, which we announced in fact relatively recently, very recently, that in fact our agent technologies now is bundled in Microsoft. So we have built security with Microsoft in. So from a security perspective today, if you go to the Microsoft as your secretly center, you click on the link and now you have the view of your entire Azure environment. Crazier for quality Sagent. You click on a second link and now you have the view of your significant loss posture, crazy of that same quality. Say Sagent and then you click on the third name with us. Nothing to do with quality. It's all Microsoft. You create your playbook and you remediate. So security in this environment has become click, click, click, nothing to install, nothing to update. And the only thing you bring are your policies saying, I don't want to have this kind of measured machine expose on the internet. >>I want, this is what I want. And you can continuously audit in essentially in real time, right? So as you can see, totally different than putting boxes and boxes and so many things and then having to for you. So very big game changer. So the analogy that I want you that I give to people, it's so people don't understand that paradigm shift is already happening in the way we secure our homes. You put sensors everywhere, you have cameras, you have detection for proximity detection. Essentially when somebody tried to enter your home, all that data is continuously pumped up into an incidence restaurant system. And then from your phone, again across the internet, you can change the temperature of your rooms. You can do what you can see the person who knocks on the door. You can see its face, you can open the door, close the door, the garage door, you can do all of that remotely, another medically. >>And then if there's a burglar then in your house to try to raking immediately the incidents or some system called the cops or the far Marsha difficult fire. And that's the new paradigm. So security has to follow that paradigm. And then you have interesting of the problem today that we see with all the current secretly uh, systems, uh, incidents, response system. They have a lot of false positive, false positive and false negative are the enemy really of security. Because if you are forced visited, you cannot automate the response because then you are going to try to respond to something that is not true. So you are, you could create a lot of damage. And the example I give you that today in the, if you leave your dog in your house and if you don't have the ability, the dog will bark, would move. And then the sensors would say intruder alert. >>So that's becomes a false positive. So how do you eliminate that? By having more context, you can eliminate automatically again, this false positives. Like now you take a fingerprint of your dog and of these voice and now the camera and this and the sensors and the voice can pick up and say, Oh, this is my dog. So then of course you eliminate that for solar, right? Right. Now even if another dog managed to enter your home through a window which was open or whatever for soul, you will know her window was up and but you know you cannot necessarily fix it and the dog opens. Then you will know it's a, it's a, it's not sure about, right? So that's what security is evolving such a huge sea of change, which is happening because of all that internet and today companies today, after leveraging new cloud technology, which are coming, there's so much new technology. >>What people understand is where's that technology coming from? How come silently we have, you know, Dockers netics all these solutions today, which are available at almost no cost because it's all open source. So what happened is that, which is unlike the enterprise software, which were more the Oracle et cetera, the manufacturer of that software today is in fact the cloud public cloud vendors, the Amazon, the Google, the Facebook, the Microsoft. We suddenly needed to have to develop new technology so they could scale at the size of the planet. And then very shrewdly realized that effective that technology for me, I'm essentially going to imprison that technology is not going to evolve. And then I need other technologies that are not developing. So they realized that they totally changed that open source movement, which in the early days of opensource was more controlled by people who had more purity. >>If you prefer no commercial interests, it was all for the good of the civilization and humankind. And they say their licensing model was very complex. So they simplified all of that. And then nothing until you had all this technology coming at you extremely fast. And we have leverage that technology, which was not existing in the early days when when socials.com started with the Linux lamp pour called what's called Linux Apache. My SQL and PHP, a little bit limiting, but now suddenly all this technology, that classic search was coming, we today in our backend, 3 trillion data points on elastic search clusters and we return inflammation in a hundred milliseconds. And then onto the calf cabin, which is again something at open source. We, we, we, and now today 5 million messages a day and on and on and on. So the world is changing and of course, if that's what it's called now, the digital transformation. >>So now enterprises to be essentially agile, to reach out to the customers better and more, they need to embrace the cloud as the way they do, retool their entire it infrastructure. And essentially it's a huge sea of change. And that's what we see even the market of security just to finish, uh, now evolving in a totally different ways than the way it has been, which in the past, the market of security was essentially the market for the enterprise. And I'm bringing you my, my board, my board town solutions that you have to go and install and make work, right? And then you had the, the antivirus essentially, uh, for all the consumers and so forth. So today when we see the marketplace, which is fragmenting in four different segments, which is one is the large enterprise which are going to essentially consolidate those stock, move into the digital transformation, leveraging absolutely dev ops, which isn't becoming the new buyer and of course a soak or they could improve, uh, their it for, to reach out to more customers and more effectively than the cloud providers as I mentioned earlier, which are building security in the, no few use them. >>You don't have to worry about infrastructure, about our mini servers. You need, I mean it is, it's all done for you. And same thing about security, right? The third market is going to be an emergence of a new generation of managed security service providers, which are going to take to all these companies. We don't have enough resources. Okay, don't worry, I'm going to help you, you know, do all that digital transformation. And that if you build a security and then there's a totally new market of all these devices, including the phone, et cetera, which connects and that you essentially want to all these like OT and IOT devices that are all now connected, which of course presents security risk. So you need to also secure them, but you also need to be able to also not only check their edits to make sure that, okay, because you cannot send people anymore. >>So you need to automate the same thing on security. If you find that that phone is compromised, you need to make, to be able to make immediate decisions about should I kill that phone, right? Destroyed everything in it. Should I know don't let that phone connect anymore to my networks. What should I do? Should I, by the way detected that they've downloaded the application, which are not allowed? Because what we see is more and more companies now are giving tablets, do the users. And in doing so now today's the company property. So they could say, okay, you use these tablets and uh, you're not allowed to do this app. So you could check all of that and then automatically remote. But that again requires a full visibility on what you are. And that's why just to finish, we make a big decision about a few, three months ago that we have, we build the ability for any company on the planet to automatically build their entire global HSE inventory, which nobody knows what they have in that old networking environment. >>You don't know what connects to have the view of the known and the unknown, totally free of charge, uh, across on premise and pawn cloud containers, uh, uh, uh, whether vacations, uh, OT and IOT devices to come. So now there's the cornerstone of security. So with that totally free. So, and then of course we have all these additional solutions and we're build a very scalable, uh, up in platform where we can take data in, pass out data as well. So we really need to be and want to be good citizen here because security at the end of the day, it's almost like we used to say like the doctors, you have to have that kind of apricot oath that you cannot do no arm. So if you keep, if you try to take the data that you have, keep it with you, that's absolutely not right because it's the data of your customers, right? >>So, and you have to make sure that it's there. So you have to be a good warning of the data, but you have to make sure that the customer can absolutely take that data to whatever he wants with it, whatever he needs to do. So that's the kind of totally new field as a fee. And finally today there is a new Ash culture change, which is, which is happening now in the companies, is that security has become fronted centers, is becoming now because of GDPR, which has a huge of financial could over you challenge an impact on a company. A data breach can have a huge financial impact. Security has become a board level. More and more social security is changing and now it's almost like companies, if they want to be successful in the future, they need to embrace a culture of security. And now what I used to say, and that was the, the conclusion of my talk is that now, today it DevOps, uh, security compliance, people need to unite. Not anymore. The silos. I do that. This is my, my turf, my servers. You do that, you do this. Everybody in the company can work. I have to work together towards that goal. And the vendors need to also start to inter operate as well and working with our customers. So it's a tall, new mindset, which is happening, but the safes are big. That's what I'm very confident that we're now into that. Finally, we thought, I thought it would have happened 10 years ago, quite frankly. And uh, but now today's already happening. >>She touched on a lot, a lot there. And I'll speak for another two hours if we could. We could go for Tara, but I want to, I want to unpack a couple of things. We've had James Hamilton on you to at AWS. Um, CTO, super smart guy and it was, it was at one of his talks where it really was kind of a splash, a wet water in the face when he talked about the amount of resources Amazon could deploy to just networking or the amount of PhD power he could put on, you know, any little tiny sub segment of their infrastructure platform where you just realize that you just can't, you can't compete, you cannot put those kinds of resources as an individual company in any bucket. So the inevitability of the cloud model is just, it's, it's the only way to leverage those resources. But because of that, how has, how has that helped you guys change your market? How nice is it for you to be able to leverage infrastructure partners? Like is your bill for go to market as well as feature sets? And also, you know, because the other piece they didn't talk about is the integration of all these things. Now they all work together. Most apps are collection of API APIs. That's also changed. So when you look at the cloud provider GCP as well, how does that help you deliver value to your customers? >>Yeah, but the, the, the, the club, they, they don't do everything. You know, today what is interesting is that the clubs would start to specialize themselves more and more. So for example, if you look at Amazon, the, the core value of Amazon since the beginning has been elastic computing. Uh, now today we should look at Microsoft. They leverage their position and they really have come up with a more enterprise friendly solution. And now Google is trying to find also their way today. And so then you have Addy Baba, et cetera. So these are the public cloud, but life is not uniform like is by nature. Divers life wants to leave lunch to find better ways. We see that that's what we have so many different species and it just ended up. So I've also the other phenomena of companies also building their own cloud as well. >>So the word is entering into a more hybrid cloud. And the technology is evolving very fast as well. And again, I was selling you all these open source software. There's a bigger phenomenon at play, which I used to say that people don't really understand that much wood, but it's so obvious is if you look at the printing price, that's another example that gives the printing price essentially allowed, as we all know, to distribute the gospel, which has some advantage of, you know, creating more morality, et cetera. But then what people don't know for the most part, it distributed the treaties of the Arabs on technology, the scientif treaties, because the archives, which were very thriving civilization at the time, I'd collected all the, all the, all the information from India, from many other places and from China and from etc. And essentially at the time all of Europe was pretty in the age they really came up and it now certainty that scientific knowledge was distributed and that was in fact the seeds of the industrial revolution, which then you're up cat coats and use that and creating all these different technologies. >>So that confidence of this dimension of electricity and all of that created the industrial revolution seeded by now, today what is happening is that the internet is the new printing press, which now is distributing the knowledge that not to a few millions of people to billions of people. So the rate today of advancing technology is accelerating and it's very difficult. I was mentioning today, we know today that work and working against some quantum computing which are going to totally change things. Of course we don't know exactly how and you have also it's clear that today we could use genetic, uh, the, the, the, if you look at DNA, which stores so much information, so little place that we could have significant more, you know, uh, memory capabilities that lower costs. So we have embarked into absolutely a new world where things are changing. I've got a little girl, which is 12 years old and fundamentally that new generation, especially of girls, not boys, because the boys are still on, you know, at that age. >>Uh, they are very studious. They absorb so much information via YouTube. They are things like a security stream. They are so knowledgeable. And when you look back at history 2000 years plus ago in Greece, you at 95 plus percent of the population slaves. So a few percent could start to think now, today it's totally changed. And the amount of information they can, they learn. And this absolutely amazing. And you know, she, she's, I would tell you the story which has nothing to do with computing, but as a button, the knowledge of, she came to me the few, few weeks ago and she said, Oh daddy, I would like to make my mother more productive. Okay. So I said, Oh, that's her name is Avia, which is the, which is the, the, the either Greece or Zeus weathered here. And so I say, Evie, I, so that's a good idea. >>So how are you going to do it? I mean, our answer, I was flawed, but that is very simple. Just like with, for me, I'm going to ask her to go to YouTube to learn what she needs to learn. Exactly. And she learns, she draws very well. She learns how to draw in YouTube and it's not a gifted, she's a nice, very nice little girl and very small, but all her friends are like that. Right? So we're entering in a word, which thing are changing very, very fast. So the key is adaptation, education and democracy and democratization. Getting more people access to more. Absolutely. It's very, very important. And then kind of this whole dev ops continuous improve that. Not big. That's a very good point that you make because that's exactly today the new buyer today in security and in it is becoming the DevOps shipper. >>Because what? What are these people? There are engineers which suddenly create good code and then they want to of course ship their code and then all these old silos or you need to do these, Oh no, we need to put the new server, we don't have the capacity, et cetera. How is that going to take three months or a month? And then finally they find a way through, again, you know, all the need for scale, which was coming from the Google, from the Facebook and so forth. And by the way, we can shortcut all of that and we can create and we can run out to auto-ship, our code. Guess what are they doing today? They are learning how to secure all of that, right? So again, it's that ability to really learn and move. And today, uh, one of the problem that you alluded to is that, which the Amazon was saying is that their pick there, they have taken a lot of the talent resources in the U S today because of course they pay them extra to me, what? >>Of course they'll attract that talent. And of course there's now people send security. There's not enough people that even in, but guess what? We realized that few years ago in 2007, we'll make a big decision who say, well, never going to be able to attract the right people in the Silicon Valley. And we've started to go to India and we have now 750 people. And Jack Welch used to say, we went to India for the cost and discover the talent. We went to India for the talent and we discover the cost. And there is a huge pool of tenants. So it's like a life wants to continue to leave and now to, there are all these tools to learn, are there, look at the can Academy, which today if you want to go in nuclear physics, you can do that through your phone. So that ability to learn is there. So I think we need just more and more people are coming. So I'm a very optimistic in a way because I think the more we improve our technologies that we look at the progress we're making genetics and so everywhere and that confidence of technology is really creating a new way. >>You know, there's a lot of conversations about a dystopian future and a utopian future with all these technologies and the machines. And you know what? Hollywood has shown us with AI, you're very utopian side, very optimistic on that equation. What gives you, what gives you, you know, kind of that positive feeling insecurity, which traditionally a lot of people would say is just whack a mole. And we're always trying to chase the bad guys. Generally >>speaking, if I'm a topian in in a way. But on the other end, you'd need to realize that unfortunately when you have to technological changes and so forth, it's also create factors. And when you look at this story in Manatee, the same technological advancement that some countries to take to try to take advantage of fathers is not that the word is everything fine and everything peaceful. In fact, Richard Clark was really their kid always saying that, Hey, you know that there is a sinister side to all the internet and so forth. But that's the human evolution. So I believe that we are getting longterm. It's going to. So in the meantime there's a lot of changes and humans don't adapt well to change. And so that's in a way, uh, the big challenge we have. But I think over time we can create a culture of change and that will really help. And I also believe that probably at some point in time we will re-engineer the human race. >>All right, cool. We'll leave it there. That's going to launch a whole nother couple hours. They leave. Congratulations on the event and a great job on your keynote. Thanks for taking a few minutes with us. Alrighty. It's relief. I'm Jeff. You're watching the cube where the Qualice security conference at the Bellagio in Las Vegas. Thanks for watching. We'll see you next time.
SUMMARY :
conference 2019 you buy quality. So you touched on so many great, And in fact, you know, what happened is that we started in 1999 And so if you look at their architectures, so the mainframe were essentially big data centers in So it started inside the walls of the castle if you prefer. And of course that's the era short-lived at the end of the day because you put more and more weight and then you also increase And like the previous that I sent her, the are much more fractured because you just one scale And the internet of course is the web communications extremely cheap and it There was no bad guys, you know, the, he'd be days, if you like, and then you have now on the other side, you have now very intelligent devices from in a very simple And the only thing you bring are your policies saying, And you can continuously audit in essentially in real time, And the example I give you that today in the, So then of course you eliminate that for solar, right? you know, Dockers netics all these solutions today, which are available at And then nothing until you had all this technology coming at you extremely And then you had the, And that if you build a security So you need to automate the same thing on security. it's almost like we used to say like the doctors, you have to have that kind of apricot oath So you have to be a good warning of the data, And also, you know, because the other piece they didn't talk about is the integration of And so then you have Addy Baba, And again, I was selling you all these open source software. because the boys are still on, you know, at that age. And when you look back at So how are you going to do it? and then they want to of course ship their code and then all these old silos or you need to do in nuclear physics, you can do that through your phone. And you know what? And when you We'll see you next time.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Richard Clark | PERSON | 0.99+ |
Felipe korto | PERSON | 0.99+ |
Microsoft | ORGANIZATION | 0.99+ |
Jeff | PERSON | 0.99+ |
1999 | DATE | 0.99+ |
IBM | ORGANIZATION | 0.99+ |
Amazon | ORGANIZATION | 0.99+ |
Jack Welch | PERSON | 0.99+ |
ORGANIZATION | 0.99+ | |
ORGANIZATION | 0.99+ | |
Jeff Frick | PERSON | 0.99+ |
Greece | LOCATION | 0.99+ |
three months | QUANTITY | 0.99+ |
Silicon Valley | LOCATION | 0.99+ |
James Hamilton | PERSON | 0.99+ |
today | DATE | 0.99+ |
Las Vegas | LOCATION | 0.99+ |
India | LOCATION | 0.99+ |
Philippe Courtot | PERSON | 0.99+ |
Phillip | PERSON | 0.99+ |
2007 | DATE | 0.99+ |
two hours | QUANTITY | 0.99+ |
750 people | QUANTITY | 0.99+ |
Evie | PERSON | 0.99+ |
AWS | ORGANIZATION | 0.99+ |
second link | QUANTITY | 0.99+ |
first year | QUANTITY | 0.99+ |
a month | QUANTITY | 0.99+ |
second component | QUANTITY | 0.99+ |
Qualys | ORGANIZATION | 0.99+ |
Oracle | ORGANIZATION | 0.99+ |
GDPR | TITLE | 0.99+ |
800 vendors | QUANTITY | 0.99+ |
Tara | PERSON | 0.99+ |
China | LOCATION | 0.98+ |
Morris | LOCATION | 0.98+ |
PHP | TITLE | 0.98+ |
Europe | LOCATION | 0.98+ |
one | QUANTITY | 0.98+ |
19 years later | DATE | 0.98+ |
Avia | PERSON | 0.98+ |
10 years ago | DATE | 0.98+ |
Hollywood | ORGANIZATION | 0.98+ |
95 plus percent | QUANTITY | 0.98+ |
billions of people | QUANTITY | 0.98+ |
SQL | TITLE | 0.97+ |
Senat | ORGANIZATION | 0.97+ |
3 trillion data points | QUANTITY | 0.97+ |
Philippe Courtot, Qualys | Qualys Security Conference 2019
>>from Las >>Vegas. It's the cues covering quality security Conference 2019 by quality. Hey, welcome back already, Jefe Rick here with the Cube were in Las Vegas at the Bellagio at the Kuala Security Conference. It's the 19th year they've been doing this. It's our first year here, and we're excited to be here. And it's great to have a veteran who's been in this space for so long to give a little bit more of historical perspective as to what happened in the past. Where we are now, what can we look forward to in the future? So coming right off its keynote is Felipe Quarto, the chairman and CEO of Qualities felt great. See, >>Thank you. Same. Same same for me. >>Absolutely. So you touched on so many great topics in your conversation about kind of the shifts of of modern computing, from the mainframe to the mini. We've heard it over and over and over. But the key message was really about architecture. If you don't have the right architecture, you can't have the right solution. How is the evolution of architects of architectures impacted your ability to deliver security solutions for your clients >>So no That's a very good question. And in fact, you know what happened is that we started in 1999 with the vision that we could use exactly like Salesforce. They'll come this nascent Internet technologies and apply that to security. And s and Marc Benioff applied that essentially changing the way serum was essentially used and deployed in enterprises and with a fantastic success as we know. So for us, the I can't say today that 19 years later the vision was right. It took a significant longer because the security people are not really, uh, warm at the idea of Senate Lee, uh, having the data interview which was in place that they could not control. And the i t people, they didn't really like a toll. The fact that certainly they were not in control anymore of the infrastructure. So whether a lot of resistance, I wever, we always I always believe, absolutely believe that the cloud will be the architecture to go back. A lot of people make the confusion That was part of the confusion that for people it was a cloud, that kind of magical things someplace would you don't know where and when I was trying to explain, and I've been saying that so many times that well, you need to look at the club like a computer that can architecture which distribute the computing power for more efficiently than the previous one, which was Clyde Server, which was distributing the computing power for better then, of course, the mainframes and minicomputers. And so if you look at their architecture's so the mainframe were essentially big data centers in in Fort Knox, like setting private lines of communication to damn terminal. And of course, security was not really an issue then, because it's a gritty was building by the IBM said company simply with the minicomputer, which then was, instead of just providing the computing power to the large, very large company could afford it. Now 70 the minicomputer through the advance and say, My conductor technology could reduce the food frank. And then I'll bring the company power to the labs and to the departments. And that was then the new era of the dish, your equipment, the primes, that General et cetera, Uh, and then conservative. So what client service did again? If you look at the architecture, different architectures now, incidently servers LAN or the Internet network and the PC, and that was now allowing to distribute the computing power to the people in the company. And so, but then you needed to so everybody. Nobody paid attention to security because then you were inside of the enterprise. So it starts inside the wars of the castle if you prefer. So nobody paid attention to that. It was more complex because now you have multiple actors instead of having one IBM or one desert equipped. But its center said, You have the people manufacturing the servers. The software that that obeys the PC is an unannounced excellently there was the complexity increased significantly, but nobody paid attention to security because it was not needed. Until suddenly we realized that viruses could come in through the front door being installed innocent. You were absolutely, absolutely compromised. And of course, that's the era of the anti VARS, which came in and then because of the need to communicate more more. Now, Senator, you could not stay only in your castle. You need to go and communicate your customers to your suppliers, et cetera, et cetera. And now you were starting to up and up your your castle to the word and a low now so that the bad guy could come in and start to steal your information. And that's what the new era of the far wall. Now you make sure that those who come in But of course, that was a bit naive because there were so many other doors and windows that people could come in, you know, create tunnels and these and over that transfer, insure your custard. Because the day I was becoming more, more rich and more more important, more value. So whatever this value, of course, the bad guys are coming in to try to sell it. And that was that new era off a win. Each of attention to security. The problem is being is because you have so many different actors. There was nothing really central there. Now. I just suddenly had Maura and more solutions, and now absolutely like 800 vendors. Boarding on security and boating on anything is shortly at the end of the day because you put more more weight, and then you also increasing complexity in all these different solutions. Didn't they need to talk together? So you have a better context, but they weren't designed to talk together. So now you need to put other system where they could communicate that information. So you complicated, complicated, complicated the solution. And that's the problem of today. So now cloud computing comes in and again. If you look at the architecture of cloud computing, it's again Data centers, which not today, have become, thanks to the technology, having infinite, almost company power and storage capabilities. And like the previous data center, there are much more fracture because you just once gave and they become essentially a bit easier to secure. And by the way, it's your fewer vendors now doing that. And then, of course, the access can be controlled better on then. Of course, the second component is that the land and the one it's now the Internet and the Internet, of course, eyes the Web communications extremely cheap, and it brings you in every place on the planet and soon in Morse. Why no so and so now. The issue today is that still the Internet needs to be secure, and today how are you going to secure the Internet? Which is very important thing today because you see today that you can spoof your image, you can spoof your website. You could attack the Deanna's who? Yes, there's a lot of things that the bad guy still do in fact, themselves that ever is the Internet, of course, to access everywhere, so they take advantage of it. So now this is obviously, you know, I created the trustworthy movement many years ago to try to really address that. Unfortunately, qualities was too small, and it was not really our place. Today there's all the Google, the Facebook, the big guys which contract their business, depend on the Internet. Now need to do that and I upload will be been criticised very much so. Google was the 1st 1 to essentially have a big initiative. I was trying to Bush SSL, which everybody understands secret encryption, if you prefer and to everybody. So they did a fantastic job, really push it. So now today's society is becoming like okay, it's a said. You want to have this a settle on your communication, but that's not enough. And now they're pushing and some people criticize them, and I absolutely applaud them to say we need to change the Internet protocols which were created at the time when security you were transferring information from universities. And so for these was a hay days, you know, if everything was fine, there's no bad guys. No, The heebie day is if you like arranging that everybody was free, Everybody was up in fantastic. Okay. And now, of course, today, these poor cold this to be a graded, which is a lot of work. But today I really believe that if you put Google Amazon Facebook altogether and they can fix these internet for records so we could forget about the spoofing and we forget about all these fishing and all this thing this is there responsibility. So and then you have now on the other side, you have now a very intelligent devices from in a very simple sensors and, you know, too sophisticated devices the phone, et cetera, and Maura and more Maur devices interconnected and for people to understand what is being so This is the new environment. And whether we always believe is that if you adopt an architecture which is exactly which fits which is similar, then we could instead of bolting security in, we can also have the build security in voting signal on. We could be in security in. And we have been very proud of the work that went down with my car itself, which we announce, in fact, reluctantly recently, very recently, that, in fact, our agent technologies now it's banned erred in Microsoft. So we have been security with Microsoft in So from a security perspective today, if you go to the Microsoft as your security center, you click on a link, and now you have the view. If you're in tar, is your environment courtesy of record? It's agent. You click on a second link, and now you have the view of your secret cameras. First year, crazy of the same qualities agent. And then you click on the third inning with us. Nothing to do with quite it's It's old Mike ourself you create your playbook and Yuri mediates The security in this environment has become quickly, quick, nothing to in store, nothing to update, and the only thing you bring. All your policies saying I don't want to have this kind of machine exposed on the Internet on what this is what I want and you can continuously owed it essentially in real time, right? So, as you can see, totally different than putting boxes and boxes and so many things. And then I think for you, so very big game changer. So the analogy that I want you that I give to people it's so people understand that paradigm shift. It's already happening in the way we secure our homes. You put sensors everywhere, your cameras of detection, approximately detection. Essentially, when somebody tried to enter your home all that day, that's continuously pumped up into an incident response system. And then from your phone again across the Internet, you can change the temperature of your rooms. You can do it. You can see the person who knocks on the door. You can see its face. You can open the door, close the door, the garage door. You can do all of that remotely and automatically. And then, if there's a burglar, then in your house, who's raking immediately that the incidence response system called the cops or the farmer shirt? If good far. And that's the new paradigm. So security has to follow that product, and then you have interesting of the problem today that we see with all the current security systems incidents Original system developed for a positive force. Positive and negative are the enemy reedy off security? Because if you have forced positive, you cannot automate the response because then you're going to try to respond to something that is that true? So you are. You could create a lot of damage. And the example. I give you that today in the if you leave your dog in your house and if you don't have the ability the dog would bark would move, and then the senses will say intruder alert. So that's become the force. Pretty. So how do you eliminate that? By having more context, you can eliminate automatically again this false positives, like now you, I think a fingerprint of fuel dog and of his voice. And now the camera and this and the sensors on the voice can pick up and say, Oh, this is my dog. So then, of course, you eliminate that forces right now, if if another dog managed to return your home through a window which was open or whatever for so what do we know? A window was open, but you know you can't necessarily fix it on the dog weapons, then you will know it. Sze, not yours. So that's what securities avoiding such a huge sea of change which is happening because of all that injured that end today Companies today after leverages nuclear technology which are coming, there's so much new to college. What people understand is where's that technology coming from? How come silently we have doctors cybernetics a ll these solutions today which are available at almost no cost because it's all open source So what happened is that which is unlike the enterprise software which were Maur the oracle, et cetera, the manufacturer of that software today is in fact the cloud bubbly club Sanders, the Amazon, the Google, the Facebook, the macro self which shouldn't be needed to have to develop new technology so they could scale at the size of the planet. And that very shrewdly realized that if I keep the technology for me, I'm essentially going to imprison. The technology is not going to evolve. And then I need other technologies that I'm not developing. So they realize that they totally changed that open source movement, which in the early days of happens offers more controlled by people who had more purity. If you prefer no commercial interests, it was all for the good, off the civilization and humankind. And they say they're licensing Modern was very complex or the simplified all of that. And then Nelson and you had all this technology coming at you extremely fast. And we have leverage that technology, which was not existing in the early days when when such was not come started with the eunuchs, the lamb, pork or what's called leaks. Apache mice Fewer than Petri limiting Announcer Tiel This technology, like elasticsearch, was coming. We index today now back and three trillion points or less excerpts, clusters, and we return information in 100 minutes seconds and then on the calf campus, which is again something that open source way Baker Now today, five million messages a day and on and on and on. So the word is changing. And of course, if that's what it's called now, the dish transformation now enterprises to be essentially a joy to reach out to the customers better and Maur, they need to embrace the cloud as well, >>right? I >>do retool their entire right infrastructure, and it's such A. It's a huge sea of change, and that's what we see even the market of security just to finish now, evolving in a totally different ways than the way it has Bean, which in the positive market of security was essentially the market for the enterprise. And I'm bringing you might my board, my board, towns, traditions that you have to go in installed and make work. And then you had the the anti virus, essentially for all the consumers and so forth. So today, when we see the marketplace, which is fragmenting in four different segments, which is one is the large enterprise which are going to essentially constantly data start moving to the transformation. Leveraging absolutely develops, which isn't becoming the new buyer. And, of course, so they could improve their I t. For to reach out to more customers and more effectively than the current providers. As I mentioned earlier, which are building security in the knife, you use them. You don't have to worry about infrastructure about how many servers you need, amenities. It's all done for you and something about security. The third market is going to be in an emergence of a new generation of managed Grannie service providers which are going to take all these companies. We don't have enough resources. Okay, Don't worry. I'm going to help you, you know, duel that digital transformation and help you build the security. And then there's a totally new market of all these devices, including the phone, et cetera, which connects and that you essentially I want to all these i, o t and I ot devices that are or now connected, which, of course, present security risk. So I need to also secure them. But you also need to be able to also not only check their health to make sure that okay, because you cannot send people read anymore. So you tournament simply on security. If you find that that phone is compromised, you need to make to be able to make immediate decisions about Should I kill that phone? Destroyed everything in it. Should I Now don't let that phone connect any more to my networks. What should I do? Should I, by the way, detected that they've done with the application which another loud Because what we see is more and more companies are giving tablets to their users and in doing so now, today's the company property so they could say, OK, you use these tablets and you're not allowed to do that so you could check all of that and then automatically. But that again requires full visibility in what you are. And that's why just to finish, we make a big decision about the few three months ago that were We build the ability for any company on the planet to automatically build their targetable itis it eventually, which nobody knows what they have. That old networking environment. You don't know what connects to have the view of the known and the unknown totally free of charge across on premise and pawned crowd continues Web obligations or to united devices to come. So now that's the cornerstone of securities with that totally free. So and then, of course, you have all these additional solutions, and we're being very scalable up in platform where we can take data, a passel data as well. So we really need to be and want to be good citizen here because security at the end of it, it's almost like we used to say, like the doctors, you have to have that kind of feeble court oath that you can do no arms. So if you keep if you try to take the data that you have, keep it with you, that's all.
SUMMARY :
So coming right off its keynote is Felipe Quarto, the chairman and CEO of Qualities So you touched on so many great topics in your conversation So the analogy that I want you that I give to people it's so people understand because security at the end of it, it's almost like we used to say, like the doctors, you have to have that kind of
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Microsoft | ORGANIZATION | 0.99+ |
Amazon | ORGANIZATION | 0.99+ |
Marc Benioff | PERSON | 0.99+ |
1999 | DATE | 0.99+ |
IBM | ORGANIZATION | 0.99+ |
Felipe Quarto | PERSON | 0.99+ |
ORGANIZATION | 0.99+ | |
Philippe Courtot | PERSON | 0.99+ |
ORGANIZATION | 0.99+ | |
Las Vegas | LOCATION | 0.99+ |
today | DATE | 0.99+ |
Vegas | LOCATION | 0.99+ |
Las | LOCATION | 0.99+ |
Mike | PERSON | 0.99+ |
Today | DATE | 0.99+ |
800 vendors | QUANTITY | 0.99+ |
First year | QUANTITY | 0.99+ |
second component | QUANTITY | 0.99+ |
second link | QUANTITY | 0.99+ |
first year | QUANTITY | 0.99+ |
70 | QUANTITY | 0.99+ |
Jefe Rick | PERSON | 0.99+ |
Senate | ORGANIZATION | 0.98+ |
Fort Knox | LOCATION | 0.98+ |
three trillion points | QUANTITY | 0.98+ |
19 years later | DATE | 0.98+ |
19th year | QUANTITY | 0.98+ |
Yuri | PERSON | 0.97+ |
100 minutes seconds | QUANTITY | 0.97+ |
Bellagio | LOCATION | 0.97+ |
one | QUANTITY | 0.97+ |
Qualys | ORGANIZATION | 0.96+ |
Maur the oracle | TITLE | 0.96+ |
three months ago | DATE | 0.95+ |
Each | QUANTITY | 0.95+ |
Nelson | PERSON | 0.94+ |
third inning | QUANTITY | 0.93+ |
third market | QUANTITY | 0.93+ |
Apache | ORGANIZATION | 0.91+ |
1st 1 | QUANTITY | 0.9+ |
Maura | PERSON | 0.88+ |
Cube | ORGANIZATION | 0.88+ |
Kuala Security Conference | EVENT | 0.86+ |
five million messages a day | QUANTITY | 0.84+ |
Qualities | ORGANIZATION | 0.8+ |
Lee | PERSON | 0.77+ |
Qualys Security Conference 2019 | EVENT | 0.74+ |
Clyde | ORGANIZATION | 0.7+ |
Deanna | PERSON | 0.69+ |
Bush | PERSON | 0.67+ |
many years ago | DATE | 0.67+ |
Conference 2019 | EVENT | 0.67+ |
Morse | LOCATION | 0.56+ |
Sanders | ORGANIZATION | 0.53+ |
Salesforce | ORGANIZATION | 0.52+ |
Maur | PERSON | 0.5+ |
Maura | ORGANIZATION | 0.41+ |
Matt Carroll, Immuta | CUBEConversation, November 2019
>> From the Silicon Angle Media office, in Boston Massachusetts, it's the Cube. Now, here's your host, Dave Vellante. >> Hi everybody, welcome to this Cube Conversation here in our studios, outside of Boston. My name is Dave Vellante. I'm here with Matt Carroll, who's the CEO of Immuta. Matt, good to see ya. >> Good, nice to have me on. >> So we're going to talk about governance, how to automate governance, data privacy, but let me start with Immuta. What is Immuta, why did you guys start this company? >> Yeah, Immuta is an automated data governance platform. We started this company back in 2014 because we saw a gap in the market to be able to control data. What's happened in the market as changes is that every enterprise wants to leverage their data. Data's the new app. But, governments want to regulate it and consumers want to protect it. These were at odds with one another, so we saw a need of creating a platform that could meet the needs of everyone. To democratize access to data and in the enterprise, but at the same time, provide the necessary controls on the data to enforce any regulation, and ensure that there was transparency as to who is using it and why. >> So let's unpack that a little bit. Just try to dig into the problem here. So we all know about the data explosion, of course, and I often say data used to be a liability, now it's turned into an asset. People used to say get rid of the data, now everybody wants to mine it, and they want to take advantage of it, but that causes privacy concerns for individuals. We've seen this with Facebook and many others. Regulations now come into play, GDPR, different states applying different regulations, so you have all these competing forces. The business guys just want to go and get out to the market, but then the lawyers and the compliance officers and others. So are you attacking that problem? Maybe you could describe that problem a little further and talk about how you guys... >> Yeah, absolutely. As you described, there's over 150 privacy regulations being proposed over 25 states, just in 2019 alone. GDPR has created or opened the flood gates if you will, for people to start thinking about how do we want to insert our values into data? How should people use it? And so, the challenge now is, you're right, your most sensitive data in an enterprise is most likely going to give you the most insight into driving your business forward, creating new revenue channels, and be able to optimize your operational expenses. But the challenge is that consumers have awoken to, we're not exactly sure we're okay with that, right? We signed a YULU with you to just use our data for marketing, but now you're using it for other revenue channels? Why? And so, where Immuta is trying to play in there is how do we give the line of business the ability to access that instantaneously? But also give the CISO, the Chief Information Security Officer, and the governance seems the ability to take control back. So it's a delicate balance between speed and safety. And I think what's really happening in the market is we used to think about security from building firewalls, we invested in physical security controls around managing external adversaries from stealing our data. But now it's not necessarily someone trying to steal it, it's just potentially misusing it by accident in the enterprise. And the CISO is having to step in and provide that level of control. And it's also the collision of the cloud and these privacy regulations. Cause now, we have data everywhere, it's not just in our firewalls. And that's the big challenge. That's the opportunity at hand, democratization of data in the enterprise. The problem is data's not all in the enterprise. Data's in the cloud, data's in SaaS, data's in the infrastructure. >> It's distributed by it's very nature. All right, so there's a lot of things I want to follow up on. So first, there's GDPR. When GDPR came out of course, it was May of 2018 I think. It went into effect. It actually came out in 2017, but the penalties didn't take effect till '18. And I thought, okay, maybe this can be a framework for governments around the world and states. It sounds like yeah sort of, but not really. Maybe there's elements of GDPR that people are adopting, but then it sounds like they're putting in their own twists, which is going to be a nightmare for companies. So, are you not seeing a sort of, GDPR becoming this global standard? It sounds like, no. >> I don't think it's going to be necessarily global standard, but I do think the spirit of the GDPR, and at the core of it is, why are you using my data? What was the purpose? So traditionally, when we think about using data, we think about all right, who's the user, and what authorizations do they have, right? But now, there's a third question. Sure, you're authorized to see this data, depending on your role or organization right? But why are you using it? Are you using it for certain business use? Are you using it for personal use? Why are you using this? That's the spirit of GDPR that everyone is adopting across the board. And then of course, each state, or each federal organization is thinking about their unique lens on it, right? And so you're right. This is going to be incredibly complex. And the amount of policies being enforced at query time. I'm in my favorite, let's just say I'm in Tableau or Looker right? I'm just some simple analyst, I'm a young kid, I'm 22, my first job right? And I'm running these queries, I don't know where the data is, right? I don't know what I'm combining. And what we found is on average in these large enterprises, any query at any moment in time, might have over 500 thousand policies that need to be enforced in real time. >> Wow. >> And it's only getting worse. We have to automate it. No human can handle all those edge cases. We have to automate. >> So, I want to get into how you guys actually do that. Before I do, there seems to be... There's a lot of confusion in the marketplace. Take the word data management, data protection. All the backup guys are using that term, the database guys use that term, GOC folks use that term, so there's a lot of confusion there. You have all these adjacent markets coming together. You've got the whole governance risk and compliance space, you've got cyber security, there's privacy concerns, which is kind of two sides of the same coin. How do you see these adjacencies coming together? It seems like you sit in the middle of all that. >> Yeah, welcome to why my marketing budget is getting bigger and bigger. The challenge we're facing now is I think, who owns the problem right? The Chief Data Officer is taking on a much larger role in these organizations, the CISO is taking a much more larger role in reporting up to the board. You have the line of business who now is almost self-sustaining, they don't have to depend on IT as much any longer because of the cloud and because of the new compute layers to make it easier. So who owns it? At the end of the day, where we see it is we think there's a next generation of cyber tools that are coming out. We think that the CISO has to own this. And the reason is that the CISO's job is to protect the enterprise from cyber risk. And at the core of cyber risk is data. And they must own the data problem. The CDO must find the data, and explain what that data is, and make sure it's quality, but it is the CISO that must protect the enterprise from these threats. And so, I see us as part of this next wave of cyber tools that are coming out. There's other companies that are equally in our stratosphere, like BigID, we're seeing AWS with Macy doing sensitive data discovery, Google has their data loss prevention service. So the cloud players are starting to see, hey, we've got to identify sensitive data. There's other startups that are saying hey, we got to identify and catalog sensitive data. And for us, we're saying hey, we need to be able to consume all that cataloging, understand what's sensitive, and automatically apply policies to ensure that any regulation in that environment is met. >> I want to ask you about the cloud too. So much to talk to you about here, Matt. So, I also wanted to get your perspective on variances within industries. So you mentioned Chief Data Officers. The ascendancy of the Chief Data Officers started in financial services, healthcare, and government where we had highly regulation industries. And now it's sort of seeped into more commercial. But it terms of those regulated industries, take healthcare for example. There are specific nuances. Can you talk about what you're seeing in terms of industry variance. >> Yeah, it's a great point. Starting with like, healthcare. What does it mean to be HIPPA compliant anymore? There are different types of devices now where I can point it at your heartbeat from a distance away and I can have 99 percent accuracy of identifying you, right? It takes three data points in any data set to identify 87 percent of US citizens. If I have your age, sex, location, I can identify you. So, what does it mean anymore to be HIPPA compliant? So the challenge is how do we build guarantees of trust that we've de-identified these DESA's, cause we have to use it, right? No one's going to go into a hospital and say, "You know what, I don't want you to say my life. "Cause I want my data protected," right? No one's ever going to say that. So the challenges we face now across these regulated industries is the most sensitive data sets are critical for those businesses to operate. So there has to be a compromise. So, what we're trying to do in these organizations is help them leverage their data and build levels of proportionality, to access that right? So, the key isn't to stop people from using data. The key is to build the controls necessary to leverage a small bit of the data. Let's just say, we've made it indistinguishable. You can only ask Agriculture and Statistics the question. Well, you know what, we actually found some really interesting things there, we need to be a little bit more useful, it's this trade-off between privacy and utility. It's a pendulum that swings back and forth. As someone proves I need more of this, you can swing it, or just mask it. I need more of it? All right, we'll just redact some of the certain things. Nope, this is really important, it's going to save someone's life. Okay, completely unmasked, you have the raw data. But it's that control that's necessary in these environments, that's what's missing. You know, we came out of the US Intelligence community. We understood this better than anyone. Because highly regulated, very sensitive data, but we knew we needed the ability to rapidly control. Well is this just a hunch, or is this a 9-11 event? And you need the ability to switch like that. That's the difference and so, healthcare is going through a change of, we have all these new algorithms. Like Facebook the other day said, hey, we have machine learning algorithms that can look at MRI scans, and we're going to be better than anyone in the world at identifying these. Do you feel good about giving your data to Facebook? I don't know, but we can maybe provide guaranteed anonymization to them, to prove to the world they're going to do right. That's where we have to get to. >> Well, this is huge, especially for the consumer, cause you just gave several examples. Facebook's going to know a lot about me, a mobile device, a Fit Bit, and yet, if I want to get access to my own medical records, it's like Fort Knox to try to get, please, give this to my insurance company. You know, you got to go through all these forms. So, you've got those diverging objectives and so, as a consumer, I want to be able to trust that when I say yes you can use it, go, and I can get access to it, and other can get access to it. I want to understand exactly what it is that you guys do, what you sell. Is it software, is it SAS, and then let's get into how it works. So what is it? >> Yeah, so we're a software platform. We deploy into any infrastructure, but it is not multi-tenant so, we can deploy on any cloud, or on premises for any customer, and we do that with customers across the world. But if you think about at the core of what is Immuta, think of Immuta as a system of record for the CISO or the line of business where I can connect to any data, on any infrastructure, on any compute layer, and we connect into over 61 different storage platforms. We then have built a UI where lawyers... We actually have three lawyers as employees that act as product managers to help any lawyer of any stature take what's on paper, these regulations, these rules and policies, and they digitize it essentially, in active code. So they can build any policy they want on any data in the ecosystem, in the enterprise, and enforce it globally without having to write any code. And then because we're this plane where you can connect any tool to this data, and enforce any regulation because we're the man in the middle, we can audit who is using what data and why. In every action, in any change in policy. So, if you think about it, it's connect any tool to any data, control it, any regulation, and prove compliance in a court of law. >> So you can set the policy at the data set level? >> Correct. >> And so, how does one do that? Can you automate that on the creation of that data set? I mean you've got you know, dependencies. How does that all work? >> Yeah, what's a really interesting part of our secret sauce is that one, we could do that at the column level, we can do it at the row level, we can do it at the cell level. >> So very granular. >> Very, very granular. This is something again, we learned from the US Intelligence community, that we have to have very fine grained access to every little bit of the data. The reason is that, especially in the age of data, is people are going to combine many data sets together. The challenge isn't enforcing the policy on a static data set, the challenge is enforcing the policy across three data sets where you merge three pieces of data together, who have conflicting policies. What do you do then? That's the beauty of our system. We deal with that policy inheritance, we manage that lineage of the policy, and can tell you here's what the policy will be. >> In other words, you can manage to the highest common denominator as an example. >> Or we can automate it to the lowest common denominator, where you can work in projects together recognizing hey, we're going to bring someone into the project that's not going to have the level of access. Everyone else will automatically change it to the lowest common denominator. But then you share that work with another team and it'll automatically be brought to the highest common denominator. And we've built all these work flows in. That was what was missing and that's why I call it a system of record. It's really a symbiotic relationship between IT, the data owner, governance, the CISO, who are trying to protect the data, and the consumer, and all they want to do is access the data as fast as possible to make better, more informed decisions. >> So the other mega-trend you have is obviously, the super power of machine intelligence, or artificial intelligence, and then you've got edge devices and machine to machine communication, where it's just an explosion of IP addresses and data, and so, it sounds like you guys can attack that problem as well. >> Any of this data coming in on any system, the idea is that eventually it's going to land somewhere, right? And you got to protect it. We call that like rogue data, right? This is why I said earlier, when we talk about data, we have to start thinking about it as it's not in some building anymore. Data's everywhere. It's going to be on a cloud infrastructure, it's going to be on premises, and it's likely, in the future, going to be on many distributed data centers around the world cause business is global. And so, what's interesting to us is no matter where the data's sitting, we can protect it, we can connect to it, and we allow people to access it. And that's the key thing is not worrying about how to lock down your physical infrastructure, it's about logically separating it. And that's why what differentiates us from other people is one, we don't copy the data, right? That's the always the barrier for these types of platforms. We leave the data where it is. The second is we take all those regulations and we can actually, at query time, push it down to where that data is. So rather than bring it to us, we push the policy to the data. And what that does is that's what allows us, what differentiates us from everyone else is, it allows us to guarantee that protection, no matter where the data's living. >> So you're essentially virtualizing the data? >> Yeah, yeah. It's virtual views of data, but it's not all the data. What people have to realize is in the day of apps, we cared about storage. We put all the data into a database, we built some services on top of it and a UI, and it was controlled that way, right? You had all the nice business logic to control it. In the age of data, right? Data is the new app, right? We have all these automation tools, Data Robot, and H20, and Domino, and Tableau's building all these automation work flows. >> The robotic process automation. >> Yeah, RPA, UI Path, the Work Fusion, right? They're making it easier and easier for any user to connect to any data and then automate the process around it. They don't need an app to build a unique work flows, these new tools do that for them. The key is getting to the data. And the challenge with the supply chain of data is time to data is the most critical aspect of that. Cause, the time to insight is perishable. And so, what I always tell people, a little story, I came from the government, I worked in Baghdad, we had 42 minutes to know whether or not a bad guy in the environment, we could go after him. After that, that data was perishable, right? We didn't know where he was. It's the same thing in the real world. It's like imagine if Google told you, well, in 42 minutes it might be a good time to go 495. (laughter) It's not very useful, I need to know the information now. That's the key. What we see is policy enforcement and regulations are the key barrier of entry. So our ability to rapidly, with no latency, be able to connect anyone to that data and enforce those policies where the data lives, that's the critical nature. >> Okay, so you can apply the policies and you do it quickly, and so now you can help solve the problem. You mentioned a cloud before, or on prem. What is the strategy there with regard to various clouds and how do you approach multi-clouds? >> I think cloud is what used to be an infrastructure as a service game, is now becoming a compute game. I think large, regulated enterprises, government, healthcare, financial services, insurance, are all moving to cloud now in a different way. >> What do you mean by that? Cause people think infrastructure as service, they'll say oh that's compute storage and some networking. What do you mean by that? >> I think there's a whole new age of software that's being laid on top of the availability of compute and the availability of storage. That's companies like Databricks, companies like Snowflake, and what they're doing is dramatically changing how people interact with data. The availability zones, the different types of features, the ability to rip and replace legacy warehouses and main frames. It's changing the ability to not just access, but also the types of users that could even come on to leverage this data. And so these enterprises are now thinking through, "How do I move my entire infrastructure of data to them? "And what are these new capabilities "that I could get out of that?" Which, that is just happening now. A lot of people have been thinking, "Oh, this has been happening over the past five years," no, the compute game is now the new war. I used to think of like, Big Data, right? Big Data created, everyone started to understand, "Ah, if we've got our data assets together, "we can get value." Now they're thinking, "All right, let's move beyond that." The new cloud at our currents works is Snowflake and Databricks. What they're thinking about is, "How do I take all your meta-data "and allow anyone to connect any BI tool, "any data science tool, and provide highly performance, "and highly dependable compute services "to process petabytes of data?" It's pretty fantastic. >> And very cost efficient and being able to scale, compute independent of storage, from an architectural perspective. A lot of people claim they can do that, but it doesn't scale the same way. >> Yeah, when you're talking about... Cause that's the thing is you got to remember, these financial systems especially, they depend on these transactions. They cannot go down and they're processing petabytes of data. That's what the new war is over, is that data in the compute layer. >> And the opportunity for you is that data that can come from anywhere, it's not sitting in a God box, where you can enforce policies on that corpus. You don't know where it's coming from. >> We want to be invisible to that right? You're using Snowflake, it's just automatically enforced. You're using Databricks, it's automatically enforced. All these policies are enforced in flight. No one should even truly care about us. We just want to allow you to use the data the way you're used to using it. >> And you do this, this secret sauce you talked about is math, it's artificial intelligence? >> It's math. I wish I could say it was like super fancy, unsupervised neural nets or what not, it's 15 years of working in the most regulated, sticky environments. We learned about very simple novel ways of pushing it down. Great engineering's always simple. But what we've done is... At query time, what's really neat is we figured a way to take user attributes from identity management system and combine that with a purpose, and then what we do is we've built all these libraries to connect into all these dispert storage and compute systems, to push it in there. The nice thing about that is prior to this what people were doing, was making copies. They'd go to the data engineering team and they'd say hey, "I need to ETL this "and get a copy and it'll be anatomized." Think about that for a second. One, the load on your production systems, of all these copies, all the time, right? The second is CISO, the surface area. Now you've got all this data that in a snapshot in time, is legal and ethical, might change tomorrow. And so, now you've got an increase surface area of risk. Like that no-copy aspect. So the pushing it down and then the no-copy aspect really changed the game for enterprises. >> And you've got providence issues, like you say. You've got governance and compliance. >> And imagine trying, if someone said to you, imagine Congress said hey, "Any data source that you've processed "over the past five years, I want to know if "there was these three people in any of these data sources "and if there were, who touched that data "and why did they touch it?" >> Yeah and storage is cheap, but there's unintended consequences. People are, management isn't. >> We just don't have a unified way to look at all of the logs cross listed. >> So we started to talk about cloud and then I took you down a different path. But you offer your software on any cloud, is that right? >> Yeah, so right now, we are in production on Immuta's Marketplace. And that is a managed service, so you can go deploy in there, it'll go into your VPC, and we can manage the updates for you, we have no insight into your infrastructure, but we can push those updates, it'll automatically update, so you're getting our quarterly releases, we release every season. But yeah, we started with AWBS, and then we will grow out. We see cloud is just too ubiquitous. Currently, we still support though, Bigquery, Data Praq, we support Azure, Data Light Storage version two, as well as Azure Databricks. But you can get us through Immuta's Marketplace. We're also investing in ReInvent, we'll be out there in Vegas in a couple weeks. It's a big event for us just because obviously, the government has a very big stake in AWBS, but also commercial customers. It's been a massive endeavor to move. We've seen lots of infrastructure. Most of our deals now are on cloud infrastructure. >> Great, so tell us about the company. You've raised, I think in a Series B, about 28 million to date. Maybe you could give us the head count, and whatever you can share about momentum, maybe customer examples. >> Yeah, so we've raised 32 million to date. >> 32 million. >> From some great investors. The company's about 70 people now. So not too big, but not small anymore. Just this year, at this point, I haven't closed my fiscal year, so I don't want to give too much, but we've doubled our ARR and we've tripled our LOGO count this year alone and we've still got one more quarter here. We just started our fourth quarter. And some customer cases, the way I think about our business is I love healthcare, I love government, I love finance. To give you some examples is like, COGNO is a really great example. COGNO and what they're trying to solve is can they predict where a child is on the autism spectrum? And they're trying to use machine learning to be able to narrow these children down so that they can see patterns as to how a provider, a therapist is helping these families give these kids the skills to operate in the real world. And so it's like this symbiotic relationship utilizing software, surveys and video and what not, to help connect these kids that are in similar areas of the spectrum, to help say hey, this is a successful treatment, right? The problem with that is we need lots of training data. And this is children, one, two, this is healthcare, and so, how do you guarantee HIPPA compliance? How do you get through FDA trials, through third party, blind testing? And still continue to validate and retrain your models, while protecting the identity of these children? So we provide a platform where we can anonymize all the data for them, we can guarantee that there's blind studies, where the company doesn't have access to certain subsets of the data. We can also then connect providers to gain access to the HIPPA data as needed. We can automate the whole thing for them. And they're a startup too, there are 100 people. But imagine if you were a startup in this health-tech industry and you had to invest in the backend infrastructure to handle all of that. It's too expensive. What we're unlocking for them, I mean yes, it's great that they're HIPPA compliant and all that, that's what we want right? But the more important thing is like, we're providing a value add to innovate in areas utilizing machine learning, that regulations would've stymied, right? We're allowing startups in that ecosystem to really push us forward and help those families. >> Cause HIPPA compliance is table stay compulsory. But now you're talking about enabling new business models. >> Yeah, yeah exactly. >> How did you get into all this? You're CEO, you're business savvy, but it sounds like you're pretty technical as well. What's your background? >> Yeah I mean, so I worked in the intelligence community before this. And most of my focus was on how do we take data and be able to leverage it, either for counter-terrorism missions, to different non-kinetic operations. And so, where I kind of grew up in is in this age of, think about billions of dollars in Baghdad. Where I learned is that through the computing infrastructure there, everything changed. 2006 Baghdad created this boom of technology. We had drones, right? We had all these devices on our trucks that were collecting information in real time and telling us things. And then we started building computing infrastructure and it burst Hadoop. So, I kind of grew up in this era of Big Data. We were collecting it all, we had no idea what to do with it. We had nowhere to process it. And so, I kind of saw like, there's a problem here. If we can find the unique little, you know, nuggets of information out of that, we can make some really smart decisions and save lives. So once I left that community, I kind of dedicated myself to that. The birth of this company again, was spun out of the US Intelligence community and it was really a simple problem. It was, they had a bunch of data scientists that couldn't access data fast enough. So they couldn't solve problems at the speed they needed to. It took four to six months to get to data, the mission said they needed it in less than 72 hours. So it was orthogonal to one another, and so it was very clear we had to solve that problem fast. So that weird world of very secure, really sensitive, but also the success that we saw of using data. It was so obvious that we need to democratize access to data, but we need to do it securely and we need to be able to prove it. We work with more lawyers in the intelligence community than you could ever imagine, so the goal was always, how do we make a lawyer happy? If you figure that problem out, you have some success and I think we've done it. >> Well that's awesome in applying that example to the commercial business world. Scott McNeely's famous for saying there is no privacy in the internet, get over it. Well guess what, people aren't going to get over it. It's the individuals that are much more concerned with it after the whole Facebook and fake news debacle. And as well, organizations putting data in the cloud. They need to govern their data, they need that privacy. So Matt, thanks very much for sharing with us your perspectives on the market, and the best of luck with Immuta. >> Thanks so much, I appreciate it. Thanks for having me out. >> All right, you're welcome. All right and thank you everybody for watching this Cube Conversation. This is Dave Vellante, we'll see ya next time. (digital music)
SUMMARY :
in Boston Massachusetts, it's the Cube. Matt, good to see ya. What is Immuta, why did you guys start this company? on the data to enforce any regulation, and get out to the market, but then the lawyers and the governance seems the ability to take control back. but the penalties didn't take effect till '18. and at the core of it is, why are you using my data? We have to automate it. There's a lot of confusion in the marketplace. So the cloud players are starting to see, So much to talk to you about here, Matt. So, the key isn't to stop people from using data. and I can get access to it, and other can get access to it. and we do that with customers across the world. Can you automate that on the creation of that data set? we can do it at the row level, The reason is that, especially in the age of data, to the highest common denominator as an example. and the consumer, and all they want to do So the other mega-trend you have is obviously, and it's likely, in the future, You had all the nice business logic to control it. Cause, the time to insight is perishable. What is the strategy there with regard to are all moving to cloud now in a different way. What do you mean by that? It's changing the ability to not just access, but it doesn't scale the same way. Cause that's the thing is you got to remember, And the opportunity for you is that data We just want to allow you to use the data and they'd say hey, "I need to ETL this And you've got providence issues, like you say. Yeah and storage is cheap, to look at all of the logs cross listed. and then I took you down a different path. and we can manage the updates for you, and whatever you can share about momentum, in the backend infrastructure to handle all of that. But now you're talking about enabling new business models. How did you get into all this? so the goal was always, how do we make a lawyer happy? and the best of luck with Immuta. Thanks so much, I appreciate it. All right and thank you everybody
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Dave Vellante | PERSON | 0.99+ |
Matt Carroll | PERSON | 0.99+ |
Boston | LOCATION | 0.99+ |
Immuta | ORGANIZATION | 0.99+ |
Matt | PERSON | 0.99+ |
2014 | DATE | 0.99+ |
ORGANIZATION | 0.99+ | |
2017 | DATE | 0.99+ |
15 years | QUANTITY | 0.99+ |
32 million | QUANTITY | 0.99+ |
ORGANIZATION | 0.99+ | |
2019 | DATE | 0.99+ |
November 2019 | DATE | 0.99+ |
Vegas | LOCATION | 0.99+ |
99 percent | QUANTITY | 0.99+ |
Congress | ORGANIZATION | 0.99+ |
Baghdad | LOCATION | 0.99+ |
Snowflake | ORGANIZATION | 0.99+ |
42 minutes | QUANTITY | 0.99+ |
GDPR | TITLE | 0.99+ |
four | QUANTITY | 0.99+ |
third question | QUANTITY | 0.99+ |
AWS | ORGANIZATION | 0.99+ |
six months | QUANTITY | 0.99+ |
22 | QUANTITY | 0.99+ |
three people | QUANTITY | 0.99+ |
Boston Massachusetts | LOCATION | 0.99+ |
May of 2018 | DATE | 0.99+ |
Bigquery | ORGANIZATION | 0.99+ |
three pieces | QUANTITY | 0.99+ |
87 percent | QUANTITY | 0.99+ |
two sides | QUANTITY | 0.99+ |
Data Praq | ORGANIZATION | 0.99+ |
Scott McNeely | PERSON | 0.99+ |
Databricks | ORGANIZATION | 0.99+ |
less than 72 hours | QUANTITY | 0.99+ |
two | QUANTITY | 0.99+ |
100 people | QUANTITY | 0.99+ |
first | QUANTITY | 0.99+ |
tomorrow | DATE | 0.99+ |
first job | QUANTITY | 0.98+ |
second | QUANTITY | 0.98+ |
2006 | DATE | 0.98+ |
ReInvent | ORGANIZATION | 0.98+ |
each state | QUANTITY | 0.98+ |
US | LOCATION | 0.98+ |
this year | DATE | 0.98+ |
AWBS | ORGANIZATION | 0.98+ |
over 500 thousand policies | QUANTITY | 0.98+ |
over 25 states | QUANTITY | 0.98+ |
one | QUANTITY | 0.98+ |
over 150 privacy regulations | QUANTITY | 0.98+ |
'18 | DATE | 0.98+ |
495 | QUANTITY | 0.98+ |
fourth quarter | DATE | 0.98+ |
One | QUANTITY | 0.97+ |
about 70 people | QUANTITY | 0.96+ |
three data sets | QUANTITY | 0.96+ |
billions of dollars | QUANTITY | 0.95+ |
Series B | OTHER | 0.95+ |
one more quarter | QUANTITY | 0.95+ |
YULU | ORGANIZATION | 0.95+ |
CISO | ORGANIZATION | 0.95+ |
Looker | ORGANIZATION | 0.94+ |
over 61 different storage platforms | QUANTITY | 0.93+ |
Fort Knox | ORGANIZATION | 0.92+ |
about 28 million | QUANTITY | 0.92+ |
Immuta | TITLE | 0.92+ |
Tableau | ORGANIZATION | 0.88+ |
Tara Vaishnav, The Clorox Company | Mayfield People First Network
>> Announcer: From Sand Hill Road in the heart of Silicon Valley, it's "theCUBE," presenting the People First Network, insights from entrepreneurs and tech leaders. (upbeat electronic music) >> Hi, everyone, welcome to this special "CUBE" conversation. I'm John Furrier, co-host of "theCUBE" and co-founder of SiliconANGLE Media. We are on Sand Hill Road at Mayfield Fund, the venture capitalist funding startups. We're here with Tara Vaishnav, who is the vice president of technology, innovation, and advanced analytics at The Clorox Company, as part of the People First Network co-creation of content with SiliconANGLE and Mayfield. Tara, welcome. >> Well, thank you very much for having me! And congratulations to Mayfield on 50 amazing years, wow! >> 50 years they have been in Sand Hill Road, they've been investing in some great startups. They really have a great philosophy about people first. >> Yep. >> And you've had a very distinguished career in technology, IT, in big companies. Long tenures, too, like, you know, decades. >> Yes, oh, yes. >> And now at Clorox, a consumer company. So talk about your journey, where your experience is, where you started, tell us about your background. >> Yeah, well, I grew up in India, if it's not obvious already. I came to the United States after I finished my undergrad in India, I had an undergrad in electrical engineering. Came over here, got my electrical engineering master's at the University of Southern California, go Trojans. And after that, I worked for several companies, but mostly in health care and life sciences. So the past four years, I have been the vice president of IT at The Clorox Company, which is a CPG company, so quite a bit of a learning curve there. >> Health care, serving patients, now you're serving consumers. >> That's right, that's right. >> Clorox is well-known for their analytics, well-known for technology, innovation. >> Tara: Yes, yeah. >> I've interviewed a bunch of folks at Clorox, they've always been at the head of the curve. >> Tara: Yeah. >> Like Procter & Gamble, you guys, consumer companies have to be. >> Tara: Definitely. >> Now, more than ever, digital disruption is an opportunity for companies to have a better relationship with their customers. >> Tara: Absolutely. >> And changes the makeup of their brand as well, since it touches the customer. How do you see that evolving? What's the current state of the art of some of the things you're working on? >> Yeah, it's pretty fascinating, actually. And I hate to use cliches, but things like consumer experience is really at the heart of it. We're a brand company, at the end of the day, and how people feel about us is really, really important. It's not so much, it is about the products, and we make amazing products, but how do they feel about us as a company, and how do they engage with us differently than they did before? We do not buy the same way as we did even five years ago. And so, learning that, learning the new, evolving consumer, and getting really close to what's important to them, that's really on the forefront of how we think about our digital transformation. >> One of the cool things that's great about the People First Network that we've been doing-- >> Tara: Yeah. >> This content, is that we have a lot of luminaries who have had a storied career, like yourself, have looked at the changes and the waves of innovation that have come before, and now, more than ever, omnichannel, how you advertise and reach customers, how they interact, how they buy and consume. When you look at health care and some of the things you've been involved in, in the '90s, remember, client-server was big, they had computers. >> Tara: (laughs) Oh, yes. Oh, yeah. >> IT has changed a lot. >> It has. >> What is the most striking thing that you see from those changes in this new wave that we're living now? >> You know, so, (sharply exhales) I was fortunate in that I decided that data was where it was at, right from the beginning of my career. That's how I kind of made my way up my career ladder, is really that focus on data. I had a software engineering background, but really felt the power of data to change things. What has happened, if I think about some of the big changes, or the key milestones, if you will, in my career, one of the first real big changes came about when data, which was up until that point really sort of coming along for the ride, you had applications, applications had data, when data actually became the mainstay and the applications kind of came and went. I remember one of my mentors in the past, a past CIO, actually, telling me that applications come and go, but data is forever. And when that really started to become a thing was when big data and big data technologies became, came of enterprise age, if you will, along with cloud technologies. That marriage really, that was, I think, the tipping point where the things that you could do with data and the way that you could get insights from data really took on a life of its own, if you will. >> You know, one of the things, that's a great point. I'd love to get your insights as a leader and as you grew with data, because it wasn't really obvious at that time. Certainly, people had databases and that, the big data, the applications had data. >> Tara: Sure, sure, yeah. >> But it was always kind of old-school data. "Hey, get some data, let's look at the demographics, "let's look at the Consumer Price Index," blah, blah, blah, all kinds of data. But access to data became driven by the database. >> Tara: Correct. >> So there might've been data available-- >> Tara: Yeah. >> But getting it in the hands of the practitioners even now is hard, but even back then, you might not have had the data. So as a leader who's sought data-- >> Tara: Yeah. >> As a strategic advantage. By the way, that's rare early, isn't it? So, (laughs) awesome for you. >> You know, I got lucky. >> How did you get through that? How did you lead the organization to make data at the center of things? >> It is a very good question. There were a few things that started to take shape once big data and the marriage of the cloud started to happen. It started to open up doors, break down organizational silos. When you brought that data together, the business value, or the potential business value that could be unlocked, became obvious. The way that we approached it, though, under my leadership, I always believe in small steps. I believe in leapfrog, but I believe that you have to feed innovation or innovative thinking out in small doses. People are not always ready to consume it in one big (laughs) fell swoop, if you will. So doing things incrementally, but with an idea towards transformation, was, I think, the secret sauce that I used to approach these things. So as a couple of examples, in Kaiser Permanente, when I worked there for almost seven years, I was instrumental in bringing their big data platform to life. But it was not just a matter of, "Here's the technology "for technology's sake." It was a matter of, "Here are some real problems "that we are having a lot of difficulty in solving today. "Let's show you how we can solve those differently "in an amazing way." And we proved that. It was an experiment, that we proved that, and that really started to get us those adopters, if you will. >> John: So take baby steps. >> Yep. >> Don't try to do wholesale changes hardcore. >> Correct, correct. >> Let people get used to it. >> Yeah. >> This must've had an impact on culture. >> Yes, yes. >> And this comes up a lot in the DevOps culture we've seen in the past decade, even now. >> Yeah. >> Getting people to change has become very difficult. >> Yes! >> John: We all know that person-- >> Yes. >> Has their project that's their baby, adding features, "No, don't take my "baby away from me." >> Tara: Yes, yes, yes. >> "I don't want to change." >> (laughs) Oh, yeah. >> How do you make that happen? How do you lead people through that very difficult transformation at an emotional level, on a business level? What's the strategy there? What's your technique? >> Yeah, so, again, back to, you have to show results. And you have to show results incrementally in a way that people can appreciate them and consume them. You have to look at technology from a business value perspective. Business value comes first, technology is just along for the ride. That's how people see it, and that's how they should see it. >> John: Mm-hm. >> It's what you can do with the technology that makes a difference. So, some of the techniques that I have used in the past have been, number one, you do have to find like-minded people in the organization. You can't go at it alone. You have to start to build your clan, if you will, of innovators, so you've got a target audience that you're chippin' away at, slowly, but you've got to build credibility. Because results build credibility. Credibility builds trust. Trust removes barriers. So that's kind of the way that I approach things. I bring like-minded people together, I find people in the organization, of the people that are resistant, that I can bring onto "my side," if you will, and I use their knowledge, their insights, their knowledge of how this person who is obviously a stakeholder, and an important stakeholder, how they think and what's important to them, and I use that language and that person to be able to approach individuals in different ways. It's about culture. >> And it's always good to make them, you know, success has many fathers, if you will-- >> Yep. >> Is always an expression. Making them feel part of the solution. >> Absolutely. >> So I got to ask you a question. Is having a software background, coming into the tech world and the business world, this, now, you're starting to see applications really dictate to the infrastructure. Elastic clouds are out there. >> Tara: Yes. >> You have data as a resource now. If you were entering the market as a young software engineer today, and you were asked to come in and make an impact, knowing what you know, how do you see the world today? Because, you know, a lot of software engineers creating value from men, and, now, a lot more women are coming on board. >> Yeah, yeah. >> It's still lower numbers, but still, software's not just that software engineer. >> Yeah. >> It's software architecture, it's software engineering, software development, UX, UI-- >> Tara: Yeah. >> Analytics, a lot of range-- >> Tara: Yeah, yeah. >> Of software opportunities. How would you attack the marketplace today if you were coming in and entering the workforce or in the middle of your career? >> Yes, you know, when I look at my career, which is a little longer than I'd like to admit, I see myself as a young undergraduate student in India. I was one of six girls in a class of about 50. I was striving to get a degree in what was called, actually, electronics and telecommunication. I was in a minority. I came over here to the United States, and I continued to be in the minority. I look at my career, which is more than 25 years old. I have also continued to stay in the minority throughout that career. The biggest difference between where I am now in my career versus where I was then is I don't care as much anymore that I'm in the minority. (both laugh) Right? What is fascinating to me, though, John, is when I look at some of the very young students, actually, we had a high school intern program for the first time this year at Clorox, which is actually interesting. We typically have college interns, but this year, Clorox, a 105-year-old company in the middle of the Silicon Valley, having the ability to see that the very, very young generation can think very differently, and bringing in the high school intern, or a set of high school interns, to help with that journey, I think, was forward-thinking for the company. And those kids, the confidence that they have? They are not shackled by knowing too much, you know? >> John: Yes. >> But they know what's relevant, they know how to make things happen, and boy, do they know how to use technology to make problems that we consider problems that would take months, happen so quickly. They were with us for four weeks. In four weeks, they developed an app, a website. They developed our logo. They developed a PR video for us. They had an innovation showcase. In four weeks, four little students. >> It's interesting, for the first time (Tara laughs) in my career, I can admit that, from a self-awareness standpoint, "Well, I really don't know what I'm talking about." These young kids have a different view, because now their experiences are different. >> Tara: Yes. >> And so, the insight coming out of this new generation really is pretty compelling. >> Tara: It is. >> They are adding a lot more because there's been a shift in expectations, there's been a shift in experiences-- >> Tara: Yes. >> For this new generation, and they're at the forefront, so it's a big wave coming. What's your thoughts on that? Because analytics is a big part of your career now, and it always-- >> Tara: Yes, yes. >> Has been, but now, more than ever-- >> Yeah. >> The younger generation, they want instant gratification, they want value. >> They do. >> They don't want to wait and be told-- >> They do. >> They want to see the immediacy. >> They do. >> Talk about this new shift, this new younger generation. >> Yeah, yeah. You know, there used to be the good old days, where we could, say, put a product out there and, you know, eventually it kind of works its way into the consumer ecosystem, and then we'd get to hear back, over the course of time. Customers would call in with a recommendation or a complaint. It's very different now. Things are out there instantaneously. We put something out there, you're getting comments and reviews, some of them good, some of them not so good. It's out there, and it's out there instantly. And that also, the modern consumer is not shy. They kind of hide behind the keyboard, and they're putting their comments out there, right? (both laugh) They're the keyboard warriors! >> John: (laughs) Yeah. >> So being able to respond to that and having not just the data, but the ability to extract insights from data and to extract insights in real time, that is crucial. And so, gone are the days where you had months to do your analytics. You have to be able to do your analytics in the flow, you have to be able to take in new information, incorporate it into your models, be able to do predictive analytics on it. So technology and the way that it is evolving is super critical for survival these days. >> So, survival, and also competitive advantage, we've heard-- >> Oh, for sure. >> From other CIOs, and also CSOs, from a security standpoint-- >> Yes, yes. >> There's business risks involved. How real-time do you see the advantage being? Obviously, near real time is pretty much what people talk about. >> Yeah. >> Real time is to the second, and self-driving cars will certainly need that. >> Yeah, yeah, yeah. >> But as a leader chasing the real-time holy grail-- >> Yeah. >> Seems to be a theme we hear. How do you react to that, and how do you view real-time data? >> There is definitely something that builds up to the richness of data that you can take advantage of in "real time." And I am saying "real time" in quotes because there is a contextuality associated with it. The wonder of modern advanced analytics and machine learning is that you have an existing model that you're tweaking and evolving with new information, and that model is serving as your guide as you receive new information. So, does it have to be reactive, or can it be proactive? You're building the insights, and then you're adding on new information as you see it. And you're using technology to help you make more holistic decisions. And at the end of the day, there is something to be said about the human aspect of it. The machine can give you guidance-- >> John: Yes. >> But the human being needs to make the decision. >> I'd love to ask you a quick question on that, because I think this is something that we talk about all the time. >> Yeah. >> Humans are critical in the equation, machines augment the humans. >> Yes. >> In the data world, if you're "data-driven," which has been (laughs) a cliche, "We're data-driven!" >> Tara: Yes, yes. >> It takes on multiple forms. >> Tara: Yes. >> I've seen multiple actors saying, "We're data-driven," but they're really just correlating data. >> Tara: Yeah. >> The causation side of it is, what's causing things, that's more of a management thing. >> Tara: Yeah. >> So causation and correlation are two different variables-- >> Tara: Yes. >> In the analytics field right now-- >> Tara: Yeah. >> That are being amplified as, you got to know the distinction between correlation, because you can correlate anything, causation is something that might be more designed towards figuring out something, and you really can't rest on one more than the other. >> Yeah. (laughs) >> Your thoughts on the balance between the two. >> You're talking to someone who worked in health care for-- (laughs) >> John: (laughs) I probably won't get you to continue. >> For almost seven years. Causation and correlation are-- >> John: More important than ever. >> Are more important than ever. And I think more and more, the boundary between what machines can do and how they can augment human beings, versus actually having the machines help you make decisions, it's getting fuzzier, and machines are able to do more and more. I mean, all of the knowledge that you could read about 24 hours a day cannot sit in your head. You have to be able to leverage machines to help you make those decisions. So as far as causation and correlation, I think the correlation is something that the machine can be the master of. It can see patterns where you may not even think to look for patterns. So I think that, let's give it up to the machines. Correlation is where-- >> John: They got that. >> The machines have got that, and you got to set them up so that they can do that for you. Causation is where the tricky area starts to happen. Because there is a lot to say, especially when you talk about doctors, about experience and working with individuals. Each individual is different. You can't say that the causation for this person is the same as that because the correlations are similar. No, you have to look, there are so many factors that go into what is causing-- >> John: Yeah. >> A disease or a condition in a person. So I think that is where the human element and experience really, really still make a difference. >> In the media business, we call it behavioral and contextual. >> Yes. >> Context is really important for really aligning-- >> It is. >> With whatever the problem statement may be. >> Yes, yes. >> Correlation, behavior, machines can do that. >> Correct. >> That's awesome, great, great, great insight there. A final question for you is, for other folks out there, CIOs or IT executives, as they look at the digital transformation journey, which, again, very cliche, but very real, there's a lot of opportunities, but also potential pitfalls if not executed properly. >> Tara: Yeah. >> Your thoughts on general roadmaps or best practices around how to tackle transformation, if they're doing it, coming in for the first time or at the beginning, or if they're in the middle of a digital transformation, and they're stuck in the mud-- >> Yeah, yeah. >> Or "Oh my God, "my head person quit. "I got to get more people." >> Yeah. >> "I need developers," or people on the back end of the transformation, different parts of the journey. What's your advice? >> Yeah, I've got a couple of, again, from the scars of my past, a couple of things that I think are important. Number one, when I joined Clorox, I had the stretch goal of actually building out their cybersecurity program. I had not done that in the previous part of my career. I was an enterprise architect, that's where I would spend most of my many years. But cybersecurity, and I hired the CSO and built out that program for Clorox, it puts a whole different lens on how you look at your transformation, and it is an important lens. And I think I would not have been rounded, as either an enterprise architect who's developing technology strategy or a digital technology innovator, if I did not have that lens of, there is risk that you need to consider. Now, the point to remember is that you can't over-rotate one way or the other. You have to consider risk and opportunity, and there's a fine line. And I think the smartest CIOs and senior executives know where that fine line exists, and are able to tell when you need to go this way or that way. So that's one thing that I would say, is don't lose that lens. Technology can do wonderful things for you, but so can the hackers from a different-- >> You got to be aware-- >> You've got to be aware. >> And then, you've got to shape it, too, as it evolves. Is that something that you see as important? >> You have to have that lens of, you're doing this wonderful, amazing thing, however, what if the unintended audience is able to access whatever you're doing? And what can they do with it? So that's one thing that I would say, is keep that balance in mind. Again, don't over-rotate one way or the other, but keep that balance in mind. The other thing that I would say is, innovation is a state of mind that needs to be nurtured and developed, and it needs to be sought from every part of the organization. The only way to scale innovation is to have everybody be an innovator in the organization. So that would be my advice, is innovation can come from the youngest high school intern, or, we actually just had someone at Clorox celebrate their 50th year at Clorox. So, you know-- >> John: Yeah. >> Innovation can come from anywhere in the organization. You have to always be ready, open-minded, and prepared to grab that opportunity when it happens. >> My final takeaway for this is in context to where we are now, we're on Sand Hill Road-- >> Yes. >> At Mayfield Fund, they're a venture capitalist. >> Yes. >> They fund early-stage and growth. >> Yep. >> The younger generation, we just talked about the insights that they can have, new shifts that are happening in experiences, expectations. The startups, more than ever, have an opportunity to have customers like Clorox. >> Tara: Yes, yes. >> What used to be, "Well, a startup, "risk, don't go through the, go through TSA, "and when you get approved, "then we'll talk to you," kind of thing. (Tara guffaws) It's a big, painful process. >> Used to be? >> Now, more than ever, startups want to land the big Clorox deals. >> Yes, yes. >> They want to show the value proposition, time to value, shortening, with cloud and other things. What's your advice to startups who want to sell to you or hope to, aspire to, be successful in the marketplace? >> You know, I love startups, and I spent a lot of time with them. What I have seen as differentiating in the startups that I have seen is, some of them, they're out there, they want your business. So they are looking at you from that, "Can I get your business?" And then there are other startups that, I'm sure they've got that lens, but they don't make it obvious to you. To them, the value is in working with you. You're a company that is well-reputed. You've got a ton of amazing data that can be used to develop your models. You've got a ton of insights and understanding of the business that you can get by just working with this "reputed" company, like Clorox. Those in itself, you can't put a tangible, material value on that, but that is what helps startups build relevant and amazing products. And that, in itself, is "payment." The money will come, but look to the experiences, look to the ability to leverage data, and, above all, look to how you can position your product in a way that it is solving a business problem. Don't do technology for technology's sake. >> So, your advice would be, don't focus on on the PO. If they're venture-backed, they probably have some runway. >> Yes. >> Focus on the value proposition. >> Absolutely, and learning how companies operate and what's important to them, take the time to do that. >> How about scale? Do you hear that a lot with startups, they want to try to use the value proposition? One, they have to get in the door and show value, so that's one. >> Tara: Of course. >> Kind of table stakes, get through the door. >> Okay, yep. >> Then it's more about how they can be operationalized. That becomes something I've seen with startups. What's your thoughts on that? Because one of the benefits of getting in the door is getting (laughs) in the door, but staying in-- >> Yeah. >> Is about operationalizing that new value proposition. How do you look at that as a leader? >> (sharply exhales) Yeah, the word operationalization is an interesting one. So, companies like Clorox, I mean, while I love to work with startups, I will tell you that I do experiments, four, six, eight weeks, we've got a metric. If we go beyond that, it's probably a project that needs to go through a different route. But we do these experiments, and we do them quickly. The thing that we do worry about is, "Okay, great startup, great product. "Is it enterprise-ready?" You know? And I think that is where a lot of startups struggle a little bit, is, can they prove to you that their product is Fort Knox, that it won't be a way through which your systems get hacked? Can they prove to you that they've got a good handle on where they are going, what their roadmap is, what capabilities they are developing in their roadmap? Can they showcase that to you in a way that makes sense to you? We're looking for companies that are not just here today and gone tomorrow, companies that are here for the long run. And then, even if they can't do all of that, show that you integrate really well with our other products. Because, guess what, if you don't work out so well for us, little startup, we want to be able to replace you. We want to have that option. And if you don't integrate seamlessly and can be plucked out and put back in again, then we're stuck with something that we can't extract from our environment. So they've got to think how we think, is what I would advise them. (laughs) >> Tara, thanks so much for this great insight. For startups out there, for folks entering their career, for other women who are looking to break into tech, we have a great inspirational leader here. >> Thank you. >> John: Thank you for spending the time, we really appreciate it. >> Thank you very much, really appreciate it. >> Thank you very much. I'm John Furrier. You're watching the People First program with SiliconANGLE and Mayfield. Thanks for watching. (upbeat electronic music)
SUMMARY :
Announcer: From Sand Hill Road in the heart at The Clorox Company, as part of the People First Network They really have a great philosophy about people first. you know, decades. where you started, tell us about your background. So the past four years, I have been the vice president of IT Health care, serving patients, now you're Clorox is well-known for their analytics, of the curve. consumer companies have to be. to have a better relationship with their customers. of some of the things you're working on? We do not buy the same way as we did even five years ago. have looked at the changes and the waves of innovation Tara: (laughs) Oh, yes. and the way that you could get insights from data You know, one of the things, that's a great point. "let's look at the Consumer Price Index," of the practitioners even now is hard, By the way, that's rare early, isn't it? and that really started to get us those Don't try to do wholesale an impact on culture. in the DevOps culture we've seen in the past decade, Getting people to change has become that's their baby, adding features, And you have to show results incrementally So that's kind of the way that I approach things. Is always an expression. So I got to ask you a question. and you were asked to come in and make an impact, but still, software's not just that software engineer. How would you attack the marketplace today if you and bringing in the high school intern, and boy, do they know how to use technology It's interesting, for the first time And so, the insight Because analytics is a big part of your they want instant gratification, they want value. the immediacy. Talk about this new And that also, the modern consumer is not shy. And so, gone are the days where you had months How real-time do you see the advantage being? Real time is to the second, How do you react to that, and how do you And at the end of the day, there is something to be said But the human being I'd love to ask you a quick question on that, in the equation, machines augment but they're really just correlating data. The causation side of it and you really can't rest on one more than the other. between the two. won't get you to continue. Causation and correlation are-- I mean, all of the knowledge that you could read about You can't say that the causation for this person So I think that is where the human element In the media business, we call it behavioral machines can do that. at the digital transformation journey, "I got to get more people." or people on the back end of the transformation, Now, the point to remember is that you can't Is that something that you see as important? innovation is a state of mind that needs to be nurtured Innovation can come from anywhere in the organization. they're a venture capitalist. The startups, more than ever, have an opportunity to have "and when you get approved, the big Clorox deals. time to value, shortening, with cloud and other things. of the business that you can get don't focus on on the PO. Focus on the value and what's important to them, take the time to do that. One, they have to get in the door and show value, Kind of table stakes, Because one of the benefits of getting in the door How do you look at that as a leader? Can they prove to you that they've got a good handle we have a great inspirational leader here. for spending the time, we really appreciate it. Thank you very much, Thank you very much.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Tara | PERSON | 0.99+ |
John | PERSON | 0.99+ |
India | LOCATION | 0.99+ |
Tara Vaishnav | PERSON | 0.99+ |
Clorox | ORGANIZATION | 0.99+ |
John Furrier | PERSON | 0.99+ |
SiliconANGLE | ORGANIZATION | 0.99+ |
Mayfield | ORGANIZATION | 0.99+ |
four weeks | QUANTITY | 0.99+ |
Procter & Gamble | ORGANIZATION | 0.99+ |
United States | LOCATION | 0.99+ |
one | QUANTITY | 0.99+ |
People First Network | ORGANIZATION | 0.99+ |
Silicon Valley | LOCATION | 0.99+ |
six | QUANTITY | 0.99+ |
Sand Hill Road | LOCATION | 0.99+ |
six girls | QUANTITY | 0.99+ |
tomorrow | DATE | 0.99+ |
SiliconANGLE Media | ORGANIZATION | 0.99+ |
University of Southern California | ORGANIZATION | 0.99+ |
50th year | QUANTITY | 0.99+ |
50 years | QUANTITY | 0.99+ |
second | QUANTITY | 0.99+ |
first time | QUANTITY | 0.99+ |
two | QUANTITY | 0.99+ |
four | QUANTITY | 0.98+ |
today | DATE | 0.98+ |
Kaiser Permanente | ORGANIZATION | 0.98+ |
50 amazing years | QUANTITY | 0.98+ |
eight weeks | QUANTITY | 0.98+ |
five years ago | DATE | 0.98+ |
The Clorox Company | ORGANIZATION | 0.98+ |
Mayfield Fund | ORGANIZATION | 0.97+ |
about 50 | QUANTITY | 0.97+ |
this year | DATE | 0.97+ |
theCUBE | ORGANIZATION | 0.97+ |
Steven Sprague, Rivetz | HoshoCon 2018
>> From the Hard Rock Hotel in Las Vegas, it's theCUBE covering HoshoCon 2018. Brought to you by Hosho. >> Over and welcome back to our live coverage here in Las Vegas for HoshoCon. I'm John Furrier host of theCUBE. The first inaugural conference on security in the blockchain security is obviously not new to the blockchain It's number one concern. Crypto is crypto, decentralized networks is what people want. Security is the only thing that matters, if you haven't been hacked, then you should know we're being hacked. This is theCUBE coverage here in Las Vegas for HoshoCon. I'm John Furrier with Steven Sprague CEO of Rivetz, who's a security and an entrepreneur I've known for almost 20 years now he has been at this all through multiple ways of innovation, multiple security paradigm stacks, not new the problem, great time for you, Welcome to theCUBE. >> Thank you for having me. >> So I've known you and knowing your father as well for almost 25 plus years, you have been at this in one form or another with security and the waves are different, I mean there's different the web wave there's different architectures I mean people call it internet 3.0 whatever they're just different evolutionary steps, now is the killer time because we're seeing the most action. You got web, internet, mobile, global, new economics, new money the stakes are higher it's not not just like some isolated box, you got cloud. This is the time to harvest the work you've been doing, give us an overview. >> Absolutely you know I've been at this my whole career, I started down this path in 1990. Doing digital rights management micro transactions and video games and was part of the formation that Trusted Computing group in the 2000s and helped shipped 1.4 billion PCs with hardware security on the motherboard of the PC that still out there today. Started with started Rivets in 2013 to really go after, how do we enable the hardware security and mobile devices? And just about instantaneously ran into the blockchain and at my first Bitcoin conference, which was the Miami Bitcoin conference about a half an hour into it, it dawned on me two things. One, we were talking a lot about crypto but nobody was talking about cybersecurity and there's a gap between those just because we talk crypto all the time doesn't mean that we know what we're doing in cyber and the other one that was true as, oh my God, I've been looking for this for the last 10 years, which is how do we enable the user to own their own keys? And I don't mean like single keys on each device. I mean, the root key that controls all the other keys on all their devices. This is a super interesting space, we're just the very beginning of it in some ways the Bitcoin side the sort of value or or money side is the demo, the real opportunity is, this is the infrastructure that's going to replace how we do normal enterprise computing. >> Yeah. >> And the end of PC computing, we're about to have a new paradigm, blockchain-- >> I agree with you as an infrastructure shift over because the efficiencies that are gained and the disruption around what's not efficient, whether it's venture capital or infrastructure, IoT, whatever the supply chain or the decentralized way is the way to make it efficient, so it's an opportunity. Every entrepreneur that I know that is licking their chops going, wow, I can come in here and and create value. The mainstream adoptions around this complexity around use to your point, and then the fear of being hacked the cybersecurity piece whether it's for money, or a a hostile actor. >> But think of it in a different way. Security, nobody cares about security, nobody buys security, nobody wants security, security is UI. So if I asked you what your favorite multi factor authentication experience, you think like fingerprints and all this kind of stuff, it's not true, the send button is your favorite one, dial the number and push then and it just works. It works everywhere in the world works every time you've taught mom how to use it and the kids how to use it. It's simple, so why, so we would never use like, dial the number and we're going to use AI and big data to determine whether your phone is in the right condition to complete the call. And then a message is going to come up and say, would you please breathe deeply and calm down, because you're clearly agitated, I can't complete your call for you at this time. (laughing) Like, you've never used that phone, so why are we going to use that for the rest of our enterprise? >> I just sent you a pin number on your phone that you can't use before you can make the call. Again, I agree, it should be under the wire. It should be transparent security should be native, always on. >> That's right. >> And that's what you're getting at, okay. In your opinion, where are we in the progress because again, I think this connects the dots for your career, what you've worked on the itch you've been scratching in security because you have the perfect storm, you have full mobility penetration, you have commerce on top of it, and you have full global connectedness those three things alone make a-- >> And we have decentralization, so the thing that's important in blockchain is it's important remember, while the data on a chain is immutable, we know we can seal inside a little envelope a message and sign it and we write it to a chain it never changes. What we don't know is whether the data written to the chain was intended so all the information on all the blockchains is fake news. It's important to understand that we, if we take a blockchain to court try and prove something, all we can prove with the data hasn't changed. I have absolutely no idea whether your private key was written on the bathroom wall or stored in Fort Knox. And so if you try and record something on chain, your defense is always ah somebody stole my private key. Or if I'm trying to defend that you didn't do it on chain, somebody stole his private key, so actually the date on the chain is fake. It's real it was signed by a private key, but we have no knowledge to the quality of the private key and if you told the blockchain community that we got to go get your Windows log files to see whether or not your key was compromised at the time and the windows log files are the way we secure all blockchains. We're not going to get there, so the problem is-- >> That's a roadblock for sure, no doubt. >> Yeah, so the problem is that blockchains, are decentralized therefore, they're censorship proof. All of network security is censorship, therefore, blockchain is network security proof. Oops. So everything we spent in the last trillion dollars in cyber security doesn't work on blockchain Unless I run private chains, all a private chain is running inside the enterprise security while using all Juniper firewalls to secure your chain. That's not what we're talking about, We're talking about a decentralized solution. >> So match the security for pro posture for the architecture that you're working on. >> So we are going to have to do for the first time something that's crazy, we're going to have to do security commerce, which is when we form an instruction 'cause blockchains aren't authentication either, this isn't about logging into a node, getting a web page and filling out a form, no this is about sending an instruction. So, a blockchain instruction, a nuclear launch code, an e-commerce transaction, an IoT instruction like turn the lights on to 50% are all the same thing, it's an instruction based paradigm so it's not only about protecting the key but also the protection of the instruction that tells the system what to do and so in order to do that, the device that creates the instruction has to be a known device. Today we run our whole world, all our critical infrastructure, everything on unknown compute. When you turn this machine on, you didn't check to see it wasn't run by the North Koreans and you can't tell. >> Yeah, they could be in there, they probably are. >> Absolutely, more so than you would want to know. >> So what whereas the answer on this so get to the, cut to the chase here in your opinion, as the people figure out okay, we have all this great hardware that was built for a certain generation, now I'm using it as mission critical in my life, it's integrated to my lifestyle with my watch, my computer, my phone, now my in house Siri, portal, Facebook thing. >> So we need to get away from Apple's embracing of the CompuServe model, where you have a mobile phone that is a terminal, when you log into apps and your identity is based on your login to your phone. We don't actually check to see if the phone is really your phone. And we need to move to the concept of mobile, where it's a device identity network where services are delivered, not based on the username and password, but based on the identity of the device and really, ultimately, we need to get to what looks like an IoT network, which is a device identity network with messaging as the primary protocol. So secure messages sent. Fundamentally, we need to demote the importance of user authentication and promote the importance of device identity, so that I have a known device and a known condition with known controls that is producing the instructions that are sent to the chain. Ideally, you'd like in every chain, a second hash. And that second hash represents a manifest of controls that were in place, so I checked to see I was in the building, I checked to see who's still an employee, I checked to see my devices working properly, I check to see the trust infrastructure in the hardware of my devices working properly, and that gives me a hash I can write that to chain with the same immutable transaction, now I can prove that John's device in this condition with these controls wrote this transaction. >> Authentication powered the last architecture blockchain to your point about being you know, you don't know what's on the data needs to have an identity model for the signatures. >> For the robot. >> For the robot. >> For the robot. So some people like oh my god, but what if I lose my phone and the most important thing is you notice. If I steal your private keys you don't notice I still your phone like I just touch your phone. It makes you feel nervous, >> Yeah. (laughing) It's a very, but that's 100,000 years. >> I know when I leave my phone home I turn around soon as am three feet the driveway I'm like, okay, go back, get the phone. >> And so that's cyber security training it starts when you're 18 months old, when somebody gives you an important object you're not supposed to forget places like heaven forbid you remove the fuzzy rabbit from the three year old, you can lose an arm, right. So that model buying device, the good news is the trusted computing standards of the world have given us embedded hardware security in the chip sets as a standard capability in every ARM processor. Now in every Intel processor, we can turn these capabilities that have been deployed in these devices. We turn them on, provide an effective hardware based wallet for all of crypto. >> How does the hardware wallet work in your vision? Because I think most people generally and me included would say, look I love crypto but I'm busy got my four kids, two are in college, two or in high school and running around you're running around, bottom line is I got my key, my cold storage, I get keys everywhere, I forgot where I put my damn keys where's my key anyway I ended up writing and I post it. Who knows? >> I want to believe your keys are your collection of devices. So we've actually just done a recent relationship with Telefonica we showed two weeks ago, a dual Root of Trust handset, so half of your key is protected by the SIM architecture in your phone, half of your key is protected by the manufactured ARM processor in your, in your handset. So I have two separate routes of trust. I'm not trusting the carrier, I'm not trusting the manufacturer, they have to work in cooperation, the owner owns the keys, then I want to backup those keys. So why not, now that I have multiple routes of trust in my device, they can talk to my other devices, So we think of your household of devices as your key, not your single super phone. So every time I make a new wallet, you're right. You're running around, you didn't think about it, You don't want to write down 12 words, you're out at Starbucks, you shouldn't be writing the 12 words down on the surveillance camera at Starbucks. That would be a bad plan, Instead, you want your device to just communicate out to your other devices. So imagine in the future I lose my phone I can shut it off by calling my carrier and then I want to Make a new phone, maybe I've got to go like push a button in my Tesla push a button on my smart refrigerator. And my wife has to push a button or my girlfriend, or whatever the complications we all have. (laughing) And that's what allows me to recreate, not just my blockchain keys, but my Marriott keys, my car keys, my refrigerator keys, my these keys and we're going to have lots of keys for all this stuff. >> And the hardware is key in your opinion, got to have the hardware. >> Right, the reason why you have hardware is because, we can measure that the hardware hasn't changed so we can have a hardware Root of Trust, something that we know is anchored in silicon, in iron and then, or really in copper, and then from that we can build a stack that says we know this hasn't changed because if it's cast in the ground now we can build up from there each step and know that this measured environment is running properly. >> So people want be concerned, obviously Bloomberg had a story this week about China putting a mod chip on super micro boxes that's hardware. How do you talk to that, because I'm now saying, hey, I love the Root of Trust concept you guys are awesome, great job, but what about being hacked by someone else-- >> Well let's assume hacks continue on in time, I think the ultimate disinfectant in this is identity of the device, so give me a list of where 100% of those computers are. And are they in any critical systems that you have? So you're running DHS, and you've got 1.2 million servers across your network? Can you tell me 100% of the machines, that have that capability on them? Now that you know that model 45 had that. So we have an example for this VIN numbers in cars have been a great example of how we've improved the quality of cars, not that we aren't stupid humans and we build stuff that breaks or doesn't work and people die, we just want to know, that if he dies in his car that I don't want to drive the same car he drove without fixing whatever it is they're broken your car. >> So unique ID for the car, an asset. >> Yeah. And so tracking that, yep, we have it for lots of things. We don't have it for PCs, if you ask the average organization, please give me a list of the software that runs your corporation, they have no idea. >> Yeah, and the same thing with data to the GDPR thing, all these regulations, >> Right, because all, so GDPR is a great example of where now I need to prove I had controls in place in order to show that my data is properly-- >> They didn't know they had a server out there. >> I don't want to audit once a year, I want to check every time I do a transaction, was the person and employee did they have data rest in their machine, did they. So we can use the concepts of GDPR regulation to press this idea that I've provable controls at a transactional level for every instruction that's done. I want to know that I have known compute, if you had to write policy for the federal government, it's only known computers connected to sensitive networks and data. That doesn't require rocket science to understand. It's like, don't hook anonymous unknown computers you picked up out in the parking lot and tie them to the nuclear launch codes, that would be a bad plan. Like, let's start with at least machines we know and that are running software we know and that we've tested them so that we know they're running what we expect and they're working correctly, then let's use them for critical systems. So let's talk about the, and want to just finish up this segment on looking at what you're saying, which is a whole new operating model is coming really fast. The old model that's being operate is run by huge companies, Apple, Amazon, IT departments all around the world, governments, so there's going to be some resistance is going to have to be some change, that change is going to be disruptive. How do you see it playing out, you see people waking up going it's inevitable or you see a train wreck or collision. >> Now I think we have to create a transition. I spent a decade trying to create the train wreck and that didn't work very well, we shipped the technology and every PC. What we've done here is we're making it possible for you measure the integrity of a device in a mobile phone, and then you can hold keys in it. But I can apply policies or rules to those keys and those policies can talk to all of my old external systems. So I can ask all my network security stack, Where is this device, is this person an employee? Is my organization feeling good today, before I let you use the key. >> You bring program ability and state into-- >> Right, it's like you drag along the whole network security stack, and all their API controls and their SIEMs and let's hook Watson up and watch the whole network and apply that as a rule to a case. So now I can sit in Starbucks, and my device checks to see my organization's good, and then logs me into Gmail. I didn't have to tell Gmail to ask whether I was an employee, so I can have a mobile phone that says only log on if you're on the nuclear submarine and it'll work and I don't have to tell GitHub that check to see whether he's on a nuclear submarine. They just have to know that this two factor authentication is external, what's making that possible is that two factor authentication and all the services is fundamentally device registration, and as we mature that as the industry matures, those standards it provides the vehicle for all the services to incorporate a device component to the authentication strategy and then we can engage the robot to make that device smarter. >> Robot being the machine. >> Our device. >> Great to have you on, give the quick plug, what's going on Rivets real give us a quick. >> So Rivets is a fun company going after building these tools, we have a great partnership with Telefonica, we're extending it to other carriers as well. And our mission here is to bring the next billion people the blockchain by giving them a hardware based wallet for crypto, for IoT, for cloud in 100% of the mobile devices that are shipped and use the carriers as a mechanism to deliver that to us. >> You bring value that carries you also help the users make that usability peace secure. If you can pull that off, man I'd have a parade on Main Street for you. We need that. >> We desperately need this. We are so ready for our digital life to become simpler and safer for the user, And really for the services, it allows them to have more valuable data. So it's the combination of those two things, it's a win both for the consumer and for the services. >> Well, let's hope it can be a seamless transition rather than a train wreck collision. I'm John Furrier we here at talking security at Hoshocon, the inaugural blockchain secure, the first blockchain security conference am here with Steven Sprague CEO Rivets, hot, hot company in the space with many, many years experience. Time is ripe, right now the time is perfect for you. Congratulations. >> Thank you. >> Thanks for coming on, we're back with more after this short break. (electronic music)
SUMMARY :
Brought to you by Hosho. The first inaugural conference on security in the blockchain This is the time to harvest the work you've been doing, and the other one that was true as, oh my God, I've been and the disruption around what's not efficient, So if I asked you what your favorite multi factor I just sent you a pin number on your phone that and you have full global connectedness and the windows log files are the way Yeah, so the problem is that blockchains, So match the security for pro posture for of the instruction that tells the system cut to the chase here in your opinion, of the CompuServe model, where you have a mobile phone blockchain to your point about being you know, and the most important thing is you notice. It's a very, but that's 100,000 years. I'm like, okay, go back, get the phone. the three year old, you can lose an arm, right. How does the hardware wallet work in your vision? the manufacturer, they have to work in cooperation, And the hardware is key in your opinion, Right, the reason why you have hardware hey, I love the Root of Trust concept you guys are awesome, of the device, so give me a list of where 100% of the software that runs your corporation, and that are running software we know and that we've tested and then you can hold keys in it. the robot to make that device smarter. Great to have you on, give the quick plug, for crypto, for IoT, for cloud in 100% of the mobile devices You bring value that carries you also help the users So it's the combination of those two things, it's a win both Time is ripe, right now the time is perfect for you. we're back with more after this short break.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Apple | ORGANIZATION | 0.99+ |
Amazon | ORGANIZATION | 0.99+ |
1990 | DATE | 0.99+ |
Telefonica | ORGANIZATION | 0.99+ |
Steven Sprague | PERSON | 0.99+ |
12 words | QUANTITY | 0.99+ |
100% | QUANTITY | 0.99+ |
John | PERSON | 0.99+ |
two | QUANTITY | 0.99+ |
John Furrier | PERSON | 0.99+ |
Rivets | ORGANIZATION | 0.99+ |
Siri | TITLE | 0.99+ |
100,000 years | QUANTITY | 0.99+ |
50% | QUANTITY | 0.99+ |
2000s | DATE | 0.99+ |
GitHub | ORGANIZATION | 0.99+ |
four kids | QUANTITY | 0.99+ |
Las Vegas | LOCATION | 0.99+ |
Bloomberg | ORGANIZATION | 0.99+ |
Gmail | TITLE | 0.99+ |
two things | QUANTITY | 0.99+ |
three feet | QUANTITY | 0.99+ |
2013 | DATE | 0.99+ |
Starbucks | ORGANIZATION | 0.99+ |
Today | DATE | 0.99+ |
Marriott | ORGANIZATION | 0.99+ |
Tesla | ORGANIZATION | 0.99+ |
GDPR | TITLE | 0.99+ |
Rivetz | ORGANIZATION | 0.99+ |
HoshoCon | EVENT | 0.98+ |
second hash | QUANTITY | 0.98+ |
each device | QUANTITY | 0.98+ |
1.4 billion PCs | QUANTITY | 0.98+ |
this week | DATE | 0.98+ |
two factor | QUANTITY | 0.98+ |
today | DATE | 0.98+ |
two weeks ago | DATE | 0.98+ |
both | QUANTITY | 0.98+ |
first time | QUANTITY | 0.98+ |
Juniper | ORGANIZATION | 0.98+ |
single keys | QUANTITY | 0.97+ |
first | QUANTITY | 0.97+ |
One | QUANTITY | 0.97+ |
three year old | QUANTITY | 0.97+ |
HoshoCon 2018 | EVENT | 0.97+ |
each step | QUANTITY | 0.96+ |
about a half an hour | QUANTITY | 0.96+ |
three things | QUANTITY | 0.96+ |
billion people | QUANTITY | 0.96+ |
Intel | ORGANIZATION | 0.95+ |
once a year | QUANTITY | 0.95+ |
Hosho | ORGANIZATION | 0.94+ |
1.2 million servers | QUANTITY | 0.94+ |
almost 20 years | QUANTITY | 0.94+ |
Fort Knox | LOCATION | 0.94+ |
Windows | TITLE | 0.93+ |
a decade | QUANTITY | 0.93+ |
almost 25 plus years | QUANTITY | 0.93+ |
Hard Rock Hotel | LOCATION | 0.93+ |
half of your key | QUANTITY | 0.92+ |
Rivetz | PERSON | 0.89+ |
North Koreans | PERSON | 0.87+ |
Miami Bitcoin conference | EVENT | 0.86+ |
first inaugural | QUANTITY | 0.86+ |
trillion dollars | QUANTITY | 0.85+ |
18 months old | QUANTITY | 0.83+ |
Bitcoin | EVENT | 0.82+ |
lots of keys | QUANTITY | 0.82+ |
two separate | QUANTITY | 0.82+ |
China | ORGANIZATION | 0.8+ |
half of | QUANTITY | 0.79+ |
one form | QUANTITY | 0.77+ |
CEO | PERSON | 0.76+ |
last 10 years | DATE | 0.76+ |
Arun Murthy, Hortonworks | DataWorks Summit 2018
>> Live from San Jose in the heart of Silicon Valley, it's theCUBE, covering DataWorks Summit 2018, brought to you by Hortonworks. >> Welcome back to theCUBE's live coverage of DataWorks here in San Jose, California. I'm your host, Rebecca Knight, along with my cohost, Jim Kobielus. We're joined by Aaron Murphy, Arun Murphy, sorry. He is the co-founder and chief product officer of Hortonworks. Thank you so much for returning to theCUBE. It's great to have you on >> Yeah, likewise. It's been a fun time getting back, yeah. >> So you were on the main stage this morning in the keynote, and you were describing the journey, the data journey that so many customers are on right now, and you were talking about the cloud saying that the cloud is part of the strategy but it really needs to fit into the overall business strategy. Can you describe a little bit about how you're approach to that? >> Absolutely, and the way we look at this is we help customers leverage data to actually deliver better capabilities, better services, better experiences, to their customers, and that's the business we are in. Now with that obviously we look at cloud as a really key part of it, of the overall strategy in terms of how you want to manage data on-prem and on the cloud. We kind of joke that we ourself live in a world of real-time data. We just live in it and data is everywhere. You might have trucks on the road, you might have drawings, you might have sensors and you have it all over the world. At that point, we've kind of got to a point where enterprise understand that they'll manage all the infrastructure but in a lot of cases, it will make a lot more sense to actually lease some of it and that's the cloud. It's the same way, if you're delivering packages, you don't got buy planes and lay out roads you go to FedEx and actually let them handle that view. That's kind of what the cloud is. So that is why we really fundamentally believe that we have to help customers leverage infrastructure whatever makes sense pragmatically both from an architectural standpoint and from a financial standpoint and that's kind of why we talked about how your cloud strategy, is part of your data strategy which is actually fundamentally part of your business strategy. >> So how are you helping customers to leverage this? What is on their minds and what's your response? >> Yeah, it's really interesting, like I said, cloud is cloud, and infrastructure management is certainly something that's at the foremost, at the top of the mind for every CIO today. And what we've consistently heard is they need a way to manage all this data and all this infrastructure in a hybrid multi-tenant, multi-cloud fashion. Because in some GEOs you might not have your favorite cloud renderer. You know, go to parts of Asia is a great example. You might have to use on of the Chinese clouds. You go to parts of Europe, especially with things like the GDPR, the data residency laws and so on, you have to be very, very cognizant of where your data gets stored and where your infrastructure is present. And that is why we fundamentally believe it's really important to have and give enterprise a fabric with which it can manage all of this. And hide the details of all of the underlying infrastructure from them as much as possible. >> And that's DataPlane Services. >> And that's DataPlane Services, exactly. >> The Hortonworks DataPlane Services we launched in October of last year. Actually I was on CUBE talking about it back then too. We see a lot of interest, a lot of excitement around it because now they understand that, again, this doesn't mean that we drive it down to the least common denominator. It is about helping enterprises leverage the key differentiators at each of the cloud renderers products. For example, Google, which we announced a partnership, they are really strong on AI and MO. So if you are running TensorFlow and you want to deal with things like Kubernetes, GKE is a great place to do it. And, for example, you can now go to Google Cloud and get DPUs which work great for TensorFlow. Similarly, a lot of customers run on Amazon for a bunch of the operational stuff, Redshift as an example. So the world we live in, we want to help the CIO leverage the best piece of the cloud but then give them a consistent way to manage and count that data. We were joking on stage that IT has just about learned how deal with Kerberos and Hadoob And now we're telling them, "Oh, go figure out IM on Google." which is also IM on Amazon but they are completely different. The only thing that's consistent is the name. So I think we have a unique opportunity especially with the open source technologies like Altas, Ranger, Knox and so on, to be able to draw a consistent fabric over this and secured occurrence. And help the enterprise leverage the best parts of the cloud to put a best fit architecture together, but which also happens to be a best of breed architecture. >> So the fabric is everything you're describing, all the Apache open source projects in which HortonWorks is a primary committer and contributor, are able to scheme as in policies and metadata and so forth across this distributed heterogeneous fabric of public and private cloud segments within a distributed environment. >> Exactly. >> That's increasingly being containerized in terms of the applications for deployment to edge nodes. Containerization is a big theme in HTP3.0 which you announced at this show. >> Yeah. >> So, if you could give us a quick sense for how that containerization capability plays into more of an edge focus for what your customers are doing. >> Exactly, great point, and again, the fabric is obviously, the core parts of the fabric are the open source projects but we've also done a lot of net new innovation with data plans which, by the way, is also open source. Its a new product and a new platform that you can actually leverage, to lay it out over the open source ones you're familiar with. And again, like you said, containerization, what is actually driving the fundamentals of this, the details matter, the scale at which we operate, we're talking about thousands of nodes, terabytes of data. The details really matter because a 5% improvement at that scale leads to millions of dollars in optimization for capex and opex. So that's why all of that, the details are being fueled and driven by the community which is kind of what we tell over HDP3 Until the key ones, like you said, are containerization because now we can actually get complete agility in terms of how you deploy the applications. You get isolation not only at the resource management level with containers but you also get it at the software level, which means, if two data scientists wanted to use a different version of Python or Scala or Spark or whatever it is, they get that consistently and holistically. That now they can actually go from the test dev cycle into production in a completely consistent manner. So that's why containers are so big because now we can actually leverage it across the stack and the things like MiNiFi showing up. We can actually-- >> Define MiNiFi before you go further. What is MiNiFi for our listeners? >> Great question. Yeah, so we've always had NiFi-- >> Real-time >> Real-time data flow management and NiFi was still sort of within the data center. What MiNiFi does is actually now a really, really small layer, a small thin library if you will that you can throw on a phone, a doorbell, a sensor and that gives you all the capabilities of NiFi but at the edge. >> Mmm Right? And it's actually not just data flow but what is really cool about NiFi it's actually command and control. So you can actually do bidirectional command and control so you can actually change in real-time the flows you want, the processing you do, and so on. So what we're trying to do with MiNiFi is actually not just collect data from the edge but also push the processing as much as possible to the edge because we really do believe a lot more processing is going to happen at the edge especially with the A6 and so on coming out. There will be custom hardware that you can throw and essentially leverage that hardware at the edge to actually do this processing. And we believe, you know, we want to do that even if the cost of data not actually landing up at rest because at the end of the day we're in the insights business not in the data storage business. >> Well I want to get back to that. You were talking about innovation and how so much of it is driven by the open source community and you're a veteran of the big data open source community. How do we maintain that? How does that continue to be the fuel? >> Yeah, and a lot of it starts with just being consistent. From day one, James was around back then, in 2011 we started, we've always said, "We're going to be open source." because we fundamentally believed that the community is going to out innovate any one vendor regardless of how much money they have in the bank. So we really do believe that's the best way to innovate mostly because their is a sense of shared ownership of that product. It's not just one vendor throwing some code out there try to shove it down the customers throat. And we've seen this over and over again, right. Three years ago, we talk about a lot of the data plane stuff comes from Atlas and Ranger and so on. None of these existed. These actually came from the fruits of the collaboration with the community with actually some very large enterprises being a part of it. So it's a great example of how we continue to drive it6 because we fundamentally believe that, that's the best way to innovate and continue to believe so. >> Right. And the community, the Apache community as a whole so many different projects that for example, in streaming, there is Kafka, >> Okay. >> and there is others that address a core set of common requirements but in different ways, >> Exactly. >> supporting different approaches, for example, they are doing streaming with stateless transactions and so forth, or stateless semantics and so forth. Seems to me that HortonWorks is shifting towards being more of a streaming oriented vendor away from data at rest. Though, I should say HDP3.0 has got great scalability and storage efficiency capabilities baked in. I wonder if you could just break it down a little bit what the innovations or enhancements are in HDP3.0 for those of your core customers, which is most of them who are managing massive multi-terabyte, multi-petabyte distributed, federated, big data lakes. What's in HDP3.0 for them? >> Oh for lots. Again, like I said, we obviously spend a lot of time on the streaming side because that's where we see. We live in a real-time world. But again, we don't do it at the cost of our core business which continues to be HDP. And as you can see, the community trend is drive, we talked about continuization massive step up for the Hadoob Community. We've also added support for GPUs. Again, if you think about Trove's at scale machine learning. >> Graphing processing units, >> Graphical-- >> AI, deep learning >> Yeah, it's huge. Deep learning, intensive flow and so on, really, really need a custom, sort of GPU, if you will. So that's coming. That's an HDP3. We've added a whole bunch of scalability improvements with HDFS. We've added federation because now we can go from, you can go over a billion files a billion objects in HDFS. We also added capabilities for-- >> But you indicated yesterday when we were talking that very few of your customers need that capacity yet but you think they will so-- >> Oh for sure. Again, part of this is as we enable more source of data in real-time that's the fuel which drives and that was always the strategy behind the HDF product. It was about, can we leverage the synergies between the real-time world, feed that into what you do today, in your classic enterprise with data at rest and that is what is driving the necessity for scale. >> Yes. >> Right. We've done that. We spend a lot of work, again, loading the total cost of ownership the TCO so we added erasure coding. >> What is that exactly? >> Yeah, so erasure coding is a classic sort of storage concept which allows you to actually in sort of, you know HTFS has always been three replicas So for redundancy, fault tolerance and recovery. Now, it sounds okay having three replicas because it's cheap disk, right. But when you start to think about our customers running 70, 80 hundred terabytes of data those three replicas add up because you've now gone from 80 terabytes of effective data where actually two 1/4 of an exobyte in terms of raw storage. So now what we can do with erasure coding is actually instead of storing the three blocks we actually store parody. We store the encoding of it which means we can actually go down from three to like two, one and a half, whatever we want to do. So, if we can get from three blocks to one and a half especially for your core data, >> Yeah >> the ones you're not accessing every day. It results in a massive savings in terms of your infrastructure costs. And that's kind of what we're in the business doing, helping customers do better with the data they have whether it's on-prem or on the cloud, that's sort of we want to help customers be comfortable getting more data under management along with secured and the lower TCO. The other sort of big piece I'm really excited about HDP3 is all the work that's happened to Hive Community for what we call the real-time database. >> Yes. >> As you guys know, you follow the whole sequel of ours in the Doob Space. >> And hive has changed a lot in the last several years, this is very different from what it was five years ago. >> The only thing that's same from five years ago is the name (laughing) >> So again, the community has done a phenomenal job, kind of, really taking sort of a, we used to call it like a sequel engine on HDFS. From there, to drive it with 3.0, it's now like, with Hive 3 which is part of HDP3 it's a full fledged database. It's got full asset support. In fact, the asset support is so good that writing asset tables is at least as fast as writing non-asset tables now. And you can do that not only on-- >> Transactional database. >> Exactly. Now not only can you do it on prem, you can do it on S3. So you can actually drive the transactions through Hive on S3. We've done a lot of work to actually, you were there yesterday when we were talking about some of the performance work we've done with LAP and so on to actually give consistent performance both on-prem and the cloud and this is a lot of effort simply because the performance characteristics you get from the storage layer with HDFS versus S3 are significantly different. So now we have been able to bridge those with things with LAP. We've done a lot of work and sort of enhanced the security model around it, governance and security. So now you get things like account level, masking, row-level filtering, all the standard stuff that you would expect and more from an Enprise air house. We talked to a lot of our customers, they're doing, literally tens of thousands of views because they don't have the capabilities that exist in Hive now. >> Mmm-hmm 6 And I'm sitting here kind of being amazed that for an open source set of tools to have the best security and governance at this point is pretty amazing coming from where we started off. >> And it's absolutely essential for GDPR compliance and compliance HIPA and every other mandate and sensitivity that requires you to protect personally identifiable information, so very important. So in many ways HortonWorks has one of the premier big data catalogs for all manner of compliance requirements that your customers are chasing. >> Yeah, and James, you wrote about it in the contex6t of data storage studio which we introduced >> Yes. >> You know, things like consent management, having--- >> A consent portal >> A consent portal >> In which the customer can indicate the degree to which >> Exactly. >> they require controls over their management of their PII possibly to be forgotten and so forth. >> Yeah, it's going to be forgotten, it's consent even for analytics. Within the context of GDPR, you have to allow the customer to opt out of analytics, them being part of an analytic itself, right. >> Yeah. >> So things like those are now something we enable to the enhanced security models that are done in Ranger. So now, it's sort of the really cool part of what we've done now with GDPR is that we can get all these capabilities on existing data an existing applications by just adding a security policy, not rewriting It's a massive, massive, massive deal which I cannot tell you how much customers are excited about because they now understand. They were sort of freaking out that I have to go to 30, 40, 50 thousand enterprise apps6 and change them to take advantage, to actually provide consent, and try to be forgotten. The fact that you can do that now by changing a security policy with Ranger is huge for them. >> Arun, thank you so much for coming on theCUBE. It's always so much fun talking to you. >> Likewise. Thank you so much. >> I learned something every time I listen to you. >> Indeed, indeed. I'm Rebecca Knight for James Kobeilus, we will have more from theCUBE's live coverage of DataWorks just after this. (Techno music)
SUMMARY :
brought to you by Hortonworks. It's great to have you on Yeah, likewise. is part of the strategy but it really needs to fit and that's the business we are in. And hide the details of all of the underlying infrastructure for a bunch of the operational stuff, So the fabric is everything you're describing, in terms of the applications for deployment to edge nodes. So, if you could give us a quick sense for Until the key ones, like you said, are containerization Define MiNiFi before you go further. Yeah, so we've always had NiFi-- and that gives you all the capabilities of NiFi the processing you do, and so on. and how so much of it is driven by the open source community that the community is going to out innovate any one vendor And the community, the Apache community as a whole I wonder if you could just break it down a little bit And as you can see, the community trend is drive, because now we can go from, you can go over a billion files the real-time world, feed that into what you do today, loading the total cost of ownership the TCO sort of storage concept which allows you to actually is all the work that's happened to Hive Community in the Doob Space. And hive has changed a lot in the last several years, And you can do that not only on-- the performance characteristics you get to have the best security and governance at this point and sensitivity that requires you to protect possibly to be forgotten and so forth. Within the context of GDPR, you have to allow The fact that you can do that now Arun, thank you so much for coming on theCUBE. Thank you so much. we will have more from theCUBE's live coverage of DataWorks
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Jim Kobielus | PERSON | 0.99+ |
Rebecca Knight | PERSON | 0.99+ |
James | PERSON | 0.99+ |
Aaron Murphy | PERSON | 0.99+ |
Arun Murphy | PERSON | 0.99+ |
Arun | PERSON | 0.99+ |
2011 | DATE | 0.99+ |
ORGANIZATION | 0.99+ | |
5% | QUANTITY | 0.99+ |
80 terabytes | QUANTITY | 0.99+ |
FedEx | ORGANIZATION | 0.99+ |
two | QUANTITY | 0.99+ |
Silicon Valley | LOCATION | 0.99+ |
Hortonworks | ORGANIZATION | 0.99+ |
San Jose | LOCATION | 0.99+ |
Amazon | ORGANIZATION | 0.99+ |
Arun Murthy | PERSON | 0.99+ |
HortonWorks | ORGANIZATION | 0.99+ |
yesterday | DATE | 0.99+ |
San Jose, California | LOCATION | 0.99+ |
three replicas | QUANTITY | 0.99+ |
James Kobeilus | PERSON | 0.99+ |
three blocks | QUANTITY | 0.99+ |
GDPR | TITLE | 0.99+ |
Python | TITLE | 0.99+ |
Europe | LOCATION | 0.99+ |
millions of dollars | QUANTITY | 0.99+ |
Scala | TITLE | 0.99+ |
Spark | TITLE | 0.99+ |
theCUBE | ORGANIZATION | 0.99+ |
five years ago | DATE | 0.99+ |
one and a half | QUANTITY | 0.98+ |
Enprise | ORGANIZATION | 0.98+ |
three | QUANTITY | 0.98+ |
Hive 3 | TITLE | 0.98+ |
Three years ago | DATE | 0.98+ |
both | QUANTITY | 0.98+ |
Asia | LOCATION | 0.97+ |
50 thousand | QUANTITY | 0.97+ |
TCO | ORGANIZATION | 0.97+ |
MiNiFi | TITLE | 0.97+ |
Apache | ORGANIZATION | 0.97+ |
40 | QUANTITY | 0.97+ |
Altas | ORGANIZATION | 0.97+ |
Hortonworks DataPlane Services | ORGANIZATION | 0.96+ |
DataWorks Summit 2018 | EVENT | 0.96+ |
30 | QUANTITY | 0.95+ |
thousands of nodes | QUANTITY | 0.95+ |
A6 | COMMERCIAL_ITEM | 0.95+ |
Kerberos | ORGANIZATION | 0.95+ |
today | DATE | 0.95+ |
Knox | ORGANIZATION | 0.94+ |
one | QUANTITY | 0.94+ |
hive | TITLE | 0.94+ |
two data scientists | QUANTITY | 0.94+ |
each | QUANTITY | 0.92+ |
Chinese | OTHER | 0.92+ |
TensorFlow | TITLE | 0.92+ |
S3 | TITLE | 0.91+ |
October of last year | DATE | 0.91+ |
Ranger | ORGANIZATION | 0.91+ |
Hadoob | ORGANIZATION | 0.91+ |
HIPA | TITLE | 0.9+ |
CUBE | ORGANIZATION | 0.9+ |
tens of thousands | QUANTITY | 0.9+ |
one vendor | QUANTITY | 0.89+ |
last several years | DATE | 0.88+ |
a billion objects | QUANTITY | 0.86+ |
70, 80 hundred terabytes of data | QUANTITY | 0.86+ |
HTP3.0 | TITLE | 0.86+ |
two 1/4 of an exobyte | QUANTITY | 0.86+ |
Atlas and | ORGANIZATION | 0.85+ |
DataPlane Services | ORGANIZATION | 0.84+ |
Google Cloud | TITLE | 0.82+ |
Halsey Minor, VideoCoin | Polycon 2018
>> Announcer: Live from Nassau in the Bahamas, it's theCUBE, covering Polygon 18, brought to you by Polyman. >> Welcome back everyone, we're here live with theCUBE's exclusive coverage of Polycon '18. We're in the Bahamas, I'm John Furrier with Dave Vellante, co-founders and co-hosts of theCUBE. We're here with special guest Halsey Minor, entrepreneur, serious serial entrepreneur here on theCUBE. Halsey, great to have you. You're the founder and CEO of VideoCoin, a successful ICO. You had an event last night, kind of an investor thank you event out in the Bahamas Country Club, there, you're here. Man, you're a pro, you're back in the game with this crypto. This is the wave, I mean, I want to get your perspective 'cause you see waves. You've seen CNET, you started that from scratch before online news was anything, you were the pioneer in that. First investor, first operator in salesforce.com, a variety of other successful entrepreneurial adventures. You've got a nose for the waves. So just put it in perspective, what is this wave? >> Yeah, so I actually have an interesting story because I've actually started around 2012, and I launched my first business in 2013. So, the first problem that I saw was, how do you get your money from your bank account and buy Bitcoin? Still a problem, hasn't been fixed, right? So I tried to fix that. Oh well, I did to a certain extent, I did fix the problem. So what I did was created effectively a coin-based converter, and I started out and was going to make it very easy for you to take your bank account, connect it up, seemed logical, and then buy, you know, the currency. The company was called Bit Reserve at the time. So, no bank would touch anybody named Bit in their name. And it was even worse than that, all of us who put our company name into our bank account, we had our bank accounts basically shut down, right? So, I started getting an idea how difficult this was going to be, you know, Coinbase getting a Silicon Valley bank account early on to become a conduit, was very fortuitous. It ultimately took two and a half years and buying a big chunk of New Jersey Bank before we were able to allow you to connect your US bank and your European bank into Uphold to buy currency. So it's really Uphold, Coinbase, maybe like Gitbit, very, very few who've been able to crack that problem. We literally had to buy part of a bank to do it. So that's where I started. So I really looked at it very much as money, as a new monetary system. And I still see unlimited opportunities in that area. It wasn't until really a couple years later that I saw the block chain as the new architecture for the computer, and what I mean by that, is what Bitcoin proved was that if you gave people software and they ran it on their computer and they got paid in some funny kind of digital money, they would convert that money back into fee hock, you know, dollars, and they go buy more computers. And nobody asks anybody to be a Bitcoin miner, they just come and showed up the more, the bigger it got, the bigger the opportunity. And what's most interesting is when you make money or lose money, depends on your cost of power. So for most of these Bitcoin miners, they're near hydroelectric dams. So what I realized, and VideoCoin is in the area of video. It's a direct competitor with Amazon web services, everything they do in video. So there's, it's called encoding which is compress it, there's storage and there's streaming, three basic pieces. So what I realized was, two things: first of all, 20% of servers and data centers are not used at all. They're called zombies, right? So all of these people, the Airbnb, Uber model, they can all of a sudden start earning on assets that are doing nothing. But even if you look out into the future, if video mining, which is what we call it, ends up being like bitcoin mining, then what happens is that the whole thing works on the cost of power. It's not good for Amazon, if they have to be competitive solely based on the cost of power. >> Dave, so he's got an ICO going on, we looked Filecoin, right? So Filecoin was storage and that's infrastructure. You go to VideoCoin, we're streaming right now, we've got video. This is kind of like an interesting digital media infrastructure ... >> Well ... >> What's your take compared to Filecoin? >> What's interesting to me is that I'd love to get Halsey's input on, because you've got the full spectrum here. You started in publishing and now-- >> With five TV shows. >> Dave: Okay. >> Yeah, CNET had five TV shows. >> So right, and so very digital from the beginning and relatively ripe for disruption and then now into banking, which really hasn't been disrupted, but we all think it's coming. So that's an interesting spectrum. It's not Negroponte, I don't think, bits versus atoms, because you've seen, you know tax season get disrupted. That's atoms. So what are the factors that make an industry ripe for disruption? >> Well, I mean the obvious thing is really disruptive technologies, right? And so for the Internet, for me, it was, I started the company in '93 to be on commercial online services like AOL and I saw, I guess, the first browser in '93 and, actually at Sun, and it made me believe the Internet was going to be this incredible thing. And it was really seeing information coming in, and, you know, the Internet wasn't that big back then but I watched a gif of a storm, you know, from one of the weather centers, and so I realized that this information thing was incredibly interesting. And so what all of us did, the way I thought about it and seen it, is we're cracking open databases and we're just letting people have the information. And it was silly things like the ability for me to live in San Francisco but know what the weather was in New York and pack appropriately. This was the magic, I mean, we take all of this for granted. This was magic, right, at the time. You had to go out and buy a USA Today-- >> Check the stock price. >> Yeah, exactly. >> Call your friends in New York. >> Yeah, that was magic. So at a very high level, it was just access to information. At a very high level, what this is is combining information and money into a packet. Right? So now what we can do is, I can gather information from servers about what they're really doing and I can also be paying them at the same time. So you know, it would have actually solved a lot of problems around the Internet, because on the Internet getting paid was hard. And there were so many times we'd go into a meeting and we'd agree on the partnership but we didn't know who was paying who. You know? (laughing) Am I paying you for traffic or are you paying me for content or you know, how is that going? So this kind of comes with a built-in payment system, which I think is what makes it so incredible as a system. >> So we're-- >> And more stable, I am inferring, long-term anyway. Because that whole system that you just described on the Internet all blew up when the funding dried up. >> It blew up and I think, you know, I think there are certainly a lot of risks. The number one thing I would tell everybody in this area is, you know, be very cautious about what in you invest in. There were a lot of companies that, uh-- so my whole description was sort of the Internet bubble was that people say that, well, you know, nine trillion dollars was lost in investing. >> With everything that happened though. >> And when I-- >> The plus.com happened, everything happened. >> And what I said to the people is that it would be great if people had just invested in the survivors, but who knew what they were? The only reason the United States emerged, with, you know, with Salesforce and Ebay and Amazon, etc., the only reason that we emerged dominating the world was 'cause we invested in them all. Right? And so-- >> Even all those things that were called silly ideas actually happened. >> And they ended up happening. It was all a matter of timing, yeah. So you know, what's happening now is very much the same thing. You know, a lot of people are going to invest in a lot of bad ideas, right? But this is all necessary for the good ideas to get funding and for something big to come out of this. >> So I want to get your take on with the VideoCoin and in comparison, you mentioned Amazon, right? So our observation, obviously we're recording all these shows, Amazon web service, among others, the big guys are sucking all the oxygen out of the room. Look at the big whales, Google, Facebook, Amazon, I mean, we can't even run any ads on our site. We actually prefer to just push the content all over the world because it's hard to build a destination site. I mean, people going out of business in the media business. Video, your choices are Ustream now owned by IBM, Twitch TV became Amazon which was Ustream before that. Build your own custom player, set up a CDN, which is actually hard and expensive. Okay, so do I do Facebook live, again controlled by Facebook? So there's an opportunity that you're pursuing. Did you have that in mind? I mean, we see it every day and we know this, but luckily we have a good deal with Ustream, but the point is that is going to be up too. What's the alternative producers, content producers who have streaming, whether it's a pro set like this or someone who's going to have unlimited access to video streaming? >> So the real issues are cost and innovation, okay? And so Hanno Basse, who's the CTO of 20th Century Fox and one of our advisors, right? And all these media companies have the same problem. Nobody is watching broadcast anymore that'll cost them nothing and everybody's now streaming in, which is one-to-one and has a cost associated with it. So that's why, and even worse, videos going to 4k, 8k, VR, data that's going up like this-- >> Data isn't growing as fast either. >> So all these companies are confronted with all these costs and they can't monetize them. Google can monetize it, Amazon can monetize it. >> Tel cos ... >> Netflix, yeah. >> Ouch. >> But they can't monetize it, so it's all cost effectively and no revenue. So the one thing that we offered to VideoCoin by using all this research is we cut the cost 60 to 80%, so that's huge. The other thing is, in the early days, everybody bought Salesforce because it was cheaper. It was 1/10th of the cost. And I used to say to people, in the long run, it's going to be way more innovation, right? Because they're constantly, every quarter, rolling out a new version, right? And they're going to have the ability to connect, an API effectively, and the ability to connect, and the whole ecosystem can arise around that. And that's why their conference has 140,000 people, Dreamforce, because there's a whole ecosystem. >> It's sticky as hell too. >> That's right. >> Hard to get out. >> That's right. So while we are 60 to 80% lower cost, we're also effectively open source at the same time. So the ability to have a community arise and develop software. And so right now, you've seen this huge consolidation because it's actually kind of hard to build new kinds of apps on top of Amazon web services, right? But if you have this open system, and you have all these people are contributing code to it, all of a sudden, there are apps, video apps, that they'll be literally a whole new-- >> So you're going to have an open source contribution piece to your ... ? >> Yeah, I mean basically, everything we build is open source, right, so you know, all the way through to the network. So it creates a palate for people to start innovating in video. Because really what's happening is a lot of innovation is getting hurt by the fact these big guys totally dominate it, right? They don't want to see any innovation outside of the funds they bring you, right? >> Right, so you've heard my rap on this. I'd love to get Halsey's thoughts. So the big guys, you're right, have won. It's like centralization and victory. People here are saying, "No, we want to take it back." The premise that I hear a lot is there's been no innovation in protocols in, you know ... Google built gmail on SMPT, HTTP, DNS, it's all government-funded or academia. >> Yeah. >> And it's just a lack of innovation. >> That's right. >> And now, this is why I counter Warren Buffet and Charlie Monger, is no, we're building out a new set of infrastructure. >> That's right. >> Okay, so where do you guys fit into that? What are your thoughts, first of all, on that premise? And where do you guys fit? >> Yeah, I mean, look, you've got these huge companies that are totally dominant and even though they are, in fact, you know, innovative Silicon Valley companies by label, okay, they have all the same issues-- like I say to people, nobody today believes that anybody can put Amazon web services at risk. If I went to somebody and said, "You know Amazon web services which are worth 3/4 "of the value of the company, or 5/6, "depending on who you talk to, "there's going to be something after that." It would literally be a new concept because everybody's convinced this is Amazon's-- >> John: The winner. >> Yeah, this is their big, this is the way they make all their money-- >> Alright it's over-- >> Right, and if you say to somebody there is going to be a next thing, they would look at you like, you know, like you're foolish. But the reality is when you start changing some basic, underlying infrastructure in the Internet and you start doing things, decentralization, this is the word we're going to be using, you know, we're going to see it in solar power. And solar power is, you know, on a cost to benefit like this so, you know, it isn't going to be long before we're going to have power in our house legitimately, not like, you know, some science-fiction thing, we'll be legitimately powering most of our needs with solar that we connect because the cost is coming down so much. So we're going to see all of this decentralization happening. And in the world of computing, decentralization means that this is going to be the most efficient that computing can ever be. Because just compare using the Uber and Airbnb model of saying anything that's excess, let's turn into value. And I've heard that for every Uber driver, 15 cars go away, right? So the decentralization is going to have a profound effect on the economy and it's going to have a profound effect on these big guys. >> Oh, even those guys are going to get disrupted. >> They're going to get disrupted. And they're 20 years old, it's time for them to get disrupted, I mean, you know ... >> E-commerce is a 20, 30-year-old stack, some say 20, 20-year-old stack on e-commerce, all these things are ready, even what we would consider modern, you know, the miracle of saying oh the weather in New York. I mean that magic is here now in a new way. So I got to ask you the question-- >> Taken for granted. >> I got to ask you a question because you brought up that point. In your history of your career as an entrepreneur because you're doing stuff that's always new and cool, and probably before anyone else sees it, can you talk about some of the ideas that you've seen, not necessarily your ideas, as well others, where the investor said, "That's the dumbest idea "I ever heard"? What billion dollar opportunities have you seen emerge that investors have said, "That's the dumbest idea "I've ever heard"? >> Well, actually, the one that is Salesforce. No VC would put money in. It was really kind of backed by Larry Ellison and me early on. And what's so-- >> John: Google was a dumb idea. We want portals, not search. >> Yeah, so the bet that nobody would take in 2000 was that companies would take their sales information and they would put it in the cloud. Nobody would believe that. Not anyone. And so I used to joke, I used to say the only way it's going to happen is if the sales guy's been waiting two years to get his sales management system in place actually runs over the head of security in the parking lot. That's what it's going to take because it's outsourcing and, you know, the security guys say, "Oh, no, no, no, "we're going to lose all of our data", right? It didn't matter that Salesforce had way more security guys, you know, than these guys had and better, you know, working internally. Nobody believed in it. Literally nobody believed in it. >> This is your point about the decentralization, no one's going to believe, "Wait a minute, "that could never happen." So, in a way, the investor thesis should be, "I want to invest in the dumbest ideas," because that might be the best idea. >> It is. I mean the big, obvious ones that attract billions and billions of dollars, I mean, how many of those end up actually not turning into anything? Right? A lot of them, right? So CDAT was profitable on nine million dollars. I believe that Yahoo was profitable on three million dollars. I think Google was somewhere around 12 to 15 million dollars, right? So there are a lot of these business-- Amazon's obviously the outlier. >> John: It's still not profitable. >> Yeah, it's the outlier. But you know, a lot of these businesses were started by people who used a relatively small amount of money and were very creative. You know, you're going to hear this over and over again. Microsoft never needed any money. They accepted five million dollars from-- >> John: (mumbles) >> Yeah, so this happens a lot. And in fact, I think it's very dangerous when in year five, you're losing three hundred million dollars, right? I mean, five hundred, or whatever it is. There are a lot of things that can go wrong. >> What's the role of community? Because we heard the guy from Locktower Capital say something I thought was really profound, "I don't need VC because, if you're a startup, "you don't have to waste your energy on board meetings "and other things, you can build your business "and use the community as your benchmark." So this plays to your whole picking up the slack kind of thing in efficiency. So entrepreneurs can be more efficient in these communities. This is where the cryptocurrency Blockchain is thriving. What's your thoughts to that and how do you see that community interaction progressing? >> In my career, there's been a sea change in sort of the culture of technology and really everything, right? You know, when I started out, everything was very hierarchical. You know, it's like how far up the chain you got that measured how successful you were. Now it's how big is your network, right? And you know, I was talking to somebody the other day who said VCs are going in and they're measuring these companies' success by how many Instagram and Twitter accounts they have and there's massive fraud going on because people are buying these accounts to pump up their numbers, right? So people are starting to value by the breadth of your network. >> John: Reputable network. >> Reputable, yeah. >> John: Not fake network. >> Yeah, but what I heard is there's actually a Twitter application which I haven't seen that'll go in and tell how many of 'em are real and how many of 'em are not now. So really the community becomes almost the measuring stick for your value. You know, before I'd seen it, I had users. Today, everybody has community members. And so, it becomes sort of, kind of like everything I guess. >> And our media model is all community-based which is, we just naturally go there because that's where the data is. >> That's right. >> That's where the feedback is. >> That's right. >> I mean, I can't get feedback from Facebook and Google, they own the data, right? There's no letters to the editor on Facebook. There's only hate comments. >> But you know before Microsoft and all these came, you know, IBM dominated the world. Nobody ever thought they would go away. AT&T dominated the world and nobody ever thought that they would go away, you know. >> Alright, personal question for you, I got to wrap because I know you got to go. Appreciate your time, by the way. Great story, we could go on for another hour. Personal note, what is the most compelling thing that's moved you, as an entrepreneur, in the crypto market? Like, something that, it could be an anecdote, it could be a situation. When you look at this opportunity, as the world's going to eventually be re-instrumented with data, with new open source and community, what's something that's surprised you or moves you as an entrepreneur saying, "This is freakin' awesome"? >> So this hasn't been done yet but it will be done. So this is what actually motivated me to start Uphold was the ability to turn your phone into your bank and to be able to exchange money and primarily really solving the ability for the poor to be able to move money around without having 10 to 20 to 30% of it taken away. Everybody's talked about this, remittance, and so far, nobody has actually solved that problem. That problem is going to get solved. I mean it's inevitable that the phone becomes the bank. There are so many regulations that are designed to stop that and it's extraordinary. Once you get into it and you see all the ways that have been set up-- >> Byzantine system. >> this problem should have been solved long ago, right? And every phone should be a bank. I mean, it can be connected to a bank, but every phone should have my money in it. I should be able to send it to you instantaneously. >> It shouldn't be like getting into Fort Knox. >> Yeah. I mean, computers, banks have computers, they could make this happen today. They just don't want to. So I think the most profound thing for me is the problem is still not solved, that the problem I set out to solve, which is really creating a more equitable financial system. And we live in a country where the banks make about 37 billion dollars a year in bounced check fees. Think about that. Thirty-seven billion dollars in bounced check fees. So if you just take that out, you just take out, 'cause it all affects people in the lower socioeconomic scale, you create a revolution. Just getting rid of the bank fees that you'll pay for bouncing checks. >> Well, I mean the narratives, like the narrative of taking down gatekeepers or central authorities, is the premise of this ecosystem and you could take that example and apply it to thousands of use cases. >> And banks are rapacious, flat out. American banks are the most rapacious 'cause no other country would allow 37 billion dollars to be taken away in bounced check fees. >> Halsey, congratulations on your success again and great to see you on theCUBE. You're now a Cube alumni, so ... >> Congratulations. >> We hope you'll come back again. >> Yeah, thank you guys. >> We're going to get you in our telegram group, now you'll be 42 members, we just turned on last night. (everyone laughs) We appreciate it and congratulations. >> Thank you very much. >> Thanks for your insight and experience and commentary. Halsey Minor, experienced entrepreneur, pro, here in the trenches, establishing a great new venture. We'll be back with more live coverage after this short break. (electronic music)
SUMMARY :
brought to you by Polyman. This is the wave, I mean, I want to get your perspective and was going to make it very easy for you You go to VideoCoin, we're streaming right now, that I'd love to get Halsey's input on, So right, and so very digital from the beginning And so for the Internet, for me, it was, So you know, it would have actually solved a lot of problems Because that whole system that you just described was that people say that, well, you know, and Amazon, etc., the only reason that we emerged Even all those things that were called silly ideas So you know, what's happening now but the point is that is going to be up too. So the real issues are cost and innovation, okay? So all these companies are confronted with all these costs So the one thing that we offered to VideoCoin So the ability to have a community arise to your ... ? so you know, all the way through to the network. So the big guys, you're right, have won. and Charlie Monger, is no, we're building out in fact, you know, innovative Silicon Valley companies So the decentralization is going to have a profound effect to get disrupted, I mean, you know ... So I got to ask you the question-- I got to ask you a question Well, actually, the one that is Salesforce. John: Google was a dumb idea. Yeah, so the bet that nobody would take in 2000 because that might be the best idea. I mean the big, obvious ones that attract billions But you know, a lot of these businesses And in fact, I think it's very dangerous So this plays to your whole picking up the slack And you know, I was talking to somebody the other day So really the community becomes almost the measuring stick And our media model is all community-based There's no letters to the editor on Facebook. that they would go away, you know. I got to wrap because I know you got to go. I mean it's inevitable that the phone becomes the bank. I should be able to send it to you instantaneously. that the problem I set out to solve, and you could take that example and apply it to be taken away in bounced check fees. and great to see you on theCUBE. We're going to get you in our telegram group, here in the trenches, establishing a great new venture.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Dave Vellante | PERSON | 0.99+ |
20 | QUANTITY | 0.99+ |
Halsey Minor | PERSON | 0.99+ |
Hanno Basse | PERSON | 0.99+ |
IBM | ORGANIZATION | 0.99+ |
John | PERSON | 0.99+ |
Halsey | PERSON | 0.99+ |
Dave | PERSON | 0.99+ |
Amazon | ORGANIZATION | 0.99+ |
Yahoo | ORGANIZATION | 0.99+ |
New York | LOCATION | 0.99+ |
San Francisco | LOCATION | 0.99+ |
ORGANIZATION | 0.99+ | |
Larry Ellison | PERSON | 0.99+ |
2013 | DATE | 0.99+ |
Coinbase | ORGANIZATION | 0.99+ |
CNET | ORGANIZATION | 0.99+ |
60 | QUANTITY | 0.99+ |
three million dollars | QUANTITY | 0.99+ |
Charlie Monger | PERSON | 0.99+ |
nine million dollars | QUANTITY | 0.99+ |
ORGANIZATION | 0.99+ | |
five million dollars | QUANTITY | 0.99+ |
AT&T | ORGANIZATION | 0.99+ |
Microsoft | ORGANIZATION | 0.99+ |
Bahamas | LOCATION | 0.99+ |
two years | QUANTITY | 0.99+ |
Uber | ORGANIZATION | 0.99+ |
10 | QUANTITY | 0.99+ |
20 years | QUANTITY | 0.99+ |
15 cars | QUANTITY | 0.99+ |
nine trillion dollars | QUANTITY | 0.99+ |
John Furrier | PERSON | 0.99+ |
Airbnb | ORGANIZATION | 0.99+ |
billions | QUANTITY | 0.99+ |
42 members | QUANTITY | 0.99+ |
1/10th | QUANTITY | 0.99+ |
140,000 people | QUANTITY | 0.99+ |
five TV shows | QUANTITY | 0.99+ |
Ustream | ORGANIZATION | 0.99+ |
'93 | DATE | 0.99+ |
20% | QUANTITY | 0.99+ |
five hundred | QUANTITY | 0.99+ |
Warren Buffet | PERSON | 0.99+ |
Ebay | ORGANIZATION | 0.99+ |
Uphold | ORGANIZATION | 0.99+ |
three hundred million dollars | QUANTITY | 0.99+ |
Twitch TV | ORGANIZATION | 0.99+ |
Locktower Capital | ORGANIZATION | 0.99+ |
first problem | QUANTITY | 0.99+ |
two and a half years | QUANTITY | 0.99+ |
ORGANIZATION | 0.99+ | |
37 billion dollars | QUANTITY | 0.99+ |
20th Century Fox | ORGANIZATION | 0.99+ |
Cube | ORGANIZATION | 0.99+ |
Thirty-seven billion dollars | QUANTITY | 0.99+ |
Netflix | ORGANIZATION | 0.99+ |
2000 | DATE | 0.99+ |
Silicon Valley | LOCATION | 0.99+ |
Gitbit | ORGANIZATION | 0.99+ |
Dreamforce | ORGANIZATION | 0.99+ |
Bahamas Country Club | LOCATION | 0.99+ |
Editorial Analysis of CryptoCurrenty Blockchain at Polycon 2018
(energetic electronic music) >> Narrator: Live, from Nassau, in the Bahamas it's theCUBE covering POLYCON18. Brought to you by, Polymath. (attendees chatting indistinctly) >> Crew Member: So, go, we're live. >> Okay, we're live, welcome back! This is day two of our exclusive CUBE coverage of the Bahamas' POLYCON18 It's a security token conference. It's where the world of cryptocurrency, Blockchain, Bitcoin and everything comes together around powering a new value economy. A new kind of decentralized internet. This is the biggest wave that I've seen in my lifetime. It's really bigger than all the other waves, combined. I'm here with Dave Vellante. We have two days of wall-to-wall coverage. And the bottom line is, Dave, we are seeing historic, massive, wealth creation. We're seeing crypto-billionaires here. I mean, people are new money, they're old money and a massive new landscape is emerging. And the tell-sign of this is, institutional money is coming in, real professionals are coming in. It's moving from a culture of Burning Man and cult of the personalities to real industry formation. You see that with companies coming out with real commercial opportunities. You're seeing ecosystems developing, and you're starting to see biz dev. And it's been probably at least a couple decades since I've gone to a conference where this kind of computer-industry movement is happening where the players are doing deals in the hallways. You're hearing people having substantive conversations around how they can work together to create tons of value. This is a dynamic that is absolutely happening. And we're seeing a lot of wealth involved, from people who have made tons of money, billions of dollars in Bitcoin, to kind of, new migration coming into the sector from Wall Street, from other global markets. We're seeing a sea change of democratizing, with an open-source ethos. To me, this is something that we've never seen before. It has all the elements of the modernization, business model modernizations, technology modernizations, real, disruptive, enabling, technology at the heart of it. And some people ask questions like, "How do we make money?" Bottom line is, there is money being made. How and with who, is the real question. So Dave, day one's over. We were out 'til one in the morning last night, working the hallways, having great conversations. I probably talked to at least six whales as they're called, billionaires in the business, and the vibe is the same. We're here to play the long game, we love this market. There's a culture of ethos, of partnership, and openness, and unwritten rules, and tons of activity. Sure there's bad actors! But there's a lot of great players here, and they are starting to crack down on behavior that's not right, because this is a funding dynamic. It's a funding growth companies dynamic. It's a liquidity dynamic. All these things, classic, business model modernization, happening with a massive wave, your take. >> So, let's share with our audience. Well, first of all, this is an investor conference. It's the first conference built around the topic of security tokens. And we can, maybe, explain that in a moment. But, I have, John, I have never seen at an investor conference, which I guess this is, but it's more than that, Blockchain, technology, etc. But, I've never seen such diversity. Like you said, there's new money, there's old money. There's tons of millennials. 100% of the people here are doing deals. >> Yeah. >> And the conversations in the hall, it's all about ICO's, security tokens, utility tokens, protocols, white papers, business models. So, a lot of diversity. Some super smart millennials. Developers that really understand this stuff, and a lot of money. >> And, more women in tech here than I had thought. >> Yeah, I think it's slightly higher proportion. But, you're also seeing, just really interesting, you're seeing VC's who aren't going to sit back and wait and get disintermediated. You're seeing developers who have made a ton of dough, that are now sprinkling the wealth. You're seeing private equity, you're seeing hedge funds. You're seeing, like I say, traditional VC's, new types of VC's. And, very importantly, you're seeing a major diversity in cultural impact, nationalities. And this is a heavily Canadian show, because the organizers of POLYCON, the folks who started Ethereum. But, a lot of diversity in terms of where people are coming from. It's not just U.S. based, you know, MBA's-- >> Silicon Valley. >> Yeah. >> I mean, the game's changing. The other thing I observed is, we're seeing validation of my premise, a couple weeks ago when I was in Washington D.C. with Theresa Carlson, the most powerful woman in D.C. She's also the chief, and head of, Amazon Web Services' global public sector. Is that the global national stage, the nation building, the digital nation transformation, is part of it. Two, the validation that societal change and entrepreneurship, that was used to be involved in non-profits that never went anywhere, you know, these philanthropy projects. Social entrepreneurship, or societal entrepreneurship, as I call it, is absolutely real. And, in this culture, you're seeing people with Bitcoin, and crypto-currencies funding mission based activities. Now, the younger demographics, I think, lean towards that. That's pretty clear in our reporting and our data. That the younger generation wants to work for companies and communities that have an ethos of mission base. But, mission base is not about changing the world, it's about saving the world. And, this is real, you're looking at Blockchain ventures that track water supply. You're looking at Blockchain ventures that track, you know, food supply. You're looking at solving world hunger kind of challenges. And I think the tell here is, Blockchain is used to identify markets and incumbents, or opportunities where there's idle resource. So, whether that's using compute in a P2P way or solving the world hunger problem, anywhere there's an opportunity to be efficient, Blockchain is being used to solve those problems. And, the creative talent is the technology providers. This is a completely new dynamic. One that Silicon Valley pays lip service to. 'Cause they don't actually do societal change. They say they do, but, they build apps and platforms. So, I think this is a nuanced, but an important game changer for the industry, and the global economy and global entrepreneurship, because you can do things now that can be global impact based investing, and technology investing, in one shot. So, you get a double down effect for change. This is not just cloud computing, have more power, faster, better apps, more monetization. Sure, but now you have over the top, impact to users. The community dynamic, and the societal change is very, very real. That's a big driver of this ecosystem in terms of market selection, human capital, technology, leverage, and now financial. So, it is pretty intoxicating here. People are geared up, they're energized, and it's just pretty phenomenal. >> So, many people in our audience are still probably saying, I just don't get it. So, let's go back to 2008 when Satoshi, whoever that person was, writes this, I think it was an eight page white paper. And, remember what 2008 was like, banks were blowing up, too big to fail, the economic system was melting down, and guess who paid for it? The taxpayers. So, some libertarian minded people said, screw that, we're going to change the world. We're going to create a virtual currency and we're going to take back what the government is taking from us. Essentially, okay. So, that started people like, what, I don't really get it. That has formed a whole new, and people often say, it's not about Bitcoin, it's about Blockchain. Blockchain is building out this whole new internet. And we've talked about that all week. But, what you're seeing now is this concept of a value store a virtual value store, and people leveraging that in so many different ways to build out this new internet. And, they're building protocols, they're building apps, they're building new capabilities that we haven't seen before. That brings state to the internet, a state of communications. Now, let's talk about the investor profiles that we see here. I want to start with developers. So, developers built the internet, and most of them didn't really get paid huge money. Here, many of the developers are like multi, multi-millionaires flying in on private jets. Okay, so why? Because they've developed a new token that they, basically, invested in with their sweat and their money, and the price has gone through the roof. Bitcoin, Ethereum, etc., VC's. VC's, you know, they elbowed out, well they're elbowing their way back in. Private equity, hedge funds, big money. And there's two paths there, one is, guys that read white papers, real hard core technical guys who say, I'm going to invest in just this infrastructure token, utility token. Other guys who say, You know what, I've got big money, I don't really understand the technology, but, I'm going to sprinkle my money around and try to get a big hit. You got angels, you got entrepreneurs, you got superstars that have become billionaires, that are mission based. All these, and here's the thing John, and I want you to sort of explain this to the audience. You have these investor ecosystems forming. It's like the PayPal Mafia, and they're basically buying up all the tokens early, elbowing other people out. You know, one investor told us, We're fighting steel with steel. Steel beats steel, you have to form, it's like Survivor Baha Mar, right? And they're forming groups, and they're eyeing each other, attacking opportunities, elbowing each out, and it's really interesting. >> I mean, it's happening, big time. And, this is healthy, I think, in my mind. Emerging ecosystems have this behavior. The early days of Silicon Valley was very much the same. And it became very much war, now in Silicon Valley. See, people don't syndicate deals as much as they used to. Some are and some aren't, but the notion of teamwork has always been part of Silicon Valley. The old saying is, venture capital is a team sport. That is very much what's going on here. Now, they team up because they have to, but, steel on steel implies art of war. You know, we're going to take more allocations down. That's because the new pro persona of the investor, Dave, is the billionaire developer who captured value from the technology that they built, not someone else, not some central organization, they're the players. Developers, and or the actors who were making money in the early days of Bitcoin, cryptocurrency and Blockchain actually are also starting funds themselves. So, that is a new dynamic. We've never seen that before, where you see a wealthy developer become rich and then also start investing at the same time. You have a smarter investor there, but they're doing it in packs and herds. You have a tribe mentality and people are starting to recognize that, okay, this group here loves Burning Man, this group here is more commercial oriented, this group here, like Polychain is much more technical, and BlockTower's much more Goldman Sachs like. So, you're starting to see the formation of categorical roles in the ecosystem. This is very healthy. Now, in the short term there's some jockeying, right? So, you're starting to see people syndicate together. You buy my coin, I'll buy your coin. So, there's a healthy, robust equilibrium going on where the market of insiders is very much the story. The insiders of this industry are the players. They are the ones, not just building the technology, they're funding technology, they're also recruiting, the talent issue, human capital role, mission based. These are all new dynamics. This is going to be a hard nut to crack if you're an incumbent, venture capitalist, or hedge fund, trying to walk into this ecosystem, throw your weight around and compete on a frontal basis, money for money, steel on steel, if you don't play by the rules of engagement that's emerging. Such as, open source communities, unwritten rules, certain kinds of syndications, eliminating bad behavior. This is a dynamic that's real, and you'll either win or lose if you're an investor, win or lose if you're an entrepreneur if you don't recognize that, kind of, big picture. So, you get down and dirty, you got to pull back and say, okay, what's going on, how do I engage? This is where the true money making is going on. >> That's great analysis, John. You mentioned the word dynamics several times. The other underpinning dynamic is, we are going to take control of our own destinies. I've heard things all week like, I might move out of the U.S. Ya know. (laughs) Do you have a bank account overseas? (laughs) >> Estonia's looking good right now. >> Right, because I'm going to move to a place that's more friendly to this kind of concept. And the U.S. is anti-competitive. And this is the ethos of this community, We are going to control our own destiny. And we're going to go live in places and work in places that are friendly. >> This, to me, is perfect capitalism at work. You know, some would criticize Barack Obama or other folks that might have more of a socialistic bent around having government do redistribution of wealth. This is actually an example where I see redistribution of wealth going on in a capitalistic way. Where the enabling technology, Blockchain, and or new business models with cryptocurrency, which is money, basically open sourced money, as Miko Matsumura would say, and that is the dynamic. That is actually creating real value and redistribution of wealth. And the premise of Blockchain and cryptocurrency, although Bill Tighe pointed out, investor, and leader in the area, money's a concept, right? A dollar's a dollar, it has money value because it's a concept. But, if you look at things like what we learned in business school, the value chain of a organization, value chain, Blockchain, cryptocurrency money, is that this redistribution of wealth is going on in context to redefining business, redefining how people work. And again, I said earlier, the human capital component is very much a real dynamic, it's not just machines taking over the world. Some poopoo AI, some poopoo all this technology, but, human capital, a big force in this market. And, it is a big issue, and you got to learn protocols. We're all developers. So, again, zoom out, opportunity is right there. I think I'm long on this sector. I'm long on this game because the actors are going to self organize, Steel on steel turns into handshakes, or, steel on steel in the right areas, eliminating bad actors. FCC makes some regulations, that's only in the U.S. What about the opportunities for digital nations to say, hey, we're going to be the Wall Street of crypto. There are country opportunities right now where whoever builds that system, taking in crypto, converting it to fiat, will win everything. It's like, I'm surprised no one's done that yet. >> Yeah >> This is coming. >> I can't tell you what the price of Bitcoin is in August, but I agree with you, longterm, there's no question in my mind that this is going to be a key contributor to the digital economy. The build out of the next internet. Remember the fundamentals, you got Bitcoin, it's essentially, you know, a virtual Fort Knox. You got Ethereum, which is a horizontal infrastructure that's much more easily programmed by developers. And then you've got a zillion other protocols and tokens. I want to talk about risk factors. Like what could blow this up, what have we heard? Tax exposure, all these people, all these Bitcoin millionaires and billionaires that think, I don't have to pay taxes, well, guess what? (laughs) You do have to pay taxes. And so, one theory is that's why the price has moderated lately, 'cause people are saying, Wow, it's like I exercised the option, but I don't have cash to pay my taxes. 'Cause we saw a pullback recently. Regulation's the other one we heard. Too much regulation could put some brakes on the momentum here, your thoughts. >> Talent, talent. >> Yep, skill sets, and developer talent, right? >> Yeah, well, the top talent, in the protocol area is going to be at a premium. This is a global issue, so, you know, the old days when cloud, old days, when cloud computing came around, full stack developers were all the rage. Now protocol developers are all the rage. So, if you're a full stack developer and a protocol developer, you can have a lot of leverage. So, the danger, in my opinion is the job hopping nature of some of these ICO's. Hey, I made a bunch of dough on this ICO, they paid me in Ether and or Bitcoin whatever, I'm off to the next one and make a couple million bucks there, and move on to the next one. And so the job hopping factor for top talent is an issue. We heard that loud and clear. The tax thing, I'm bullish on Bitcoin, post April 16th. I think, buy Bitcoin right now and look for it to pop in April. Because I think people are going to realize, Oh shit, I should have sold some and had a tax carry over. >> Well, be careful, be careful. They might have to sell more to meet their tax bill. They might be holding on for a little bit, but I don't know. >> File the extension. (laughs) But anyway, I love the opportun-- >> No, you owe your taxes on the date. Extension doesn't remove you from paying the taxes. >> Yeah, but the issue Dave, is, that what's a scam and what's not a scam? So, you know, if you ask Joe Six Pack on the street, throw crypto and Bitcoin, it's a scam. There's a lot of stuff going on. This industry is absolutely, acutely aware of that dynamic. The risk on the wealth creation opportunity. They know it, so they're creating mechanisms to kind of weed that out. You're seeing PR firms having internal, called, in baseball and in sports it's like, clubhouse issues. There's a clubhouse issue going on in this industry. And they're going to take it amongst themselves. And I think that is going to be the tell sign if this ecosystem succeeds or not. >> Do you think there's more scams, or less scams going on there? >> There'll be less scams because, obviously there's too much money to be made right now. >> Right, and in terms of the percentage of the activity that's going on, in my opinion, the smallest percentages is the scams. The challenge is, anyone could be a scam so you have to sort that out, you got to do-- >> Due diligence. >> As always, you got to do homework. >> Alright, well, day two Dave, we're going to drill into. We got a great line up of guests. We'll be talking to investors, entrepreneurs, some whales coming on, we're going to get their opinion on the future of this market. What's the liquidity, how do you get paid? Who's making the money? How is the value that's being created ultimately captured? And, who's going to get that value? It's theCUBE coverage, from the Bahamas, exclusive coverage of the cryptocurrency, tokenization, here at POLYCON18. We'll be right back. (electronic music)
SUMMARY :
Narrator: Live, from Nassau, in the Bahamas and cult of the personalities to real industry formation. 100% of the people here are doing deals. And the conversations in the hall, it's all about that are now sprinkling the wealth. Is that the global national stage, the nation building, Here, many of the developers are like Developers, and or the actors who were making money I might move out of the U.S. And the U.S. is anti-competitive. the actors are going to self organize, Remember the fundamentals, you got Bitcoin, in the protocol area is going to be at a premium. They might have to sell more to meet their tax bill. But anyway, I love the opportun-- No, you owe your taxes on the date. The risk on the wealth creation opportunity. there's too much money to be made right now. Right, and in terms of the percentage you got to do homework. What's the liquidity, how do you get paid?
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Theresa Carlson | PERSON | 0.99+ |
John | PERSON | 0.99+ |
Dave Vellante | PERSON | 0.99+ |
Amazon Web Services' | ORGANIZATION | 0.99+ |
Dave | PERSON | 0.99+ |
Bill Tighe | PERSON | 0.99+ |
FCC | ORGANIZATION | 0.99+ |
April 16th | DATE | 0.99+ |
April | DATE | 0.99+ |
Miko Matsumura | PERSON | 0.99+ |
100% | QUANTITY | 0.99+ |
D.C. | LOCATION | 0.99+ |
August | DATE | 0.99+ |
Silicon Valley | LOCATION | 0.99+ |
Barack Obama | PERSON | 0.99+ |
Washington D.C. | LOCATION | 0.99+ |
Goldman Sachs | ORGANIZATION | 0.99+ |
two days | QUANTITY | 0.99+ |
Satoshi | PERSON | 0.99+ |
2008 | DATE | 0.99+ |
Bahamas | LOCATION | 0.99+ |
one theory | QUANTITY | 0.99+ |
two paths | QUANTITY | 0.99+ |
U.S. | LOCATION | 0.99+ |
eight page | QUANTITY | 0.99+ |
BlockTower | ORGANIZATION | 0.99+ |
Two | QUANTITY | 0.99+ |
billions of dollars | QUANTITY | 0.98+ |
one shot | QUANTITY | 0.98+ |
one | QUANTITY | 0.98+ |
Polychain | ORGANIZATION | 0.98+ |
first conference | QUANTITY | 0.97+ |
Wall Street | LOCATION | 0.96+ |
last night | DATE | 0.95+ |
each | QUANTITY | 0.94+ |
Nassau | LOCATION | 0.94+ |
Survivor Baha Mar | EVENT | 0.93+ |
POLYCON18 | EVENT | 0.91+ |
PayPal Mafia | ORGANIZATION | 0.89+ |
one investor | QUANTITY | 0.88+ |
Estonia | LOCATION | 0.85+ |
protocols | QUANTITY | 0.85+ |
couple million bucks | QUANTITY | 0.84+ |
Burning Man | ORGANIZATION | 0.83+ |
POLYCON18 | ORGANIZATION | 0.82+ |
Polycon 2018 | EVENT | 0.81+ |
Polymath | ORGANIZATION | 0.81+ |
tons of money | QUANTITY | 0.81+ |
couple weeks ago | DATE | 0.8+ |
waves | EVENT | 0.8+ |
POLYCON | ORGANIZATION | 0.78+ |
six whales | QUANTITY | 0.77+ |
day two | QUANTITY | 0.73+ |
first | QUANTITY | 0.72+ |
Joe | PERSON | 0.72+ |
Canadian | OTHER | 0.66+ |
a zillion | QUANTITY | 0.66+ |
Six Pack | ORGANIZATION | 0.66+ |
wave | EVENT | 0.66+ |
Bahamas' | LOCATION | 0.65+ |
couple | QUANTITY | 0.65+ |
one | DATE | 0.64+ |
One | QUANTITY | 0.6+ |
Narrator: | TITLE | 0.6+ |
Ethereum | OTHER | 0.59+ |
Bitcoin | OTHER | 0.56+ |
Ethereum | ORGANIZATION | 0.54+ |
licon Valley | ORGANIZATION | 0.47+ |
CryptoCurrenty | ORGANIZATION | 0.4+ |
Knox | ORGANIZATION | 0.3+ |
Derek Manky, Fortinet | Fortinet Accelerate 2018
(upbeat techno music) >> Narrator: Live from Las Vegas, it's The Cube, covering Fortinet Accelerate '18, brought to you by Fortinet. >> Welcome back to The Cube's continuing coverage live from Fortinet Accelerate 2018. I'm Lisa Martin with The Cube, along with my co-host Peter Burris, and we're very excited to welcome a Cube alumni back to The Cube, Derek Manky, the global security strategist from Fortinet - welcome back! >> Derek: Thank you, it's always good to be here. We have great conversations. >> Lisa: We do. We're happy that you think that. So, lots of news coming out today. But, I want to kind of start with, maybe a top-down approach, the theme of the event: strength in numbers. >> Derek: Yes. >> Lisa: As a marketer I'm like, "What are they going to share?" And of course, Ken and a lot of your peers shared a lot of interesting statistics. From your standpoint - what you're doing with FortiGuard Labs, strength in numbers, help us understand that from the technology standpoint. What does that mean to you? >> Derek: Sure, sure. So, there's a couple aspects to that. First of all, I've always been a firm advocate that we can never win the war on cybercrime alone. We have to be able to collaborate; collaboration is a key aspect. The attack surface today now, just from if you look at the complexity of attacks, the attack surface is massive today. And it's going to continue to expand. I mean, 15 years ago, we're just dealing with you know, threats that would operate on IRC channels or something, you know, some websites, and just some spam attacks. Now, we have to deal with that in addition to this growing attack surface, right? Specifically, with IOMT - the Internet of Medical Things, OT, as well. You have within that OT umbrella, obviously, things like the connected vehicles and all of these different things, which I know you've seen here, also, at Accelerate. So, when we look at that attack surface, you need security in all aspects - end-to-end, right? And so, from a security architecture perspective, strength in numbers is important to have that whole coverage of the attack surface, right? That's not complex and easy to manage. At the same time, being able to inter-operate: that's another strength. You know, the more a structure is bonded or glued together, the more resilient it's going to become. That's the exact concept of the fabric, right? The more that we can inter-weave the fabric and connect the different nodes together and share intelligence, that becomes a much, much stronger structure. So, to me, the strength in numbers means collaboration, information flow, and also end-to-end coverage between the security solutions. >> Peter: But it also means, you know, the growing ecosystem; the need for additional expertise, greater specialization in people. Talk a little bit about how, from a strategy standpoint, Fortinet is helping prepare people for different types of inclusion, different types of participation; what it means to be great, in a security way. >> Derek: Yeah, absolutely. I think there's very (mumbles) We're taking a multi-pronged approach to that. If you look at things like our NSC training program - it's the largest in the industry - so, training other experts through our partners. Growing, doing that knowledge transfer in expertise onto new features, like we're doing here at Accelerate, is critically important. So, that's one aspect when you look at the ecosystem. When you look at something for FortiGuard, as an example, what we're doing. We have, traditionally, you know, we've trained up a very large team; we have 215 security experts at FortiGuard, which is, for a network security organization one of the largest in the world, if not the largest. >> Peter: And FortiGuard is a practical and active think tank, right? >> Derek: Absolutely, yeah. It's many things, it's reactive protection, it's proactive protection, it's - now we've just launched the FortiGuard AI, as well; artificial intelligence, machine learning, that's all the threat intelligence aspect. So, it's threat detection and response. Again, if you look at technology, when we started just with antivirus and intrusion prevention and things like this, it was very signature-based and reactive. We went from signature-based detections to anomaly-based detections. Now, the third generation of this is machine learning and deep learning And going back to your question: we don't ever want to replace humans - because humans are very important in this ecosystem - rather, repurpose them, right? So, what we're doing, as an example, is when we, you know, train our analysts. Instead of having them do day to day tasks like some signature creation or something like this, we can actually have AI systems replace that to identify a threat, respond to it, and then repurpose those humans for something more strategic, you know, looking at the context, "How bad is this threat?" "Why is it a threat?" "How do we respond to it?" "How do we work with partners and customers?" We've launched our threat intelligence service, as well. This is a good example of something we've used internally within FortiGuard to protect customers. Now, we're offering this as a service to customers for security operation centers. We also have our Forti analyzer product and incident response framework. These are all key components that we're empowering organizations to be able to respond those threats. But, again, strength in numbers, it's this ecosystem working together. So, fabric-ready partners is another good example of that strength in numbers, I think, too. >> Peter: Well, I remember the first time I walked into a knock and found the security person and their eyes were literally bleeding. (Derek chuckles) And it's nice to have AI be able to take that kind of a load off, to be looking at some of these challenges, some of these anomalies, things previously we expected people to be able to uncover. >> Derek: Yeah, and (mumbles) when we talk about AI, to me, it's a trust exercise, as well. When you talk about machine learning, it's an accuracy problem, right? "How accurate can the machines really be?" When we pass the torch, as I say, to the machines to be able to take on those day to day jobs, we have to be able to trust it, saying, "You're doing a good job and you're accurate." So, we're using supervised learning, right, where we have our human experts actually training the machines - that's a good use for them, instead of just doing the same cycles day to day, you know, as an example. That's another way that we're scaling out that way. I think it's absolutely required in today's day and age. If you look at the numbers, it's an exponential curve right now. Last year, one year ago today, on average we're seeing about a million hacking attempts in just a minute across the entire globe, right? Now, we're seeing that number up over four million. So, it's increased four-fold in just a year, and that's just going to continue to rise. So, having that automated defense and AI machine learning; machine learning's just a learning aspect; the AI is the actionable part - how we can take that intelligence and put that into the fabric so that the customer doesn't have to do that themselves. I mean, the customer doesn't always have to be involved in the security aspect of that, and that's how we start reducing on the complexity, too. >> Lisa: You mentioned a couple terms that I wanted to pivot on: proactive/reactive. One of the biggest challenges that we hear from the C-suite in this perspective is visibility, complexity, but also high TCO reactivity. Where is Fortinet enabling, when you talk to customers, that shift, that successful shift from reactive to proactive? >> Derek: Right, yeah. Good question, very good question. I think - just parallels - I mean, they're both always going to have to exist, that's just their nature. I mean, if you keep walking across, you know, it's like Frogger - if you keep walking across a busy highway, you're going to get hit eventually, 'cause there's that much traffic, that much attacks coming, right? So, again, the incident response angle - using detection systems and, you know, threat reporting, and this intelligence service to be able to, you know, alert on what sort of attacks are happening and how to prioritize that is one way on the reactive end. On the proactive end: consulting. We have a team of consulting engineers and specifically, ones on FortiGuard, so threat experts that are able to actually analyze. So, we have programs, like CTAP, as a cyberthreat assessment program that is able to able to go into these new networks as a free service and do assessments. So, audits and assessments on the state of security on that network - end-to-end, right? So, we're talking even up to the distributed enterprise level. It's very, very important because we're in a day and age of information overload, especially if you talk to, you know, most CSOs (chief security officer) I talk to, they say "Derek, I got so much traffic being thrown at me; I have all these security logs that are letting up - how do I prioritize and respond to that?" So, if you can understand who your enemy is - what they're up to, then you can start building an appropriate security strategy around that, as opposed to just building checkboxes and, you know, building a fort and thinking you're protected against everything. That's a very important part. And, of course, there's proactive security technologies: anomaly-based, you know, things like sandbox detection that we've already integrated into the fabric ecosystem. But, visibility is key first; know your enemy, understand it, then build up a stack around that. >> Peter: So you're a strategist? >> Derek: Yes. >> Peter: What's the difference between a security strategist and a strategist - a business strategist? And, specifically, how is security strategy starting to find its way into business strategy? >> Derek: Really good question. So, it's becoming blended, right, because security is a vital part of business today. So, if you look at some attacks that even happened last year, there's targeted attacks that are starting to go after big businesses; critical revenue streams and services, because these are high payouts, right? And so, you know, if you look at building a business, you have to identify what are your digital assets: that can include services, intellectual property, and what would happen if that service was, you know, if there was a denial-of-service attack on that? How much lead or revenue loss are you going to have versus the cost of implementing, you know, an adequate security structure around that? So, you know, security's a board-level discussion right now, right? And so, when I think you look at building up these businesses, security should be, by design, from the top down - let's start it there. >> Peter: But, is it finding its way, and we've asked this question a couple times - at least I have - is it finding its way into "Hey, my balance sheet is a source of competitive advantage; my sales force is a source of competitive advantage." Is your security capabilities a source of competitive advantage in a digital business? >> Derek: I would say absolutely, yeah. It's starting to find its way in there. If you look at regions like Australia, you know, they just implemented a mandatory breach disclosure, right, so then, any business that is earning, I think it's like over two million dollars in revenue, needs to, you know, have a certain security posture in place and be able to respond to that. And that's trust and brand recognition. So, because, having, you know, cases like this, building trust with your provider, especially if we talk about, you know, cloud services; I'm putting my data into your hands and trust. How well do you trust that? Of course, if there's good reputation and a powerful security solution, you know customers are going to feel safer doing that. It's like, are you going to, you know, put your gold in Fort Knox or are you going to put it, you know, bury it in your backyard? There's a definite relationship happening there. >> Lisa: I read (hesitates) I didn't read this report, but I saw it the other day that in 2017, a kind of cybercrime report that said by 2021, which isn't that far away, that the global impact will be six trillion dollars in cybercrime. >> Derek: Yeah. >> How do you see the public sector, the private sector working together to help mitigate that, where that cybercrime is concerned and the costs that are so varied and large. >> Derek: Yeah, it's not just cybercrime, either. It's cyberterrorism, these other aspects, especially if you're talking about public sector, if you're talking about critical infrastructure and also with, you know, energy sector and operational technology and all of these things, too. So, you know, it becomes very important for doing a collaboration in alliances - that's something that's actually close to my heart. You know, at FortiNet and FortiGuard, we've formed several strategic partnerships in alliance with public sector, mostly, you know, national computer emergency response, because we feel that we have a lot of intelligence. We're very good at what we do, you know, we can protect customers; detecting threats. But, if there's an attack happening on a national level, you know, we should be able to empower - to be able to work together to combat the threat. It's the same thing even with cybercrime, right? So, as an example, we work with law enforcement, as well with cybercrime, trying to find threat actors in the adversary; cybercriminals are running their own business, and the more expensive you can make it for them to operate, it slows down their operations. >> Peter: A COGS approach to competition. >> Derek: Yeah. (chuckles) Yeah, yeah. And, you know, they're always going to find the path of least resistance, right? That's the whole idea of security, strategy too, is, we call it the "attack chain," right, this layered security - that's the strength in numbers theme again, right; end-to-end security that makes the whole security chain stronger 'cause of that bond and that makes it more expensive for the cybercriminals to operate, too. So, as an example, like I said, national CERT, law enforcement; we're even teaming up in the private sector - a cyberthreat alliance, as well, that's been a very successful project; Fortinet's a founding member, I'm on the steering committee of the cyberthreat alliance. >> Peter: It was Ken's brainchild, wasn't it? >> Derek: Yeah, yep, yeah. And so, you know, we're competitors in the industry but we're actually - it's a friendly environment when we meet and it's actionable intelligence that's being shared. Again, it comes down to how well you can implement that technology, or that (hesitates) information in your technology - that's an important part. >> Lisa: So, here we are at Accelerate 2018 the - I think Ken was saying the 16th year of this event. What are you looking forward to in 2018 for Fortinet, looking at the strength of the partners - those behind us. What's exciting you about the opportunities that Fortinet has in 2018? >> Derek: It's never a boring day. (laughs) There's a lot of interesting opportunities to work with. I think it's - what's exciting to me is the vibe. People are very keen on this, right? If you look at our fabric-ready program, it's growing quite significantly and I think it's fantastic, there's a lot of people, you know, that are energized and willing to work in these programs. There's a lot of programs we can build at, specifically, FortiGuard, as well. Like I said, these threat intelligence services that we're offering to our partners now, which include, you know, proactive alerts, early warning systems. That empowerment and, you know, working together definitely excites me - there's a lot of opportunities there. And there's going to be a lot of, you know, challenges to overcome. If we look at the threat landscape right now, you know, one thing I'm talking about is swarm bots. It's this swarm intelligence - there's parallels here again; we talk about strength in numbers and what we're doing on our side. The bad guys are also teaming up and doing strength in numbers on their side, too. So, we're looking at on the horizon threats like this that are using, leveraging, their own learning mechanisms, being able to self-adapt to be much quicker to attack systems, right, because that's on the horizon - we're already seeing indications of that; we have to get this right. I think for the first time in the industry, you know, we're doing this right. You know, if you look at years past, cybercriminals, they can do a million things wrong and they don't care, right? So, we need to be able to overcome more hurdles. If we work together, which we're doing right now; I think for the first time, we have the opportunity to have an advantage over the cybercriminals, too. So, that's also exciting. >> Lisa: Definitely. We've heard a lot of, I think, conversation today along the spirit of collaboration, compatibility. So, that sentiment, I think, was well represented from your peers that we've spoken with today. >> Derek: Yeah. Everybody has a part to play, I think, right? And that's the thing - you mentioned the word "ecosystem" and that's exactly what it is, right? And that's another brilliant thing we're finding is that everybody brings some strength to the table, so that's another aspect, and I think people, you know, are realizing that organizations are realizing that they can actually play in these collaborations. >> Peter: It's not a zero sum game. >> Derek: No. >> Peter: It's not. I mean, there's so much diversity and so much opportunity and this digital transformation going to have touched so many different corners in so many different ways. >> Derek: Yeah. >> At this point in time, it's "How fast can we all work together to take advantage of the opportunities?" and not "Eh, I want that piece and I want that piece." because then the whole thing won't grow as fast. >> Derek: Yeah, and, you know, the other challenges - the technology challenge, and that's something we are addressing as well. Like, we're actually creating a solution to this - a framework, as we did with the cyberthreat alliance, but also with the fabric program, as well, so having those tools is very important, I think, as well, to help grow that ecosystem, right? >> Lisa: Exciting stuff, Derek. Thanks so much for joining us on The Cube and sharing some of the things that you're working on, and, it sounds, like you said earlier, never a dull moment; every day is a busy day. >> Derek: Absolutely not. Yeah, there's a long road ahead and I think there always will be. But, like I said, it's a lot of exciting times and it's good to see progress in the industry. >> Lisa: Absolutely. Well, thanks for your time. We look forward to our chat next year and to see what happens then. >> Derek: Okay, thank you so much! >> Lisa: Absolutely. We want to thank you for watching The Cube's continuing coverage of Fortinet Accelerate 2018. For Peter Burris, I'm Lisa Martin, and we'll be right back after a short break. (subtle electronic song)
SUMMARY :
Fortinet Accelerate '18, brought to you by Fortinet. to welcome a Cube alumni back to Derek: Thank you, it's always good to be here. We're happy that you think that. What does that mean to you? At the same time, being able to Peter: But it also means, you know, the So, that's one aspect when you look at the ecosystem. when we, you know, train our analysts. that kind of a load off, to be looking at day to day, you know, as an example. One of the biggest challenges that we hear and this intelligence service to be able to, you know, So, you know, security's a board-level discussion I have - is it finding its way into if we talk about, you know, cloud services; I'm a kind of cybercrime report that said by 2021, that cybercrime is concerned and the So, you know, it becomes very important for for the cybercriminals to operate, too. Again, it comes down to how well you can implement What are you looking forward to in 2018 for Fortinet, And there's going to be a lot of, you know, So, that sentiment, I think, was well represented And that's the thing - you mentioned the word a zero sum game. and so much opportunity and this of the opportunities?" Derek: Yeah, and, you know, the other and sharing some of the things that you're and it's good to see progress in the industry. and to see what happens then. We want to thank you for watching The Cube's
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Derek | PERSON | 0.99+ |
Peter Burris | PERSON | 0.99+ |
Peter | PERSON | 0.99+ |
Ken | PERSON | 0.99+ |
Lisa Martin | PERSON | 0.99+ |
2018 | DATE | 0.99+ |
Lisa | PERSON | 0.99+ |
Fortinet | ORGANIZATION | 0.99+ |
FortiNet | ORGANIZATION | 0.99+ |
FortiGuard | ORGANIZATION | 0.99+ |
Derek Manky | PERSON | 0.99+ |
Last year | DATE | 0.99+ |
2021 | DATE | 0.99+ |
2017 | DATE | 0.99+ |
FortiGuard Labs | ORGANIZATION | 0.99+ |
last year | DATE | 0.99+ |
next year | DATE | 0.99+ |
Accelerate | ORGANIZATION | 0.99+ |
six trillion dollars | QUANTITY | 0.99+ |
Cube | ORGANIZATION | 0.99+ |
third generation | QUANTITY | 0.99+ |
Australia | LOCATION | 0.99+ |
Fort Knox | LOCATION | 0.99+ |
16th year | QUANTITY | 0.99+ |
first time | QUANTITY | 0.98+ |
15 years ago | DATE | 0.98+ |
215 security experts | QUANTITY | 0.98+ |
One | QUANTITY | 0.98+ |
both | QUANTITY | 0.98+ |
over two million dollars | QUANTITY | 0.98+ |
The Cube | ORGANIZATION | 0.97+ |
one aspect | QUANTITY | 0.97+ |
today | DATE | 0.97+ |
Las Vegas | LOCATION | 0.96+ |
Fortinet Accelerate 2018 | TITLE | 0.96+ |
over four million | QUANTITY | 0.95+ |
First | QUANTITY | 0.94+ |
Miles Kingston, Intel | AWS re:Invent
>> Narrator: Live from Las Vegas, it's theCUBE. Covering AWS re:Invent 2017 presented by AWS, Intel and our ecosystem of partners. >> Hello and welcome back. Live here is theCUBE's exclusive coverage here in Las Vegas. 45,000 people attending Amazon Web Services' AWS re:Invent 2017. I'm John Furrier with Lisa Martin. Our next guest is Miles Kingston, he is the General Manager of the Smart Home Group at Intel Corporation. Miles, it's great to have you. >> Thank you so much for having me here, I'm really happy to be here. >> Welcome to theCUBE Alumni Club. First time on. All the benefits you get as being an Alumni is to come back again. >> Can't wait, I'll be here next year, for sure. >> Certainly, you are running a new business for Intel, I'd like to get some details on that, because smart homes. We were at the Samsung Developer Conference, we saw smart fridge, smart living room. So we're starting to see this become a reality, for the CES, every 10 years, that's smart living room. So finally, with cloud and all of the computing power, it's arrived or has it? >> I believe we're almost there. I think the technology has finally advanced enough and there is so much data available now that you have this combination of this technology that can analyze all of this data and truly start doing some of the artificial intelligence that will help you make your home smarter. >> And we've certainly seen the growth of Siri with Apple, Alexa for the home with Amazon, just really go crazy. In fact, during the Industry Day, yesterday, you saw the repeat session most attended by developers, was Alexa. So Alexa's got the minds and has captured the imagination of the developers. Where does it go from here and what is the difference between a smart home and a connected home? Can you just take a minute to explain and set the table on that? >> Yeah and I agree, the voice capability in the home, it's absolutely foundational. I think I saw a recent statistic that by 2022, 55% of US households are expected to have a smart speaker type device in their home. So that's a massive percentage. So I think, if you look in the industry, connected home and smart home, they're often use synonymously. We personally look at it as an evolution. And so what I mean by that is, today, we think the home is extremely connected. If I talk about my house, and I'm a total geek about this stuff, I've got 60 devices connected to an access point, I've got another 60 devices connected to an IOT hub. My home does not feel very smart. It's crazy connected, I can turn on lights on and off, sprinklers on and off, it's not yet smart. What we're really focused on at Intel, is accelerating that transition for your home to truly become a smart home and not just a connected home. >> And software is a key part of it, and I've seen developers attack this area very nicely. At the same time, the surface area with these Smart Homes for security issues, hackers. Cause WiFi is, you can run a process on, these are computers. So how does security fit into all of this? >> Yeah, security is huge and so at Intel we're focused on four technology pillars, which we'll get through during this discussion. One of the first ones is connectivity, and we actually have technology that goes into a WiFi access point, the actual silicon. It's optimized for many clients to be in the home, and also, we've partnered with companies, like McAfee, on security software that will sit on top of that. That will actually manage all of the connected devices in your home, as that extra layer of security. So we fundamentally agree that the security is paramount. >> One of the things that I saw on the website that says, Intel is taking a radically different approach based on proactive research into ways to increase smart home adoption. What makes Intel's approach radically different? >> Yeah, so I'm glad that you asked that. We've spent years going into thousands of consumers' homes in North America, Western Europe, China, etc. To truly understand some of the pain points they were experiencing. From that, we basically, gave all this information to our architects and we really synthesized it into what areas we need to advance technology to enable some of these richer use cases. So we're really working on those foundational building blocks and so those four ones I mentioned earlier, connectivity, that one is paramount. You know, if you want to add 35 to 100 devices in your home, you better make sure they're all connected, all the time and that you've got good bandwidth between them. The second technology was voice, and it's not just voice in one place in your home, it's voice throughout your home. You don't want to have to run to the kitchen to turn your bedroom lights on. And then, vision. You know, making sure your home has the ability to see more. It could be cameras, could be motion sensors, it could be vision sensors. And then this last one is this local intelligence. This artificial intelligence. So the unique approach that Intel is taking is across all of our assets. In the data center, in our artificial intelligence organization, in our new technology organization, our IOT organization, in our client computing group. We're taking all of these assets and investing them in those four pillars and kind of really delivering unique solutions, and there's actually a couple of them that have been on display this week so far. >> How about DeepLens? That certainly was an awesome keynote point, and the device that Andy introduced is essentially a wireless device, that is basically that machine learning an AI in it. And that is awesome, because it's also an IOT device, it's got so much versatility to it. What's behind that? Can you give some color to DeepLens? What does it mean for people? >> So, we're really excited about that one. We partnered with Amazon at AWS on that for quite some time. So, just a reminder to everybody, that is the first Deep Learning enabled wireless camera. And what we're helped do in that, is it's got an Intel Atom processor inside that actually runs the vision processing workload. We also contributed a Deep Learning toolkit, kind of a software middleware layer, and we've also got the Intel Compute Library for deep neural networks. So basically, a lot of preconfigured algorithms that developers can use. The bigger thing, though, is when I talked about those four technology pillars; the vision pillar, as well as the artificial intelligence pillar, this is a proof point of exactly that. Running an instance of the AWS service on a local device in the home to do this computer vision. >> When will that device be available? And what's the price point? Can we get our hands on one? And how are people going to be getting this? >> Yeah, so what was announced during the keynote today is that there are actually some Deep Learning workshops today, here at re:Invent where they're actually being given away, and then actually as soon as the announcement was made during the keynote today, they're actually available for pre-order on Amazon.com right now. I'm not actually sure on the shipping date on Amazon, but anybody can go and check. >> Jeff Frick, go get one of those quickly. Order it, put my credit card down. >> Miles: Yes, please do. >> Well, that's super exciting and now, where's the impact in that? Because it seems like it could be a great IOT device. It seems like it would be a fun consumer device. Where do you guys see the use cases for these developing? >> So the reason I'm excited about this one, is I fundamentally believe that vision is going to enable some richer use cases. The only way we're going to get those though, is if you get these brilliant developers getting their hands on the hardware, with someone like Amazon, who's made all of the machine learning, and the cloud and all of the pieces easier. It's now going to make it very easy for thousands, ideally, hundreds of thousands of developers to start working on this, so they can enable these new use cases. >> The pace of innovation that AWS has set, it's palpable here, we hear it, we feel it. This is a relatively new business unit for Intel. You announced this, about a year ago at re:Invent 2016? Are you trying to match the accelerated pace of innovation that AWS has? And what do you see going on in the next 12 months? Where do you think we'll be 12 months from now? >> Yeah, so I think we're definitely trying to be a fantastic technology partner for Amazon. One of the things we have since last re:Invent is we announced we were going to do some reference designs and developer kits to help get Alexa everywhere. So during this trade show, actually, we are holding, I can't remember the exact number, but many workshops, where we are providing the participants with a Speech Enabling Developer toolkit. And basically, what this is, is it's got an Intel platform, with Intel's dual DSP on it, a microarray, and it's paired with Raspberry Pi. So basically, this will allow anybody who already makes a product, it will allow them to easily integrate Alexa into that product with Intel inside. Which is perfect for us. >> So obviously, we're super excited, we love the cloud. I'm kind of a fanboy of the cloud, being a developer in my old days, but the resources that you get out of the cloud are amazing. But now when you start looking at these devices like DeepLens, the possibilities are limitless. So it's really interesting. The question I have for you is, you know, we had Tom Siebel on earlier, pioneer, invented the CRM category. He's now the CEO of C3 IOT, and I asked him, why are you doing a startup, you're a billionaire. You're rich, you don't need to do it. He goes, "I'm a computer guy, I love doing this." He's an entrepreneur at heart. But he said something interesting, he said that the two waves that he surfs, they call him a big time surfer, he's hanging 10 on the waves, is IOT and AI. This is an opportunity for you guys to reimagine the smart home. How important is the IOT trend and the AI trend for really doing it right with smart home, and whatever we're calling it. There's an opportunity there. How are you guys viewing that vision? What progress points have you identified at Intel, to kind of, check? >> Completely agree. For me, AI really is the key turning point here. 'Cause even just talking about connected versus smart, the thing that makes it smart is the ability to learn and think for itself. And the reason we have focused on those technology pillars, is we believe that by adding voice everywhere in the home, and the listening capability, as well as adding the vision capability, you're going to enable all of this rich new data, which you have to have some of these AI tools to make any sense of, and when you get to video, you absolutely have to have some amount of it locally. So, that either for bandwidth reasons, for latency reasons, for privacy reasons, like some of the examples that were given in the keynote today, you just want to keep that stuff locally. >> And having policy and running on it, you know, access points are interesting, it gives you connectivity, but these are computers, so if someone gets malware on the home, they can run a full threaded process on these machines. Sometimes you might not want that. You want to be able to control that. >> Yes, absolutely. We would really believe that the wireless access point in the home is one of the greatest areas where you can add additional security in the home and protect all of the devices. >> So you mentioned, I think 120 different devices in your home that are connected. How far away do you think your home is from being, from going from connected to smart? What's that timeline like? >> You know what I think, honestly, I think a lot of the hardware is already there. And the examples I will give is, and I'm not just saying this because I'm here, but I actually do have 15 Echos in my house because I do want to be able to control all of the infrastructure everywhere in the home. I do believe in the future, those devices will be listening for anomalies, like glass breaking, a dog barking, a baby crying, and I believe the hardware we have today is very capable of doing that. Similarly, I think that a lot of the cameras today are trained to, whenever they see motion, to do certain things and to start recording. I think that use case is going to evolve over time as well, so I truly believe that we are probably two years away from really seeing, with some of the existing infrastructure, truly being able to enable some smarter home use cases. >> The renaissance going on, the creativity is going to be amazing. I'm looking at a tweet that Bert Latimar, from our team made, on our last interview with the Washington County Sheriff, customer of Amazon, pays $6 a month for getting all the mugshots. He goes, "I'm gonna use DeepLens for things like "recognizing scars and tattoos." Because now they have to take pictures when someone comes in as a criminal, but now with DeepLens, they can program it to look for tattoos. >> Yeah, absolutely. And if you see things like the Ring Doorbell today, they have that neighborhood application of it so you can actually share within your local neighborhood if somebody had a package stolen, they can post a picture of that person. And even just security cameras, my house, it feels like Fort Knox sometimes, I've got so many security cameras. It used to be, every time there was a windstorm, I got 25 alerts on my phone, because a branch was blowing. Now I have security cameras that actually can do facial recognition and say, your son is home, your daughter is home, your wife is home. >> So are all the houses going to have a little sign that says,"Protected by Alexa and Intel and DeepLens" >> Don't you dare, exactly. (laughs) >> Lisa: And no sneaking out for the kids. >> Yes, exactly. >> Alright, so real quick to end the segment, quickly summarize and share, what is the Intel relationship with Amazon Web Services? Talk about the partnership. >> It's a great relationship. We've been partnering with Amazon for over a decade, starting with AWS. Over the last couple of years, we've started working closely with them on their first party products. So, many of you have seen the Echo Show and the Echo Look, that has Intel inside. It also has a RealSense Camera in the Look. We've now enabled the Speech Enabling Developer Kit, which is meant to help get Alexa everywhere, running on Intel. We've now done DeepLens, which is a great example of local artificial intelligence. Partnered with all the work we've done with them in the cloud, so it really is, I would say the partnership expands all the way from the very edge device in the home, all the way to the cloud. >> Miles, thanks for coming, Miles Kingston with Intel, General Manager of the Smart Home Group, new business unit at Intel, really reimagining the future for people's lives. I think in this great case where technology can actually help people, rather than making it any more complicated. Which we all know if we have access points and kids gaming, it can be a problem. It's theCUBE, live here in Las Vegas. 45,000 people here at Amazon re:Invent. Five years ago, our first show, only 7,000. Now what amazing growth. Thanks so much for coming out, Lisa Martin and John Furrier here, reporting from theCUBE. More coverage after this short break. (light music)
SUMMARY :
and our ecosystem of partners. he is the General Manager of the Smart Home Group I'm really happy to be here. All the benefits you get as being an Alumni for the CES, every 10 years, that's smart living room. that will help you make your home smarter. and has captured the imagination of the developers. Yeah and I agree, the voice capability in the home, At the same time, the surface area with these Smart Homes One of the first ones is connectivity, and we actually One of the things that I saw on the website that says, Yeah, so I'm glad that you asked that. and the device that Andy introduced in the home to do this computer vision. I'm not actually sure on the shipping date on Amazon, Jeff Frick, go get one of those quickly. Where do you guys see the use cases for these developing? and all of the pieces easier. And what do you see going on in the next 12 months? One of the things we have since last re:Invent in my old days, but the resources that you get And the reason we have focused on those technology so if someone gets malware on the home, in the home is one of the greatest areas where you How far away do you think your home is from being, and I believe the hardware we have today is very the creativity is going to be amazing. so you can actually share within your local neighborhood Don't you dare, exactly. Talk about the partnership. and the Echo Look, that has Intel inside. General Manager of the Smart Home Group,
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Lisa Martin | PERSON | 0.99+ |
AWS | ORGANIZATION | 0.99+ |
Bert Latimar | PERSON | 0.99+ |
Tom Siebel | PERSON | 0.99+ |
Jeff Frick | PERSON | 0.99+ |
60 devices | QUANTITY | 0.99+ |
Amazon | ORGANIZATION | 0.99+ |
John Furrier | PERSON | 0.99+ |
Miles Kingston | PERSON | 0.99+ |
China | LOCATION | 0.99+ |
McAfee | ORGANIZATION | 0.99+ |
Miles | PERSON | 0.99+ |
Amazon Web Services | ORGANIZATION | 0.99+ |
Las Vegas | LOCATION | 0.99+ |
thousands | QUANTITY | 0.99+ |
Intel | ORGANIZATION | 0.99+ |
Siri | TITLE | 0.99+ |
35 | QUANTITY | 0.99+ |
North America | LOCATION | 0.99+ |
yesterday | DATE | 0.99+ |
Western Europe | LOCATION | 0.99+ |
Lisa | PERSON | 0.99+ |
Apple | ORGANIZATION | 0.99+ |
two years | QUANTITY | 0.99+ |
next year | DATE | 0.99+ |
Amazon Web Services' | ORGANIZATION | 0.99+ |
Andy | PERSON | 0.99+ |
Five years ago | DATE | 0.99+ |
first show | QUANTITY | 0.99+ |
45,000 people | QUANTITY | 0.99+ |
CES | EVENT | 0.99+ |
today | DATE | 0.99+ |
2022 | DATE | 0.99+ |
Smart Home Group | ORGANIZATION | 0.99+ |
10 | QUANTITY | 0.99+ |
Amazon.com | ORGANIZATION | 0.98+ |
One | QUANTITY | 0.98+ |
Echo Show | COMMERCIAL_ITEM | 0.98+ |
Intel Corporation | ORGANIZATION | 0.98+ |
120 different devices | QUANTITY | 0.98+ |
100 devices | QUANTITY | 0.98+ |
four ones | QUANTITY | 0.98+ |
first | QUANTITY | 0.97+ |
this week | DATE | 0.97+ |
$6 a month | QUANTITY | 0.97+ |
four technology pillars | QUANTITY | 0.97+ |
55% | QUANTITY | 0.97+ |
7,000 | QUANTITY | 0.96+ |
First time | QUANTITY | 0.96+ |
first ones | QUANTITY | 0.96+ |
Echos | COMMERCIAL_ITEM | 0.96+ |
Alexa | TITLE | 0.96+ |
one place | QUANTITY | 0.95+ |
thousands of consumers' | QUANTITY | 0.95+ |
first party | QUANTITY | 0.95+ |
US | LOCATION | 0.94+ |
12 months | QUANTITY | 0.94+ |