Horizon3.ai Signal | Horizon3.ai Partner Program Expands Internationally
hello I'm John Furrier with thecube and welcome to this special presentation of the cube and Horizon 3.ai they're announcing a global partner first approach expanding their successful pen testing product Net Zero you're going to hear from leading experts in their staff their CEO positioning themselves for a successful Channel distribution expansion internationally in Europe Middle East Africa and Asia Pacific in this Cube special presentation you'll hear about the expansion the expanse partner program giving Partners a unique opportunity to offer Net Zero to their customers Innovation and Pen testing is going International with Horizon 3.ai enjoy the program [Music] welcome back everyone to the cube and Horizon 3.ai special presentation I'm John Furrier host of thecube we're here with Jennifer Lee head of Channel sales at Horizon 3.ai Jennifer welcome to the cube thanks for coming on great well thank you for having me so big news around Horizon 3.aa driving Channel first commitment you guys are expanding the channel partner program to include all kinds of new rewards incentives training programs help educate you know Partners really drive more recurring Revenue certainly cloud and Cloud scale has done that you got a great product that fits into that kind of Channel model great Services you can wrap around it good stuff so let's get into it what are you guys doing what are what are you guys doing with this news why is this so important yeah for sure so um yeah we like you said we recently expanded our Channel partner program um the driving force behind it was really just um to align our like you said our Channel first commitment um and creating awareness around the importance of our partner ecosystems um so that's it's really how we go to market is is through the channel and a great International Focus I've talked with the CEO so you know about the solution and he broke down all the action on why it's important on the product side but why now on the go to market change what's the what's the why behind this big this news on the channel yeah for sure so um we are doing this now really to align our business strategy which is built on the concept of enabling our partners to create a high value high margin business on top of our platform and so um we offer a solution called node zero it provides autonomous pen testing as a service and it allows organizations to continuously verify their security posture um so we our company vision we have this tagline that states that our pen testing enables organizations to see themselves Through The Eyes of an attacker and um we use the like the attacker's perspective to identify exploitable weaknesses and vulnerabilities so we created this partner program from a perspective of the partner so the partner's perspective and we've built It Through The Eyes of our partner right so we're prioritizing really what the partner is looking for and uh will ensure like Mutual success for us yeah the partners always want to get in front of the customers and bring new stuff to them pen tests have traditionally been really expensive uh and so bringing it down in one to a service level that's one affordable and has flexibility to it allows a lot of capability so I imagine people getting excited by it so I have to ask you about the program What specifically are you guys doing can you share any details around what it means for the partners what they get what's in it for them can you just break down some of the mechanics and mechanisms or or details yeah yep um you know we're really looking to create business alignment um and like I said establish Mutual success with our partners so we've got two um two key elements that we were really focused on um that we bring to the partners so the opportunity the profit margin expansion is one of them and um a way for our partners to really differentiate themselves and stay relevant in the market so um we've restructured our discount model really um you know highlighting profitability and maximizing profitability and uh this includes our deal registration we've we've created deal registration program we've increased discount for partners who take part in our partner certification uh trainings and we've we have some other partner incentives uh that we we've created that that's going to help out there we've we put this all so we've recently Gone live with our partner portal um it's a Consolidated experience for our partners where they can access our our sales tools and we really view our partners as an extension of our sales and Technical teams and so we've extended all of our our training material that we use internally we've made it available to our partners through our partner portal um we've um I'm trying I'm thinking now back what else is in that partner portal here we've got our partner certification information so all the content that's delivered during that training can be found in the portal we've got deal registration uh um co-branded marketing materials pipeline management and so um this this portal gives our partners a One-Stop place to to go to find all that information um and then just really quickly on the second part of that that I mentioned is our technology really is um really disruptive to the market so you know like you said autonomous pen testing it's um it's still it's well it's still still relatively new topic uh for security practitioners and um it's proven to be really disruptive so um that on top of um just well recently we found an article that um that mentioned by markets and markets that reports that the global pen testing markets really expanding and so it's expected to grow to like 2.7 billion um by 2027. so the Market's there right the Market's expanding it's growing and so for our partners it's just really allows them to grow their revenue um across their customer base expand their customer base and offering this High profit margin while you know getting in early to Market on this just disruptive technology big Market a lot of opportunities to make some money people love to put more margin on on those deals especially when you can bring a great solution that everyone knows is hard to do so I think that's going to provide a lot of value is there is there a type of partner that you guys see emerging or you aligning with you mentioned the alignment with the partners I can see how that the training and the incentives are all there sounds like it's all going well is there a type of partner that's resonating the most or is there categories of partners that can take advantage of this yeah absolutely so we work with all different kinds of Partners we work with our traditional resale Partners um we've worked we're working with systems integrators we have a really strong MSP mssp program um we've got Consulting partners and the Consulting Partners especially with the ones that offer pen test services so we they use us as a as we act as a force multiplier just really offering them profit margin expansion um opportunity there we've got some technology partner partners that we really work with for co-cell opportunities and then we've got our Cloud Partners um you'd mentioned that earlier and so we are in AWS Marketplace so our ccpo partners we're part of the ISP accelerate program um so we we're doing a lot there with our Cloud partners and um of course we uh we go to market with uh distribution Partners as well gotta love the opportunity for more margin expansion every kind of partner wants to put more gross profit on their deals is there a certification involved I have to ask is there like do you get do people get certified or is it just you get trained is it self-paced training is it in person how are you guys doing the whole training certification thing because is that is that a requirement yeah absolutely so we do offer a certification program and um it's been very popular this includes a a seller's portion and an operator portion and and so um this is at no cost to our partners and um we operate both virtually it's it's law it's virtually but live it's not self-paced and we also have in person um you know sessions as well and we also can customize these to any partners that have a large group of people and we can just we can do one in person or virtual just specifically for that partner well any kind of incentive opportunities and marketing opportunities everyone loves to get the uh get the deals just kind of rolling in leads from what we can see if our early reporting this looks like a hot product price wise service level wise what incentive do you guys thinking about and and Joint marketing you mentioned co-sell earlier in pipeline so I was kind of kind of honing in on that piece sure and yes and then to follow along with our partner certification program we do incentivize our partners there if they have a certain number certified their discount increases so that's part of it we have our deal registration program that increases discount as well um and then we do have some um some partner incentives that are wrapped around meeting setting and um moving moving opportunities along to uh proof of value gotta love the education driving value I have to ask you so you've been around the industry you've seen the channel relationships out there you're seeing companies old school new school you know uh Horizon 3.ai is kind of like that new school very cloud specific a lot of Leverage with we mentioned AWS and all the clouds um why is the company so hot right now why did you join them and what's why are people attracted to this company what's the what's the attraction what's the vibe what do you what do you see and what what do you use what did you see in in this company well this is just you know like I said it's very disruptive um it's really in high demand right now and um and and just because because it's new to Market and uh a newer technology so we are we can collaborate with a manual pen tester um we can you know we can allow our customers to run their pen test um with with no specialty teams and um and and then so we and like you know like I said we can allow our partners can actually build businesses profitable businesses so we can they can use our product to increase their services revenue and um and build their business model you know around around our services what's interesting about the pen test thing is that it's very expensive and time consuming the people who do them are very talented people that could be working on really bigger things in the in absolutely customers so bringing this into the channel allows them if you look at the price Delta between a pen test and then what you guys are offering I mean that's a huge margin Gap between street price of say today's pen test and what you guys offer when you show people that they follow do they say too good to be true I mean what are some of the things that people say when you kind of show them that are they like scratch their head like come on what's the what's the catch here right so the cost savings is a huge is huge for us um and then also you know like I said working as a force multiplier with a pen testing company that offers the services and so they can they can do their their annual manual pen tests that may be required around compliance regulations and then we can we can act as the continuous verification of their security um um you know that that they can run um weekly and so it's just um you know it's just an addition to to what they're offering already and an expansion so Jennifer thanks for coming on thecube really appreciate you uh coming on sharing the insights on the channel uh what's next what can we expect from the channel group what are you thinking what's going on right so we're really looking to expand our our Channel um footprint and um very strategically uh we've got um we've got some big plans um for for Horizon 3.ai awesome well thanks for coming on really appreciate it you're watching thecube the leader in high tech Enterprise coverage [Music] [Music] hello and welcome to the Cube's special presentation with Horizon 3.ai with Raina Richter vice president of emea Europe Middle East and Africa and Asia Pacific APAC for Horizon 3 today welcome to this special Cube presentation thanks for joining us thank you for the invitation so Horizon 3 a guy driving Global expansion big international news with a partner first approach you guys are expanding internationally let's get into it you guys are driving this new expanse partner program to new heights tell us about it what are you seeing in the momentum why the expansion what's all the news about well I would say uh yeah in in international we have I would say a similar similar situation like in the US um there is a global shortage of well-educated penetration testers on the one hand side on the other side um we have a raising demand of uh network and infrastructure security and with our approach of an uh autonomous penetration testing I I believe we are totally on top of the game um especially as we have also now uh starting with an international instance that means for example if a customer in Europe is using uh our service node zero he will be connected to a node zero instance which is located inside the European Union and therefore he has doesn't have to worry about the conflict between the European the gdpr regulations versus the US Cloud act and I would say there we have a total good package for our partners that they can provide differentiators to their customers you know we've had great conversations here on thecube with the CEO and the founder of the company around the leverage of the cloud and how successful that's been for the company and honestly I can just Connect the Dots here but I'd like you to weigh in more on how that translates into the go to market here because you got great Cloud scale with with the security product you guys are having success with great leverage there I've seen a lot of success there what's the momentum on the channel partner program internationally why is it so important to you is it just the regional segmentation is it the economics why the momentum well there are it's there are multiple issues first of all there is a raising demand in penetration testing um and don't forget that uh in international we have a much higher level in number a number or percentage in SMB and mid-market customers so these customers typically most of them even didn't have a pen test done once a year so for them pen testing was just too expensive now with our offering together with our partners we can provide different uh ways how customers could get an autonomous pen testing done more than once a year with even lower costs than they had with with a traditional manual paint test so and that is because we have our uh Consulting plus package which is for typically pain testers they can go out and can do a much faster much quicker and their pain test at many customers once in after each other so they can do more pain tests on a lower more attractive price on the other side there are others what even the same ones who are providing um node zero as an mssp service so they can go after s p customers saying okay well you only have a couple of hundred uh IP addresses no worries we have the perfect package for you and then you have let's say the mid Market let's say the thousands and more employees then they might even have an annual subscription very traditional but for all of them it's all the same the customer or the service provider doesn't need a piece of Hardware they only need to install a small piece of a Docker container and that's it and that makes it so so smooth to go in and say okay Mr customer we just put in this this virtual attacker into your network and that's it and and all the rest is done and within within three clicks they are they can act like a pen tester with 20 years of experience and that's going to be very Channel friendly and partner friendly I can almost imagine so I have to ask you and thank you for calling the break calling out that breakdown and and segmentation that was good that was very helpful for me to understand but I want to follow up if you don't mind um what type of partners are you seeing the most traction with and why well I would say at the beginning typically you have the the innovators the early adapters typically Boutique size of Partners they start because they they are always looking for Innovation and those are the ones you they start in the beginning so we have a wide range of Partners having mostly even um managed by the owner of the company so uh they immediately understand okay there is the value and they can change their offering they're changing their offering in terms of penetration testing because they can do more pen tests and they can then add other ones or we have those ones who offer 10 tests services but they did not have their own pen testers so they had to go out on the open market and Source paint testing experts um to get the pen test at a particular customer done and now with node zero they're totally independent they can't go out and say okay Mr customer here's the here's the service that's it we turn it on and within an hour you're up and running totally yeah and those pen tests are usually expensive and hard to do now it's right in line with the sales delivery pretty interesting for a partner absolutely but on the other hand side we are not killing the pain testers business we do something we're providing with no tiers I would call something like the foundation work the foundational work of having an an ongoing penetration testing of the infrastructure the operating system and the pen testers by themselves they can concentrate in the future on things like application pen testing for example so those Services which we we're not touching so we're not killing the paint tester Market we're just taking away the ongoing um let's say foundation work call it that way yeah yeah that was one of my questions I was going to ask is there's a lot of interest in this autonomous pen testing one because it's expensive to do because those skills are required are in need and they're expensive so you kind of cover the entry level and the blockers that are in there I've seen people say to me this pen test becomes a blocker for getting things done so there's been a lot of interest in the autonomous pen testing and for organizations to have that posture and it's an overseas issue too because now you have that that ongoing thing so can you explain that particular benefit for an organization to have that continuously verifying an organization's posture yep certainly so I would say um typically you are you you have to do your patches you have to bring in new versions of operating systems of different Services of uh um operating systems of some components and and they are always bringing new vulnerabilities the difference here is that with node zero we are telling the customer or the partner package we're telling them which are the executable vulnerabilities because previously they might have had um a vulnerability scanner so this vulnerability scanner brought up hundreds or even thousands of cves but didn't say anything about which of them are vulnerable really executable and then you need an expert digging in one cve after the other finding out is it is it really executable yes or no and that is where you need highly paid experts which we have a shortage so with notes here now we can say okay we tell you exactly which ones are the ones you should work on because those are the ones which are executable we rank them accordingly to the risk level how easily they can be used and by a sudden and then the good thing is convert it or indifference to the traditional penetration test they don't have to wait for a year for the next pain test to find out if the fixing was effective they weren't just the next scan and say Yes closed vulnerability is gone the time is really valuable and if you're doing any devops Cloud native you're always pushing new things so pen test ongoing pen testing is actually a benefit just in general as a kind of hygiene so really really interesting solution really bring that global scale is going to be a new new coverage area for us for sure I have to ask you if you don't mind answering what particular region are you focused on or plan to Target for this next phase of growth well at this moment we are concentrating on the countries inside the European Union Plus the United Kingdom um but we are and they are of course logically I'm based into Frankfurt area that means we cover more or less the countries just around so it's like the total dark region Germany Switzerland Austria plus the Netherlands but we also already have Partners in the nordics like in Finland or in Sweden um so it's it's it it's rapidly we have Partners already in the UK and it's rapidly growing so I'm for example we are now starting with some activities in Singapore um um and also in the in the Middle East area um very important we uh depending on let's say the the way how to do business currently we try to concentrate on those countries where we can have um let's say um at least English as an accepted business language great is there any particular region you're having the most success with right now is it sounds like European Union's um kind of first wave what's them yes that's the first definitely that's the first wave and now we're also getting the uh the European instance up and running it's clearly our commitment also to the market saying okay we know there are certain dedicated uh requirements and we take care of this and and we're just launching it we're building up this one uh the instance um in the AWS uh service center here in Frankfurt also with some dedicated Hardware internet in a data center in Frankfurt where we have with the date six by the way uh the highest internet interconnection bandwidth on the planet so we have very short latency to wherever you are on on the globe that's a great that's a great call outfit benefit too I was going to ask that what are some of the benefits your partners are seeing in emea and Asia Pacific well I would say um the the benefits is for them it's clearly they can they can uh talk with customers and can offer customers penetration testing which they before and even didn't think about because it penetrates penetration testing in a traditional way was simply too expensive for them too complex the preparation time was too long um they didn't have even have the capacity uh to um to support a pain an external pain tester now with this service you can go in and say even if they Mr customer we can do a test with you in a couple of minutes within we have installed the docker container within 10 minutes we have the pen test started that's it and then we just wait and and I would say that is we'll we are we are seeing so many aha moments then now because on the partner side when they see node zero the first time working it's like this wow that is great and then they work out to customers and and show it to their typically at the beginning mostly the friendly customers like wow that's great I need that and and I would say um the feedback from the partners is that is a service where I do not have to evangelize the customer everybody understands penetration testing I don't have to say describe what it is they understand the customer understanding immediately yes penetration testing good about that I know I should do it but uh too complex too expensive now with the name is for example as an mssp service provided from one of our partners but it's getting easy yeah it's great and it's great great benefit there I mean I gotta say I'm a huge fan of what you guys are doing I like this continuous automation that's a major benefit to anyone doing devops or any kind of modern application development this is just a godsend for them this is really good and like you said the pen testers that are doing it they were kind of coming down from their expertise to kind of do things that should have been automated they get to focus on the bigger ticket items that's a really big point so we free them we free the pain testers for the higher level elements of the penetration testing segment and that is typically the application testing which is currently far away from being automated yeah and that's where the most critical workloads are and I think this is the nice balance congratulations on the international expansion of the program and thanks for coming on this special presentation really I really appreciate it thank you you're welcome okay this is thecube special presentation you know check out pen test automation International expansion Horizon 3 dot AI uh really Innovative solution in our next segment Chris Hill sector head for strategic accounts will discuss the power of Horizon 3.ai and Splunk in action you're watching the cube the leader in high tech Enterprise coverage foreign [Music] [Music] welcome back everyone to the cube and Horizon 3.ai special presentation I'm John Furrier host of thecube we're with Chris Hill sector head for strategic accounts and federal at Horizon 3.ai a great Innovative company Chris great to see you thanks for coming on thecube yeah like I said uh you know great to meet you John long time listener first time caller so excited to be here with you guys yeah we were talking before camera you had Splunk back in 2013 and I think 2012 was our first splunk.com and boy man you know talk about being in the right place at the right time now we're at another inflection point and Splunk continues to be relevant um and continuing to have that data driving Security in that interplay and your CEO former CTO of his plug as well at Horizon who's been on before really Innovative product you guys have but you know yeah don't wait for a breach to find out if you're logging the right data this is the topic of this thread Splunk is very much part of this new international expansion announcement uh with you guys tell us what are some of the challenges that you see where this is relevant for the Splunk and Horizon AI as you guys expand uh node zero out internationally yeah well so across so you know my role uh within Splunk it was uh working with our most strategic accounts and so I looked back to 2013 and I think about the sales process like working with with our small customers you know it was um it was still very siled back then like I was selling to an I.T team that was either using this for it operations um we generally would always even say yeah although we do security we weren't really designed for it we're a log management tool and we I'm sure you remember back then John we were like sort of stepping into the security space and and the public sector domain that I was in you know security was 70 of what we did when I look back to sort of uh the transformation that I was witnessing in that digital transformation um you know when I look at like 2019 to today you look at how uh the IT team and the security teams are being have been forced to break down those barriers that they used to sort of be silent away would not commute communicate one you know the security guys would be like oh this is my box I.T you're not allowed in today you can't get away with that and I think that the value that we bring to you know and of course Splunk has been a huge leader in that space and continues to do Innovation across the board but I think what we've we're seeing in the space and I was talking with Patrick Coughlin the SVP of uh security markets about this is that you know what we've been able to do with Splunk is build a purpose-built solution that allows Splunk to eat more data so Splunk itself is ulk know it's an ingest engine right the great reason people bought it was you could build these really fast dashboards and grab intelligence out of it but without data it doesn't do anything right so how do you drive and how do you bring more data in and most importantly from a customer perspective how do you bring the right data in and so if you think about what node zero and what we're doing in a horizon 3 is that sure we do pen testing but because we're an autonomous pen testing tool we do it continuously so this whole thought I'd be like oh crud like my customers oh yeah we got a pen test coming up it's gonna be six weeks the week oh yeah you know and everyone's gonna sit on their hands call me back in two months Chris we'll talk to you then right not not a real efficient way to test your environment and shoot we saw that with Uber this week right um you know and that's a case where we could have helped oh just right we could explain the Uber thing because it was a contractor just give a quick highlight of what happened so you can connect the doctor yeah no problem so um it was uh I got I think it was yeah one of those uh you know games where they would try and test an environment um and with the uh pen tester did was he kept on calling them MFA guys being like I need to reset my password we need to set my right password and eventually the um the customer service guy said okay I'm resetting it once he had reset and bypassed the multi-factor authentication he then was able to get in and get access to the building area that he was in or I think not the domain but he was able to gain access to a partial part of that Network he then paralleled over to what I would assume is like a VA VMware or some virtual machine that had notes that had all of the credentials for logging into various domains and So within minutes they had access and that's the sort of stuff that we do you know a lot of these tools like um you know you think about the cacophony of tools that are out there in a GTA architect architecture right I'm gonna get like a z-scale or I'm going to have uh octum and I have a Splunk I've been into the solar system I mean I don't mean to name names we have crowdstriker or Sentinel one in there it's just it's a cacophony of things that don't work together they weren't designed work together and so we have seen so many times in our business through our customer support and just working with customers when we do their pen tests that there will be 5 000 servers out there three are misconfigured those three misconfigurations will create the open door because remember the hacker only needs to be right once the defender needs to be right all the time and that's the challenge and so that's what I'm really passionate about what we're doing uh here at Horizon three I see this my digital transformation migration and security going on which uh we're at the tip of the spear it's why I joined sey Hall coming on this journey uh and just super excited about where the path's going and super excited about the relationship with Splunk I get into more details on some of the specifics of that but um you know well you're nailing I mean we've been doing a lot of things on super cloud and this next gen environment we're calling it next gen you're really seeing devops obviously devsecops has already won the it role has moved to the developer shift left is an indicator of that it's one of the many examples higher velocity code software supply chain you hear these things that means that it is now in the developer hands it is replaced by the new Ops data Ops teams and security where there's a lot of horizontal thinking to your point about access there's no more perimeter huge 100 right is really right on things one time you know to get in there once you're in then you can hang out move around move laterally big problem okay so we get that now the challenges for these teams as they are transitioning organizationally how do they figure out what to do okay this is the next step they already have Splunk so now they're kind of in transition while protecting for a hundred percent ratio of success so how would you look at that and describe the challenge is what do they do what is it what are the teams facing with their data and what's next what are they what are they what action do they take so let's use some vernacular that folks will know so if I think about devsecops right we both know what that means that I'm going to build security into the app it normally talks about sec devops right how am I building security around the perimeter of what's going inside my ecosystem and what are they doing and so if you think about what we're able to do with somebody like Splunk is we can pen test the entire environment from Soup To Nuts right so I'm going to test the end points through to its I'm going to look for misconfigurations I'm going to I'm going to look for um uh credential exposed credentials you know I'm going to look for anything I can in the environment again I'm going to do it at light speed and and what what we're doing for that SEC devops space is to you know did you detect that we were in your environment so did we alert Splunk or the Sim that there's someone in the environment laterally moving around did they more importantly did they log us into their environment and when do they detect that log to trigger that log did they alert on us and then finally most importantly for every CSO out there is going to be did they stop us and so that's how we we do this and I think you when speaking with um stay Hall before you know we've come up with this um boils but we call it fine fix verifying so what we do is we go in is we act as the attacker right we act in a production environment so we're not going to be we're a passive attacker but we will go in on credentialed on agents but we have to assume to have an assumed breach model which means we're going to put a Docker container in your environment and then we're going to fingerprint the environment so we're going to go out and do an asset survey now that's something that's not something that Splunk does super well you know so can Splunk see all the assets do the same assets marry up we're going to log all that data and think and then put load that into this long Sim or the smoke logging tools just to have it in Enterprise right that's an immediate future ad that they've got um and then we've got the fix so once we've completed our pen test um we are then going to generate a report and we can talk about these in a little bit later but the reports will show an executive summary the assets that we found which would be your asset Discovery aspect of that a fix report and the fixed report I think is probably the most important one it will go down and identify what we did how we did it and then how to fix that and then from that the pen tester or the organization should fix those then they go back and run another test and then they validate like a change detection environment to see hey did those fixes taste play take place and you know snehaw when he was the CTO of jsoc he shared with me a number of times about it's like man there would be 15 more items on next week's punch sheet that we didn't know about and it's and it has to do with how we you know how they were uh prioritizing the cves and whatnot because they would take all CBDs it was critical or non-critical and it's like we are able to create context in that environment that feeds better information into Splunk and whatnot that brings that brings up the efficiency for Splunk specifically the teams out there by the way the burnout thing is real I mean this whole I just finished my list and I got 15 more or whatever the list just can keeps growing how did node zero specifically help Splunk teams be more efficient like that's the question I want to get at because this seems like a very scale way for Splunk customers and teams service teams to be more so the question is how does node zero help make Splunk specifically their service teams be more efficient so so today in our early interactions we're building customers we've seen are five things um and I'll start with sort of identifying the blind spots right so kind of what I just talked about with you did we detect did we log did we alert did they stop node zero right and so I would I put that you know a more Layman's third grade term and if I was going to beat a fifth grader at this game would be we can be the sparring partner for a Splunk Enterprise customer a Splunk Essentials customer someone using Splunk soar or even just an Enterprise Splunk customer that may be a small shop with three people and just wants to know where am I exposed so by creating and generating these reports and then having um the API that actually generates the dashboard they can take all of these events that we've logged and log them in and then where that then comes in is number two is how do we prioritize those logs right so how do we create visibility to logs that that um are have critical impacts and again as I mentioned earlier not all cves are high impact regard and also not all or low right so if you daisy chain a bunch of low cves together boom I've got a mission critical AP uh CPE that needs to be fixed now such as a credential moving to an NT box that's got a text file with a bunch of passwords on it that would be very bad um and then third would be uh verifying that you have all of the hosts so one of the things that splunk's not particularly great at and they'll literate themselves they don't do asset Discovery so dude what assets do we see and what are they logging from that um and then for from um for every event that they are able to identify one of the cool things that we can do is actually create this low code no code environment so they could let you know Splunk customers can use Splunk sword to actually triage events and prioritize that event so where they're being routed within it to optimize the Sox team time to Market or time to triage any given event obviously reducing MTR and then finally I think one of the neatest things that we'll be seeing us develop is um our ability to build glass cables so behind me you'll see one of our triage events and how we build uh a Lockheed Martin kill chain on that with a glass table which is very familiar to the community we're going to have the ability and not too distant future to allow people to search observe on those iocs and if people aren't familiar with it ioc it's an instant of a compromise so that's a vector that we want to drill into and of course who's better at Drilling in the data and smoke yeah this is a critter this is an awesome Synergy there I mean I can see a Splunk customer going man this just gives me so much more capability action actionability and also real understanding and I think this is what I want to dig into if you don't mind understanding that critical impact okay is kind of where I see this coming got the data data ingest now data's data but the question is what not to log you know where are things misconfigured these are critical questions so can you talk about what it means to understand critical impact yeah so I think you know going back to the things that I just spoke about a lot of those cves where you'll see um uh low low low and then you daisy chain together and they're suddenly like oh this is high now but then your other impact of like if you're if you're a Splunk customer you know and I had it I had several of them I had one customer that you know terabytes of McAfee data being brought in and it was like all right there's a lot of other data that you probably also want to bring but they could only afford wanted to do certain data sets because that's and they didn't know how to prioritize or filter those data sets and so we provide that opportunity to say hey these are the critical ones to bring in but there's also the ones that you don't necessarily need to bring in because low cve in this case really does mean low cve like an ILO server would be one that um that's the print server uh where the uh your admin credentials are on on like a printer and so there will be credentials on that that's something that a hacker might go in to look at so although the cve on it is low is if you daisy chain with somebody that's able to get into that you might say Ah that's high and we would then potentially rank it giving our AI logic to say that's a moderate so put it on the scale and we prioritize those versus uh of all of these scanners just going to give you a bunch of CDs and good luck and translating that if I if I can and tell me if I'm wrong that kind of speaks to that whole lateral movement that's it challenge right print serve a great example looks stupid low end who's going to want to deal with the print server oh but it's connected into a critical system there's a path is that kind of what you're getting at yeah I use Daisy Chain I think that's from the community they came from uh but it's just a lateral movement it's exactly what they're doing in those low level low critical lateral movements is where the hackers are getting in right so that's the beauty thing about the uh the Uber example is that who would have thought you know I've got my monthly Factor authentication going in a human made a mistake we can't we can't not expect humans to make mistakes we're fallible right the reality is is once they were in the environment they could have protected themselves by running enough pen tests to know that they had certain uh exposed credentials that would have stopped the breach and they did not had not done that in their environment and I'm not poking yeah but it's an interesting Trend though I mean it's obvious if sometimes those low end items are also not protected well so it's easy to get at from a hacker standpoint but also the people in charge of them can be fished easily or spearfished because they're not paying attention because they don't have to no one ever told them hey be careful yeah for the community that I came from John that's exactly how they they would uh meet you at a uh an International Event um introduce themselves as a graduate student these are National actor States uh would you mind reviewing my thesis on such and such and I was at Adobe at the time that I was working on this instead of having to get the PDF they opened the PDF and whoever that customer was launches and I don't know if you remember back in like 2008 time frame there was a lot of issues around IP being by a nation state being stolen from the United States and that's exactly how they did it and John that's or LinkedIn hey I want to get a joke we want to hire you double the salary oh I'm gonna click on that for sure you know yeah right exactly yeah the one thing I would say to you is like uh when we look at like sort of you know because I think we did 10 000 pen tests last year is it's probably over that now you know we have these sort of top 10 ways that we think and find people coming into the environment the funniest thing is that only one of them is a cve related vulnerability like uh you know you guys know what they are right so it's it but it's it's like two percent of the attacks are occurring through the cves but yeah there's all that attention spent to that and very little attention spent to this pen testing side which is sort of this continuous threat you know monitoring space and and this vulnerability space where I think we play a such an important role and I'm so excited to be a part of the tip of the spear on this one yeah I'm old enough to know the movie sneakers which I loved as a you know watching that movie you know professional hackers are testing testing always testing the environment I love this I got to ask you as we kind of wrap up here Chris if you don't mind the the benefits to Professional Services from this Alliance big news Splunk and you guys work well together we see that clearly what are what other benefits do Professional Services teams see from the Splunk and Horizon 3.ai Alliance so if you're I think for from our our from both of our uh Partners uh as we bring these guys together and many of them already are the same partner right uh is that uh first off the licensing model is probably one of the key areas that we really excel at so if you're an end user you can buy uh for the Enterprise by the number of IP addresses you're using um but uh if you're a partner working with this there's solution ways that you can go in and we'll license as to msps and what that business model on msps looks like but the unique thing that we do here is this C plus license and so the Consulting plus license allows like a uh somebody a small to mid-sized to some very large uh you know Fortune 100 uh consulting firms use this uh by buying into a license called um Consulting plus where they can have unlimited uh access to as many IPS as they want but you can only run one test at a time and as you can imagine when we're going and hacking passwords and um checking hashes and decrypting hashes that can take a while so but for the right customer it's it's a perfect tool and so I I'm so excited about our ability to go to market with uh our partners so that we understand ourselves understand how not to just sell to or not tell just to sell through but we know how to sell with them as a good vendor partner I think that that's one thing that we've done a really good job building bring it into the market yeah I think also the Splunk has had great success how they've enabled uh partners and Professional Services absolutely you know the services that layer on top of Splunk are multi-fold tons of great benefits so you guys Vector right into that ride that way with friction and and the cool thing is that in you know in one of our reports which could be totally customized uh with someone else's logo we're going to generate you know so I I used to work in another organization it wasn't Splunk but we we did uh you know pen testing as for for customers and my pen testers would come on site they'd do the engagement and they would leave and then another release someone would be oh shoot we got another sector that was breached and they'd call you back you know four weeks later and so by August our entire pen testings teams would be sold out and it would be like well even in March maybe and they're like no no I gotta breach now and and and then when they do go in they go through do the pen test and they hand over a PDF and they pack on the back and say there's where your problems are you need to fix it and the reality is that what we're going to generate completely autonomously with no human interaction is we're going to go and find all the permutations of anything we found and the fix for those permutations and then once you've fixed everything you just go back and run another pen test it's you know for what people pay for one pen test they can have a tool that does that every every Pat patch on Tuesday and that's on Wednesday you know triage throughout the week green yellow red I wanted to see the colors show me green green is good right not red and one CIO doesn't want who doesn't want that dashboard right it's it's exactly it and we can help bring I think that you know I'm really excited about helping drive this with the Splunk team because they get that they understand that it's the green yellow red dashboard and and how do we help them find more green uh so that the other guys are in red yeah and get in the data and do the right thing and be efficient with how you use the data know what to look at so many things to pay attention to you know the combination of both and then go to market strategy real brilliant congratulations Chris thanks for coming on and sharing um this news with the detail around the Splunk in action around the alliance thanks for sharing John my pleasure thanks look forward to seeing you soon all right great we'll follow up and do another segment on devops and I.T and security teams as the new new Ops but and super cloud a bunch of other stuff so thanks for coming on and our next segment the CEO of horizon 3.aa will break down all the new news for us here on thecube you're watching thecube the leader in high tech Enterprise coverage [Music] yeah the partner program for us has been fantastic you know I think prior to that you know as most organizations most uh uh most Farmers most mssps might not necessarily have a a bench at all for penetration testing uh maybe they subcontract this work out or maybe they do it themselves but trying to staff that kind of position can be incredibly difficult for us this was a differentiator a a new a new partner a new partnership that allowed us to uh not only perform services for our customers but be able to provide a product by which that they can do it themselves so we work with our customers in a variety of ways some of them want more routine testing and perform this themselves but we're also a certified service provider of horizon 3 being able to perform uh penetration tests uh help review the the data provide color provide analysis for our customers in a broader sense right not necessarily the the black and white elements of you know what was uh what's critical what's high what's medium what's low what you need to fix but are there systemic issues this has allowed us to onboard new customers this has allowed us to migrate some penetration testing services to us from from competitors in the marketplace But ultimately this is occurring because the the product and the outcome are special they're unique and they're effective our customers like what they're seeing they like the routineness of it many of them you know again like doing this themselves you know being able to kind of pen test themselves parts of their networks um and the the new use cases right I'm a large organization I have eight to ten Acquisitions per year wouldn't it be great to have a tool to be able to perform a penetration test both internal and external of that acquisition before we integrate the two companies and maybe bringing on some risk it's a very effective partnership uh one that really is uh kind of taken our our Engineers our account Executives by storm um you know this this is a a partnership that's been very valuable to us [Music] a key part of the value and business model at Horizon 3 is enabling Partners to leverage node zero to make more revenue for themselves our goal is that for sixty percent of our Revenue this year will be originated by partners and that 95 of our Revenue next year will be originated by partners and so a key to that strategy is making us an integral part of your business models as a partner a key quote from one of our partners is that we enable every one of their business units to generate Revenue so let's talk about that in a little bit more detail first is that if you have a pen test Consulting business take Deloitte as an example what was six weeks of human labor at Deloitte per pen test has been cut down to four days of Labor using node zero to conduct reconnaissance find all the juicy interesting areas of the of the Enterprise that are exploitable and being able to go assess the entire organization and then all of those details get served up to the human to be able to look at understand and determine where to probe deeper so what you see in that pen test Consulting business is that node zero becomes a force multiplier where those Consulting teams were able to cover way more accounts and way more IPS within those accounts with the same or fewer consultants and so that directly leads to profit margin expansion for the Penn testing business itself because node 0 is a force multiplier the second business model here is if you're an mssp as an mssp you're already making money providing defensive cyber security operations for a large volume of customers and so what they do is they'll license node zero and use us as an upsell to their mssb business to start to deliver either continuous red teaming continuous verification or purple teaming as a service and so in that particular business model they've got an additional line of Revenue where they can increase the spend of their existing customers by bolting on node 0 as a purple team as a service offering the third business model or customer type is if you're an I.T services provider so as an I.T services provider you make money installing and configuring security products like Splunk or crowdstrike or hemio you also make money reselling those products and you also make money generating follow-on services to continue to harden your customer environments and so for them what what those it service providers will do is use us to verify that they've installed Splunk correctly improved to their customer that Splunk was installed correctly or crowdstrike was installed correctly using our results and then use our results to drive follow-on services and revenue and then finally we've got the value-added reseller which is just a straight up reseller because of how fast our sales Cycles are these vars are able to typically go from cold email to deal close in six to eight weeks at Horizon 3 at least a single sales engineer is able to run 30 to 50 pocs concurrently because our pocs are very lightweight and don't require any on-prem customization or heavy pre-sales post sales activity so as a result we're able to have a few amount of sellers driving a lot of Revenue and volume for us well the same thing applies to bars there isn't a lot of effort to sell the product or prove its value so vars are able to sell a lot more Horizon 3 node zero product without having to build up a huge specialist sales organization so what I'm going to do is talk through uh scenario three here as an I.T service provider and just how powerful node zero can be in driving additional Revenue so in here think of for every one dollar of node zero license purchased by the IT service provider to do their business it'll generate ten dollars of additional revenue for that partner so in this example kidney group uses node 0 to verify that they have installed and deployed Splunk correctly so Kitty group is a Splunk partner they they sell it services to install configure deploy and maintain Splunk and as they deploy Splunk they're going to use node 0 to attack the environment and make sure that the right logs and alerts and monitoring are being handled within the Splunk deployment so it's a way of doing QA or verifying that Splunk has been configured correctly and that's going to be internally used by kidney group to prove the quality of their services that they've just delivered then what they're going to do is they're going to show and leave behind that node zero Report with their client and that creates a resell opportunity for for kidney group to resell node 0 to their client because their client is seeing the reports and the results and saying wow this is pretty amazing and those reports can be co-branded where it's a pen testing report branded with kidney group but it says powered by Horizon three under it from there kidney group is able to take the fixed actions report that's automatically generated with every pen test through node zero and they're able to use that as the starting point for a statement of work to sell follow-on services to fix all of the problems that node zero identified fixing l11r misconfigurations fixing or patching VMware or updating credentials policies and so on so what happens is node 0 has found a bunch of problems the client often lacks the capacity to fix and so kidney group can use that lack of capacity by the client as a follow-on sales opportunity for follow-on services and finally based on the findings from node zero kidney group can look at that report and say to the customer you know customer if you bought crowdstrike you'd be able to uh prevent node Zero from attacking and succeeding in the way that it did for if you bought humano or if you bought Palo Alto networks or if you bought uh some privileged access management solution because of what node 0 was able to do with credential harvesting and attacks and so as a result kidney group is able to resell other security products within their portfolio crowdstrike Falcon humano Polito networks demisto Phantom and so on based on the gaps that were identified by node zero and that pen test and what that creates is another feedback loop where kidney group will then go use node 0 to verify that crowdstrike product has actually been installed and configured correctly and then this becomes the cycle of using node 0 to verify a deployment using that verification to drive a bunch of follow-on services and resell opportunities which then further drives more usage of the product now the way that we licensed is that it's a usage-based license licensing model so that the partner will grow their node zero Consulting plus license as they grow their business so for example if you're a kidney group then week one you've got you're going to use node zero to verify your Splunk install in week two if you have a pen testing business you're going to go off and use node zero to be a force multiplier for your pen testing uh client opportunity and then if you have an mssp business then in week three you're going to use node zero to go execute a purple team mssp offering for your clients so not necessarily a kidney group but if you're a Deloitte or ATT these larger companies and you've got multiple lines of business if you're Optive for instance you all you have to do is buy one Consulting plus license and you're going to be able to run as many pen tests as you want sequentially so now you can buy a single license and use that one license to meet your week one client commitments and then meet your week two and then meet your week three and as you grow your business you start to run multiple pen tests concurrently so in week one you've got to do a Splunk verify uh verify Splunk install and you've got to run a pen test and you've got to do a purple team opportunity you just simply expand the number of Consulting plus licenses from one license to three licenses and so now as you systematically grow your business you're able to grow your node zero capacity with you giving you predictable cogs predictable margins and once again 10x additional Revenue opportunity for that investment in the node zero Consulting plus license my name is Saint I'm the co-founder and CEO here at Horizon 3. I'm going to talk to you today about why it's important to look at your Enterprise Through The Eyes of an attacker the challenge I had when I was a CIO in banking the CTO at Splunk and serving within the Department of Defense is that I had no idea I was Secure until the bad guys had showed up am I logging the right data am I fixing the right vulnerabilities are my security tools that I've paid millions of dollars for actually working together to defend me and the answer is I don't know does my team actually know how to respond to a breach in the middle of an incident I don't know I've got to wait for the bad guys to show up and so the challenge I had was how do we proactively verify our security posture I tried a variety of techniques the first was the use of vulnerability scanners and the challenge with vulnerability scanners is being vulnerable doesn't mean you're exploitable I might have a hundred thousand findings from my scanner of which maybe five or ten can actually be exploited in my environment the other big problem with scanners is that they can't chain weaknesses together from machine to machine so if you've got a thousand machines in your environment or more what a vulnerability scanner will do is tell you you have a problem on machine one and separately a problem on machine two but what they can tell you is that an attacker could use a load from machine one plus a low from machine two to equal to critical in your environment and what attackers do in their tactics is they chain together misconfigurations dangerous product defaults harvested credentials and exploitable vulnerabilities into attack paths across different machines so to address the attack pads across different machines I tried layering in consulting-based pen testing and the issue is when you've got thousands of hosts or hundreds of thousands of hosts in your environment human-based pen testing simply doesn't scale to test an infrastructure of that size moreover when they actually do execute a pen test and you get the report oftentimes you lack the expertise within your team to quickly retest to verify that you've actually fixed the problem and so what happens is you end up with these pen test reports that are incomplete snapshots and quickly going stale and then to mitigate that problem I tried using breach and attack simulation tools and the struggle with these tools is one I had to install credentialed agents everywhere two I had to write my own custom attack scripts that I didn't have much talent for but also I had to maintain as my environment changed and then three these types of tools were not safe to run against production systems which was the the majority of my attack surface so that's why we went off to start Horizon 3. so Tony and I met when we were in Special Operations together and the challenge we wanted to solve was how do we do infrastructure security testing at scale by giving the the power of a 20-year pen testing veteran into the hands of an I.T admin a network engineer in just three clicks and the whole idea is we enable these fixers The Blue Team to be able to run node Zero Hour pen testing product to quickly find problems in their environment that blue team will then then go off and fix the issues that were found and then they can quickly rerun the attack to verify that they fixed the problem and the whole idea is delivering this without requiring custom scripts be developed without requiring credential agents be installed and without requiring the use of external third-party consulting services or Professional Services self-service pen testing to quickly Drive find fix verify there are three primary use cases that our customers use us for the first is the sock manager that uses us to verify that their security tools are actually effective to verify that they're logging the right data in Splunk or in their Sim to verify that their managed security services provider is able to quickly detect and respond to an attack and hold them accountable for their slas or that the sock understands how to quickly detect and respond and measuring and verifying that or that the variety of tools that you have in your stack most organizations have 130 plus cyber security tools none of which are designed to work together are actually working together the second primary use case is proactively hardening and verifying your systems this is when the I that it admin that network engineer they're able to run self-service pen tests to verify that their Cisco environment is installed in hardened and configured correctly or that their credential policies are set up right or that their vcenter or web sphere or kubernetes environments are actually designed to be secure and what this allows the it admins and network Engineers to do is shift from running one or two pen tests a year to 30 40 or more pen tests a month and you can actually wire those pen tests into your devops process or into your detection engineering and the change management processes to automatically trigger pen tests every time there's a change in your environment the third primary use case is for those organizations lucky enough to have their own internal red team they'll use node zero to do reconnaissance and exploitation at scale and then use the output as a starting point for the humans to step in and focus on the really hard juicy stuff that gets them on stage at Defcon and so these are the three primary use cases and what we'll do is zoom into the find fix verify Loop because what I've found in my experience is find fix verify is the future operating model for cyber security organizations and what I mean here is in the find using continuous pen testing what you want to enable is on-demand self-service pen tests you want those pen tests to find attack pads at scale spanning your on-prem infrastructure your Cloud infrastructure and your perimeter because attackers don't only state in one place they will find ways to chain together a perimeter breach a credential from your on-prem to gain access to your cloud or some other permutation and then the third part in continuous pen testing is attackers don't focus on critical vulnerabilities anymore they know we've built vulnerability Management Programs to reduce those vulnerabilities so attackers have adapted and what they do is chain together misconfigurations in your infrastructure and software and applications with dangerous product defaults with exploitable vulnerabilities and through the collection of credentials through a mix of techniques at scale once you've found those problems the next question is what do you do about it well you want to be able to prioritize fixing problems that are actually exploitable in your environment that truly matter meaning they're going to lead to domain compromise or domain user compromise or access your sensitive data the second thing you want to fix is making sure you understand what risk your crown jewels data is exposed to where is your crown jewels data is in the cloud is it on-prem has it been copied to a share drive that you weren't aware of if a domain user was compromised could they access that crown jewels data you want to be able to use the attacker's perspective to secure the critical data you have in your infrastructure and then finally as you fix these problems you want to quickly remediate and retest that you've actually fixed the issue and this fine fix verify cycle becomes that accelerator that drives purple team culture the third part here is verify and what you want to be able to do in the verify step is verify that your security tools and processes in people can effectively detect and respond to a breach you want to be able to integrate that into your detection engineering processes so that you know you're catching the right security rules or that you've deployed the right configurations you also want to make sure that your environment is adhering to the best practices around systems hardening in cyber resilience and finally you want to be able to prove your security posture over a time to your board to your leadership into your regulators so what I'll do now is zoom into each of these three steps so when we zoom in to find here's the first example using node 0 and autonomous pen testing and what an attacker will do is find a way to break through the perimeter in this example it's very easy to misconfigure kubernetes to allow an attacker to gain remote code execution into your on-prem kubernetes environment and break through the perimeter and from there what the attacker is going to do is conduct Network reconnaissance and then find ways to gain code execution on other machines in the environment and as they get code execution they start to dump credentials collect a bunch of ntlm hashes crack those hashes using open source and dark web available data as part of those attacks and then reuse those credentials to log in and laterally maneuver throughout the environment and then as they loudly maneuver they can reuse those credentials and use credential spraying techniques and so on to compromise your business email to log in as admin into your cloud and this is a very common attack and rarely is a CV actually needed to execute this attack often it's just a misconfiguration in kubernetes with a bad credential policy or password policy combined with bad practices of credential reuse across the organization here's another example of an internal pen test and this is from an actual customer they had 5 000 hosts within their environment they had EDR and uba tools installed and they initiated in an internal pen test on a single machine from that single initial access point node zero enumerated the network conducted reconnaissance and found five thousand hosts were accessible what node 0 will do under the covers is organize all of that reconnaissance data into a knowledge graph that we call the Cyber terrain map and that cyber Terrain map becomes the key data structure that we use to efficiently maneuver and attack and compromise your environment so what node zero will do is they'll try to find ways to get code execution reuse credentials and so on in this customer example they had Fortinet installed as their EDR but node 0 was still able to get code execution on a Windows machine from there it was able to successfully dump credentials including sensitive credentials from the lsas process on the Windows box and then reuse those credentials to log in as domain admin in the network and once an attacker becomes domain admin they have the keys to the kingdom they can do anything they want so what happened here well it turns out Fortinet was misconfigured on three out of 5000 machines bad automation the customer had no idea this had happened they would have had to wait for an attacker to show up to realize that it was misconfigured the second thing is well why didn't Fortinet stop the credential pivot in the lateral movement and it turned out the customer didn't buy the right modules or turn on the right services within that particular product and we see this not only with Ford in it but we see this with Trend Micro and all the other defensive tools where it's very easy to miss a checkbox in the configuration that will do things like prevent credential dumping the next story I'll tell you is attackers don't have to hack in they log in so another infrastructure pen test a typical technique attackers will take is man in the middle uh attacks that will collect hashes so in this case what an attacker will do is leverage a tool or technique called responder to collect ntlm hashes that are being passed around the network and there's a variety of reasons why these hashes are passed around and it's a pretty common misconfiguration but as an attacker collects those hashes then they start to apply techniques to crack those hashes so they'll pass the hash and from there they will use open source intelligence common password structures and patterns and other types of techniques to try to crack those hashes into clear text passwords so here node 0 automatically collected hashes it automatically passed the hashes to crack those credentials and then from there it starts to take the domain user user ID passwords that it's collected and tries to access different services and systems in your Enterprise in this case node 0 is able to successfully gain access to the Office 365 email environment because three employees didn't have MFA configured so now what happens is node 0 has a placement and access in the business email system which sets up the conditions for fraud lateral phishing and other techniques but what's especially insightful here is that 80 of the hashes that were collected in this pen test were cracked in 15 minutes or less 80 percent 26 of the user accounts had a password that followed a pretty obvious pattern first initial last initial and four random digits the other thing that was interesting is 10 percent of service accounts had their user ID the same as their password so VMware admin VMware admin web sphere admin web Square admin so on and so forth and so attackers don't have to hack in they just log in with credentials that they've collected the next story here is becoming WS AWS admin so in this example once again internal pen test node zero gets initial access it discovers 2 000 hosts are network reachable from that environment if fingerprints and organizes all of that data into a cyber Terrain map from there it it fingerprints that hpilo the integrated lights out service was running on a subset of hosts hpilo is a service that is often not instrumented or observed by security teams nor is it easy to patch as a result attackers know this and immediately go after those types of services so in this case that ILO service was exploitable and were able to get code execution on it ILO stores all the user IDs and passwords in clear text in a particular set of processes so once we gain code execution we were able to dump all of the credentials and then from there laterally maneuver to log in to the windows box next door as admin and then on that admin box we're able to gain access to the share drives and we found a credentials file saved on a share Drive from there it turned out that credentials file was the AWS admin credentials file giving us full admin authority to their AWS accounts not a single security alert was triggered in this attack because the customer wasn't observing the ILO service and every step thereafter was a valid login in the environment and so what do you do step one patch the server step two delete the credentials file from the share drive and then step three is get better instrumentation on privileged access users and login the final story I'll tell is a typical pattern that we see across the board with that combines the various techniques I've described together where an attacker is going to go off and use open source intelligence to find all of the employees that work at your company from there they're going to look up those employees on dark web breach databases and other forms of information and then use that as a starting point to password spray to compromise a domain user all it takes is one employee to reuse a breached password for their Corporate email or all it takes is a single employee to have a weak password that's easily guessable all it takes is one and once the attacker is able to gain domain user access in most shops domain user is also the local admin on their laptop and once your local admin you can dump Sam and get local admin until M hashes you can use that to reuse credentials again local admin on neighboring machines and attackers will start to rinse and repeat then eventually they're able to get to a point where they can dump lsas or by unhooking the anti-virus defeating the EDR or finding a misconfigured EDR as we've talked about earlier to compromise the domain and what's consistent is that the fundamentals are broken at these shops they have poor password policies they don't have least access privilege implemented active directory groups are too permissive where domain admin or domain user is also the local admin uh AV or EDR Solutions are misconfigured or easily unhooked and so on and what we found in 10 000 pen tests is that user Behavior analytics tools never caught us in that lateral movement in part because those tools require pristine logging data in order to work and also it becomes very difficult to find that Baseline of normal usage versus abnormal usage of credential login another interesting Insight is there were several Marquee brand name mssps that were defending our customers environment and for them it took seven hours to detect and respond to the pen test seven hours the pen test was over in less than two hours and so what you had was an egregious violation of the service level agreements that that mssp had in place and the customer was able to use us to get service credit and drive accountability of their sock and of their provider the third interesting thing is in one case it took us seven minutes to become domain admin in a bank that bank had every Gucci security tool you could buy yet in 7 minutes and 19 seconds node zero started as an unauthenticated member of the network and was able to escalate privileges through chaining and misconfigurations in lateral movement and so on to become domain admin if it's seven minutes today we should assume it'll be less than a minute a year or two from now making it very difficult for humans to be able to detect and respond to that type of Blitzkrieg attack so that's in the find it's not just about finding problems though the bulk of the effort should be what to do about it the fix and the verify so as you find those problems back to kubernetes as an example we will show you the path here is the kill chain we took to compromise that environment we'll show you the impact here is the impact or here's the the proof of exploitation that we were able to use to be able to compromise it and there's the actual command that we executed so you could copy and paste that command and compromise that cubelet yourself if you want and then the impact is we got code execution and we'll actually show you here is the impact this is a critical here's why it enabled perimeter breach affected applications will tell you the specific IPS where you've got the problem how it maps to the miter attack framework and then we'll tell you exactly how to fix it we'll also show you what this problem enabled so you can accurately prioritize why this is important or why it's not important the next part is accurate prioritization the hardest part of my job as a CIO was deciding what not to fix so if you take SMB signing not required as an example by default that CVSs score is a one out of 10. but this misconfiguration is not a cve it's a misconfig enable an attacker to gain access to 19 credentials including one domain admin two local admins and access to a ton of data because of that context this is really a 10 out of 10. you better fix this as soon as possible however of the seven occurrences that we found it's only a critical in three out of the seven and these are the three specific machines and we'll tell you the exact way to fix it and you better fix these as soon as possible for these four machines over here these didn't allow us to do anything of consequence so that because the hardest part is deciding what not to fix you can justifiably choose not to fix these four issues right now and just add them to your backlog and surge your team to fix these three as quickly as possible and then once you fix these three you don't have to re-run the entire pen test you can select these three and then one click verify and run a very narrowly scoped pen test that is only testing this specific issue and what that creates is a much faster cycle of finding and fixing problems the other part of fixing is verifying that you don't have sensitive data at risk so once we become a domain user we're able to use those domain user credentials and try to gain access to databases file shares S3 buckets git repos and so on and help you understand what sensitive data you have at risk so in this example a green checkbox means we logged in as a valid domain user we're able to get read write access on the database this is how many records we could have accessed and we don't actually look at the values in the database but we'll show you the schema so you can quickly characterize that pii data was at risk here and we'll do that for your file shares and other sources of data so now you can accurately articulate the data you have at risk and prioritize cleaning that data up especially data that will lead to a fine or a big news issue so that's the find that's the fix now we're going to talk about the verify the key part in verify is embracing and integrating with detection engineering practices so when you think about your layers of security tools you've got lots of tools in place on average 130 tools at any given customer but these tools were not designed to work together so when you run a pen test what you want to do is say did you detect us did you log us did you alert on us did you stop us and from there what you want to see is okay what are the techniques that are commonly used to defeat an environment to actually compromise if you look at the top 10 techniques we use and there's far more than just these 10 but these are the most often executed nine out of ten have nothing to do with cves it has to do with misconfigurations dangerous product defaults bad credential policies and it's how we chain those together to become a domain admin or compromise a host so what what customers will do is every single attacker command we executed is provided to you as an attackivity log so you can actually see every single attacker command we ran the time stamp it was executed the hosts it executed on and how it Maps the minor attack tactics so our customers will have are these attacker logs on one screen and then they'll go look into Splunk or exabeam or Sentinel one or crowdstrike and say did you detect us did you log us did you alert on us or not and to make that even easier if you take this example hey Splunk what logs did you see at this time on the VMware host because that's when node 0 is able to dump credentials and that allows you to identify and fix your logging blind spots to make that easier we've got app integration so this is an actual Splunk app in the Splunk App Store and what you can come is inside the Splunk console itself you can fire up the Horizon 3 node 0 app all of the pen test results are here so that you can see all of the results in one place and you don't have to jump out of the tool and what you'll show you as I skip forward is hey there's a pen test here are the critical issues that we've identified for that weaker default issue here are the exact commands we executed and then we will automatically query into Splunk all all terms on between these times on that endpoint that relate to this attack so you can now quickly within the Splunk environment itself figure out that you're missing logs or that you're appropriately catching this issue and that becomes incredibly important in that detection engineering cycle that I mentioned earlier so how do our customers end up using us they shift from running one pen test a year to 30 40 pen tests a month oftentimes wiring us into their deployment automation to automatically run pen tests the other part that they'll do is as they run more pen tests they find more issues but eventually they hit this inflection point where they're able to rapidly clean up their environment and that inflection point is because the red and the blue teams start working together in a purple team culture and now they're working together to proactively harden their environment the other thing our customers will do is run us from different perspectives they'll first start running an RFC 1918 scope to see once the attacker gained initial access in a part of the network that had wide access what could they do and then from there they'll run us within a specific Network segment okay from within that segment could the attacker break out and gain access to another segment then they'll run us from their work from home environment could they Traverse the VPN and do something damaging and once they're in could they Traverse the VPN and get into my cloud then they'll break in from the outside all of these perspectives are available to you in Horizon 3 and node zero as a single SKU and you can run as many pen tests as you want if you run a phishing campaign and find that an intern in the finance department had the worst phishing behavior you can then inject their credentials and actually show the end-to-end story of how an attacker fished gained credentials of an intern and use that to gain access to sensitive financial data so what our customers end up doing is running multiple attacks from multiple perspectives and looking at those results over time I'll leave you two things one is what is the AI in Horizon 3 AI those knowledge graphs are the heart and soul of everything that we do and we use machine learning reinforcement techniques reinforcement learning techniques Markov decision models and so on to be able to efficiently maneuver and analyze the paths in those really large graphs we also use context-based scoring to prioritize weaknesses and we're also able to drive collective intelligence across all of the operations so the more pen tests we run the smarter we get and all of that is based on our knowledge graph analytics infrastructure that we have finally I'll leave you with this was my decision criteria when I was a buyer for my security testing strategy what I cared about was coverage I wanted to be able to assess my on-prem cloud perimeter and work from home and be safe to run in production I want to be able to do that as often as I wanted I want to be able to run pen tests in hours or days not weeks or months so I could accelerate that fine fix verify loop I wanted my it admins and network Engineers with limited offensive experience to be able to run a pen test in a few clicks through a self-service experience and not have to install agent and not have to write custom scripts and finally I didn't want to get nickeled and dimed on having to buy different types of attack modules or different types of attacks I wanted a single annual subscription that allowed me to run any type of attack as often as I wanted so I could look at my Trends in directions over time so I hope you found this talk valuable uh we're easy to find and I look forward to seeing seeing you use a product and letting our results do the talking when you look at uh you know kind of the way no our pen testing algorithms work is we dynamically select uh how to compromise an environment based on what we've discovered and the goal is to become a domain admin compromise a host compromise domain users find ways to encrypt data steal sensitive data and so on but when you look at the the top 10 techniques that we ended up uh using to compromise environments the first nine have nothing to do with cves and that's the reality cves are yes a vector but less than two percent of cves are actually used in a compromise oftentimes it's some sort of credential collection credential cracking uh credential pivoting and using that to become an admin and then uh compromising environments from that point on so I'll leave this up for you to kind of read through and you'll have the slides available for you but I found it very insightful that organizations and ourselves when I was a GE included invested heavily in just standard vulnerability Management Programs when I was at DOD that's all disa cared about asking us about was our our kind of our cve posture but the attackers have adapted to not rely on cves to get in because they know that organizations are actively looking at and patching those cves and instead they're chaining together credentials from one place with misconfigurations and dangerous product defaults in another to take over an environment a concrete example is by default vcenter backups are not encrypted and so as if an attacker finds vcenter what they'll do is find the backup location and there are specific V sender MTD files where the admin credentials are parsippled in the binaries so you can actually as an attacker find the right MTD file parse out the binary and now you've got the admin credentials for the vcenter environment and now start to log in as admin there's a bad habit by signal officers and Signal practitioners in the in the Army and elsewhere where the the VM notes section of a virtual image has the password for the VM well those VM notes are not stored encrypted and attackers know this and they're able to go off and find the VMS that are unencrypted find the note section and pull out the passwords for those images and then reuse those credentials across the board so I'll pause here and uh you know Patrick love you get some some commentary on on these techniques and other things that you've seen and what we'll do in the last say 10 to 15 minutes is uh is rolled through a little bit more on what do you do about it yeah yeah no I love it I think um I think this is pretty exhaustive what I like about what you've done here is uh you know we've seen we've seen double-digit increases in the number of organizations that are reporting actual breaches year over year for the last um for the last three years and it's often we kind of in the Zeitgeist we pegged that on ransomware which of course is like incredibly important and very top of mind um but what I like about what you have here is you know we're reminding the audience that the the attack surface area the vectors the matter um you know has to be more comprehensive than just thinking about ransomware scenarios yeah right on um so let's build on this when you think about your defense in depth you've got multiple security controls that you've purchased and integrated and you've got that redundancy if a control fails but the reality is that these security tools aren't designed to work together so when you run a pen test what you want to ask yourself is did you detect node zero did you log node zero did you alert on node zero and did you stop node zero and when you think about how to do that every single attacker command executed by node zero is available in an attacker log so you can now see you know at the bottom here vcenter um exploit at that time on that IP how it aligns to minor attack what you want to be able to do is go figure out did your security tools catch this or not and that becomes very important in using the attacker's perspective to improve your defensive security controls and so the way we've tried to make this easier back to like my my my the you know I bleed Green in many ways still from my smoke background is you want to be able to and what our customers do is hey we'll look at the attacker logs on one screen and they'll look at what did Splunk see or Miss in another screen and then they'll use that to figure out what their logging blind spots are and what that where that becomes really interesting is we've actually built out an integration into Splunk where there's a Splunk app you can download off of Splunk base and you'll get all of the pen test results right there in the Splunk console and from that Splunk console you're gonna be able to see these are all the pen tests that were run these are the issues that were found um so you can look at that particular pen test here are all of the weaknesses that were identified for that particular pen test and how they categorize out for each of those weaknesses you can click on any one of them that are critical in this case and then we'll tell you for that weakness and this is where where the the punch line comes in so I'll pause the video here for that weakness these are the commands that were executed on these endpoints at this time and then we'll actually query Splunk for that um for that IP address or containing that IP and these are the source types that surface any sort of activity so what we try to do is help you as quickly and efficiently as possible identify the logging blind spots in your Splunk environment based on the attacker's perspective so as this video kind of plays through you can see it Patrick I'd love to get your thoughts um just seeing so many Splunk deployments and the effectiveness of those deployments and and how this is going to help really Elevate the effectiveness of all of your Splunk customers yeah I'm super excited about this I mean I think this these kinds of purpose-built integration snail really move the needle for our customers I mean at the end of the day when I think about the power of Splunk I think about a product I was first introduced to 12 years ago that was an on-prem piece of software you know and at the time it sold on sort of Perpetual and term licenses but one made it special was that it could it could it could eat data at a speed that nothing else that I'd have ever seen you can ingest massively scalable amounts of data uh did cool things like schema on read which facilitated that there was this language called SPL that you could nerd out about uh and you went to a conference once a year and you talked about all the cool things you were splunking right but now as we think about the next phase of our growth um we live in a heterogeneous environment where our customers have so many different tools and data sources that are ever expanding and as you look at the as you look at the role of the ciso it's mind-blowing to me the amount of sources Services apps that are coming into the ciso span of let's just call it a span of influence in the last three years uh you know we're seeing things like infrastructure service level visibility application performance monitoring stuff that just never made sense for the security team to have visibility into you um at least not at the size and scale which we're demanding today um and and that's different and this isn't this is why it's so important that we have these joint purpose-built Integrations that um really provide more prescription to our customers about how do they walk on that Journey towards maturity what does zero to one look like what does one to two look like whereas you know 10 years ago customers were happy with platforms today they want integration they want Solutions and they want to drive outcomes and I think this is a great example of how together we are stepping to the evolving nature of the market and also the ever-evolving nature of the threat landscape and what I would say is the maturing needs of the customer in that environment yeah for sure I think especially if if we all anticipate budget pressure over the next 18 months due to the economy and elsewhere while the security budgets are not going to ever I don't think they're going to get cut they're not going to grow as fast and there's a lot more pressure on organizations to extract more value from their existing Investments as well as extracting more value and more impact from their existing teams and so security Effectiveness Fierce prioritization and automation I think become the three key themes of security uh over the next 18 months so I'll do very quickly is run through a few other use cases um every host that we identified in the pen test were able to score and say this host allowed us to do something significant therefore it's it's really critical you should be increasing your logging here hey these hosts down here we couldn't really do anything as an attacker so if you do have to make trade-offs you can make some trade-offs of your logging resolution at the lower end in order to increase logging resolution on the upper end so you've got that level of of um justification for where to increase or or adjust your logging resolution another example is every host we've discovered as an attacker we Expose and you can export and we want to make sure is every host we found as an attacker is being ingested from a Splunk standpoint a big issue I had as a CIO and user of Splunk and other tools is I had no idea if there were Rogue Raspberry Pi's on the network or if a new box was installed and whether Splunk was installed on it or not so now you can quickly start to correlate what hosts did we see and how does that reconcile with what you're logging from uh finally or second to last use case here on the Splunk integration side is for every single problem we've found we give multiple options for how to fix it this becomes a great way to prioritize what fixed actions to automate in your soar platform and what we want to get to eventually is being able to automatically trigger soar actions to fix well-known problems like automatically invalidating passwords for for poor poor passwords in our credentials amongst a whole bunch of other things we could go off and do and then finally if there is a well-known kill chain or attack path one of the things I really wish I could have done when I was a Splunk customer was take this type of kill chain that actually shows a path to domain admin that I'm sincerely worried about and use it as a glass table over which I could start to layer possible indicators of compromise and now you've got a great starting point for glass tables and iocs for actual kill chains that we know are exploitable in your environment and that becomes some super cool Integrations that we've got on the roadmap between us and the Splunk security side of the house so what I'll leave with actually Patrick before I do that you know um love to get your comments and then I'll I'll kind of leave with one last slide on this wartime security mindset uh pending you know assuming there's no other questions no I love it I mean I think this kind of um it's kind of glass table's approach to how do you how do you sort of visualize these workflows and then use things like sore and orchestration and automation to operationalize them is exactly where we see all of our customers going and getting away from I think an over engineered approach to soar with where it has to be super technical heavy with you know python programmers and getting more to this visual view of workflow creation um that really demystifies the power of Automation and also democratizes it so you don't have to have these programming languages in your resume in order to start really moving the needle on workflow creation policy enforcement and ultimately driving automation coverage across more and more of the workflows that your team is seeing yeah I think that between us being able to visualize the actual kill chain or attack path with you know think of a of uh the soar Market I think going towards this no code low code um you know configurable sore versus coded sore that's going to really be a game changer in improve or giving security teams a force multiplier so what I'll leave you with is this peacetime mindset of security no longer is sustainable we really have to get out of checking the box and then waiting for the bad guys to show up to verify that security tools are are working or not and the reason why we've got to really do that quickly is there are over a thousand companies that withdrew from the Russian economy over the past uh nine months due to the Ukrainian War there you should expect every one of them to be punished by the Russians for leaving and punished from a cyber standpoint and this is no longer about financial extortion that is ransomware this is about punishing and destroying companies and you can punish any one of these companies by going after them directly or by going after their suppliers and their Distributors so suddenly your attack surface is no more no longer just your own Enterprise it's how you bring your goods to Market and it's how you get your goods created because while I may not be able to disrupt your ability to harvest fruit if I can get those trucks stuck at the border I can increase spoilage and have the same effect and what we should expect to see is this idea of cyber-enabled economic Warfare where if we issue a sanction like Banning the Russians from traveling there is a cyber-enabled counter punch which is corrupt and destroy the American Airlines database that is below the threshold of War that's not going to trigger the 82nd Airborne to be mobilized but it's going to achieve the right effect ban the sale of luxury goods disrupt the supply chain and create shortages banned Russian oil and gas attack refineries to call a 10x spike in gas prices three days before the election this is the future and therefore I think what we have to do is shift towards a wartime mindset which is don't trust your security posture verify it see yourself Through The Eyes of the attacker build that incident response muscle memory and drive better collaboration between the red and the blue teams your suppliers and Distributors and your information uh sharing organization they have in place and what's really valuable for me as a Splunk customer was when a router crashes at that moment you don't know if it's due to an I.T Administration problem or an attacker and what you want to have are different people asking different questions of the same data and you want to have that integrated triage process of an I.T lens to that problem a security lens to that problem and then from there figuring out is is this an IT workflow to execute or a security incident to execute and you want to have all of that as an integrated team integrated process integrated technology stack and this is something that I very care I cared very deeply about as both a Splunk customer and a Splunk CTO that I see time and time again across the board so Patrick I'll leave you with the last word the final three minutes here and I don't see any open questions so please take us home oh man see how you think we spent hours and hours prepping for this together that that last uh uh 40 seconds of your talk track is probably one of the things I'm most passionate about in this industry right now uh and I think nist has done some really interesting work here around building cyber resilient organizations that have that has really I think helped help the industry see that um incidents can come from adverse conditions you know stress is uh uh performance taxations in the infrastructure service or app layer and they can come from malicious compromises uh Insider threats external threat actors and the more that we look at this from the perspective of of a broader cyber resilience Mission uh in a wartime mindset uh I I think we're going to be much better off and and will you talk about with operationally minded ice hacks information sharing intelligence sharing becomes so important in these wartime uh um situations and you know we know not all ice acts are created equal but we're also seeing a lot of um more ad hoc information sharing groups popping up so look I think I think you framed it really really well I love the concept of wartime mindset and um I I like the idea of applying a cyber resilience lens like if you have one more layer on top of that bottom right cake you know I think the it lens and the security lens they roll up to this concept of cyber resilience and I think this has done some great work there for us yeah you're you're spot on and that that is app and that's gonna I think be the the next um terrain that that uh that you're gonna see vendors try to get after but that I think Splunk is best position to win okay that's a wrap for this special Cube presentation you heard all about the global expansion of horizon 3.ai's partner program for their Partners have a unique opportunity to take advantage of their node zero product uh International go to Market expansion North America channel Partnerships and just overall relationships with companies like Splunk to make things more comprehensive in this disruptive cyber security world we live in and hope you enjoyed this program all the videos are available on thecube.net as well as check out Horizon 3 dot AI for their pen test Automation and ultimately their defense system that they use for testing always the environment that you're in great Innovative product and I hope you enjoyed the program again I'm John Furrier host of the cube thanks for watching
SUMMARY :
that's the sort of stuff that we do you
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Patrick Coughlin | PERSON | 0.99+ |
Jennifer Lee | PERSON | 0.99+ |
Chris | PERSON | 0.99+ |
Tony | PERSON | 0.99+ |
2013 | DATE | 0.99+ |
Raina Richter | PERSON | 0.99+ |
Singapore | LOCATION | 0.99+ |
Europe | LOCATION | 0.99+ |
Patrick | PERSON | 0.99+ |
Frankfurt | LOCATION | 0.99+ |
John | PERSON | 0.99+ |
20-year | QUANTITY | 0.99+ |
hundreds | QUANTITY | 0.99+ |
AWS | ORGANIZATION | 0.99+ |
20 years | QUANTITY | 0.99+ |
seven minutes | QUANTITY | 0.99+ |
95 | QUANTITY | 0.99+ |
Ford | ORGANIZATION | 0.99+ |
2.7 billion | QUANTITY | 0.99+ |
March | DATE | 0.99+ |
Finland | LOCATION | 0.99+ |
seven hours | QUANTITY | 0.99+ |
sixty percent | QUANTITY | 0.99+ |
John Furrier | PERSON | 0.99+ |
Sweden | LOCATION | 0.99+ |
John Furrier | PERSON | 0.99+ |
six weeks | QUANTITY | 0.99+ |
seven hours | QUANTITY | 0.99+ |
19 credentials | QUANTITY | 0.99+ |
ten dollars | QUANTITY | 0.99+ |
Jennifer | PERSON | 0.99+ |
5 000 hosts | QUANTITY | 0.99+ |
Horizon 3 | TITLE | 0.99+ |
Wednesday | DATE | 0.99+ |
30 | QUANTITY | 0.99+ |
eight | QUANTITY | 0.99+ |
Asia Pacific | LOCATION | 0.99+ |
American Airlines | ORGANIZATION | 0.99+ |
Deloitte | ORGANIZATION | 0.99+ |
three licenses | QUANTITY | 0.99+ |
two companies | QUANTITY | 0.99+ |
2019 | DATE | 0.99+ |
European Union | ORGANIZATION | 0.99+ |
six | QUANTITY | 0.99+ |
seven occurrences | QUANTITY | 0.99+ |
70 | QUANTITY | 0.99+ |
three people | QUANTITY | 0.99+ |
Horizon 3.ai | TITLE | 0.99+ |
ATT | ORGANIZATION | 0.99+ |
Net Zero | ORGANIZATION | 0.99+ |
Splunk | ORGANIZATION | 0.99+ |
Uber | ORGANIZATION | 0.99+ |
five | QUANTITY | 0.99+ |
less than two percent | QUANTITY | 0.99+ |
less than two hours | QUANTITY | 0.99+ |
2012 | DATE | 0.99+ |
UK | LOCATION | 0.99+ |
Adobe | ORGANIZATION | 0.99+ |
four issues | QUANTITY | 0.99+ |
Department of Defense | ORGANIZATION | 0.99+ |
next year | DATE | 0.99+ |
three steps | QUANTITY | 0.99+ |
node 0 | TITLE | 0.99+ |
15 minutes | QUANTITY | 0.99+ |
hundred percent | QUANTITY | 0.99+ |
node zero | TITLE | 0.99+ |
10x | QUANTITY | 0.99+ |
last year | DATE | 0.99+ |
7 minutes | QUANTITY | 0.99+ |
one license | QUANTITY | 0.99+ |
second thing | QUANTITY | 0.99+ |
thousands of hosts | QUANTITY | 0.99+ |
five thousand hosts | QUANTITY | 0.99+ |
next week | DATE | 0.99+ |
Wasabi |Secure Storage Hot Takes
>> The rapid rise of ransomware attacks has added yet another challenge that business technology executives have to worry about these days, cloud storage, immutability, and air gaps have become a must have arrows in the quiver of organization's data protection strategies. But the important reality that practitioners have embraced is data protection, it can't be an afterthought or a bolt on it, has to be designed into the operational workflow of technology systems. The problem is, oftentimes, data protection is complicated with a variety of different products, services, software components, and storage formats, this is why object storage is moving to the forefront of data protection use cases because it's simpler and less expensive. The put data get data syntax has always been alluring, but object storage, historically, was seen as this low-cost niche solution that couldn't offer the performance required for demanding workloads, forcing customers to make hard tradeoffs between cost and performance. That has changed, the ascendancy of cloud storage generally in the S3 format specifically has catapulted object storage to become a first class citizen in a mainstream technology. Moreover, innovative companies have invested to bring object storage performance to parity with other storage formats, but cloud costs are often a barrier for many companies as the monthly cloud bill and egress fees in particular steadily climb. Welcome to Secure Storage Hot Takes, my name is Dave Vellante, and I'll be your host of the program today, where we introduce our community to Wasabi, a company that is purpose-built to solve this specific problem with what it claims to be the most cost effective and secure solution on the market. We have three segments today to dig into these issues, first up is David Friend, the well known entrepreneur who co-founded Carbonite and now Wasabi will then dig into the product with Drew Schlussel of Wasabi, and then we'll bring in the customer perspective with Kevin Warenda of the Hotchkiss School, let's get right into it. We're here with David Friend, the President and CEO and Co-founder of Wasabi, the hot storage company, David, welcome to theCUBE. >> Thanks Dave, nice to be here. >> Great to have you, so look, you hit a home run with Carbonite back when building a unicorn was a lot more rare than it has been in the last few years, why did you start Wasabi? >> Well, when I was still CEO of Wasabi, my genius co-founder Jeff Flowers and our chief architect came to me and said, you know, when we started this company, a state of the art disk drive was probably 500 gigabytes and now we're looking at eight terabyte, 16 terabyte, 20 terabyte, even 100 terabyte drives coming down the road and, you know, sooner or later the old architectures that were designed around these much smaller disk drives is going to run out of steam because, even though the capacities are getting bigger and bigger, the speed with which you can get data on and off of a hard drive isn't really changing all that much. And Jeff foresaw a day when the architectures sort of legacy storage like Amazon S3 and so forth was going to become very inefficient and slow. And so he came up with a new, highly parallelized architecture, and he said, I want to go off and see if I can make this work. So I said, you know, good luck go to it and they went off and spent about a year and a half in the lab, designing and testing this new storage architecture and when they got it working, I looked at the economics of this and I said, holy cow, we can sell cloud storage for a fraction of the price of Amazon, still make very good gross margins and it will be faster. So this is a whole new generation of object storage that you guys have invented. So I recruited a new CEO for Carbonite and left to found Wasabi because the market for cloud storage is almost infinite. You know, when you look at all the world's data, you know, IDC has these crazy numbers, 120 zetabytes or something like that and if you look at that as you know, the potential market size during that data, we're talking trillions of dollars, not billions and so I said, look, this is a great opportunity, if you look back 10 years, all the world's data was on-prem, if you look forward 10 years, most people agree that most of the world's data is going to live in the cloud, we're at the beginning of this migration, we've got an opportunity here to build an enormous company. >> That's very exciting. I mean, you've always been a trend spotter, and I want to get your perspectives on data protection and how it's changed. It's obviously on people's minds with all the ransomware attacks and security breaches, but thinking about your experiences and past observations, what's changed in data protection and what's driving the current very high interest in the topic? >> Well, I think, you know, from a data protection standpoint, immutability, the equivalent of the old worm tapes, but applied to cloud storage is, you know, become core to the backup strategies and disaster recovery strategies for most companies. And if you look at our partners who make backup software like Veeam, Convo, Veritas, Arcserve, and so forth, most of them are really taking advantage of mutable cloud storage as a way to protect customer data, customers backups from ransomware. So the ransomware guys are pretty clever and they, you know, they discovered early on that if someone could do a full restore from their backups, they're never going to pay a ransom. So, once they penetrate your system, they get pretty good at sort of watching how you do your backups and before they encrypt your primary data, they figure out some way to destroy or encrypt your backups as well, so that you can't do a full restore from your backups. And that's where immutability comes in. You know, in the old days you, you wrote what was called a worm tape, you know, write once read many, and those could not be overwritten or modified once they were written. And so we said, let's come up with an equivalent of that for the cloud, and it's very tricky software, you know, it involves all kinds of encryption algorithms and blockchain and this kind of stuff but, you know, the net result is if you store your backups in immutable buckets, in a product like Wasabi, you can't alter it or delete it for some period of time, so you could put a timer on it, say a year or six months or something like that, once that data is written, you know, there's no way you can go in and change it, modify it, or anything like that, including even Wasabi's engineers. >> So, David, I want to ask you about data sovereignty. It's obviously a big deal, I mean, especially for companies with the presence overseas, but what's really is any digital business these days, how should companies think about approaching data sovereignty? Is it just large firms that should be worried about this? Or should everybody be concerned? What's your point of view? >> Well, all around the world countries are imposing data sovereignty laws and if you're in the storage business, like we are, if you don't have physical data storage in-country, you're probably not going to get most of the business. You know, since Christmas we've built data centers in Toronto, London, Frankfurt, Paris, Sydney, Singapore, and I've probably forgotten one or two, but the reason we do that is twofold; one is, you know, if you're closer to the customer, you're going to get better response time, lower latency, and that's just a speed of light issue. But the bigger issue is, if you've got financial data, if you have healthcare data, if you have data relating to security, like surveillance videos, and things of that sort, most countries are saying that data has to be stored in-country, so, you can't send it across borders to some other place. And if your business operates in multiple countries, you know, dealing with data sovereignty is going to become an increasingly important problem. >> So in May of 2018, that's when the fines associated with violating GDPR went into effect and GDPR was like this main spring of privacy and data protection laws and we've seen it spawn other public policy things like the CCPA and think it continues to evolve, we see judgments in Europe against big tech and this tech lash that's in the news in the U.S. and the elimination of third party cookies, what does this all mean for data protection in the 2020s? >> Well, you know, every region and every country, you know, has their own idea about privacy, about security, about the use of even the use of metadata surrounding, you know, customer data and things of this sort. So, you know, it's getting to be increasingly complicated because GDPR, for example, imposes different standards from the kind of privacy standards that we have here in the U.S., Canada has a somewhat different set of data sovereignty issues and privacy issues so it's getting to be an increasingly complex, you know, mosaic of rules and regulations around the world and this makes it even more difficult for enterprises to run their own, you know, infrastructure because companies like Wasabi, where we have physical data centers in all kinds of different markets around the world and we've already dealt with the business of how to meet the requirements of GDPR and how to meet the requirements of some of the countries in Asia and so forth, you know, rather than an enterprise doing that just for themselves, if you running your applications or keeping your data in the cloud, you know, now a company like Wasabi with, you know, 34,000 customers, we can go to all the trouble of meeting these local requirements on behalf of our entire customer base and that's a lot more efficient and a lot more cost effective than if each individual country has to go deal with the local regulatory authorities. >> Yeah, it's compliance by design, not by chance. Okay, let's zoom out for the final question, David, thinking about the discussion that we've had around ransomware and data protection and regulations, what does it mean for a business's operational strategy and how do you think organizations will need to adapt in the coming years? >> Well, you know, I think there are a lot of forces driving companies to the cloud and, you know, and I do believe that if you come back five or 10 years from now, you're going to see majority of the world's data is going to be living in the cloud and I think storage, data storage is going to be a commodity much like electricity or bandwidth, and it's going to be done right, it will comply with the local regulations, it'll be fast, it'll be local, and there will be no strategic advantage that I can think of for somebody to stand up and run their own storage, especially considering the cost differential, you know, the most analysts think that the full, all in costs of running your own storage is in the 20 to 40 terabytes per month range, whereas, you know, if you migrate your data to the cloud, like Wasabi, you're talking probably $6 a month and so I think people are learning how to deal with the idea of an architecture that involves storing your data in the cloud, as opposed to, you know, storing your data locally. >> Wow, that's like a six X more expensive in the clouds, more than six X, all right, thank you, David,-- >> In addition to which, you know, just finding the people to babysit this kind of equipment has become nearly impossible today. >> Well, and with a focus on digital business, you don't want to be wasting your time with that kind of heavy lifting. David, thanks so much for coming in theCUBE, a great Boston entrepreneur, we've followed your career for a long time and looking forward to the future. >> Thank you. >> Okay, in a moment, Drew Schlussel will join me and we're going to dig more into product, you're watching theCUBE, the leader in enterprise and emerging tech coverage, keep it right there. ♪ Whoa ♪ ♪ Brenda in sales got an email ♪ ♪ Click here for a trip to Bombay ♪ ♪ It's not even called Bombay anymore ♪ ♪ But you clicked it anyway ♪ ♪ And now our data's been held hostage ♪ ♪ And now we're on sinking ship ♪ ♪ And a hacker's in our system ♪ ♪ Just 'cause Brenda wanted a trip ♪ ♪ She clicked on something stupid ♪ ♪ And our data's out of our control ♪ ♪ Into the hands of a hacker's ♪ ♪ And he's a giant asshole. ♪ ♪ He encrypted it in his basement ♪ ♪ He wants a million bucks for the key ♪ ♪ And I'm pretty sure he's 15 ♪ ♪ And still going through puberty ♪ ♪ I know you didn't mean to do us wrong ♪ ♪ But now I'm dealing with this all week long ♪ ♪ To make you all aware ♪ ♪ Of all this ransomware ♪ ♪ That is why I'm singing you this song ♪ ♪ C'mon ♪ ♪ Take it from me ♪ ♪ The director of IT ♪ ♪ Don't click on that email from a prince Nairobi ♪ ♪ 'Cuz he's not really a prince ♪ ♪ Now our data's locked up on our screen ♪ ♪ Controlled by a kid who's just fifteen ♪ ♪ And he's using our money to buy a Ferrari ♪ (gentle music) >> Joining me now is Drew Schlussel, who is the Senior Director of Product Marketing at Wasabi, hey Drew, good to see you again, thanks for coming back in theCUBE. >> Dave, great to be here, great to see you. >> All right, let's get into it. You know, Drew, prior to the pandemic, Zero Trust, just like kind of like digital transformation was sort of a buzzword and now it's become a real thing, almost a mandate, what's Wasabi's take on Zero Trust. >> So, absolutely right, it's been around a while and now people are paying attention, Wasabi's take is Zero Trust is a good thing. You know, there are too many places, right, where the bad guys are getting in. And, you know, I think of Zero Trust as kind of smashing laziness, right? It takes a little work, it takes some planning, but you know, done properly and using the right technologies, using the right vendors, the rewards are, of course tremendous, right? You can put to rest the fears of ransomware and having your systems compromised. >> Well, and we're going to talk about this, but there's a lot of process and thinking involved and, you know, design and your Zero Trust and you don't want to be wasting time messing with infrastructure, so we're going to talk about that, there's a lot of discussion in the industry, Drew, about immutability and air gaps, I'd like you to share Wasabi's point of view on these topics, how do you approach it and what makes Wasabi different? >> So, in terms of air gap and immutability, right, the beautiful thing about object storage, which is what we do all the time is that it makes it that much easier, right, to have a secure immutable copy of your data someplace that's easy to access and doesn't cost you an arm and a leg to get your data back. You know, we're working with some of the best, you know, partners in the industry, you know, we're working with folks like, you know, Veeam, Commvault, Arc, Marquee, MSP360, all folks who understand that you need to have multiple copies of your data, you need to have a copy stored offsite, and that copy needs to be immutable and we can talk a little bit about what immutability is and what it really means. >> You know, I wonder if you could talk a little bit more about Wasabi's solution because, sometimes people don't understand, you actually are a cloud, you're not building on other people's public clouds and this storage is the one use case where it actually makes sense to do that, tell us a little bit more about Wasabi's approach and your solution. >> Yeah, I appreciate that, so there's definitely some misconception, we are our own cloud storage service, we don't run on top of anybody else, right, it's our systems, it's our software deployed globally and we interoperate because we adhere to the S3 standard, we interoperate with practically hundreds of applications, primarily in this case, right, we're talking about backup and recovery applications and it's such a simple process, right? I mean, just about everybody who's anybody in this business protecting data has the ability now to access cloud storage and so we've made it really simple, in many cases, you'll see Wasabi as you know, listed in the primary set of available vendors and, you know, put in your private keys, make sure that your account is locked down properly using, let's say multifactor authentication, and you've got a great place to store copies of your data securely. >> I mean, we just heard from David Friend, if I did my math right, he was talking about, you know, 1/6 the cost per terabyte per month, maybe even a little better than that, how are you able to achieve such attractive economics? >> Yeah, so, you know, I can't remember how to translate my fractions into percentages, but I think we talk a lot about being 80%, right, less expensive than the hyperscalers. And you know, we talked about this at Vermont, right? There's some secret sauce there and you know, we take a different approach to how we utilize the raw capacity to the effective capacity and the fact is we're also not having to run, you know, a few hundred other services, right? We do storage, plain and simple, all day, all the time, so we don't have to worry about overhead to support, you know, up and coming other services that are perhaps, you know, going to be a loss leader, right? Customers love it, right, they see the fact that their data is growing 40, 80% year over year, they know they need to have some place to keep it secure, and, you know, folks are flocking to us in droves, in fact, we're seeing a tremendous amount of migration actually right now, multiple petabytes being brought to Wasabi because folks have figured out that they can't afford to keep going with their current hyperscaler vendor. >> And immutability is a feature of your product, right? What the feature called? Can you double-click on that a little bit? >> Yeah, absolutely. So, the term in S3 is Object Lock and what that means is your application will write an object to cloud storage, and it will define a retention period, let's say a week. And for that period, that object is immutable, untouchable, cannot be altered in any way, shape, or form, the application can't change it, the system administration can't change it, Wasabi can't change it, okay, it is truly carved in stone. And this is something that it's been around for a while, but you're seeing a huge uptick, right, in adoption and support for that feature by all the major vendors and I named off a few earlier and the best part is that with immutability comes some sense of, well, it comes with not just a sense of security, it is security. Right, when you have data that cannot be altered by anybody, even if the bad guys compromise your account, they steal your credentials, right, they can't take away the data and that's a beautiful thing, a beautiful, beautiful thing. >> And you look like an S3 bucket, is that right? >> Yeah, I mean, we're fully compatible with the S3 API, so if you're using S3 API based applications today, it's a very simple matter of just kind of redirecting where you want to store your data, beautiful thing about backup and recovery, right, that's probably the simplest application, simple being a relative term, as far as lift and shift, right? Because that just means for your next full, right, point that at Wasabi, retain your other fulls, you know, for whatever 30, 60, 90 days, and then once you've kind of made that transition from vine to vine, you know, you're often running with Wasabi. >> I talked to my open about the allure of object storage historically, you know, the simplicity of the get put syntax, but what about performance? Are you able to deliver performance that's comparable to other storage formats? >> Oh yeah, absolutely, and we've got the performance numbers on the site to back that up, but I forgot to answer something earlier, right, you said that immutability is a feature and I want to make it very clear that it is a feature but it's an API request. Okay, so when you're talking about gets and puts and so forth, you know, the comment you made earlier about being 80% more cost effective or 80% less expensive, you know, that API call, right, is typically something that the other folks charge for, right, and I think we used the metaphor earlier about the refrigerator, but I'll use a different metaphor today, right? You can think of cloud storage as a magical coffee cup, right? It gets as big as you want to store as much coffee as you want and the coffee's always warm, right? And when you want to take a sip, there's no charge, you want to, you know, pop the lid and see how much coffee is in there, no charge, and that's an important thing, because when you're talking about millions or billions of objects, and you want to get a list of those objects, or you want to get the status of the immutable settings for those objects, anywhere else it's going to cost you money to look at your data, with Wasabi, no additional charge and that's part of the thing that sets us apart. >> Excellent, so thank you for that. So, you mentioned some partners before, how do partners fit into the Wasabi story? Where do you stop? Where do they pick up? You know, what do they bring? Can you give us maybe, a paint a picture for us example, or two? >> Sure, so, again, we just do storage, right, that is our sole purpose in life is to, you know, to safely and securely store our customer's data. And so they're working with their application vendors, whether it's, you know, active archive, backup and recovery, IOT, surveillance, media and entertainment workflows, right, those systems already know how to manage the data, manage the metadata, they just need some place to keep the data that is being worked on, being stored and so forth. Right, so just like, you know, plugging in a flash drive on your laptop, right, you literally can plug in Wasabi as long as your applications support the API, getting started is incredibly easy, right, we offer a 30-day trial, one terabyte, and most folks find that within, you know, probably a few hours of their POC, right, it's giving them everything they need in terms of performance, in terms of accessibility, in terms of sovereignty, I'm guessing you talked to, you know, Dave Friend earlier about data sovereignty, right? We're global company, right, so there's got to be probably, you know, wherever you are in the world some place that will satisfy your sovereignty requirements, as well as your compliance requirements. >> Yeah, we did talk about sovereignty, Drew, this is really, what's interesting to me, I'm a bit of a industry historian, when I look back to the early days of cloud, I remember the large storage companies, you know, their CEOs would say, we're going to have an answer for the cloud and they would go out, and for instance, I know one bought competitor of Carbonite, and then couldn't figure out what to do with it, they couldn't figure out how to compete with the cloud in part, because they were afraid it was going to cannibalize their existing business, I think another part is because they just didn't have that imagination to develop an architecture that in a business model that could scale to see that you guys have done that is I love it because it brings competition, it brings innovation and it helps lower clients cost and solve really nagging problems. Like, you know, ransomware, of mutability and recovery, I'll give you the last word, Drew. >> Yeah, you're absolutely right. You know, the on-prem vendors, they're not going to go away anytime soon, right, there's always going to be a need for, you know, incredibly low latency, high bandwidth, you know, but, you know, not all data's hot all the time and by hot, I mean, you know, extremely hot, you know, let's take, you know, real time analytics for, maybe facial recognition, right, that requires sub-millisecond type of processing. But once you've done that work, right, you want to store that data for a long, long time, and you're going to want to also tap back into it later, so, you know, other folks are telling you that, you know, you can go to these like, you know, cold glacial type of tiered storage, yeah, don't believe the hype, you're still going to pay way more for that than you would with just a Wasabi-like hot cloud storage system. And, you know, we don't compete with our partners, right? We compliment, you know, what they're bringing to market in terms of the software vendors, in terms of the hardware vendors, right, we're a beautiful component for that hybrid cloud architecture. And I think folks are gravitating towards that, I think the cloud is kind of hitting a new gear if you will, in terms of adoption and recognition for the security that they can achieve with it. >> All right, Drew, thank you for that, definitely we see the momentum, in a moment, Drew and I will be back to get the customer perspective with Kevin Warenda, who's the Director of Information technology services at The Hotchkiss School, keep it right there. >> Hey, I'm Nate, and we wrote this song about ransomware to educate people, people like Brenda. >> Oh, God, I'm so sorry. We know you are, but Brenda, you're not alone, this hasn't just happened to you. >> No! ♪ Colonial Oil Pipeline had a guy ♪ ♪ who didn't change his password ♪ ♪ That sucks ♪ ♪ His password leaked, the data was breached ♪ ♪ And it cost his company 4 million bucks ♪ ♪ A fake update was sent to people ♪ ♪ Working for the meat company JBS ♪ ♪ That's pretty clever ♪ ♪ Instead of getting new features, they got hacked ♪ ♪ And had to pay the largest crypto ransom ever ♪ ♪ And 20 billion dollars, billion with a b ♪ ♪ Have been paid by companies in healthcare ♪ ♪ If you wonder buy your premium keeps going ♪ ♪ Up, up, up, up, up ♪ ♪ Now you're aware ♪ ♪ And now the hackers they are gettin' cocky ♪ ♪ When they lock your data ♪ ♪ You know, it has gotten so bad ♪ ♪ That they demand all of your money and it gets worse ♪ ♪ They go and the trouble with the Facebook ad ♪ ♪ Next time, something seems too good to be true ♪ ♪ Like a free trip to Asia! ♪ ♪ Just check first and I'll help before you ♪ ♪ Think before you click ♪ ♪ Don't get fooled by this ♪ ♪ Who isn't old enough to drive to school ♪ ♪ Take it from me, the director of IT ♪ ♪ Don't click on that email from a prince in Nairobi ♪ ♪ Because he's not really a prince ♪ ♪ Now our data's locked up on our screen ♪ ♪ Controlled by a kid who's just fifteen ♪ ♪ And he's using our money to buy a Ferrari ♪ >> It's a pretty sweet car. ♪ A kid without facial hair, who lives with his mom ♪ ♪ To learn more about this go to wasabi.com ♪ >> Hey, don't do that. ♪ Cause if we had Wasabi's immutability ♪ >> You going to ruin this for me! ♪ This fifteen-year-old wouldn't have on me ♪ (gentle music) >> Drew and I are pleased to welcome Kevin Warenda, who's the Director of Information Technology Services at The Hotchkiss School, a very prestigious and well respected boarding school in the beautiful Northwest corner of Connecticut, hello, Kevin. >> Hello, it's nice to be here, thanks for having me. >> Yeah, you bet. Hey, tell us a little bit more about The Hotchkiss School and your role. >> Sure, The Hotchkiss School is an independent boarding school, grades nine through 12, as you said, very prestigious and in an absolutely beautiful location on the deepest freshwater lake in Connecticut, we have 500 acre main campus and a 200 acre farm down the street. My role as the Director of Information Technology Services, essentially to oversee all of the technology that supports the school operations, academics, sports, everything we do on campus. >> Yeah, and you've had a very strong history in the educational field, you know, from that lens, what's the unique, you know, or if not unique, but the pressing security challenge that's top of mind for you? >> I think that it's clear that educational institutions are a target these days, especially for ransomware. We have a lot of data that can be used by threat actors and schools are often underfunded in the area of IT security, IT in general sometimes, so, I think threat actors often see us as easy targets or at least worthwhile to try to get into. >> Because specifically you are potentially spread thin, underfunded, you got students, you got teachers, so there really are some, are there any specific data privacy concerns as well around student privacy or regulations that you can speak to? >> Certainly, because of the fact that we're an independent boarding school, we operate things like even a health center, so, data privacy regulations across the board in terms of just student data rights and FERPA, some of our students are under 18, so, data privacy laws such as COPPA apply, HIPAA can apply, we have PCI regulations with many of our financial transactions, whether it be fundraising through alumni development, or even just accepting the revenue for tuition so, it's a unique place to be, again, we operate very much like a college would, right, we have all the trappings of a private college in terms of all the operations we do and that's what I love most about working in education is that it's all the industries combined in many ways. >> Very cool. So let's talk about some of the defense strategies from a practitioner point of view, then I want to bring in Drew to the conversation so what are the best practice and the right strategies from your standpoint of defending your data? >> Well, we take a defense in-depth approach, so we layer multiple technologies on top of each other to make sure that no single failure is a key to getting beyond those defenses, we also keep it simple, you know, I think there's some core things that all organizations need to do these days in including, you know, vulnerability scanning, patching , using multifactor authentication, and having really excellent backups in case something does happen. >> Drew, are you seeing any similar patterns across other industries or customers? I mean, I know we're talking about some uniqueness in the education market, but what can we learn from other adjacent industries? >> Yeah, you know, Kevin is spot on and I love hearing what he's doing, going back to our prior conversation about Zero Trust, right, that defense in-depth approach is beautifully aligned, right, with the Zero Trust approach, especially things like multifactor authentication, always shocked at how few folks are applying that very, very simple technology and across the board, right? I mean, Kevin is referring to, you know, financial industry, healthcare industry, even, you know, the security and police, right, they need to make sure that the data that they're keeping, evidence, right, is secure and immutable, right, because that's evidence. >> Well, Kevin, paint a picture for us, if you would. So, you were primarily on-prem looking at potentially, you know, using more cloud, you were a VMware shop, but tell us, paint a picture of your environment, kind of the applications that you support and the kind of, I want to get to the before and the after Wasabi, but start with kind of where you came from. >> Sure, well, I came to The Hotchkiss School about seven years ago and I had come most recently from public K12 and municipal, so again, not a lot of funding for IT in general, security, or infrastructure in general, so Nutanix was actually a hyperconverged solution that I implemented at my previous position. So when I came to Hotchkiss and found mostly on-prem workloads, everything from the student information system to the card access system that students would use, financial systems, they were almost all on premise, but there were some new SaaS solutions coming in play, we had also taken some time to do some business continuity, planning, you know, in the event of some kind of issue, I don't think we were thinking about the pandemic at the time, but certainly it helped prepare us for that, so, as different workloads were moved off to hosted or cloud-based, we didn't really need as much of the on-premise compute and storage as we had, and it was time to retire that cluster. And so I brought the experience I had with Nutanix with me, and we consolidated all that into a hyper-converged platform, running Nutanix AHV, which allowed us to get rid of all the cost of the VMware licensing as well and it is an easier platform to manage, especially for small IT shops like ours. >> Yeah, AHV is the Acropolis hypervisor and so you migrated off of VMware avoiding the VTax avoidance, that's a common theme among Nutanix customers and now, did you consider moving into AWS? You know, what was the catalyst to consider Wasabi as part of your defense strategy? >> We were looking at cloud storage options and they were just all so expensive, especially in egress fees to get data back out, Wasabi became across our desks and it was such a low barrier to entry to sign up for a trial and get, you know, terabyte for a month and then it was, you know, $6 a month for terabyte. After that, I said, we can try this out in a very low stakes way to see how this works for us. And there was a couple things we were trying to solve at the time, it wasn't just a place to put backup, but we also needed a place to have some files that might serve to some degree as a content delivery network, you know, some of our software applications that are deployed through our mobile device management needed a place that was accessible on the internet that they could be stored as well. So we were testing it for a couple different scenarios and it worked great, you know, performance wise, fast, security wise, it has all the features of S3 compliance that works with Nutanix and anyone who's familiar with S3 permissions can apply them very easily and then there was no egress fees, we can pull data down, put data up at will, and it's not costing as any extra, which is excellent because especially in education, we need fixed costs, we need to know what we're going to spend over a year before we spend it and not be hit with, you know, bills for egress or because our workload or our data storage footprint grew tremendously, we need that, we can't have the variability that the cloud providers would give us. >> So Kevin, you explained you're hypersensitive about security and privacy for obvious reasons that we discussed, were you concerned about doing business with a company with a funny name? Was it the trial that got you through that knothole? How did you address those concerns as an IT practitioner? >> Yeah, anytime we adopt anything, we go through a risk review. So we did our homework and we checked the funny name really means nothing, there's lots of companies with funny names, I think we don't go based on the name necessarily, but we did go based on the history, understanding, you know, who started the company, where it came from, and really looking into the technology and understanding that the value proposition, the ability to provide that lower cost is based specifically on the technology in which it lays down data. So, having a legitimate, reasonable, you know, excuse as to why it's cheap, we weren't thinking, well, you know, you get what you pay for, it may be less expensive than alternatives, but it's not cheap, you know, it's reliable, and that was really our concern. So we did our homework for sure before even starting the trial, but then the trial certainly confirmed everything that we had learned. >> Yeah, thank you for that. Drew, explain the whole egress charge, we hear a lot about that, what do people need to know? >> First of all, it's not a funny name, it's a memorable name, Dave, just like theCUBE, let's be very clear about that, second of all, egress charges, so, you know, other storage providers charge you for every API call, right? Every get, every put, every list, everything, okay, it's part of their process, it's part of how they make money, it's part of how they cover the cost of all their other services, we don't do that. And I think, you know, as Kevin has pointed out, right, that's a huge differentiator because you're talking about a significant amount of money above and beyond what is the list price. In fact, I would tell you that most of the other storage providers, hyperscalers, you know, their list price, first of all, is, you know, far exceeding anything else in the industry, especially what we offer and then, right, their additional cost, the egress costs, the API requests can be two, three, 400% more on top of what you're paying per terabyte. >> So, you used a little coffee analogy earlier in our conversation, so here's what I'm imagining, like I have a lot of stuff, right? And I had to clear up my bar and I put some stuff in storage, you know, right down the street and I pay them monthly, I can't imagine having to pay them to go get my stuff, that's kind of the same thing here. >> Oh, that's a great metaphor, right? That storage locker, right? You know, can you imagine every time you want to open the door to that storage locker and look inside having to pay a fee? >> No, that would be annoying. >> Or, every time you pull into the yard and you want to put something in that storage locker, you have to pay an access fee to get to the yard, you have to pay a door opening fee, right, and then if you want to look and get an inventory of everything in there, you have to pay, and it's ridiculous, it's your data, it's your storage, it's your locker, you've already paid the annual fee, probably, 'cause they gave you a discount on that, so why shouldn't you have unfettered access to your data? That's what Wasabi does and I think as Kevin pointed out, right, that's what sets us completely apart from everybody else. >> Okay, good, that's helpful, it helps us understand how Wasabi's different. Kevin, I'm always interested when I talk to practitioners like yourself in learning what you do, you know, outside of the technology, what are you doing in terms of educating your community and making them more cyber aware? Do you have training for students and faculty to learn about security and ransomware protection, for example? >> Yes, cyber security awareness training is definitely one of the required things everyone should be doing in their organizations. And we do have a program that we use and we try to make it fun and engaging too, right, this is often the checking the box kind of activity, insurance companies require it, but we want to make it something that people want to do and want to engage with so, even last year, I think we did one around the holidays and kind of pointed out the kinds of scams they may expect in their personal life about, you know, shipping of orders and time for the holidays and things like that, so it wasn't just about protecting our school data, it's about the fact that, you know, protecting their information is something do in all aspects of your life, especially now that the folks are working hybrid often working from home with equipment from the school, the stakes are much higher and people have a lot of our data at home and so knowing how to protect that is important, so we definitely run those programs in a way that we want to be engaging and fun and memorable so that when they do encounter those things, especially email threats, they know how to handle them. >> So when you say fun, it's like you come up with an example that we can laugh at until, of course, we click on that bad link, but I'm sure you can come up with a lot of interesting and engaging examples, is that what you're talking about, about having fun? >> Yeah, I mean, sometimes they are kind of choose your own adventure type stories, you know, they stop as they run, so they're telling a story and they stop and you have to answer questions along the way to keep going, so, you're not just watching a video, you're engaged with the story of the topic, yeah, and that's what I think is memorable about it, but it's also, that's what makes it fun, you're not just watching some talking head saying, you know, to avoid shortened URLs or to check, to make sure you know the sender of the email, no, you're engaged in a real life scenario story that you're kind of following and making choices along the way and finding out was that the right choice to make or maybe not? So, that's where I think the learning comes in. >> Excellent. Okay, gentlemen, thanks so much, appreciate your time, Kevin, Drew, awesome having you in theCUBE. >> My pleasure, thank you. >> Yeah, great to be here, thanks. >> Okay, in a moment, I'll give you some closing thoughts on the changing world of data protection and the evolution of cloud object storage, you're watching theCUBE, the leader in high tech enterprise coverage. >> Announcer: Some things just don't make sense, like showing up a little too early for the big game. >> How early are we? >> Couple months. Popcorn? >> Announcer: On and off season, the Red Sox cover their bases with affordable, best in class cloud storage. >> These are pretty good seats. >> Hey, have you guys seen the line from the bathroom? >> Announcer: Wasabi Hot Cloud Storage, it just makes sense. >> You don't think they make these in left hand, do you? >> We learned today how a serial entrepreneur, along with his co-founder saw the opportunity to tap into the virtually limitless scale of the cloud and dramatically reduce the cost of storing data while at the same time, protecting against ransomware attacks and other data exposures with simple, fast storage, immutability, air gaps, and solid operational processes, let's not forget about that, okay? People and processes are critical and if you can point your people at more strategic initiatives and tasks rather than wrestling with infrastructure, you can accelerate your process redesign and support of digital transformations. Now, if you want to learn more about immutability and Object Block, click on the Wasabi resource button on this page, or go to wasabi.com/objectblock. Thanks for watching Secure Storage Hot Takes made possible by Wasabi. This is Dave Vellante for theCUBE, the leader in enterprise and emerging tech coverage, well, see you next time. (gentle upbeat music)
SUMMARY :
and secure solution on the market. the speed with which you and I want to get your perspectives but applied to cloud storage is, you know, you about data sovereignty. one is, you know, if you're and the elimination of and every country, you know, and how do you think in the cloud, as opposed to, you know, In addition to which, you know, you don't want to be wasting your time money to buy a Ferrari ♪ hey Drew, good to see you again, Dave, great to be the pandemic, Zero Trust, but you know, done properly and using some of the best, you know, you could talk a little bit and, you know, put in your private keys, not having to run, you know, and the best part is from vine to vine, you know, and so forth, you know, the Excellent, so thank you for that. and most folks find that within, you know, to see that you guys have done that to be a need for, you know, All right, Drew, thank you for that, Hey, I'm Nate, and we wrote We know you are, but this go to wasabi.com ♪ ♪ Cause if we had Wasabi's immutability ♪ in the beautiful Northwest Hello, it's nice to be Yeah, you bet. that supports the school in the area of IT security, in terms of all the operations we do and the right strategies to do these days in including, you know, and across the board, right? kind of the applications that you support planning, you know, in the and then it was, you know, and really looking into the technology Yeah, thank you for that. And I think, you know, as you know, right down the and then if you want to in learning what you do, you know, it's about the fact that, you know, and you have to answer awesome having you in theCUBE. and the evolution of cloud object storage, like showing up a little the Red Sox cover their it just makes sense. and if you can point your people
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
David | PERSON | 0.99+ |
Kevin | PERSON | 0.99+ |
Drew | PERSON | 0.99+ |
Kevin Warenda | PERSON | 0.99+ |
Dave Vellante | PERSON | 0.99+ |
Drew Schlussel | PERSON | 0.99+ |
Brenda | PERSON | 0.99+ |
Dave | PERSON | 0.99+ |
Paris | LOCATION | 0.99+ |
Jeff Flowers | PERSON | 0.99+ |
Sydney | LOCATION | 0.99+ |
Drew Schlussel | PERSON | 0.99+ |
Singapore | LOCATION | 0.99+ |
Toronto | LOCATION | 0.99+ |
London | LOCATION | 0.99+ |
Wasabi | ORGANIZATION | 0.99+ |
30-day | QUANTITY | 0.99+ |
Frankfurt | LOCATION | 0.99+ |
Amazon | ORGANIZATION | 0.99+ |
Bombay | LOCATION | 0.99+ |
Connecticut | LOCATION | 0.99+ |
Carbonite | ORGANIZATION | 0.99+ |
15 | QUANTITY | 0.99+ |
20 | QUANTITY | 0.99+ |
Jeff | PERSON | 0.99+ |
Red Sox | ORGANIZATION | 0.99+ |
Asia | LOCATION | 0.99+ |
Nairobi | LOCATION | 0.99+ |
80% | QUANTITY | 0.99+ |
The Hotchkiss School | ORGANIZATION | 0.99+ |
JBS | ORGANIZATION | 0.99+ |
16 terabyte | QUANTITY | 0.99+ |
Nate | PERSON | 0.99+ |
David Friend | PERSON | 0.99+ |
60 | QUANTITY | 0.99+ |
30 | QUANTITY | 0.99+ |
U.S. | LOCATION | 0.99+ |
S3 | TITLE | 0.99+ |
three | QUANTITY | 0.99+ |
May of 2018 | DATE | 0.99+ |
one | QUANTITY | 0.99+ |
2020s | DATE | 0.99+ |
two | QUANTITY | 0.99+ |
fifteen | QUANTITY | 0.99+ |
Hotchkiss School | ORGANIZATION | 0.99+ |
Zero Trust | ORGANIZATION | 0.99+ |
100 terabyte | QUANTITY | 0.99+ |
500 acre | QUANTITY | 0.99+ |
first | QUANTITY | 0.99+ |
200 acre | QUANTITY | 0.99+ |
Convo | ORGANIZATION | 0.99+ |
a year | QUANTITY | 0.99+ |
one terabyte | QUANTITY | 0.99+ |
34,000 customers | QUANTITY | 0.99+ |
Bryce Cracco, NetApp and Jim Sarale, Rancher Labs | CUBE Conversation, December 2020
>> [Female VoiceOver] From the CUBE studios in Palo Alto in Boston, connecting with our leaders all around the world, this is a CUBE conversation. >> Hello and welcome to the CUBE conversation here in the Palo Alto studios, I'm John Furrier. Cloud Native News and industry coverage. There are two great guests here to break down what's going on in Cloud Native. we got Rancher Labs, Jim Sarale, Vice President of Global Channels and Alliances and Bryce Cracco Product Manager for NetApp HCI. Guys, thanks for coming on this breaking news around Cloud Native. I mean, this has been really all about Cloud Native for the past year and a half, but this year, certainly with the pandemic, the modern applications are being pushed out faster and faster. A lot of pressure. So congratulations on this announcement, Jim set us up. What is the News? I saw some articles, we've got a story get hit and SiliconANGLE. What's the news with NetApp with Rancher Labs? >> Yeah, thank you. And you're right, we are seeing a vast push with, with the crazy times that we're in right now, but the news really is, you know, Rancher formerly launching our OEM program and launching that with with our Marquee partner with NetApp, you know, when companies get to a certain juncture, you know, an OEM relationship and sometimes means just more of a marketing type relationship but as everybody knows, Rancher is, you know, one of the industry leading multicloud, multi Kubernetes cluster management solutions, open source. And you know, what that means is we're an agnostic play for, for those that are trying to leverage Kubernetes, we've talked with NetApp, we struck a deal with them for them to embed us on their HCI platform. And when you talk about our early in program and, and the things that it entails is really around, you know, how do you get contract vehicles to map go to market strategies? How do you get support, engineering, integration, development, all of those things align with partners. It's not an easy task. It's very important to the go to the kind of go to market strategy that we have. And I think, you know, not only with the market adoption around Kubernetes, Ranchers agnostic play in open source and then obviously, you know, Ranchers come a long way. Our products tried and true. We have nearly 500 customers. We're seeing those customers lean back into some of the OEMs and to the software vendors to have them do more and get them more, I guess, ready for the things that they're doing, an IT operations, how the have dev you know, the app DevOps folks are trying to do more and get applications to market faster. So we're really suited well for organizations like NetApp to take our technology bundle in it and really make it better for their customers experience. So the program allows for contract vehicles, direct integration, support, engineering, pricing, because not one size fits all. As you see the evolution from On-prem to cloud IoT Edge, a lot of different devices from 100s of dollars to 1000s. So Ranchers committed to making sure that we align our products and pricing to fit some of those low compute platforms and also be able to right size our business model to make them successful. >> Well, congratulations, I love the term OEM still kind of hangs around, I'm old enough to remember when it was actually equipment not software, original equipment manufacturer, which essentially, you're essentially letting NetApp embed your code into their equipment or their software. But this is the relationship of a channel and indirect channel for Rancher which you guys are launching, which is total validation. Appreciate that, I like to get into the NetApp side. Bryce, if you don't mind, because, you know, obviously cloud's not new to NetApp storage becoming more critical, hybrid clouds more important. Tell us about the transformation of HCI because I think this is where Kubernetes and it starts to fit in when you see the cloud native surge coming in. How are you guys looking at this opportunity? >> Yeah, you bet when you, when you look at it from a converged infrastructure or hyper-converged infrastructure or hybrid cloud infrastructure perspective. It's always been about simplicity, right. We're not doing anything in the HCI market in general that can't be otherwise done. It's just making it much simpler, reducing that that learning curve and reducing that time to value that our IT customers get. And so I think we saw it, you know, converged infrastructure and hyper-converged infrastructure, all start out with virtualization is kind of the top layer that's facilitated but now obviously Kubernetes is becoming table stakes in the enterprise. So I think we're seeing all the vendors in the space, put in some kind of automatic deployment of Kubernetes or some easier deployment of Kubernetes, making Kubernetes that top layer rather than just virtualization. And, you know, this is a really great opportunity for us at NetApp to be able to do that. Not only with just any Kubernetes package but one that's very well regarded and beloved in the DevOps communities and that's Rancher. So what we have here is kind of something that's great for IT, and really great for DevOps in terms of being able to centralize multi cluster management across a hybrid cloud ecosystem and really empower those DevOps teams, what they to do what they need to do but still keeping IT at the center of it. >> You know, it's interesting, you know, shift left for security DevOps here, DevSecOps, it's all kind of happening with software, software defined, software operated. This is what this is the new operating environment. What is the use cases that presents itself well for this is it from a customer standpoint? Is it they're looking for certain things when you look at the product definition, you say, okay we have NetApp, we have Rancher. Take me through that thinking, what's the customer use case? What are they getting out of this? >> Sure, I think there's a variety of use cases where you see Kubernetes coming into play. And one of the great things about NetApp HCI, is it's not just simple infrastructure but it's also very scalable infrastructure. So that's where a lot of these types of products fall down. As we get to such such a scale point they don't work because of our scalability and our ability to handle mixed workloads. We can really handle any number of use cases. So in a Kubernetes context, this could be anything from IT departments who are going to containerized applications for their own, you know, the applications that they themselves manage, like ERP systems and so forth that are starting to get containerized. It could also be for bespoke applications that the companies are writing themselves, the DevOps teams that actually write the code that makes the company work. And so there, there's kind of a wide variety of use cases in there that are starting to go to Kubernetes. If not there already, the DevOps teams largely are already using Kubernetes. And this is just a great way to centralize it on on one kind of easy button, but yet very scalable and highly performing infrastructure for that kind of consolidation. >> Jim, this is the holy grail we've you guys have been doing since the beginning of Rancher Labs, programmable infrastructure, infrastructure as code, you couldn't get any clear or here when you start to have mainstream, you know, programmable storage and still programmable networking. All of this is happening. This is what we had hoped for the world's now gone full containers. Now you've got Kubernetes and IDC still shows that the enterprises are only like 30 to 40%. Even deep in their toes in on containers. If that, so you see a coupe call and you see all that at VM world, you'll see that re-invent you're going to see mainstream IT, the classic IT with DevOps. What's your reaction to that? Because there this, you know, what's your, what's your what's your take on this? >> Yeah I think you're absolutely right, we are scratching the surface and I think that we will see IT really embrace, right. This, this becomes the opportunity for business enablement to take, to take shape across all different avenues, IT is building infrastructure and make it, you know, allowing compute to be available. And this is kind of, we'll see this surge, not just the IT operations but really having the different groups from app devs to the business line owners, to those pushing applications, understanding the entire ecosystem. You know, we're talking about NetApp and HCI today but you can think of cross the edge, data center edge cloud, retail point of sale systems, getting immediate updates, dealing with IT operations and the compute platforms. It's really just endless. And we're excited. I think the OEM program is going to allow companies like NetApp and in other verticals and industries to really take shape and take advantage of what Rancher's offering to help them be more efficient across what their critical business apps are trying to do. >> Well, congratulations on NetApp, they're very smart company. They've got savvy customers and they're very loyal. Bryce, with that in mind, what's been the reaction you laid out the use cases when you bring this to market with your customers and partners? What's the feedback thumbs up on this and what's the vibe? >> Yeah, we've had some really enthusiastic early reaction, a couple early customers looking at it. You know, it's been a lot of fun and people are really excited that one of the great things about doing this with Rancher is that it's, it's purely open source software. So, you know, our customers love that. It's, there's, it's kind of a low risk proposition for them. They're very well, well hedged they can push this button and get it started on their NetApp HCI with very little, very little lead up to that very little advanced knowledge and just kind of get started. It's actually there's no incremental costs to use it on NetApp HCI. It's just, if you want a joint support model that it, that that there's a fee. And so you can kind of think of it as an indefinite trial period in a way. And I think that's created a lot of early interest and I think yeah I think it's going to be a really great option for our customers. It's going to add a lot of value to the NetApp HCI product. And so far, everyone's been very excited about it. >> You know, I was talking with Dave Vellante, my co-host in the CUBE also does a lot of storage research, knows NetApp as well. We were also commenting about this dynamic and we kind of call this out in 2016 when VMware was having trouble with the cloud operations. And then they decided to get rid of everything and just partner with Amazon. Everyone's like, that's horrible. It's going to be terrible. They're going to lose all their customers but we pointed out and I think this is true here. And I want to get your reaction, both of you guys, if you don't mind commenting what turned out to be the case was is that there was a clear distinction and operator of infrastructure and software development environments with higher level cloud native services. And they're not necessarily competing directly. They're kind of coming together, this idea of operating infrastructure and IT concept when it goes software and goes cloud, it's not a win, lose dynamic. You have software and you get people often need to operate that either code it or run it. So at large scale, this is where HCI kind of fits in Bryce, right? I mean, because now you got the edge, it's more devices. I mean, this is more infrastructure to run. So more, more stuff you've got to operate all this stuff. It's not going to ever go away. You guys react to that. What do you think? >> Sure. Yeah, I think I mean, from a NetApp perspective our customers use all kinds of infrastructure. They use public cloud infrastructure and NetApp has a really great public cloud focused portfolio, around public cloud services. So that's certainly a market that would be playing in our customers use. And it's part of the landscape, as you say, edge, of course also, and you know, with this solution I think it fits right into that because Rancher becomes this kind of container orchestration control plane. That's hosted on an HCI but can span this hybrid multi-cloud and edge environment all from that kind of centralized location. >> I think the simplification of the workloads is a huge deal. Jim, your, your thoughts on this? I see you've got this great program. You have the OEM program and you got an indirect partner, rising tide floats all boats here with, with this market. What's your take? >> Absolutely. And what better way to launch this program with somebody like NetApp? So yeah, you know, Rancher from its inception has been an open source platform agnostic. I think that will help, you know, help us, not just us but NetApp and other OEM partners, depending on operating system, legacy systems, verticals, industries, we're all playing a part in it. On-prem cloud, hybrid cloud, you know, I think Ranchers really well suited, for this advancement strictly by the way that we've continued in our philosophy of building an open source agnostic platform to help organizations, OEMs, ISBs, cloud providers, you name it. I think that Rancher is really well suited for, you know, kind of taking this additional ride, if you will, right. We're seeing we're all seeing it. And as you pointed out, it's less than 30% adoption today. We're all hoping for that to increase exponentially. >> Yeah, when you go mainstream, you get a lot of issues. Bryce, final question on the news analysis here. Why Rancher Labs from a NetApp perspective, what was the what was the deciding factor for you guys? >> Well, they just made a lot of sense for us to partner with. Again, the open source nature of it and the free nature of it made it really low barrier to entry for our customers. We really liked that. We also like they're very open and agnostic approach. So, you know, nothing that we're doing here with Rancher has to be at the expense of any other relationships that we have. And that was really that was really an important consideration. You know, it's, it's a very low risk, low cost, easy to get going solution for our customers. And there's very, there's no fear of lock-in with it. And so it's basically just all potential upsides and no potential downsides. And I think it's a really great solution for both IT and for DevOps, which was really critical. >> Real quick question on the customer expectation. Are you guys going to support Rancher? How does a customer get impacted by this? Obviously NetApp has, has their own supporters or is there a joint support? Is you guys going to handle that? How does the customer deal with that touches? >> Yeah, that's, that's really the crux of the deal. There is NetApp is able to provide frontline support for our customers or NetApp HCI customers, if they've, if they've purchased the Rancher support package through NetApp, they can get support for it through NetApp. And we're able to pass tickets back and forth between the companies as needed. So you don't have to have any guesswork about where where the problem and the stack might lie. You just opened your support ticket with NetApp and we can make sure it gets resolved. So that's been a really great part of the deal. >> Well, gentlemen, thanks for coming on. Appreciate the news insight. I do want to ask one final question, while I got you both here. If you don't mind, as we come in to the end of the year 2020, what a crazy year it's been between the pandemic and just the just the shift and the massive sea change of how virtual virtualization, not, you know, server or storage virtualization, but you know, the virtual world we live in remote everything, pandemic, uncertainty the digital transformation is just full throttle just more and more pressure. As we come out of cloud native CUBE con and AWS reinvent, we had VM all this activity. What do you guys think of the most important stories that customers should pay attention to in cloud native? What's what's the high order bit? What's the one thing or two things that really are notable that people should pay attention to that's important? Bryce, we'll start with you. >> I think it's bringing Kubernetes into the mainstream, right? I mean, that's what we see happening. How do you do that in a way that continues to give DevOps the flexibility they need and empower them and the way that Kubernetes does, but but also brings it into the mainstream. That's what I think what everyone's trying to solve right now >> Jim, your take on the most important story people should pay attention to. >> I think the same, I think Kubernetes adoption and really getting that education and people up to speed to start making that transformation. You know, quicker and getting that adoption rate up. I think we'll see a lot of benefits. Like you said, remote virtual in Kubernetes is kind of that framework that needs to get out there, be prevalent and and all of us take advantage, and start working together. >> All right, we'll leave it there. Guys, congratulations on the deal. NetApp embedding Kubernetes and Rancher support inside their hyper-converged infrastructure HCI. Bryce, Jim, thanks for coming on the CUBE. >> Thank you. >> Okay, I'm John Furrier with CUBE conversation here in Palo Alto. Normally when we do these in person but it's remote with the pandemic, giving you the latest continuing the cube virtual coverage, here in Palo Alto. Thanks for watching. (gentle music)
SUMMARY :
all around the world, What's the news with but the news really is, you know, and it starts to fit in And so I think we saw it, you know, You know, it's interesting, you know, of use cases where you see and you see all that at VM and make it, you know, allowing when you bring this to market that one of the great I mean, because now you got edge, of course also, and you know, of the workloads is a huge deal. I think that Rancher is really well suited for, you know, what was the deciding factor for you guys? of it and the free nature Is you guys going to handle that? and forth between the companies as needed. and the massive sea change but also brings it into the mainstream. the most important story that framework that needs to Bryce, Jim, thanks for coming on the CUBE. giving you the latest continuing
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Amazon | ORGANIZATION | 0.99+ |
Dave Vellante | PERSON | 0.99+ |
Jim | PERSON | 0.99+ |
Bryce | PERSON | 0.99+ |
Rancher | ORGANIZATION | 0.99+ |
Jim Sarale | PERSON | 0.99+ |
2016 | DATE | 0.99+ |
December 2020 | DATE | 0.99+ |
Palo Alto | LOCATION | 0.99+ |
John Furrier | PERSON | 0.99+ |
Rancher Labs | ORGANIZATION | 0.99+ |
Bryce Cracco | PERSON | 0.99+ |
30 | QUANTITY | 0.99+ |
less than 30% | QUANTITY | 0.99+ |
NetApp | TITLE | 0.99+ |
both | QUANTITY | 0.99+ |
AWS | ORGANIZATION | 0.99+ |
1000s | QUANTITY | 0.99+ |
two things | QUANTITY | 0.99+ |
CUBE | ORGANIZATION | 0.99+ |
Boston | LOCATION | 0.99+ |
today | DATE | 0.98+ |
40% | QUANTITY | 0.98+ |
this year | DATE | 0.98+ |
one final question | QUANTITY | 0.98+ |
NetApp | ORGANIZATION | 0.98+ |
one | QUANTITY | 0.98+ |
nearly 500 customers | QUANTITY | 0.97+ |
past year and a half | DATE | 0.97+ |
Kubernetes | TITLE | 0.97+ |
Global Channels and Alliances | ORGANIZATION | 0.96+ |
pandemic | EVENT | 0.95+ |
NetApp HCI | TITLE | 0.95+ |
one thing | QUANTITY | 0.95+ |
Marquee | ORGANIZATION | 0.94+ |
Cloud Native | ORGANIZATION | 0.93+ |
two great guests | QUANTITY | 0.91+ |
DevSecOps | TITLE | 0.91+ |
VMware | ORGANIZATION | 0.91+ |
100s of dollars | QUANTITY | 0.89+ |
HCI | ORGANIZATION | 0.87+ |
end of the year 2020 | DATE | 0.87+ |
Cloud | ORGANIZATION | 0.86+ |
Ranchers | ORGANIZATION | 0.85+ |
DevOps | TITLE | 0.84+ |
Ajay Patel, VMware & Peter FitzGibbon, Rackspace | VMworld 2019
>> Announcer: Live, from San Francisco celebrating 10 years of high-tech coverage it's theCUBE. Covering VMworld 2019. Brought to you by VMware and its ecosystem partners. >> Welcome back, this is theCUBE two stages, three days of coverage, our tenth year here at the VMworld show. I'm Stu Miniman and my co-host for this segment is Bobby Allan. And welcome back, two of our CUBE alumni. >> How are you? >> As I said back in 2010 we didn't even know what a CUBE alumni was. People were trying to figure out what we're doing but now we have thousands of them and both of these gentlemen have been on the program, a few times. >> Thanks for having us back. >> You're welcome. So, first, over we have Ajay Patel, who I believe was doing another filming evening with our crew-- >> Absolutely >> Earlier today. >> The Accenture Innovation Center. >> Ah, excellent. Beautiful building Accenture has here in San Francisco. >> Ajay: Beautiful (mumbles) >> One of the other benefits of being back in San Francisco is we brought in people and it's really easy to get in and out and do other things in the Valley. But Ajay is the senior vice president and general manager of the cloud provider software business unit inside VMware. And one of his partners is Rackspace. We have Peter FitzGibbon who is the vice president of Product Alliances, with for mentioned Rackspace. >> Yeah, super to be back in San Francisco. It's a great change from Vegas. >> Yeah, you know, there is some debate in the community of course it's a little more expensive here in San Francisco and there are other logistic challenges. We're excited to be back here and yeah, really excited to be talking with both of you. Peter, let's start, you know Rackspace has had a long, long partnership with VMware. When I remember back to like VMware Environments Hosted it's like, Rackspace was the one with the lion's share in that market. And, you know, Rackspace has gone through a lot of changes in the last 10 years that we've been doing this coverage. When I think about multi cloud, all of these environments you've got a nice perspective on this and lots of customers you've worked with. So, give us the update on what you're hearing from customers and your relationship with VMware. >> Yeah, so, 20-year history with VMware that we're very proud of. I would say it's almost being re-birthed in the last two years though. Two years ago, we were one of the first VMware Cloud Verified partners. We launched our VMware Cloud VMware Cloud Foundation Private Cloud. We added that about six months later in customer data centers. We're now one of the major partners of VMware Cloud AWS >> Ajay: VMware Cloud AWS yep. >> And that's one of the areas that we're continuing to expand upon. We announced some new services this week, specifically around VMware Cloud AWS or support of HDX, both for migrations for ongoing support as well as a number of, what we call Rackspace service blocks. Which are additional manage services that we are applying, specifically for VMware Cloud and AWS. So, exciting times at Rackspace and VMware continues to be a look, a major part of our portfolio. >> Ajay: And thank you for all the support, Peter. >> Yeah, so Ajay, bring us up to speed of what's happening in your space you know, a lot of attention gets paid, you know Every time, you know, I saw Sanjay Poon, up on stage at the Goolge clould event, and of course the AWS partnership has been one of the biggest stories in all of tech, for the last couple of years. And that's been extending to, you know first it was like, wait, you know Rackspace has data centers and many of your other partners have data centers, but how did these all, play together and how does the VMware software pull them all together. >> So Stu, I think, you and I have been talking about this world of hybrid multi and we've been arguing, whether it's just a transitionary stage, or here to stay. Hopefully that debate's over, right? Hybrid's a new reality, multi cloud's a new reality and we talk about these hyper scales but you know, Rackspace and many of my VCP partners they've been longstanding in this journey with us. I don't know if you caught Pat's keynote? We demonstrated, that we have over 10 000 data centers through our VCPP network and Rackspace being one of our top 10 partners. So you start, to start seeing this mix of VMware everywhere. Whether it's trough our service provider cloud the customer manage cloud or even a hyper scale VMware cloud. You now have the ubiquitous VMware infrastructure to play with. >> At some point it's just cloud. (chattering) >> That is a great point, when I talk to customers most of them, they have a cloud strategy it's usually not a hybrid or a multi or all these things. Here's the nuance I want to, you know, ask for a second then I definitely want Bobby to jump in with what he's been talking to customers about. You know, hybrid cloud is a reality because customers have their own data centers and they have public cloud. The ideal of multi cloud, customers have multiple clouds, but, you know, one of the definitions I put out there is, multi cloud exists when the multi cloud solution is more valuable than the sum of the pieces. And I'm not sure that we're quite there yet. I think we're starting to move down that path. But what are you both seeing? And does that resonate with what you see today? >> Yeah like, all of our customers have workloads in multiple locations and trying to provide the assessments of where to put the right workloads at the right time is one of the key values that we hold dear. And before we ever talk about where we're going to but a workload we assess whether, what our clients environments is and determine, maybe this is an AWS workload maybe this is a WMS workload maybe this workload really belongs in the data center for, due to laws of the lands laws of gravity and physics. >> And I think, what's happening, really is any application, typically choosing a platform or the cloud service that's driving the decision. Collectively what ends up happening because of that, you are in multiple clouds. So, I think what's it's a result of the reality that applications are driving location and platform choices and the way to drive consistency is trying to pick a few common things whether it's kubernetes as a platform or VMware, right? Those are a way to, kind of, unify these desperate choices that are made individually. That are collectively making each of our customers multi cloud, right? >> Ajay, I want to piggyback on that because you talked about the applications driving a lot of the choices, when applications teams in my experience are, kind of, making the choices they don't care about a centralized strategy and obviously, this very powerful partnership can support multiple places and ways around your workloads. How do you lead the witness, a little bit towards simplification and just because you can do it doesn't mean you should do it. >> Yes, so I think what's happening from our perspective is depending on which side of the IT house you're at if you're part of the core IT that's running and maintaining mission critical systems you're really looking for something that's reliable, performance scalable, secure. And you, maybe, looking at a hardware refresher looking at your data center strategy and you're looking to migrate that workload. You're not really looking to re-change the app just because it's cool. >> Bobby: Right. >> If you're part of digital transformation effort you're looking to say, okay how do I get something out there quickly? >> Bobby: Right. >> How do I integrate on the average my data and application assets while leveraging cloud services? >> Bobby: Right. So, we're seeing this tension in some ways where the, kind of, net new is really pushing the envelope of cloud with self service elasticity, new capability while as the old guard is like I got to keep my running business, running keep it secure. And how do you bridge these two worlds and bring them together? We call it DevOps and, you know, ITA and the traditional, kind of new developer. Reality is, you're trying to bring the two worlds on a common platform. Whether it's VM's or containers and so the exciting part for us is, how do we unify? How do we deliver this experience and give them the choice, where it makes more sense. And blur the lines between public and private. Those are just locations and makes more sense for your customer or your application that you can drive. >> Bobby: Right, excellent. >> We find ourselves in those conversations, all the time trying to bridge two sides of the equation at a customer and trying to get them together on a uniformed strategy and weighing the pros and cons of different locations or different workloads. So, it's not easy, it's not a challenge of course. >> Peter, I'd love you to bring us inside some of those VMware on AWS customers because, you know, some of the first customers I talked to, it was, you know, I'm a VMware shop and there's a part of your group that's like oh my gosh, I can't change and this was a driver saying hey, you don't need to, we can bring you along. But, the value, once again needs to be Oh hey, I need to do some innovative things I want to be able to access some of those cool amazing services that, you know everybody is providing on a daily basis. So, you know, are you seeing that progression are there any interesting use cases that are coming out? >> Progression is the word, we could call it progressive transformation inside Rackspace. Like, you're a VMware customer let's bring you ion the journey towards public cloud. And let's help you leverage those address services. So, we find ourselves in a great position where a very large number of engineers, that support our native AWS workloads, we've brought those two groups together from our VMware expertise and address expertise. So when a customer lands on a VMware address I consider it a failure, if they haven't transformed part of the application in three months. If they're not really consuming those native AWS services. And that's what we really try inject. It's like, get our AWS engineers looking at those workloads let's start consuming those native services and that's what we're finding really exciting about how customers are starting to adopt and starting to plug and play into some of those services. >> Oh I look at it, as you know, you'll see a team Sanjay called it M&MS, migrate and modernize but a part of the migrate is often modernize your infrastructure first by putting on a modern cloud platform. And then modernize your application using cloud services. How it says, it's M-M and M, right, to follow through because it's not just about lifting and shifting keeping the old crap as it is. You got to really start to look at how do you drive innovation drive your Cube to a better place. So that you can operate it more affectively and then modernize for application results. And your service blocks, are really catered to helping that customers. So you can talk a little bit about how they're building the services that compliment our offer. >> Yeah, so our service blocks is... In the past, we offered them one big block manage service to a customer. We realized, let's decompose that and offer the customer what they need at a specific point in time. So we, think about Lego blocks, where at some point you may need, just some support or at some point you might need some architectural services and design and other times you might say cost optimization. That sort of stuff. So over time, we're adding on these Lego blocks if you will, to add a customer, to give them what they need at the point they need it, and not more. So, it's an exciting concept that every month, we're adding more services. We launched a Rackspace manage security service block today specifically for VMware cloud. So, we continue to add these and provide incremental value. >> I want to ask you a little bit of a controversial question. There's a saying, pioneers take the arrows but settlers take the land. >> Right >> So, if I'm a technology leader how do I embrace all this newness without getting shot, partnering with your firms. >> So, you know, we always say lock-ins bad but reality is, we always choose to reject technology platforms. And if you're a VMware customer I hate to say it, you're running on VMware infrastructure you have VMware ecosystem, you have VMware run books you have VMware partners, managing your on-prem assets what if I could you a path forward on any cloud of your choice without having to change any of your day-tot-day operation while leveraging the innovation future. What is the safest path for you, Mr Customer? And so, in this world, you can think of us being laggard in some sense. Because we're not pushing them to a single destination. We're giving them that choice, leveraging the strength. I think the innovative part that we've done today has really brought containers and VM'S in a single solution. We talked about containers killing VM'S two years ago, right? You know, VMware was getting trouble with docker VMware was going to be trouble with Openstack. Where are those two companies today and where is VMware? It's about simplifying for the customer a common solution. And we're taking those choices away and making this easy. Giving partners who can help them on their journey. So, I would say we're the safer choice. >> Okay >> That will be my response. >> Peter, we're not going to ask you about Openstack. (Giggles) >> I'm really back to VMware, it's working progress. (Giggles) >> Interesting point, the settlers right? At this point VMSware and AWS is two years old I think that first year, what was definitely some pioneers our there. But now I think we're really in there where the settlers are coming on and we're seeing large-scale adoption in the platform and now that VMware is offering more and more services, natively we can add more those managed services and help those customers really transform and not worry about the underlying IS that's rock-solid at this point. >> Peter, I would like you to get into it a little bit, kind of, the containerization and the kubernetes, you know, Docker, obviously a lot of hype, but containerization that's hugely important, you know a lot of the keynote this morning was talking about cloud native. I talked to lots of customers, you know there's some that, yes, they will want the VMware journey but many of them say, well, If I'm going to cloud I can just use containers. Why would I have the overhead of VM's? when cloud founders was originally created it was not for that type of environment. So where does that fit into, you know your world containers? >> Yeah, we actually launched some more services on that today as well, some more professional services and manage services, so safely around advanced kubernetes support, across all our platforms so this isn't just a VMware announcement this is on AWS, Microsoft, Badger and Google. So, another exciting progression, or hybrid could story and making investments in those resources to deliver kubernetes. We also launched a cloud native service block today, as well, that is really giving customers access to deep engineering skills and giving them cloud reliability engineers that can help them transform their workloads and get them ready for the cloud. >> I think, for us, if you... Project (mumbles) sorry tan zoo as a solution, and project pacific. Our two marquee announcements we made this week and if you look at the way we're focusing on the bull run manage aspects of the full life cycle and our active participation in the kubernetes community we're starting the beginnings of what I felt, like Java in 2000 when I was at BA, right? Where Weblogic and Java was the runtime for rolling and building new apps. Kubernetes and containers are the new runtime for building distributed apps across Cal platforms. And we're in this early journey and we are uniquely in opposition with the combination of pivotal for build. With project Pacific we're bringing containers into V&V-sphere, so VM's and containers become first class. Trough your point, we demonstrated eight percent performance improvement over bare metal on a V-sphere container based solution. Starting to engineer, based on a key scheduling work that we do in the kernel and in the hypervisor we're driving that deep into the kubernetes platform into the core platform itself. And then manage is going to be the new interesting bit. What is that control panel that everyone is going to fight over? And the manage services partner can help them choose. So, I think the battleground is more and more going to manage I think we secured our base with the runtime. And the bill will be about choice. (Mumbles) >> And Tan zoo is music to our ears we can now, again, focus on what's the additional manage services and service-- >> How do you help customers build apps? And change the engineering culture is what you provide. We just give you the runtime across any of these clouds. >> We want to help everyone, transform applications also transform the culture and how they do their business all that rapport-- >> Engineering transformation is a big one. Sajay transformation we talked about, internally for us VMware, same with our customers. You got to change the mindset of how you build the applications. In this container service based architecture >> Agree, agree >> What else is keeping folks up at night? That you talk to? Love to know that, just hot tail. >> Nothing keeps me up at night it's an exciting world we live in so loaded question, what excites me? What excites me is the progression, that VMware is making and the announcement Lydon video and GPU access link I think, early next year. I think that can be another wave of VMC adoptions. So, not keep me up at night but keep me interesting and excited. >> I think to that point I can build on what Pat said about tech for good, I mean we have a joined customer feeding America, right? We're now taking technology and making it available so that, you know, the 60 000 plus distribution centers they have, are up all the time. They're not even worried about infrastructure. They can focus on feeding the cause which is, I think 47 million people being fed. It's scary, right? >> Well, we want to bring it back to the organization of the discussion, you said you're helping customers with because we are worried you know, about how racking, stacking, configuring how doing all of those things, you know how do you help them? I talked to a number of customers at this show and they said look, my roles in my organization is still hardware to find And it's tough to move into a software role but if I want to get into the6 tech for good I need to be able to uplift my skills uplift my organizations, yeah. >> It's difficult, right? Organizational changes differ for every company but as part of the digital transformation there is also organizational transformation so we're having customers think about what is the progression form a VMware administrator to a DevOps-- >> Or cloud, I bet. (Giggles) >> It's not easy, it's your short answer on that. >> I think for us, is really starting to drive the cultural chance providing the tools and bring the self service in where they can be a coach, right? Be the trailblazer, who can come in and help change your organization. Teach them how to do it right. Not everyone will get there, hopefully bulk of the organization can shift right. >> Peter, I want to give you the final word you know, your partners and customers to understand. Take aways from VMware 2019. >> Yeah, it's great to be here, as usual thanks for having us. I think, Tan Zoo is really exciting. The progression that we're making with adding service blocks on top of VMware and AWS and or other hybrid cloud announcements. So, great to be here, but the Tan Zoo is kind of the story of the show. >> For me, it's a VMware is here to stay. We want to be, be have been, your strategic partner for the last decade. We're here to stay for the next decade. We're going to help you solve these hard complex problems and give you the choice you need. Across a broader ecosystem of partners and solutions. so, very excited to be here and to deliver that value. >> And Peter, thank you so much for joining us again, Bobby Allen, thank you for co-hosting. I'm Stu Miniman and as always thank you for watching theCUBE.
SUMMARY :
Brought to you by VMware I'm Stu Miniman and my co-host for this segment and both of these gentlemen So, first, over we have Ajay Patel, has here in San Francisco. and it's really easy to get in and out Yeah, super to be back in San Francisco. Yeah, you know, there is some debate in the last two years though. And that's one of the areas that we're continuing and how does the VMware software pull them all together. but you know, Rackspace and many of my VCP partners At some point it's just cloud. Here's the nuance I want to, you know, ask for a second and determine, maybe this is an AWS workload and the way to drive consistency driving a lot of the choices, when applications teams and you're looking to migrate that workload. And how do you bridge these two worlds and cons of different locations or different workloads. I talked to, it was, you know, I'm a VMware shop And let's help you leverage those address services. So that you can operate it more affectively and offer the customer what they need I want to ask you a little bit of a controversial question. how do I embrace all this newness And so, in this world, you can think of us Peter, we're not going to ask you about Openstack. I'm really back to VMware, it's working progress. in the platform and now that VMware is offering and the kubernetes, you know, Docker, obviously and manage services, so safely around and if you look at the way we're focusing And change the engineering culture is what you provide. how you build the applications. That you talk to? and the announcement Lydon video and GPU access link so that, you know, the 60 000 plus distribution centers of the discussion, you said (Giggles) and bring the self service in you know, your partners and customers So, great to be here, but the Tan Zoo is kind of and give you the choice you need. And Peter, thank you so much
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Ajay Patel | PERSON | 0.99+ |
Bobby Allen | PERSON | 0.99+ |
Ajay | PERSON | 0.99+ |
Bobby Allan | PERSON | 0.99+ |
Stu Miniman | PERSON | 0.99+ |
AWS | ORGANIZATION | 0.99+ |
Peter | PERSON | 0.99+ |
Rackspace | ORGANIZATION | 0.99+ |
VMware | ORGANIZATION | 0.99+ |
Microsoft | ORGANIZATION | 0.99+ |
San Francisco | LOCATION | 0.99+ |
2010 | DATE | 0.99+ |
Bobby | PERSON | 0.99+ |
two companies | QUANTITY | 0.99+ |
2000 | DATE | 0.99+ |
Peter FitzGibbon | PERSON | 0.99+ |
CUBE | ORGANIZATION | 0.99+ |
Pat | PERSON | 0.99+ |
tenth year | QUANTITY | 0.99+ |
ORGANIZATION | 0.99+ | |
20-year | QUANTITY | 0.99+ |
both | QUANTITY | 0.99+ |
10 years | QUANTITY | 0.99+ |
two | QUANTITY | 0.99+ |
Java | TITLE | 0.99+ |
two groups | QUANTITY | 0.99+ |
Accenture | ORGANIZATION | 0.99+ |
Vegas | LOCATION | 0.99+ |
Sanjay Poon | PERSON | 0.99+ |
one | QUANTITY | 0.99+ |
first | QUANTITY | 0.99+ |
two sides | QUANTITY | 0.99+ |
three days | QUANTITY | 0.99+ |
two years ago | DATE | 0.99+ |
eight percent | QUANTITY | 0.99+ |
over 10 000 data centers | QUANTITY | 0.98+ |
early next year | DATE | 0.98+ |
three months | QUANTITY | 0.98+ |
thousands | QUANTITY | 0.98+ |
next decade | DATE | 0.98+ |
47 million people | QUANTITY | 0.98+ |
Badger | ORGANIZATION | 0.98+ |
first year | QUANTITY | 0.98+ |
ITA | ORGANIZATION | 0.98+ |
Stu | PERSON | 0.98+ |
each | QUANTITY | 0.98+ |
VMworld | EVENT | 0.98+ |
Two years ago | DATE | 0.98+ |
Paul Noglows, Forbes Media - Food IT 2017 - #FoodIT #theCUBE
>> Narrator: From the Computer History Museum in the heart of Silicon Valley it's the Cube, covering Food IT: Fork to Farm brought to you by Western digital. >> Hi welcome back to the Cube. We are at the fourth annual Food IT: Fork to Farm event at the Computer History Museum. I'm Lisa Martin with my cohost Jeff Frick Very excited to to welcome our next guest, Paul Noglows, who is the executive producer of the Forbes AgTech Summit. Paul, welcome to the Cube. >> Thank you >> So we're in the heart of Silicon Valley right now, but you are the creator of the Forbes AgTech Summit, which happens tomorrow, June 28th and 29th in Salinas, the salad bowl of America. Talk to us about this event that you've created. What was the genesis of this, and why Salinas? >> We were doing a series at Forbes in 2014 called reinventing America, and we were going around cities mostly in the midwest, but we were mostly looking at industries that were really reinventing themselves and remaking themselves, so we focused on advanced manufacturing in Chicago, we focused on healthcare in Indianapolis, then we went up to Detroit and we focused on reinventing the workforce. So we did a series of five shows over 15 months. And the last one, we thought we were going to reinvent the farm, and we thought we were going to do it somewhere in the Midwest. But we got a proposal from the city of Salinas and they said, why don't you come out and see what we got here, and it's the salad bowl of the world, and I knew Monterey pretty well from having lived out here, and we used to take our kids down to the Monterey Aquarium, but I never really knew Salinas or the Salinas valley. So I got a tour from the former mayor, Dennis Donohue, and it was just we were blown away by how much was going on, and really, it's become the epicenter of AgTech innovation. We're just thrilled at Forbes that we were able to be part of that and to support it. And the summit has grown dramatically over the three years, and so we're really looking forward to a terrific show. >> Tell us about the growth that you've achieved in this summit. The opportunities, the types of people that are there, and what they are going to be able to see and discuss. >> Yeah, We started out with about 400 participants in the summer of 2015, we had 20 startups, but it's really mushroomed from there. This year, we're have 650 participants, we'll have 50 companies in the innovation showcase, we've expanded the field demos and the plant tours to a full day. About a good third of our audience are farmers, and that's really been the secret sauce for us. Is that we've priced the summit right. There's a lot of summits out there, and people are starting to get big numbers for an afternoon at the Marriot Marquee. Ours is really different, we've kept the rate low enough so that farmers can participate, and we love to have everyone outside. We do it all under giant white tent right out in front of the Taylor building on main street in Salinas, and we also have people out at the local processing plants and the local fields. We go out to Hartnell's Alisal campus and we use the USDA test field. >> Its interesting because Salinas has been at the forefront of Ag Innovation a long time ago. It was one of the first refrigerated rail cars to try to get fresh lettuce for salad to Chicago. I remember reading about that numerous times, and the first couple didn't work that well. >> Well it's really amazing. It's been such a privilege to deal with folks Bruce Taylor. It was Bruce's father and grandfather who really were the pioneers of iceburg lettuce. The more you get into it, you know, I've gotten really passionate about it and the history and everything else. You see the continuation today, and with the developments. And, even if it's a Taylor farm putting a startup's robotics, putting them in their processing plants. This is really the cutting edge of AgTech innovation. >> So I'm curious, we cover a lot of big tech events, usually more on the infrastructure side, this is really on the application side. So as you look at cloud, and edge computing, and big data, and mobile, and some of these big trends. What if you can just highlight some of the ones that really jump out to you that have enabled some of these innovations, autonomous vehicles obviously drones, we're seeing so much of it, but now they're putting it to work. >> Yeah, I think you're absolutely right. I mean, there's so much going on. We look in field robotics, we look at precision automation, precision agriculture, and the use of big data, and the ability to harness that and to really apply it, it's changed a lot of things. It's changed the way we can grow. It's also changing consumer's tastes in what consumers want. And that's a lot of what we're talking about here today. So it really has been revolutionary. I think we need the industry, we need to industry to really agriculture itself to get really get together. I think sometimes there still this is looked at as competitive advantage, so what I, we, find interesting is are we going to move beyond competitive advantage and what's good for your plant or your farm. Is there going a collective effort to really start applying this across the agricultural system. >> What are the interesting things that they talked about this morning in the general session was and the theme of the event. We're so used to farm to table, farm to fork, and I looked at that and fork to farm? The consumer is so empowered, very demanding. Right, we want cage free, we want organic, we want hormone free, we want, we've changed the distribution model. How are, but also there's this paradox of the consumer not wanting factory farms. How are farmers, you said quite a bit of the attendees are farmers, how are they embracing this consumer demand with technologies like big data, cloud computing, block chain? >> Well I think it's really the key. It's that you have different farmers and different processors. There's a wide spectrum in terms of adoption and in terms of innovation. But they are putting it to work, and that's why there's so much interest in the startups, and there's so much interest in how can we do this more efficiently, how can we do this better. I think it used to be that you basically needed to have a crisis, like the ecoli crisis, for things to really change in the industry. But hopefully, we've moved beyond that. In that it's not going to take a crisis for folks to really start embracing these new technologies. >> So then in the other trend that has come up in a number of times in doing some background in this show is that there's not only kind of the very organic, cage free specialty demands in the customer. On the other hand, the population is growing, and we got to feed 10 billion people, I think number is projected by 2050. There's no new dirt being created last time I checked, except in Hawaii. How are the farmers embracing that challenge specifically cause, it's kind of this bipolar thing, one you want to increase specialization, on the other hand you got to get yields way way up at massive scale. >> Well, and that's it, and it's really looking at how do you increase yield. This is a lot of the interest. This is a lot of the interest in genetics and everything else and looking at the real science of growing. But it's also interesting in this is a little bit more further afield, but I was talking to Bruce Taylor even about kale. You know 10 years ago kale was considered a throwaway crop. >> Right >> Paul: It wasn't even harvested. And now you look at the impact kale is having on the American diet and you know you have a crop that represented really nothing probably as recently as five years ago. >> Jeff: Right >> Now it's an important crop. So there's all sorts of innovation, all sorts of different ways of looking at things, but I do think for the most part that's the reason we have those things. We've always been adamant that we don't want to get people together to talk about 2050, we're not futurist. We're looking at near term solutions to current problems. So what we're really interested in, you know, what is the farm of 2020 look, not the farm of 2050. >> Jeff: Right, right >> As we look at California that's just come out of this severe drought, the event being hosted in the salad bowl of the, really, the world, what are some of the challenges that are really common across farms, across the heartland of America? Water, planting inefficiencies, harvesting or supply chains, are you seeing a lot of commonalities? >> There are a lot of commonalities. I think there's a mistake. We actually have a conversation tomorrow. I kind of feel like the assumption is all the water problems are over, and the water problems are not over. They maybe over for a short period of time, but I am fully convinced that this is going to be. Two years ago this was the topic du jour at our conference. I'd say this year probably the major topic is labor. And labor, you see, having tremendous impact. You have, across the country. And so, you have the issues of immigration, you've got issues of minimum wage, that certain farms are saying we don't know how we are going to do this. >> Lisa: Right >> We don't know how to make this work. But the major pressures, things like that water, labor, those haven't gone away, and those haven't been solved. But that's why we're all getting together. That's why we're here today, and that's why we're going to be down in Salinas Wednesday and Thursday. >> And on the labor front, it's that you've talked about the Californian minimum wage is going up quite considerably. But it's also things like an aging farming population, and there's, you can see the value there from a big data perspective to be able to capture, to facilitate some automation and drive the next generation of >> Paul: Well >> Lisa: the farmers. >> And one of the ways we're going to close our conference on Thursday afternoon is I'm going to moderate a discussion on farmers of the future. Because we've all heard it, we've all heard it time and time again. The average of the American farmer, I think it's pushing 70 years old, and there's no succession planning and that no body gets into this business unless they're basically born into it or forced into it in some way, and what we're finding is that it's not really true. We're putting up four young farmers, who are really making a difference, and who are applying innovation to be able to build their farms. And so, we think that it's actually more hopeful, and more interesting than may at first blush. So yeah, we do think there is a future for farming, and we're determined to explore it to its fullest. >> That's fantastic. Aught to be a fly on the wall on that conversation. Well Paul, thank you so much for joining us on the Cube, and we wish you the best of luck in your third annual Forbes AgTech Summit in the salad bowl. If you haven't been to Salinas, as Paul said, it's worth a drive down there, it's incredible. Roll down the window, take a nice breath in, and it's a beautiful place. And again, we wish you the best of luck at that summit, and we look forward to hearing about some of the great things that come out of that. >> Paul: Thank you >> And we want to thank you at the Cube at the Food IT: Fork to Farm event, I'm Lisa Martin with my cohost Jeff Frick. Stick around, we're going to be right back.
SUMMARY :
in the heart of Silicon Valley We are at the fourth annual Food IT: Fork to Farm in Salinas, the salad bowl of America. And the last one, we thought we were going to The opportunities, the types of people in the summer of 2015, we had 20 startups, and the first couple didn't work that well. This is really the cutting edge of AgTech innovation. some of the ones that really jump out to you that have and the ability to harness that and I looked at that and fork to farm? and there's so much interest in how can we do this the population is growing, and we got to feed 10 billion This is a lot of the interest. And now you look at the impact kale is having on the that's the reason we have those things. I kind of feel like the assumption is all the But the major pressures, things like that And on the labor front, it's that you've talked about The average of the American farmer, I think it's pushing And again, we wish you the at the Food IT: Fork to Farm event, I'm Lisa Martin
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
David | PERSON | 0.99+ |
Michael | PERSON | 0.99+ |
Paul | PERSON | 0.99+ |
David Brown | PERSON | 0.99+ |
Chris | PERSON | 0.99+ |
Dennis Donohue | PERSON | 0.99+ |
Michelle Lin | PERSON | 0.99+ |
Rebecca Knight | PERSON | 0.99+ |
Dave Vellante | PERSON | 0.99+ |
Jeff Frick | PERSON | 0.99+ |
Lisa Martin | PERSON | 0.99+ |
Indianapolis | LOCATION | 0.99+ |
Herain Oberoi | PERSON | 0.99+ |
Chris Wright | PERSON | 0.99+ |
Jeff | PERSON | 0.99+ |
Rebecca | PERSON | 0.99+ |
JJ Davis | PERSON | 0.99+ |
Paul Noglows | PERSON | 0.99+ |
John Fourier | PERSON | 0.99+ |
Bruce | PERSON | 0.99+ |
John Farrier | PERSON | 0.99+ |
Boeing | ORGANIZATION | 0.99+ |
Manoj Agarwal | PERSON | 0.99+ |
Dave Nicholson | PERSON | 0.99+ |
Cassandra Garber | PERSON | 0.99+ |
ORGANIZATION | 0.99+ | |
Andy | PERSON | 0.99+ |
2013 | DATE | 0.99+ |
Boston | LOCATION | 0.99+ |
Lisa | PERSON | 0.99+ |
Amazon | ORGANIZATION | 0.99+ |
Gil Haberman | PERSON | 0.99+ |
JJ | PERSON | 0.99+ |
Jen Saavedra | PERSON | 0.99+ |
Chicago | LOCATION | 0.99+ |
Michelle Adeline | PERSON | 0.99+ |
Europe | LOCATION | 0.99+ |
Microsoft | ORGANIZATION | 0.99+ |
Nutanix | ORGANIZATION | 0.99+ |
Stu Miniman | PERSON | 0.99+ |
Michael Dell | PERSON | 0.99+ |
Bruce Taylor | PERSON | 0.99+ |
AWS | ORGANIZATION | 0.99+ |
tomorrow | DATE | 0.99+ |
California | LOCATION | 0.99+ |
eight | QUANTITY | 0.99+ |
Palo Alto | LOCATION | 0.99+ |
Michelle Zatlyn | PERSON | 0.99+ |
two years | QUANTITY | 0.99+ |
John | PERSON | 0.99+ |
Dell | ORGANIZATION | 0.99+ |
1999 | DATE | 0.99+ |
McLaren | ORGANIZATION | 0.99+ |
2020 | DATE | 0.99+ |
Anaheim | LOCATION | 0.99+ |
Red Hat | ORGANIZATION | 0.99+ |
Salinas | LOCATION | 0.99+ |
thousands | QUANTITY | 0.99+ |
Las Vegas | LOCATION | 0.99+ |
91% | QUANTITY | 0.99+ |
San Francisco | LOCATION | 0.99+ |
Fred | PERSON | 0.99+ |
18% | QUANTITY | 0.99+ |
Dell Technologies | ORGANIZATION | 0.99+ |