Image Title

Search Results for Moritz Mann:

Moritz Mann, Open Systems AG | CUBEConversations, July 2019


 

>> from our studios in the heart of Silicon Valley, Palo Alto, California. It is a cute conversation. >> Everyone. Welcome to this Special Cube conversation here at the Palo Alto Cube Studios. I'm John for a host of Cuba here. Moritz man is the head of the product management team at Open Systems A G. Great to see you again. Thanks for coming in. >> Hey, John. Thanks for having me. >> So last time we spoke, you had your event in Las Vegas. You guys are launching. You have a new headquarters here in Silicon Valley. Opened up this past spring. Congratulations. Thank you. >> Yeah, it's a great, great venue to start, and we set foot on the Silicon Valley ground. So to make our way to >> I know you've been super busy with the new building and rolling out, expanding heavily here in the Valley. But you guys were in the hottest area that we're covering Security Cloud security on premise, security. The combination of both has been the number one conversation pretty much in the cloud world right now. Honestly, besides a normal cloud, native cloud I t hybrid versus multi cloud out. See, that continues to be the discussion I think there's no more debate around multi cloud in hybrid public clouds. Great people gonna still keep their enterprises. But the security equation still is changing this new requirements. What's the latest that you guys are seeing with respect to security? >> Yeah. So, John, what we see is actually that cloud adoption had happens at different speeds. So you have usually the infrastructure of the service. Adoption would happens in a quite controlled way because there's a lift in shift. Do you have your old data center? You you take it and you transferred into azure I W S O G C P. But then there's also uncontrolled at option, which is in the SAS space. And I think this is where a lot off data risk occur, especially the wake off GDP are on where we see that this adoption happens. Maurin a sometimes control, but sometimes in a very uncontrolled way, >> explain that the uncontrolled and controlled expansion of of how security and multi cloud and cloud is going because this interesting control means this this plan's to do stuff uncontrolled means it's just by other forces explain uncontrolled versus controls >> eso controlled specifically means the IittIe team takes as a project plan and aches servers and workloads and moves them in a controlled fashion or in a dedicated project to the cloud. But what happened in the business world of business I t is actually did use those share content at any time with any device at any at any time and in all locations. So this is called the Mobile Enterprise on the Cloud First Enterprise. So it means that the classical security perimeter and the controls in that are my past, actually, by the path of least resistance or the shortest path >> available. And this is the classic case. People use Dropbox with some, you know, personal things. They're at home, they're at work, a p I based software. That's what you're getting at the >> and the issue of this is that that the data that has bean, like contained an pera meters where, you know, as it Caesar, where your data is. This has bean deployed too many edge devices, too many mobile devices, and it's get it gets shared, a nun controlled way. >> We'll get a couple talk tracks would like to drill down on that, because I think this is the trend. We're seeing a pea eye's dominant. The perimeter on the infrastructure has gone away. It's only getting bigger and larger. You got I, O. T and T Edge just and the networks are controlled and also owned by different people. So the packets of moving on it that's crazy so that that's the reality. First, talk track is the security challenge. What is the security challenge? How does a customer figure out what to do from an architectural standpoint when they're dealing with hybrid and multi cloud? So first of >> all, um, customers or BC enterprises try need to re think their infrastructure infrastructure centric view off the architecture's. So the architecture that had been built around data send us needs to become hybrid and multi cloud aware. So that means they need to define a new way off a perimeter, which is in cloud but also in the covering. Still the old, so to say, legacy hyper data center set up, which has the data still in the old data center and at the same time, they need to open up and become the cloud themselves, so to say, and but still draw a perimeter around their data and they users and not and their applications and not so much anymore around the physical infrastructure. >> So taking, changing their view of what a security product is, Is that really what you're getting at? >> Yeah, So the issues with the product point solution was that they fixed a certain part off off a tactile issue. So if you take a firewall in itself, firewall back then it was like a entry door to a big building, and you could could decide who comes out goes in. Now. If the the kind of the walls of the building are vanishing or arm or more FIC, you need to come over the more integrated concept. So having these stacked appliance and stacked security solutions trying to work together and chain them doesn't work anymore. So we think and we see that, >> Why is that? Why doesn't it work? Because in >> the end, it's it's it's hardly two to operate them. Each of those points solutions have their own end off life. They have their own life cycle. They have their own AP eyes. They have their own TCO, as all that needs to be covered. And then there's the human aspect where you have the knowledge pools around >> those technologies. So as an enterprise you have to content to continuously keep the very scar security experts to maintain content continues the depreciating assets running right, >> and they're also in it. We weren't built for tying into a holistic kind of platform. >> Yeah, What we see is that that enterprises now realize we have data centers and it's not accepted reality that you can abstracted with the cloud. So you have You don't own your own servers and buildings anymore. So you have a PAX model to subscribe to Cloud Service is and we think that this has to happen to security to so shift from cap ex to our pecs and the same way also for operational matters >> securities. The service is a crepe is a small I want to ask you on that front you mentioned mobile users. How do you secure the mobile uses when they use cloud collaboration? Because this is really what uses expect, and they want How do you secure it? >> So be secured by by actually monitoring the data where it actually gravitates, and this is usually in the cloud. So we enforce the data that is in transit through, ah, proxies and gators towards the cloud from the endpoint devices, but also then looking by AP eyes in the cloud themselves to look for threats, data leakage and also sandbox. Certain activities that happened. There >> are the next talk talk I want to get into is the expansion to hybrid and multi cloud so that you guys do from a product standpoint, solution for your customers. But in general, this is in the industry conversation as well. How how do you look at this from a software standpoint? Because, you know, we've heard Pat Gelsinger of'em were talking about somewhere to find Data Center S d n. Everything's now software based. You talk about the premiere goes away. You guys were kind of bring up a different approaches. A software perimeter? Yeah, what is the challenge for expanding to multi cloud and hybrid cloud? >> So So the challenge for enterprise and customers we talked to is that they have to run their old business. Gardner once called it by motile business, and it's still adopting not one cloud, but we see in our surveys. And this is also what market research confirms is that customers end up with 2 to 3 loud vendors. So there were will be one or two platforms that will be the primary to their major majority of applications and data gravity. But they will end up and become much more flexible with have running AWS, the old Davis Center. But it was the G, C, P and Azure, or Ali Baba glowed even side by side, right tow cover the different speeds at what their own and the price runs. And >> so I gotta ask you about Cloud Needed was one of the things that you're bringing up that just jumps in my head. And when I got to ask, because this is what I see is a potential challenge. It might be a current challenges when you have kubernetes growing such a rapid rate. You see the level of service is coming online much higher rate. So okay, people, mobile users, they're using the drop boxes, the boxes and using all these FBI service's. But that's just those wraps. As a hundreds and thousands of micro service is being stood up and Tauron down in there, you guys are taking, I think, an approach of putting a perimeter software premieres around these kinds of things, but they get turned on enough. How do you know what's clean? It's all done automatically, so this is becoming a challenge. So is this what you guys mean when you say software perimeter that you guys could just put security around things at any time? Is that explain this? >> Yeah, So? So if you talk about the service match so really mashing cloudy but native functions, I think it's still in the face where it's, I would say, chaos chaotic when you have specific projects that are being ramped up them down. So we draw a perimeter in that specific contact. So let's say you have You're ramping up a lot off cloud a function AWS. We can build a pyramid around this kind off containment and look especially for threats in the activity locks off. The different component is containers, but from from a design perspective, this needs to be, uh, we need to think off the future because if you look at Mike soft on AWS strategy, those containers will eventually move Also back to the edge. Eso were in preparing that to support those models also cover. Bring these functions closer back again to the edge on We call that not any longer the when, ej but it will become a cloud at at actually. So it's not an extension of the land that comes to the data. It's actually the data and the applications coming back to the user and much closer. >> Yeah. I mean, in that case, you could define the on premises environment has an edge, big edge, because this is all about moving, were close and data around. This is what the new normal is. Yeah, So okay, I gotta ask the next question, which is okay, If that's true, that means that kubernetes becomes a critical part of all this. And containers. How do you guys play with that at all? >> So we play with us by by actually looking at data coming from that at the moment. We're looking at this from a from a data transit perspective. We But we will further Maur integrate into their eighties AP eyes and actually become part off the C I C D. Process that building then actually big become a security function in approval and rolling out a cannery to certain service mesh. And we can say, Well, this is safe for this is unsafe This is, I think, the eventual goal to get there. But But for now, it's It's really about tracking the locks of each of those containers and actually having a parent her and segmentation around this service mash cloud. So to say, >> I think you guys got a good thing going on when you talk about this new concept that's of softer to find perimeter. You can almost map that to anything you get. Really think everything has its own little perimeter workload. Could be moving around still in these three secure. So I gotta ask on the next talk Trek is this leads into hybrid cloud. This is the hottest topic. Hybrid cloud to me is the same as multi cloud. Just kind of get together a little bit different. But hybrid cloud means you're operating both on premises and in the cloud. This is becoming a channel most si si SOS Chief admission Security officers. I don't want to fork their teams and have multiple people coding different stacks. They don't want the vendor lock in, and so you're seeing a lot of people pulling back on premises building their own stacks, deploying in the cloud and having a seamless operation. What is your definition of hybrid? Where do you see hybrid going? And how important is it? Have a hybrid strategy. >> So I think the key successfactors of a hybrid strategy is that standards standardization is a big topic. So we think that a service platform that to secure that like the SD when secure service platform rebuilt, needs to be standardized on operational level, but also from a baseline security and detection level. And this means that if you run and create your own work, those on Prem you need to have the same security and standard security and deployment standard for the clout and have the seamless security primary perimeter and level off security no matter where these these deployments are. And the second factor of this is actually how do you ensure a secure data transfer between those different workloads? And this is where S T win comes into play, which acts as a fabric together with when backbone, where we connect all those pieces together in a secure fashion >> where it's great to have you on the Q and sharing your insight on the industry. Let's get into your company. Open systems. You guys provide an integrated solution for Dev Ops and Secure Service and Security Platform. Take a minute to talk about the innovations that you guys were doing because you guys talk a lot about Casby. Talk a lot about integrated esti when but first define what Casby is for. The audience doesn't know what Casby is. C. A S B. It's kicked around all of the security conscious of your new to security. It's an acronym that you should pay attention to so defined casby and talk about your solution. >> Eso casby isn't theory. Aviation means cloud access security we broker. So it's actually becoming this centralized orchestrator that that allows and defines access based on a trust level. So saying, um, first of all, it's between networks saying I have a mobile workforce accessing SAS or I s applications. Can't be it in the middle to provide security and visibility about Where's my data moving? Where's married? Where do I have exposure off off GDP, our compliance or P C. I or he power risks And where is it exposed to, Which is a big deal on it's kind of the lowest level to start with, But then it goes further by. You can use the Casby to actually pull in data that that is about I s were close to toe identified data that's being addressed and stored. So are there any incidentally, a shared data artifacts that are actually critical to the business? And are they shared with extra resource is and then going one step further, where we then have a complete zero trust access model where we say we know exactly who can talkto which application at any time on give access to. But as everything this needs to be is in embedded in an evolution >> and the benefit ultimately goes to the SAS applications toe, have security built in. >> That's the first thing that you need to tackle. Nowadays, it's get your sass, cloud security or policy enforced on, but without disrupting service on business on to actually empower business and not to block and keep out the business >> can make us the classic application developer challenge, which is? They love to co they love the build applications, and what cloud did with Dev Ops was abstracted away the infrastructure so that they didn't have to do all this configuration. Sister. Right? APs You guys air enabling that for security? >> Exactly. Yeah. So coming back to this multi protein product cloud would, which is not keeping up anymore with the current reality and needs of a business. So we took the approach and compared death ops with a great service platform. So we have engineers building the platform. That's Integrated Security Service Platform, which promotes Esti Wen managed Detection response and Caspi Service is in one on the one platform which is tightly integrated. But in the in the customer focus that we provide them on or Pecs model, which is pretty, very predictable, very transparent in their security posture. Make that a scalable platform to operate and expand their business on. >> And that's great. Congratulations. I wanna go back for the final point here to round up the interview for the I T. Folks watching or, um, folks who have to implement multi cloud and hybrid cloud they're sitting there could be a cloud architect that could be an I T. Operations or 90 pro. They think multi cloud this in hybrid club. This is the environment. They have to get their arms around. How? What >> should they >> be thinking about? Around multi cloud and hybrid cloud. What is it, really? What's the reality now? What >> should they be considering for evaluation? What are some of the key things that that should be on their mind when they're dealing with hybrid cloud and all the opportunity around it? >> So I think they're they're like, four key pieces. Oneness. Um, they think they still have to start to think strategic. So what? It's a platform and a partner That helps them to plan ahead for the next 3 to 5 years in a way that they can really focus on what their business needs are. This is the scalability aspect. Secondly, it's a do. We have a network on security, our architecture that allows me to grow confidently and go down different venues to to actually adopt multi clouds without worrying about the security implication behind it. Too much, uh, and to implement it. And third is have this baseline and have this standardized security posture around wherever the data is moving, being at Mobil's being it SAS or being on Prem and in clouds workloads, the fourth pieces again, reading, thinking off where did you spend most of my time? Where do I create? Create value by by defining this framework so it really can create a benefit and value for the enterprise? Because if you do it not right your not right. You will have a way. You will end up with a an architecture that will break the business and not accelerated. >> Or it's made head of product that open systems here inside the Cube studios. Um, great job. Must love your job. You got the keys. A lot of pressure. Security being a product. Head of product for security companies. A lot of pressure before we wrap up. Just give a quick plug for the company. You guys hiring you have a new office space here in Redwood City. Looks beautiful. Give a quick shared play for the company. >> Yeah. So open systems the great company to work with. We're expanding in the U. S. On also, Amy, uh, with all the work force. So we're hiring. So go on our website. We have a lot off open positions, exciting challenges in a growth or into workspace. Andi. Yeah. As you said, security at the moment, it's one of the hottest areas to be in, especially with all the fundamental changes happening in the enterprise and architecture. I d landscape. So yeah, >> and clouds securing specifically. Not just in point. The normal stuff that people used to classify as hot as hot as Hades could be right now. But thanks for coming on. Strong insights. I'm jumping with Cuba here in Palo Alto with more Morris Man is the head of product management for open systems. Thanks for watching.

Published Date : Jul 18 2019

SUMMARY :

from our studios in the heart of Silicon Valley, Palo Alto, A G. Great to see you again. So last time we spoke, you had your event in Las Vegas. So to make our way to What's the latest that you guys are seeing with respect to security? So you have usually the infrastructure of the service. So it means that the classical People use Dropbox with some, you know, personal things. and the issue of this is that that the data that has bean, So the packets of moving on it that's crazy so that that's the reality. So that means they need to define a new way off a perimeter, So if you take a firewall in itself, firewall back then it was like a entry where you have the knowledge pools around So as an enterprise you have to content to continuously keep and they're also in it. So you have You don't own your own servers and buildings The service is a crepe is a small I want to ask you on that front you mentioned mobile users. So be secured by by actually monitoring the data are the next talk talk I want to get into is the expansion to hybrid and multi cloud so that you guys do So So the challenge for enterprise and customers we talked to is that they have to So is this what you guys mean when you say software perimeter that you guys could just put security So it's not an extension of the land that comes to the data. Yeah, So okay, I gotta ask the next question, which is okay, If that's true, that means that kubernetes So to say, So I gotta ask on the next talk Trek is this leads into hybrid cloud. And the second factor of this is actually how do you ensure Take a minute to talk about the innovations that you guys were doing because you guys Can't be it in the middle to provide security That's the first thing that you need to tackle. and what cloud did with Dev Ops was abstracted away the infrastructure so that they didn't have to do But in the in the customer focus This is the environment. What's the reality now? This is the scalability aspect. Or it's made head of product that open systems here inside the Cube studios. We're expanding in the U. The normal stuff that people used to classify as hot as hot

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
JohnPERSON

0.99+

oneQUANTITY

0.99+

Silicon ValleyLOCATION

0.99+

Palo AltoLOCATION

0.99+

AmyPERSON

0.99+

2QUANTITY

0.99+

AWSORGANIZATION

0.99+

Las VegasLOCATION

0.99+

Redwood CityLOCATION

0.99+

Moritz MannPERSON

0.99+

Silicon ValleyLOCATION

0.99+

Pat GelsingerPERSON

0.99+

July 2019DATE

0.99+

U. S.LOCATION

0.99+

second factorQUANTITY

0.99+

hundredsQUANTITY

0.99+

thirdQUANTITY

0.99+

two platformsQUANTITY

0.99+

CubaLOCATION

0.99+

FirstQUANTITY

0.99+

fourth piecesQUANTITY

0.98+

EachQUANTITY

0.98+

Mike softPERSON

0.98+

MoritzPERSON

0.98+

bothQUANTITY

0.98+

twoQUANTITY

0.98+

S T winTITLE

0.98+

FBIORGANIZATION

0.98+

DropboxORGANIZATION

0.98+

T EdgeORGANIZATION

0.97+

Morris ManPERSON

0.97+

Palo Alto, CaliforniaLOCATION

0.97+

SecondlyQUANTITY

0.97+

AndiPERSON

0.96+

firstQUANTITY

0.96+

Dev OpsTITLE

0.96+

Davis CenterORGANIZATION

0.96+

first thingQUANTITY

0.95+

eachQUANTITY

0.94+

Data CenterORGANIZATION

0.94+

one platformQUANTITY

0.93+

5 yearsQUANTITY

0.93+

Open Systems AGORGANIZATION

0.93+

MobilORGANIZATION

0.92+

3 loud vendorsQUANTITY

0.92+

O. TORGANIZATION

0.92+

one cloudQUANTITY

0.9+

3QUANTITY

0.88+

SASORGANIZATION

0.88+

GORGANIZATION

0.88+

Open Systems A G.ORGANIZATION

0.87+

MaurPERSON

0.84+

GardnerPERSON

0.84+

Palo Alto Cube StudiosORGANIZATION

0.83+

TauronPERSON

0.81+

Chief admission Security officersPERSON

0.81+

eightiesDATE

0.78+

four key piecesQUANTITY

0.76+

deathTITLE

0.75+

PecsORGANIZATION

0.75+

CloudTITLE

0.74+

past springDATE

0.74+

one stepQUANTITY

0.73+

zeroQUANTITY

0.73+

threeQUANTITY

0.72+

CubeORGANIZATION

0.65+

CasbyORGANIZATION

0.63+

HadesPERSON

0.63+

CORGANIZATION

0.62+

MaurinLOCATION

0.61+

SOSPERSON

0.61+

CasbyTITLE

0.59+

PremORGANIZATION

0.58+

AliTITLE

0.57+

BabaPERSON

0.56+

DevTITLE

0.54+

EsoORGANIZATION

0.54+

micro serviceQUANTITY

0.52+

CUBEConversationsEVENT

0.51+

AzureORGANIZATION

0.5+

thousandsQUANTITY

0.5+

90QUANTITY

0.49+

opsORGANIZATION

0.48+

pro.ORGANIZATION

0.45+

CaspiTITLE

0.44+

Moritz Mann, Open Systems | Open Systems, The Future is Clear With SD-WAN & Security


 

>> From Las Vegas, it's theCUBE, covering Open Systems. The future is crystal clear with security and SD-WAN. Brought to you by Open Systems. >> Okay, welcome back, CUBE coverage here in Las Vegas. I'm John Furrier, host of theCUBE. We are here at the Chandelier Bar at the Cosmopolitan Hotel, also known as Cosmo. We're here as part of Open Systems exclusive, expert, influencer and customer party. As part of the overall week going on, Gartner's big event going on. A lot of action. We're here and our next guest is Moritz Mann. He's Chief Product Officer, CPO of Open Systems. Welcome to theCUBE. Thanks a lot. >> Yeah, good evening. >> So you got the keys to the kingdom, the product, the chief product officer has to run all the products. >> Yes, of course. You're in high demand from engineering to marketing. >> And sales of course and the customers. >> Sales, where's the product? Sales blames product, product blames sales. You know, you got to have that relationship if it's harmonious. >> Of course. >> It'll work. >> You guys are successful so it's working. >> Yeah it is and actually I think the most important part in the equation are the customers. I see more of the sales and especially customer success as kind of the gateway towards the customer to actually figure out where can we solve more problems for our customers and then create value. >> Can you step back and explain the value preposition for your product? First, describe the product or products >> Yeah. >> or core products, and the main value preposition. >> Open Systems was founded to, actually solve the key issue of a modern enterprise, which is, helping enterprises to actually master the digital transformation. And digital transformation is like a big, one of those big words, and in action it means that you have enterprises adopting multi cloud environments, connecting different locations cost efficiently, but also securing they keep business processes at the same time, so our solution comes in as a platform approach and would solve these issues by connecting, actually the end users, the business processes with the cloud and the applications and the customers. >> So operations is a big part of your success. >> Yeah, so-- >> Operating, helping operators. >> Exactly, so despite being just another yet appliance vendor, or a product vendor, or infrastructure vendor, we offer our services as a true service solution, which is-- >> Service or server? >> Service, so it's a managed service that you subscribe as a service, you consume as a service, you pay by per user, you don't have to worry about hard work, appliance costs, and actually scaling of these costs and suffer-- >> Yeah, so classic asses model. What problem are you solving for the customer? What's the way you guys are winning, why are they using you guys, why are they buying you? >> Yeah, I think one of the key, what we bring, keys that we bring is alternate key solution that comes with the operation's excellence included and manage operation's part. And one of the key differentiators is that we have an extraordinary security stack, in this SD-WAN platform, so we're not only providing and delivering applications for the users and customers but we are also protecting those applications from threats like ransomware attacks, red actors inside the network, and in the cloud environments. >> Explain the security stack piece, that's build into the SD-WAN product? >> Yeah. >> And that's a glued software you guys wrote? >> Yeah, so we have an OAM, it's like a highly scalable platform that consist of open source components with OM premium components, to do, like a DPI application detection and security threat detection, and these security functions can be enabled by use case, so for instance we have a piece that just, primarily they are to detect any lateral movement to prevent another ransomware attack like Maersk got into. >> So I'm going to ask you a question, I'll put you on the spot. So, I'm a customer. >> Yeah. >> And sometimes, I don't know, I have a problem, I'm a frog in bowling water, whatever the metaphor is, and I got issues. When do I know when to call you? What's happening around me, as a customer, to call up Open Systems to solve my problem? What are some of the symptoms I might see? What does it look like? Is it security sprawl? Are there solutions? Is it just not enough staff? What are some of these symptoms that make me want to dial you guys up? >> Great question. So one of those symptoms is that you notice that your end users are complaining so they have spotty internet, they have slow internet access, or you have SAP applications honors, for instance, that are very unsatisfied about the application's performance inside de WAN, or to the cloud. And you will notice that that's when we will get called and we will help you to actually maximize your network so you can actually focus on your core business, and not about where do I have to scare the infrastructure. >> So, performance is number one. >> It's performance. >> So basic performance stuff, what else? >> It's all about also visualizing and telling where actually do the customers have a good, or end users have a good performance of the network, and where do I have to actually expand and invest in the network and the cloud environment to actually improve customer's performance. >> Okay so here's another one: Hey, Moritz! I already got security covered. Why do I need more security, when? What gives? >> Yeah, I mean, security, you can spend endless money in security and yet have another appliance, and have another product to patch, like a Tect O problem, but you will end up in a growing stack of complexity. We'll provide you with a very strategic solution, that will help you to cover to 80% of your problems and in the end you have a budget of solutions that prevents the most of your threats to your network and to your applications. >> Okay, cool. Thanks for sharing that insight. This is like the customer dynamic. Now I want to get to the innovation piece, so as to when there used to be a bunch of network guys managing QoS, mostly packed stuff, all that good stuff, we kind of knew all that, but as the cloud comes in and as cloud operations and IT operations start to see things, like automation, AI, machine learning, data and all that stuff plays a new role, they're rethinking their architecture, so what innovations are in the horizon that you see coming? That will change the landscape of, as what SD-WAN is, and what it will become. What are the innovation areas to watch in? >> We are working already in the next generation for next year, which will enable our customers to identify any application inside of the network independent where that application is. So, it will be crucial to not think anymore in networks and how many appliances do I have where, but how fast can I get an application up and running in a new cloud. And this is where we are investing a lot, into cloud delivery, cloud integration, especially also with the partnership with Microsoft, we have a API integration to build, and actually launch new applications directly from the cloud but integrated into the SD-WAN, and including also all the security parameters that you need to secure in order to actually have a, not only application running and integrated in the network which is called Intent-Based Networking on the Gartner terms, but also have that secured in terms of business risk protection. >> What's the biggest feature request that you get asked for? Cause you're managing the product team, you're in roadmaps, you're here planning, you're marketing in sales teams, you're listening to customers, what are they asking for, what's your priorities? >> So priorities, foremost is automation and simplification, this are our core aspects in order to keep up with the, actually the new complexity that derives also in the cloud sprawl that's happening. So customers are not launching, one cloud, not two but multiple clouds in parallel, which they ask for, actually orchestration through the network and through integrated through into the cloud orchestration. And secondly, it's the whole Shadow IT, so, where do I have SAS applications I never knew about? How can we protect those applications well, and the data that we upload later too. >> Security surface area is huge. Final question for you, for people that are learning about who you guys are, Open Systems, it's expanding in the US, you're already successful you guys, great revenue, great success in the product side, so congratulations, but for the people that are learning about you, what's the culture like, and what one thing should they know about Open System, that they should know about? >> I think one cultural element that we really bring to the table is, we are unconventional in the way that how we solve customers' problems, and the amount of dedication and passion that we put into delivering the solution. So one of our core pillars is the defaults model, so that means that the engineers that are building that platform, are also at the same time your first year contacts when it comes to service management and support. That truly makes a difference in the customer experience. >> Programmable internet, programmable software, programmable deBAR as well, infrastructure as code, so you guys are like SD-WAN as code. (laughs) >> Exactly, it's similar to that. >> It's a new trend, it's like Blockchain (laughs) >> Exactly. >> You say Blockchain and anything is popular. >> We try to be as simple as that, that's true. >> Moritz, thanks for coming on theCUBE, late night here, this is theCUBE after draw, we are here, this Chandelier launch at the Cosmo, The Cosmopolitan Hotel for CUBE coverage at Open Systems' event for influencers, executives, experts and customers, of course, influencing theCUBE. We'll be back with more after this short break. (upbeat music)

Published Date : Dec 5 2018

SUMMARY :

Brought to you by Open Systems. We are here at the Chandelier Bar the kingdom, the product, engineering to marketing. You know, you got to so it's working. as kind of the gateway the main value preposition. and the applications and the customers. big part of your success. What's the way you guys are winning, and in the cloud environments. Yeah, so we have an OAM, So I'm going to ask you a question, What are some of the symptoms I might see? and we will help you to in the network and the cloud environment Okay so here's another one: and in the end you have What are the innovation areas to watch in? and integrated in the and the data that we upload later too. so congratulations, but for the people so that means that the engineers so you guys are like SD-WAN as code. and anything is popular. as that, that's true. launch at the Cosmo,

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
RajPERSON

0.99+

DavidPERSON

0.99+

Dave VellantePERSON

0.99+

CaitlynPERSON

0.99+

Pierluca ChiodelliPERSON

0.99+

JonathanPERSON

0.99+

JohnPERSON

0.99+

JimPERSON

0.99+

AdamPERSON

0.99+

Lisa MartinPERSON

0.99+

Lynn LucasPERSON

0.99+

Caitlyn HalfertyPERSON

0.99+

$3QUANTITY

0.99+

Jonathan EbingerPERSON

0.99+

Munyeb MinhazuddinPERSON

0.99+

Michael DellPERSON

0.99+

Christy ParrishPERSON

0.99+

MicrosoftORGANIZATION

0.99+

Ed AmorosoPERSON

0.99+

Adam SchmittPERSON

0.99+

SoftBankORGANIZATION

0.99+

Sanjay GhemawatPERSON

0.99+

DellORGANIZATION

0.99+

VerizonORGANIZATION

0.99+

AshleyPERSON

0.99+

AmazonORGANIZATION

0.99+

Greg SandsPERSON

0.99+

Craig SandersonPERSON

0.99+

LisaPERSON

0.99+

Cockroach LabsORGANIZATION

0.99+

Jim WalkerPERSON

0.99+

GoogleORGANIZATION

0.99+

Blue Run VenturesORGANIZATION

0.99+

Ashley GaarePERSON

0.99+

DavePERSON

0.99+

2014DATE

0.99+

IBMORGANIZATION

0.99+

Rob EmsleyPERSON

0.99+

CaliforniaLOCATION

0.99+

LynnPERSON

0.99+

AWSORGANIZATION

0.99+

Allen CranePERSON

0.99+