Image Title

Search Results for Next Level:

Kanaiya Vasani, Infoblox | Next Level Network Experience


 

>>from around the globe. It's the Cube with digital coverage of next level network experience event brought to you by info blocks. >>Welcome back to our coverage. The Cube. I'm John Furrier, your host. We're here with a virtual event with info blocks on next level networking. It's a virtual event hosted with the Cube of great guests Kenya Asuni, who is the EVP of products and corporate development with info blocks today. Thank you for coming on. Appreciate it. You guys are the theme of this is next level networking, which I love. Next level, it really kind of illustrates we are going to the next level with Cove in 19. We're seeing it everywhere security DNS topic that most people aren't familiar with. An i t. You know all about it. You guys are leading and reinventing d I for the folks that I want to know what that is. It's DNS de HCP and I p address management for the hybrid cloud and borderless enterprise, which is basically everything. Now, um, this is super super important. As we see every single company living this right now, which is workforce is working from home workplaces that are transforming the surface area is huge. You still got to connect to the Internet. You still need to go to a website and you still do. E commerce needs to run your business. This is a huge, huge problem that's been highlighted. Secure access there you guys are in the forefront for next gen or networking. Tell us what you define as next level. >>So, John, I think one of the things you'll see is if you, if you look at the train, is happening in our business, that is, there's an increasing adoption of SAS services, whether it's infrastructures of service being consumed from AWS, azure, Google or all the idea applications moving into SAS, you're already seeing a shift away from this data center. Being the center of the university in the Enterprise, I t infrastructure to more of a cloud edge world where a lot of the applications now sit in the cloud some in your private cloud still but a lot in the public cloud. And then you have your enterprise edge from where you want to get to these applications directly instead of back calling all the traffic into your traditional data center. We're also seeing a big push into the number of devices coming into the infrastructure, whether it be by Odie Iot G five GS or more devices coming into the infrastructure. As you said, that perimeter and the surface area of the enterprise has exploded. So you have to You have to start to think about security from a different standpoint. So all of these trends are starting to play out in the market. I think what you're going to see is over the next couple of years that the the network inside the Enterprise is gonna look very different from ordered yesterday. Today, everything gets back to the data center, and that's where all the action's. I think what you're going to see is a big shift towards what we call a hybrid multi cloud enterprise, where you may have some workloads sitting in your data center. Some workloads sitting in public clouds, some in your private cloud, and then you want the ability to move these workloads around and you're utilizing everything all your applications. You're actually continue rising all your applications, and you want all this stuff to move around so it poses a very interesting challenge. And that's why we say you need a next level network experience to deal with all the changes that you, their enterprises, are going to it. >>That's a great point. This is our top story that we've been reporting for a long time but rose recently with code 19. This notion of multiple networks, multiple environments, multiple clouds. Certainly hybrid cloud has been ratified. Everyone pretty much acknowledges that cloud operations on premises to the cloud of their. But you got to still move packets from A to B moving around, and now you're storing them and all kinds of things are happening. But I want to get your thoughts on a trend that even makes what you just said even more complex because the complexity is crazy. Right now, there's a trend of managed services. Cloud explosion comes on. You mentioned SAS more coming or deploying a managed services, sometimes multi tenant, sometimes pure instances in the cloud or on premises and data center that's causing access. I still want to integrate that into a Web presence. So, you know, I gotta integrate all these things. It's not that easy. Now. Again, DNS has been a big part of the Web presence But now you have a new dimension of hosted applications. You have managed services that that are easy to stand up. But now I gotta integrate them. This is one of the hardest challenge is that we're here, and I want to get your thoughts in reaction to that. Yeah, >>and I think Google has certainly accelerated the shift that we talked about. So I think a good point there in terms of your school reacting is there is a big accelerant in terms of the shift of the cloud. I think one of the the key role that we play as the enterprise gets much more dynamic is you need three elements you need the element to be to get visibility into everything that's going on in your cluster, you need to provide a layer of security of foundational security in your infrastructure and you need automation because then you have workloads moving around. You need to automate all your idea. Simple flows around allocating. I p address system is VMS or containers on moving as containers. Moving our retaining I P addresses assigning your i P addresses managing DNS records for them. So the work we do that dd I there really becomes the life blood of how this hybrid multi cloud enterprise comes along. And as you get to a much more distributed I T infrastructure, you are not going to be able to manage this entire infrastructure yourself the traditional. So if you have an enterprise idea administrator, you cannot sit there and say, Look, I'm gonna do the traditional model of deploying software on premise or appliances on premise, and I love my guys going out there and managing the administration of that software every six months after do a software upgrade and I'll do all that. What you need, because the enterprise has become so distributed in dynamic, is you need a cloud managed or a managed services. In either case, basically, what you see what you're looking at is a centralized management more and the ability to spin up and down the services Dynamically. We are strong believers in sass or a cloud managed approach and a cloud native architecture being the right architecture for the next level network. And that is something from a delivery standpoint and MSP can use. A managed service provider can leverage this flower manage architecture that we have to offer the services to enterprise customers and take away the whole headache off, managing and administering their own infrastructure. >>I like how you said dd I layer because there's an abstraction you can create the take away that complexity that was pretty straight forward. The best yet. DNS dhc p I p I p addresses. Okay, you manage those cases? No problem Naming whatnot. Now. You have a dynamic environment. That's key. I want to get back to and follow up what you said about the I t folks, your customers in the Enterprise. They're sitting there saying, Hey, I'm used to the on premises world and I have cloud What's the difference in your mind between on premises and cloud managed d D I and why does it matter? >>Look, I think in the traditional world, all the i t infrastructure it again was sitting in one or more regional or or regional or centralized data centers and that it was easy to manage. You could appliances from info blocks and now and it was easy. You had the folks sitting in these data centers and they could manage the entire infrastructure using someone premise management tools and things of that nature. But now I think about it. If you're if you're Walmart and you have 4500 stores right now, if you want to push DNS d A T v i p address management software into all these 5500 locations, it is very difficult to do that by deploying individual appliances or by deploying sort of shrink wrap software that has to sit in every every one of these locations. It's just from an idea administration standpoint. It's a it's a much heavier lift. But if I could take all the management and all the policy management that the policy framework and pull that up into a SAS lower that you can access from anywhere on the planet and I'll leave the protocol serving engines, if you will, on premise. So you have a container that gets spun up that can sit on any third party hardware that's sitting at your infrastructure. But it is all managed through the cloud it zero touch provisioning Andi, completely orchestrator. Now you're sitting at us at a central dashboard, and if you're in a corporate environment, you're sitting at home and just accessing our SAS service and managing your entire infrastructure from from from your from your home from your our checked at your home. Right? So it just becomes so much easier for idea administrators to operate. And I >>have so much free time on their hands to be the Watches virtual event. So be fun. There certainly >>do Stash stash. That's a great >>point. I want to get your thoughts because I like how you know I love the term next level. Anything going, the next level has been something that you talk about, whether you're a technical person and an entrepreneur or a business person. Let's go the next level. It means go the next level. But you add the word experience in there, and I want to get your thoughts on that because it is about the user experience. What >>do you >>guys do to provide that what info blocks provide specifically to provide that next level experience? >>Yeah, that's a great question. We are formed believers again that the future of networking and security in I T. Is going to shift to a cloud managed cloud native paradigm, which means you should be able to just like the hyper skaters. AWS is the Googles and Amazons of the world, right? If you look at how they build out their cloud infrastructure, it's all about separating the infrastructure layers of the compute layer from the applications that sit on top of them. So the compute nodes can scale at a difference at a different pace from that from the applications. That same mindset needs to come into into managing networking and security services as well. So if you have 1000 different educations, lets you can decide through a centralized policy framework what services you want to spin up a lease 1000 locations. Today you would have to buy a box, a small medium large box from info blocks or any one of the networking guys out there, and you would have to deploy that. And most likely, you will end up over provisioning each site because you don't want to run out of capacity. The next level experience would say, Just tell me what side you're deploying. The sites will call home. They will download the number of services needed based on some centralized policy that was defined, and you would get a right size deployment off services at that particular site. You need more services because, say, the user profile, that the profile of the users at that site change, which means you need to spend a Let's, say, a couple of additional security services. Well, that gets automatically imported from the cloud and gets incense created in that particular site. If you need more capacity because it's end of the quarter and you're doing a whole bunch of peer some financial contractions for closing the books, you need more capacity for some of the security applications. Those additional containers with those security applications can can get spun up, so you're starting to scale out as you need and scale back when you don't need the capacity. But this whole thing becomes a very dynamic experience in terms of how services get spun up. They get on down, and it's all driven by. There's this whole notion off the users that are sitting in a location, the context of the users of what devices they're trying to access these applications from what, what is the time of the day? How is the security profile of that device you bring all that know how into the house services get provisioned and how services get operationalized at any particular site in any particular enterprise. Rights are very simple experience when it comes to networking and security, and how do you deploy it at scale? >>And the thing that that sets up is what you're saying really about automation, because once you're in this mode in this experience, the environment lends itself well to automation because it is downloading the right services you need. But since it's dynamic and it needs to be ready, how does automation fit into that piece? >>Absolutely, if you disaster management is already automated for you now if you want to drive further automation and orchestration through integration with your Dev ops, SEC ops, Net ops tools, we have public FBI's through which this this can be driven. There's two ways to manage this right. We have a Cloud Services portals. If somebody wanted to go in and leverage our porter to manage their infrastructure, they can't do that. If they wanted this to be completely programmatic and driven through their their dev ops SEC ops tools, then through the public AP guys, we will tightly integrated into all the tools they have, whether it's sensible data forms some of the Dev ops tools or on the security side. If you want to integrate us into your store platform security orchestration, platforms, you can do that. And your entire workflow for networking as well as security can be completely, completely automated. >>That's awesome. I want to get as we get limited time left and you got to go. We have to hard stop with segment here. Customer example. I'll see customers have a need for this. You're in business to do this. Can you give an example of a customer? That kind of illustrates the next level networking >>we have. We have 6000 plus active customers. We have over 50% share when it comes to this DNS DCP eye Pam market. So you will see has deployed and have you deployed in 95. Out of the Fortune 100 enterprises in four blocks is some someone you will see in any customer that you that you go through. We have some public references such as Adobe, a great customer of ours on our website. They, their entire global network, runs on the foundational layer of D. I. We have some very large customers that are not as comfortable being public references, but we have again. If you have 95 of the Fortune 100 enterprises want you, you can imagine how sticky VR how broadly deployed we are. Typically, what happens is we would go in and we would go in as the FBI there for them to control and manage that I p address space and their DNS infrastructure. Then they take on more off. They take on a security lens at this and say, Look through the http and eye Pam, I know everything that is sitting in my infested toe, DNS. I have full visibility into all the communication happening from that employer. So that's a great data source for me to leverage as a first layer of defense from a security stand. So then they start to bring in security into the into the mix in terms of how they leverage our products and then through our SAS platforms and SAS offerings. They take that and extended as they're driving this edge transformation. So they push these services now to the edge of the infrastructure so and that the new infant, the new offerings are blocks one platform is our SAS platform and blocks one based applications on our new offerings that integrates very nicely with some of our traditional offerings. So you get a very comprehensive single pane of glass in terms of how you can manage your entire enterprise footprint, whether it's it's on prim at the edge, in the public cloud at the cloud edge, right? >>You know, having a good business model that puts abstractions and reduces complexity is is a great one. We've seen the innovation with DNS and anything that needs an Internet address. You got to connect, and I o. T only creates more need for connection. This is the key enterprises know DNS. They know it differently that it's the plumbing we all know. But every time there's an innovation inflection point, a new abstraction layer emerges for simplicity, ease of use. >>DNS is the phone book of the end of off the Internet. Right, So you want to call anywhere you have to first, your DNS. Look up and you brought up I o t. That's a great example. You're not going to be able to put in these eye ot sensors. You're not going to be able to put endpoint security software, but they're going to call home so you can leverage DNS and do some behavioral analysis of the DNS. Traffic coming out of those Iot. The sensors are I ot endpoints and say, Hey, look, is there something militias going on? Why is my thermostat talking to a server in China? You can detect that to a DNS based security earlier that this foundational >>and to your point, whether it's a light bulb or anything untested device, they're being turned on and turned off all the time at massive scale. There's no other way to handle it, but having abstraction and automation. Absolutely. Thank you. Thank you very much for your time. Great segment. We're here at the info blocks. Virtual event. This is the cube coverage. I'm John Furrier. Thanks for watching. Thank you, John. Yeah, Yeah, yeah, yeah.

Published Date : Jul 27 2020

SUMMARY :

level network experience event brought to you by info blocks. You still need to go to a website and you still do. So you have to You have to start to think about security from a different standpoint. This is one of the hardest challenge is that we're here, and I want to get your thoughts in reaction to that. because the enterprise has become so distributed in dynamic, is you need a cloud managed I want to get back to and follow up what you said about the I'll leave the protocol serving engines, if you will, on premise. have so much free time on their hands to be the Watches virtual event. That's a great Anything going, the next level has been something that you talk about, whether you're a technical person and an entrepreneur or a that the profile of the users at that site change, which means you need to spend a Let's, to automation because it is downloading the right services you need. If you want to integrate us into your store platform security orchestration, platforms, I want to get as we get limited time left and you got to go. single pane of glass in terms of how you can manage your entire enterprise footprint, They know it differently that it's the plumbing we all know. anywhere you have to first, your DNS. Thank you very much for your time.

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
JohnPERSON

0.99+

ChinaLOCATION

0.99+

GoogleORGANIZATION

0.99+

Kanaiya VasaniPERSON

0.99+

WalmartORGANIZATION

0.99+

FBIORGANIZATION

0.99+

95QUANTITY

0.99+

GooglesORGANIZATION

0.99+

John FurrierPERSON

0.99+

TodayDATE

0.99+

AdobeORGANIZATION

0.99+

AWSORGANIZATION

0.99+

AmazonsORGANIZATION

0.99+

yesterdayDATE

0.99+

5500 locationsQUANTITY

0.99+

Kenya AsuniPERSON

0.99+

4500 storesQUANTITY

0.99+

1000 locationsQUANTITY

0.99+

two waysQUANTITY

0.99+

each siteQUANTITY

0.99+

InfobloxORGANIZATION

0.98+

1000 different educationsQUANTITY

0.98+

StashPERSON

0.97+

one platformQUANTITY

0.97+

over 50% shareQUANTITY

0.97+

oneQUANTITY

0.96+

todayDATE

0.96+

first layerQUANTITY

0.96+

code 19OTHER

0.94+

firstQUANTITY

0.92+

SASORGANIZATION

0.89+

single paneQUANTITY

0.87+

three elementsQUANTITY

0.87+

WatchesEVENT

0.87+

6000 plus active customersQUANTITY

0.87+

SASTITLE

0.85+

next couple of yearsDATE

0.84+

CoveORGANIZATION

0.79+

PamPERSON

0.77+

azureORGANIZATION

0.76+

six monthsQUANTITY

0.76+

100 enterprisesQUANTITY

0.73+

AndiTITLE

0.72+

Iot G five GSCOMMERCIAL_ITEM

0.68+

CubeEVENT

0.66+

OdieORGANIZATION

0.64+

FortuneORGANIZATION

0.63+

single companyQUANTITY

0.57+

FortuneTITLE

0.53+

infoORGANIZATION

0.52+

100QUANTITY

0.4+

CubeORGANIZATION

0.32+

19QUANTITY

0.28+

Glenn Sullivan, Infoblox | Next Level Network Experience


 

(relaxing electronic music) >> Narrator: From around the globe, it's theCUBE! With digital coverage of Next Level Network Experience event. Brought to you by Infoblox. >> Welcome back to theCUBE's coverage, we're here in our Palo Alto studios. I'm John Furrier, host of theCUBE. We're here with Infoblox for their Next Level Networking virtual event with theCUBE. Glenn Sullivan is our guest, Principal Product Manager with Infoblox, formerly with SnapRoute, theCUBE alumni. Great to have you back on, Glenn. Great to see you, and thanks for jumping on remotely. We're doing the remote thing, the remote CUBE, good to see you. >> Yeah, it's great! I wish I could be in the studio, you guys have a great studio up there in Palo Alto, so I wish I could have joined you, but that's not possible right now. (chuckles) >> The governor's on, is off, we're get there, but when it does come back we'll certainly do a lot more remotes, and want to go to a "hybrid world." Hybrid, it sounds like the media business is turning into cloud computing, you got public videos, in person, you got hybrid, and virtual. The cloud native world is certainly spawning everywhere now with COVID, and you guys are talk about Next Level Networking, but with the word Experience. I want to get your thoughts on that because, you know, it's been six months, you've been on theCUBE, a lot's happened. Next Level Networking Experience, describe it. >> Yeah, it's really about processing things as close to where they need to be processed as possible, right? So, you don't really want to put everything in the cloud, you don't really want to have everything happen on-prem, you want to do the right data processing where it's needed, right? Have a little bit on-prem and have a lot in the cloud, or vice versa, it's really about elastic scale, right? That's what I think about with cloud native technologies is being able to run whatever you need to run service-wise as close to the delivery mechanism of either the user, or you know, as close to the app in the cloud as you need to. That's really what it means by, you know, having an elastic scale, and we try to do that every day. >> And notice the word Experience is in there, you know, that's been super important because you build and provision, manage these services from the customer standpoint. I mean, I can't drive in, there's no, there's clothes, or I got to go in, I now can do remotely. This is the key about having abstraction layer innovation, certainly DNS, DHCP, IP address management, never going away, you've got to connect stuff to the internet, I mean the network is there. >> Exactly. >> You've got to be a bit more innovative, what's your thoughts on the impact of the network now that cloud native and open source specifically are driving more action. >> Well, there's a lot going under the hood, right? And you can't just, you know, manage things the way you used to be able to, where you take and you buy a box, you know, it's that cattle vs pets thing that we talk about in cloud native, right? Where you treat this appliance very specifically and very specially, and you upgrade it and you're afraid to touch it. Now that you can't, you know, get the things, you have to do everything lights out. So, what we've learned via applying technologies in the cloud, you know, you didn't go into AWS' data center, or Google's data center, or Microsoft Azure's data center and manage these things, so what we've learned about how to manage infrastructure across the board in networking and compute and storage now is even more important, because everybody's lights out all the time now. >> And scale and speed is critical. I mean, Google's pioneered the concept of SRE, Site Reliability Engineer. What your teasing out, Glenn, is the same kind of concept for the network, you've got to have the security, you've got to have the scale. This is a huge point, can you react to that? >> Yeah, it's about spinning up instances where you need them, you know, when you need them, right? If networking equals a physical black box appliance that you specifically nurture and manage instead of just networking services, right, because DHCP is a networking service, DNS is a networking service, IPAM is a networking service, so you should be able to spin those up wherever you need to and manage those without having to worry about it all being tied to, you know, specific things that you have to manage in a very nurtured way. >> I want to get your thoughts, the term borderless enterprise is being kicked around, you guys use that term. I've heard, you know, the borderless networK, makes sense I guess, but what does the borderless enterprise mean to you. >> Well, it's really just an extension if you think about it from the software defined perimeter concept before. You know, people call it different terms now, but it's just saying that borderless means that I don't have people sitting in a office anymore, and if I do have people sitting in an office, they have the similar experience to people that are connecting remotely, no matter where they are. So, because there is no boundary to your network, right, because the edges of your network don't match edges of your walls in your branches, that's pretty borderless to me, right? And you have to kind of think about, you know, it's not just about adding more firewalls, It's not just about adding more network perimeter security, it's really about how do I apply foundational security across the board. I've been at Infoblocks now for a little over six months, and I can tell you, it's great to see thinking about these foundational services, right? These infrastructure services like DHCP, DNS, and IPAM being really at the foundational layer of the security that you apply to your network. Right, it's the first couple of things that happen, right? The first thing you do is you get an IP address, that's DHCP, you can figure out all kinds of stuff about a device that way. Then you start looking at services with DNS, right? And then it's like, "Okay, well now I've got a lot more information about what the user's doing, where they're going, and how to secure it," right?" So, these sound like they're really your plain vanilla protocol suites, until you really start applying borderless security across the board with them. >> Yeah, a lot of machinations, and also you now have massive amounts of connection points, 'cause with IoT, not only have more in terms of volume of things connecting, but they're being turned on and off very quickly. They have to get connected, so you have that going on. >> Yep, and then you got to make sure that they do what they're supposed to do, right? If they're supposed to phone home to a specific place that they only do that, and that they haven't been hijacked, and somebody isn't mimicking them with malware. There's all kinds of security threats when you start thinking about all the possibilities that IoT brings into account. >> Yeah, some light bulb that you screw in, wifi enabled, has a multi-threaded capability, and be, who knows what's on there, right? (laughs) I mean this is what the reality is, no one knows what connects, a little hygiene comes a long way. I want to just get back into what you said. You've been there for a few months, came from SnapRoute, which was doing some real fine work, that's where we did our feature interview on you and what you were doing there, that technology. With borderless enterprise, what is the role that cloud native and open source play? Because this is your wheelhouse, I want to get your thoughts because when you had that to borderless, things kind of happen. >> There's two things that I like to think about. One, it's scaling things down as skinny as possible, or as big as necessary, right, elastic scale, right? We talk about cloud native technologies, we always talk about elastic scale. Well, what does that mean? Well, that means that am I securing an entire data center? Am I securing a branch office? Am I securing a gas station? Or am I securing a person working from home? You know, this is what we mean by elastic scale. It doesn't mean that I'm, you know, purpose building the spoke specific security profiles for those individual use cases, it means that I have a system that I can scale up and scale down no matter where those folks are, right? That's really what you have to do when you think about cloud native technologies and the borderless network, is you have to be able to run things as close to the user as possible, or as close to the app as possible, or somewhere in between. The second thing that I think is super key is abstraction, right? You can't manage everyone working from home, or you can't manage as many instances as you need with everyone's individual laptop, right? This doesn't scale, right? Abstraction is key to cloud native technologies because it means that I don't pay attention to anything that's below me, right? If I'm an SRE, I don't necessarily care about what type of servers that application set's running on. If I'm a network engineer, I don't really care about the fiber patch panels that connect my network devices together, right? Abstracting away the underlying infrastructure is key for cloud native technologies. So, as we add more and more devices, more and more endpoints, more and more users to manage, we have to make sure that we abstract away the complexity of all the connections that need to be built between those users and whatever, you know, abstraction orchestration layer that we utilize. >> You almost peeled back the onion from the early days of DNS and go to the core, "Hey, I want to connect to this domain." And a packet moves from here to there across an IP address, "Oh, let's add some abstraction on it." This has been the innovation form for the internet for years, right? So, how do you describe the Next Level? Because you mentioned, again, the word Experience is in there, so Next Level means, okay, networks need to be programmable. You do have the Next Level opensource dynamic that you pointed out beautifully, what's that Next Level Experience? How do you see the preferred future evolving? Because if you take this further, if you believe cloud native provides some scale, as you pointed out, it should simplify, these abstraction layers should reduce complexity, or abstract away the complexities and provide more simplicity. >> Absolutely! I mean, I always come at it from an Ops perspective because that's just my background, right? But I was running networks for a long time before I started building, you know, network operating systems, right? I can tell you that what I need is visibility. You know, I need to be able to see what's going on at any given moment. I need to be able to know that the things that I've deployed are up and running. I need to know that the information that I need to troubleshoot the issues that arise is at my fingertips, right? Because I always think about it like the 3:00 a.m. call, right? The network engineer, or sysadmin, or the DNS admin, or it doesn't matter who they are, at 3:00 a.m. they got to wake up because they've just been paged, and something's wrong. And how do they get to what's broken? So, that's one way to think about it. There's also the deployment way to think about it, right? Like how can I deploy as many new users, as many new branches, as many new locations, whatever the process is. You know, you hear zero touch provisioning, you know, all these other, these features, and they come as part of a cloud native mentality, right? They mean that I don't have to do, you know, a whole lot of pre-thinking and pre-staging, and pre-configuration, and pre-thought before I deploy stuff, right? It means I need something, I deploy whatever is required from a service level, I kickstart it, it bootstraps itself, and it joins, right? I take away the headache of having to think about where something is or when it is, and that's a lot of the synergy that we had between what we were doing at SnapRoute and when we came to Infoblox, right? I can tell you, we were pleasantly surprised by the platform that was built, and we were like, "Okay, well this is going to be great! We can add services to this and we don't have to worry about having to go an reinvent the wheel." Because when you choose technologies like Docker containerization, you choose technologies like Kubernetes orchestration and Kubernetes abstraction, you are a lot closer to where you need to be. I mean one of the thing that, you know, isn't super well-known out there is that CoreDNS is one of the major projects that Infoblox helps maintain with inside CNCF, the Cloud Native Compute Foundation, right? CoreDNS ships at the core of every Kubernetes version from now on, you know, as of a few versions ago. So if you think about it, Infoblox has got a lot of cloud native technologies built into everything that we do, and we're one of the key maintainers of one of the key DNS features of something that's at the heart of Kubernetes, and you know, I don't have to tell you how popular Kubernetes is. >> Yeah, we've chatted about that. It sounds like it's the kernel of all the action, DNS, the CoreDNS for Kubernetes. (laughs) >> Exactly, exactly! It's definitely at the core there. >> Glenn, I want to get your thoughts. First of all, I love chatting with you, you mentioned you were from an operating background, but also you can bring a lot of dev into it too, so this is ultimately, to me, the inflection point of where DevOps goes mainstream, because you used to do Ops for a fruit company, Apple? >> Yes, yes, very popular! >> Big one. >> A very popular fruit company called Apple, and we know how hardcore they are, especially they lean heavy on, you know, lock it down, make sure everything's secure, I mean it's well known in the Silicon Valley and around the world, certainly in tech circles, the security mindset. >> Absolutely. >> Large scale operations. Now, you bring also the DevOps aspect of it with cloud native. As that world has to become secure, and networks, it's an Ops game, let's face it. No matter how much DevOps you sprinkle into the equation, at the end of the day, it's Ops. Ops, operations of networks, high availability, large scale. But now you have a little bit of development goin' on on top. The programmable internet past the tip of the network layer, what's your take on that? Because you still need security, you want to have the capability to do some advanced automation. These have been hot new trends, and networking people are now hearing this not for the first time, but it's the new thing where it's like, "Okay, I can have my Ops, but I got to do some Dev now." So make sense of this, where are we in this whole programmable networking aspect? >> Yeah, there's sort of two schools of thought, and it's interesting what's happening, right? You've got kind of, on the extreme left side you've got, "I just treat the network like it's dumb plumbing and I run all of my software overlays on top of it, and I basically treat the network like it doesn't exist." And you know, it's kind of a situation that's been perpetuated by the silos that are out there, where you have the network engineers, and the server compute engineers, or SREs, and then you know, it's like, "Well, these folks never have to talk to each other because we just treat the network like it doesn't exist, and we run overlays on top." And some of the vendors in the server overlay security space have been really proud of that interaction. And I can tell you that that's one way of doing it, but it's not the optimal way, right? Like, when I was a network engineer I could tell you, you're trying to build credibility, right? So, if I was talkin' to a network engineer now, and I'd say like, "How do you get your credibility built with your server folks?" It's kind of like learning a different language, right? If you try, if you try to speak the other language, the person actually is appreciative of that and will help you. So, I always found, you know, find thing things you can automate, run that code base, figure out the API structures, build some pseudo-code together to make it happen, and figure out what you're doing over, and over, and over again and automate it. Automate away, right? And that's some of the nice things that are the same here, right, everything we could ever want to do in any GUI is all REST API'd underneath the hood, right? So it's like, we don't have to pitch to people that, "Oh, you can automate this code if you want to, you can run these APIs if you want to." They know it, and they use it, and people are happy with it. And I think if you're a network engineer, you've got to spend the extra effort to try to, you know. You don't have to do anything complicated! >> It's not rocket science. You know, it's not like you got to go right C, I'm sorry? >> It's not rocket science. >> No, start with Ansible, you'll learn some Python, you'll learn some Django on top of that, and then keep running, right? Keep automating on top of that. >> All right, great stuff, Glenn. I know you've got a a tight deadline, appreciate you comin' on for this virtual fireside chat as part of the Infoblox Next Level Networking virtual event. What specifically can companies do to get what they need from a technology standpoint to secure the borderless enterprise? How do you see it playing out, now that you're on Infoblox side from SnapRoute, with what Infoblox has, which is a holistic portfolio approach, a holistic view, what are you guys offering customers, and how do they secure their borderless enterprise? Really start with DDI, right? I know DDI is something that is not specific to Infoblox, but if you look at what we're doing with DNS, DHCP and IPAM, it's really the foundational layer to start securing the rest of your network. We don't necessarily make it so you don't need the rest of your security stacks that are running on top, but we do optimize 'em and we make it so you can right-size 'em, and we really think that if you focus on getting that layer solid, and you really focus on the DNS security, you can apply a lot of lightweight, high impact features as early on in the packet forwarding process as possible. Right, if you think about, I'm a network engineer at heart, so I always think about the path of a packet from the start to the end, and DDI happens really early in the process, so if you give that right, the rest of your security infrastructure built on top of that is just going to work that much better. >> You're the Principal Product Manager at Infoblox, formerly with SnapRoute, how do you fit into this? What product are you managing? Can you give a little bit of background, kind of what you're working on? >> So, I'm an emerging technologies PM, so basically anything kind of new and cool that we look to add to our platform, that'll come out of myself and my group. >> And Kubernetes obviously is one of 'em. >> Well, Kubernetes is already there, so we're already doing stuff with Kubernetes inside Infoblox, like, our whole platform. If you buy BloxOne DDI and BloxOne Threat Defense today, it's all deployed using Kubernetes and Docker containers, and orchestration layers, and everything today. So, everything that we're building on my team, is all building on top of that well sold platform that's already been developed. >> There's definitely demand out there, you're startin' to see the big companies like VMware, very operational focused companies start acquiring cloud native and open source, kind of a new kind of section to them. Obviously it's a tell sign, the markers are all there in terms of the trends. What are people missing? What's real, what's vape or what's reality when you look at the landscape, and what does Infoblox bring to the table? >> So, I think what's important to know is that when you're lookin' at open source technologies, a lot of them have been hardened over many years, and there's new stuff coming out all the time, and there's definitely new uses for them. But what's kind of important is what you put on top, right? Everyone's got open source under the hood, or they've got technologies they've OEM'd under the hood, right? But the experience that you present to customers is really key, right? Because you can take any kind of open source project and wrap a, you know, very thing layer on top of it, and you can either, you know, trump up the open source software, and say is the open source software we use underneath, or you can downplay it and say hey, this open source software, you know, we don't really talk about what's under the hood and it just all works magically. We find that transparency is really helpful. You know, you let people know what's under the hood, and you contribute to it, and you show that you're involved in this community, and you use that as a leverage to kind of push forward. So, if you look at, you know, what we're doin' with some of the different projects within, you know, BloxOne DDI uses Kea, and we're part of IC that's part of the maintainers of that, like we're openly in this space, right? And I already mentioned CoreDNS before, right? So, you can either take open source, and use it, and pretend that you don't, or you can take open source and contribute to it and be a community member, and be an advocate, and usually when you're on that side of the equation, you end up in a better place with your customers, building, you know, building confidence in your customer base. >> That's great stuff, Glenn Sullivan, thanks for comin' on, I really appreciate it. I'll give you the last word. In a nutshell, if I have cloud native and open source, how do I secure my borderless enterprise? >> Think about it as close to where the source is as possible and scale things elastically so that you can do as much processing of the user experience as possible so that you aren't trying to, you know, funnel everything to a single place and apply some magical policies in a single centralized location, to where you have to process a lot of data across the board. If you think about it from a hybrid approach where you've got a little bit on-prem and you've got a little bit in the cloud, or in some combination that's right for your organization, the hybrid approach that really trumps the local survivability, and really, you know, keeps focusing on securing things as close to the user possible, or as close to the source as possible, then you're going to be in good shape. >> Glenn, great stuff. As always, a masterclass in networking. Appreciate the insights, thanks for comin' on this Infoblox Next Level Networking virtual event for theCUBE. I'm John Furrier, your host. Stay with us, and thanks for watching. (relaxing electronic music)

Published Date : Jul 27 2020

SUMMARY :

Brought to you by Infoblox. Great to have you back on, Glenn. you guys have a great studio and you guys are talk about That's really what it means by, you know, you know, that's been super important the impact of the network and you upgrade it and can you react to that? that you specifically nurture and manage I've heard, you know, of the security that you and also you now have massive Yep, and then you got to make sure and what you were doing and whatever, you know, that you pointed out beautifully, I mean one of the thing that, you know, kernel of all the action, It's definitely at the core there. but also you can bring a especially they lean heavy on, you know, But now you have a and then you know, it's like, you got to go right C, and then keep running, right? and we make it so you can right-size 'em, that we look to add to our platform, If you buy BloxOne DDI and when you look at the landscape, and pretend that you don't, I'll give you the last word. to where you have to process a lot of data Appreciate the insights,

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
John FurrierPERSON

0.99+

AppleORGANIZATION

0.99+

Glenn SullivanPERSON

0.99+

InfobloxORGANIZATION

0.99+

GoogleORGANIZATION

0.99+

GlennPERSON

0.99+

MicrosoftORGANIZATION

0.99+

Palo AltoLOCATION

0.99+

Cloud Native Compute FoundationORGANIZATION

0.99+

3:00 a.m.DATE

0.99+

AWS'ORGANIZATION

0.99+

SnapRouteORGANIZATION

0.99+

Silicon ValleyLOCATION

0.99+

PythonTITLE

0.99+

two thingsQUANTITY

0.99+

InfoblocksORGANIZATION

0.99+

theCUBEORGANIZATION

0.99+

first timeQUANTITY

0.99+

six monthsQUANTITY

0.99+

DjangoTITLE

0.99+

over six monthsQUANTITY

0.98+

second thingQUANTITY

0.98+

CUBEORGANIZATION

0.98+

OneQUANTITY

0.98+

KubernetesTITLE

0.97+

first coupleQUANTITY

0.97+

oneQUANTITY

0.95+

one wayQUANTITY

0.95+

CNCFORGANIZATION

0.95+

FirstQUANTITY

0.94+

DevOpsTITLE

0.94+

todayDATE

0.93+

CoreDNSTITLE

0.93+

BloxOneORGANIZATION

0.92+

two schoolsQUANTITY

0.92+

zero touchQUANTITY

0.91+

single placeQUANTITY

0.9+

first thingQUANTITY

0.89+

LevelEVENT

0.82+

single centralizedQUANTITY

0.75+

COVIDORGANIZATION

0.75+

Threat DefenseTITLE

0.71+

Next Level NetworkingEVENT

0.68+

Next LevelEVENT

0.62+

VMwareORGANIZATION

0.62+

KeaPERSON

0.6+

AnsibleORGANIZATION

0.6+

Next LevelORGANIZATION

0.59+

Craig Sanderson, Infoblox | Next Level Network Experience


 

>> Announcer: From around the globe, it's theCUBE with digital coverage of next level network experience event, brought to you by Infoblox. >> Okay, welcome back everyone's to CUBE's coverage and co creation with Infoblox. Next Level networking event, virtual event, I'm John Furrier, your host to theCUBE. We're here with Craig Sanderson, Vice President security products at Infoblox. Talking about securing the borderless enterprise, obviously Infoblox, we had a variety of different conversations. Craig, welcome to theCUBE. >> Thank you. Thanks, it's great to be here. >> Remote CUBE, normally we're in person, but since it's COVID-19, we're doing our best to get the stories out and one of things I want to chat with you is with COVID-19, this shift to remote working is interesting and the word work is interesting you got the work forces which are people work places which are locations, which is now home, workflows and work loads all work related, right? So if you think about the enterprise, you know, just the disruption to business model around this unforeseen, almost 100% VPN usage maybe or you got all this remote action, no one could have foreseen all this coming. How is this shift change the security paradigm and posture for enterprises? >> Yeah, I think for a lot of the customers that we've talked to, a lot of them are thinking about digital transformation for some time. What COVID has really done is rapidly expanded or kind of accelerated the need for them to think about what the digital transformation plans are. And unfortunately for some organizations who may be not as far down the line as others, they've looked at their current implementation for remote access, and their traditional security models of like perimeter based and they found that you know in this current environment where suddenly you've gone from being only a partial set of your workforce or remote to now all of them being remote and their applications, their data, the users, they're all kind of spread anytime, anyplace, anywhere. Their traditional models don't really work. So what it's caused a lot of organizations to do is to really accelerate their digital transformation plans and quite often for some of those organizations, they've realized that they've had to make the move relatively quickly because their traditional architectures have just not been designed for this level of disruption the digital transformation has had on their businesses. >> Give some examples of how companies have either been flat footed or on their heels, kind of push back and saying, well, we got caught off guard to ones that are kind of in place that kind of managed the pandemic well, what's the difference? Can you just give some color commentary around, you know, the the profile who got it right or some were right, and some that have gotten it wrong, or are struggling? >> So I think the ones who got it right are the ones who were already thinking about digital transformation. They're looking at the fact that a lot of the applications that their consumers or their users are consuming are increasingly going to be in the Cloud anyway. So the traditional architecture of all the good stuffs on the inside and the bad stuff on the outside, that simply doesn't work with Cloud and those organizations who were looking at obviously Cloud deployments for their applications, SDN IoT, those organizations have had be thinking about how they can secure those devices, the applications and users in a way that is going to be ubiquitous. The fact that you can deploy the security controls wherever those applications users or devices are going to be. So those organizations are already starting to think about how they can build a networking architecture that is going to be suited for digital transformation, and by extension, they've been recognizing that the security model has to change, 'cause they were much further down the path. Really, this has been an acceleration. For those organizations that well, I'm not really interested in Cloud, are worried about the risks associated with Cloud and things like that, who tended to try and stick or cling to the old traditional model. Where they really run into trouble now, it's like this model just doesn't work. And now the decisions almost been taken out of the hands with COVID, because now their users are not on the corporate network. They can't build a rock wall around those users. They now have to provide protection for a user who's potentially not even using the device that they can control. So for those organizations who are already thinking about cloud and SDN and IoT, because of that digital transformation effect they've been starting to think about security, for those who have not thought about that or who have tried have been pushing that off, they're the ones who've been caught somewhat flat footed and now they're been forced to make a decision which maybe not they're actually feeling comfortable already ready to go off and do. >> You know, Craig, I sat with a friend the other day and we're like briefing on hey, you know, COVID-19 really, kind of, exposes almost like the tide coming out as that tsunami comes. You can see everything, all the scabs and all the problems. And then we started talking about the whole work at home situation, like this is probably the biggest use case of IoT in real life because you can really see it play out, not just a factory or sensor or device at the edge of the network, these are work, people doing work, right? So this whole IoT Edge, it's about addressability. So you know, I have to ask you, 'cause we've talked with you guys earlier in other segments around this next level networking experience, I love the word experience, but next level networking means next level. So DDI has an abstraction, DDI being DNS DHCP, and IP address management. How does the security piece fit in? Because certainly, yes, you got at home, we got a bunch of IoT people running their stuff from their home networks and so remote access, and you got also the business around, which includes everything that's connected to the network now, and literally is borderless. So I like that term. So how does DDI security fit into that? Yeah, I mean, it's part of having the experience, I mean, one of the things that's changed, I mean, I've been in security for over 20 years, probably about 10 or 15 years ago, as a security guy, you could come back and you had a veto, you'd come back and say, well, no, we're not going to roll this thing out, these applications, or these services, because it's a risk to the business. Now in a lot of the CSOs that I've talked to is that veto is going away. If this application is going to get rolled out, we're going to run this service security has to catch up. Now what you can't have is from a seamless experience point of view, is to say well, okay, you've now got wonderful application experience, but then it gets ruined by all the security controls are very invasive. So all organizations are having to do is to think about how you can build a seamless networking architecture that can also seamlessly include the security as part of that. And so you can still have the security of the organization needs without it becoming a massive disruption to the experience. And one of the good examples is, for a lot of organizations their remote access, going back to the COVID example, is based on VPN. VPNs are cumbersome and have got troubles with passwords and all these sort of like traditional issues associated with the user experience from a VPN perspective. I mean, a lot of users have the patience to deal with that, and they don't necessary follow all the necessary security controls. So people are being forced to rethink how they can build the quality application experience underpinned by a digitally transformed network, but at the same time, making sure you could layer in at foundational layer, the security functions as well. And that's where a lot of organizations who are a little bit more forward thinking understood that and start to think about like DNS, is essentially this ubiquitous platform, which is already there it can already provide the sort of security services by default. Because going back to your example about IoT, one of the jokes with one of my friends is, and for every IoT security, sorry, every IoT offering, there's a separate IoT security offering. And one of the things that was a lightbulb moment for us is, if you're trying to secure all these heterogeneous IoT devices, well, one thing they have in common, they're all going to get an IP address, so we're going to use DNS. So what people have to start to do is to try and make security seamless, it has to be built into the foundations. It can't be this extra thing that you kind of glob on the side, because it then ruins the overall experience for the users. The nice thing about DNS is its ubiquitous, and you can apply the security, regardless of what the endpoint and application is, because the common denominator they choose they get an IP address and they use DNS. >> And DNS has such a great track record over the years of having layers of abstractions on top of it to pace with the functionality and it's really been an operating model and you bring up the different security packages and postures for each thing. And you mentioned, you know, the old days security guy, oh, no we're killing that, no we're going this way. That was the operational model, but now with DevOps, you put a Cloud earlier, DevOps has proven that agility, speed scale can work, and how to security catch up? It's an operating model. So this is really kind of the key epiphany is, hey, VPNs, that's not the experience that people want. And, you know, I was just talking with someone from Amazon this morning in another interview segment and the discussion was new expectations, new solutions. So that's kind of what we're seeing right now. So how do you enable that out at speed by not screwing over the operations people, right? So 'cause they got to be, operationally, I need to be really rock solid, so you need automation, you got to have those factors and requirements built in, but you got the agility for development. your reaction> >> Yeah, absolutely. We see that especially is one of the things about 'cause DNS essentially ubiquitous. You can apply similar security controls regardless of the environment. So, right now I'm stuck at home because of the COVID virus. So again, I'm going to use DNS, I go through one of our Cloud platforms, I have DNS applying the security controls there. But within the same thing because DNS works as one ubiquitous system and it's like how the internet works with DNS is quite easily, not only can you block malicious threats for myself, but also you can push that same block mitigation to a DNS server that's running in AWS. So if your workload that may also have been compromised, trying to go to the same malicious domain, you can also be blocked by DNS. And so that ubiquity, the fact that it's built as this ubiquitous system, mean one thing is very different in the networking world standards are great. We can plug different things together, they all kind of fit together nicely. Insecurity is not normally that not only the cases, normally, you've got this jigsaw puzzle, where all the pieces don't really fit together. The nice thing with DNS is is absolutely ubiquitous. So one basic example is, if I try to go to a malicious domain, or I tried to steal data over DNS, not only would we be able to block it, but we'd also be able to dynamically share that mitigation to all of the on prem DNS servers, the DNS servers rather in your public or private Cloud, and for all the other like remote users. So the fact you've got this pre built fabric, and it's not that we're security geniuses, it's just it happens to already be there because of DNS and how DNS has been developed over the last 30 or 40 years. So I think the nice thing about it is a lot of organizations are starting to realize that you've got this foundation already there. Ostensibly, it's there for networking purposes, but the ability to repurpose all the core assets of DNS, the scalability, the flexibility, adaptability, the ubiquity, all those things are there by default. Why don't you use that as the new foundation for that next gen security architecture? >> And you know, you got me as a fan, I'll say that right away, because when we think about the simplicity of going to the low level building block in DNS, it fits for what I said earlier, the future of work, the word Work, workplace, workforce, workload, workflows, no matter what it is, it works across. So it's a consistent, primitive. I mean, it makes total sense. Why would you want to have different things. So again, this brings up the whole foundational level of DDI that's got my interest. And I want you to explain this for folks, because I think it's not obvious. Abstractions are pretty clear, people get abstraction layers, reduce complexity, and increase functionality and capability. But DDI, you guys have from a foundational security standpoint, is kind of the unique thing Infoblox has. How is that different, DDI from other offerings in the security stack? >> Yeah, I think the one thing is pretty unique, especially when it comes to DNS is the fact that it's built together as this ubiquitous system, and it's there by default. I mean, otherwise, the internet just wouldn't work. So the nice thing is, is that if you deploy a DNS system we can deploy as a grid, so whether it's the an appliance running on prem or sitting in a public Cloud, or even for roaming users who are going through one of our points of presence, it works as one big ubiquitous system, whereas you take like traditional firewalls, you're configuring these devices separately, and you have to manually stitch it together. And you take multiple different vendors and you know, it doesn't quite fit neatly together. DNS is based on the standard, you could take a DNS server for master DNS server from another company and because it's based on standards, it will work seamlessly together, in fact, that the threat mitigation mechanism where you distribute threat intelligence to tell the DNS, what is the malicious domains or IP addresses to block is based on so called response policy zones. That's been part of the DNS standard since 2010. And it works seamlessly across multiple vendors, whereas in the security world, as I said, it's kind of like a jigsaw where you get all the pieces together that you think you need and then the burden is always on the customer or the organization to then piece these things together and as a chief source it doesn't fit together. I can see that burden can cause a hell of a lot of issues for a lot of the customers. >> Yeah, I got to ask you since DNS is so foundational to element *and have all internet activities obviously, you know URLs is DNS, it's string actually. So everything's based on DNS, how it resolves. So what what about the, how would you respond if someone said, hey, you know, I don't even know DNS is still around. I know it's palm. It's underneath there somewhere, I don't even have to deal with it, it just runs things, we've been using it for years. What's the big deal? So how do you go in and say, hey, customer, hey, enterprise, you're not borderless, I get a hitch. But they have DNS. How do they modernize it? How do they assess it? How do you go in and some of the young kids don't even know what DNS might even is? I mean, like, it's a new, so like, *what do you go where, how do you approach that and what's the pitch because they got it and as an opportunity to innovate. what's the story there? >> *Is really two aspects to it. The first one is, I mean, DNS is a bit like oxygen. If it's not there, you really need to notice it. You just take when we had the Mirai botnet attack a few years back, all these organizations suddenly realized how important DNS is. And there's a reason why DNS is the number one attack vector for DDoS attacks. If I'm an adversary, I could try and take out individual applications it's going to take me forever. I take out your DNS, everything's going to stop. I mean, it's that *foundational z. But because its been >> *Hackers no problem, yeah. >> Exactly, so and for that reason, that's why it's constantly targeted. So firstly, my first pitch to customers is, you've got to take this stuff seriously, because when it goes down, everything is down. And the impact to your organization, not just from a brand reputation, but just from running your business is going to be huge. But on top of that, the way to think of DNS is, the nice thing is is you don't have to change your network architecture. If you think about a typical user who clicks on a phishing link. When they click on a phishing link, who's going to see the malicious requests first? Is it your firewall? No, your DNS server. Because you made the request, you have to resolve the malicious domain that you're going to try and connect to. You need to find out the IP address of it. So your DNS server and it's been proven multiple studies that, the vast majority of malware uses DNS as its control plane. So if you want to understand what the bad guys are doing, you know, your DNS servers got a front row seat to exactly what the bad guys are doing. And to implement security on it is you don't have to change your network architecture, because your DNS is already there by default. All you need to do is infuse it with security knowledge, whether that is machine learning, analytics or threat intelligence. But those DNS servers are ideally positioned. They're going to see the malicious activity, regardless of what the application is. So it's foundational, not just in terms of, if it's not there, it's going to cause a massive issue to your field or environment anyway. But even if you secure the DNS, the DNS is also this wonderful tool that is in all the right places and it's also deeper into the network. One of the challenges you mentioned about operations is the challenges is okay, you can block malware but if you don't know the source address of the device that is actually trying to make the request, you don't know what to go and clean up, where's your DNS server, your DHCP server knows exactly who it is because we handed out the IP address, we know the MAC address, we know the IP address, we know the user name, we have all that information that is going to be critical for security operations. And now you can see what *it's or about maybe the first report, you start to see that organizations are waking up to the fact that you have this treasure trove of security operations data that you haven't tapped largely for political reasons, because the security guys can't reach over and grab the necessary DDI network context from those DNS platforms, because typically they're owned by the networking or the server team. >> Before we get into that *force reports, I think that had some threat investigation data. What you're getting at about this DNS is that basically, it's critical infrastructure. And if you try to forget about it, 'cause it works, you lose sight of the real opportunity, which is, if it's critical infrastructure, you got to treat it like critical infrastructure, and make sure it's modernized, refreshed in the right position to manage all this, right? >> Absolutely. Absolutely, yeah. It's unfortunate With the Mirai botnet attack. A lot of organizations, as they said well, okay, we'll just outsource this, we don't have to worry about it. But when it wasn't there, and it wasn't the fact that, I mean, it was an attempt to take out like Minecraft servers. Nothing to do with most of the businesses who were impacted, but there was a lot of collateral damage. And unfortunate is like one of those things is because DNS is a victim of its own success. The fact that is reliable, it is consistent. You don't have lots of DNS outages typically. As a result of that people tend to forget about how critical it is as the role it plays in serving all of your applications and your users. >> Let's get into the *fourth report 'cause they surveyed a bunch of hundreds of security and risk management leaders, both compliance and also security pros that are using DNS, what were your key thoughts on the takeaways from that study? What should people know about it? >> It's very encouraging as up in Infoblox about five years when I first joined, the usage of DNS as a network context as a way to help with security operations is very, very low. And that causes all sorts of issues for organizations when it comes to doing security operations. I mean, a prime example is, the guys who work in security operations, that is the biggest issue for customers right now. They've bought almost too much security gear. And each of those security tools and platforms, they're generating security events. So again, security events from your firewall, or from your IPS or from your neck system, or whatever it happens to be and the burden now falls on the security operations teams. And it's been proven that there's huge amounts of open opportunities because there just, isn't enough trained security operations staff and the ones who are already in the business, are massively overworked and struggle to get through all the security events that have been firing from their security operations tools. So for what I was encouraging from the first report is that organizations are realizing that DHCP is going to help* you be able to identify the fact that these two security events seem completely separate. One of them is got a source address of 10.1, the other ones 20.1, well, you know what? This laptop moved from one side the building to the other and got a different address, it's actually the same device. But based on the traditional security events you're getting from the existing tools, you know, you're going to think it's two separate events, and they're not. Likewise, one of the things that's coming out is that people start to use DNS as an audit trail. And one of the challenges for organizations is, if you get a data breach, what's one of the first questions a journalist is going to ask you is like, well, what is the scope of the breach? What was impacted? And quite often organizations are not prepared. They come back and say, well, at this stage, we don't know. That's a great way for a CEO or CFO to get fired. So a smarter way of doing it is, if you think about you got the devices under investigation, the DNS queries that those* machines have been making is a wonderful audit trail of not just the external resources it's been accessing, but also the internal resources as well, what has been potentially exposed. So I think from the forest report, we're certainly seeing people realizing what were their biggest challenges security operations. Essentially, the DDI data is almost like the oil that's going to grease the wheels of security operations. And if you don't do that, buying more security gear, it's not going to make the problem better, it's actually going to make it worse unless you can operationalize it. >> Yeah, at the end of the day, the failures right there in the low level of critical infrastructure and building floors no one cares what happened on the 10th floor foundations. I got to get your thoughts on this because as you guys have DDI abstraction, DNS, you know, as it's growing, had its evolutions with abstractions, you know, as these things kind of flex, used to be an old expression DNS tricks, you know, you would mangle DNS, and it was a naming system. So you use it the way you use it and then new innovation layers create more upside and more, takes away complexities. How does DNS scale enable value? Because now you got Cloud, you got Cloud native, new software's being written and developers want to rely on the DNS as a critical infrastructure, but also want to be enabled to have, you know, really robust applications. >> Yeah and I think with the, given the fact that all the work has been put into DNS over the last 20 or 30 years, work has resolved in a very highly available very resilient system. And so a lot of stuff has to go wrong for DNS to fully go down. And it's easy to just take things like *Anycast, Anycast allows you to connect to the nearest DNS server, that's going to give you the resolution. So it's going to give you the best performance. This also can give you the high availability and resilience that goes along with that. And I think also from the security guys point of view, is if all the things that we've started to realize is that DNS is a great avenue by which you can detect somewhat unique threats. So one of the things that comes up quite a lot, we're starting to see old malware being re weaponized to exfiltrate data over DNS. So if you're a DevOps guy, and you're building your new application, if someone compromises your application, if I tried to extract the data over HTTP or email, you probably have a solution for that. 6But how many organizations have visibility in the billions of DNS queries that's going to come out your network in a day. Which ones are those might be actually data that has been stolen, it gets encoded and corrupted, chopped up and sent out and DNS packets. Is very difficult for traditional security appliances to understand and really differentiate between legitimate DNS requests, the malicious ones are actually the ones who are benign applications that essentially tunnel over DNS because they're trying to bypass firewalls. So increasingly, DNS is a threat vector for basic data loss. It's also important to understand is really gives you a window into what the adversary is doing. So not just when it comes to data exfiltration, but other things like domain generation algorithms that allow adversaries to maintain control of devices that they compromised. So a lot of that stuff is not just about the high availability and the ubiquity of DNS, but also making sure you can be fully on top of the potential impact of DNS being exploited as a potential backdoor out of your network. >> Critical infrastructure, but also that's where you're going to see the footprints of any kind of activity right there, it's a great observation space as well for detection and analysis, great stuff. Craig, thank you for taking the time, great insight, great conversation. DNS is critical infrastructure, get on it, and people are on it, they're going to go the next level. Getting the next level networking experience is about having that security always on high availability, and protecting the bad guys. Craig, thanks for joining me on this CUBE conversation for the Infoblox virtual event. Thank you. >> Pleasure. Thanks for having me. >> Okay, that's the CUBE coverage of Infoblox is next level networking virtual event. I'm John Furrier, your hosts of the CUBE. Thanks for watching. (upbeat music)

Published Date : Jul 27 2020

SUMMARY :

brought to you by Infoblox. the borderless enterprise, it's great to be here. and one of things I want to chat with you a lot of the customers that the security model has to change, And one of the things that was and the discussion but the ability to repurpose is kind of the unique thing Infoblox has. for a lot of the customers. and some of the young kids is the number one attack vector And the impact to your organization, refreshed in the right position as the role it plays in serving that DHCP is going to help* you be able Yeah, at the end of the day, So one of the things that and protecting the bad guys. Thanks for having me. Okay, that's the CUBE

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
RajPERSON

0.99+

DavidPERSON

0.99+

Dave VellantePERSON

0.99+

CaitlynPERSON

0.99+

Pierluca ChiodelliPERSON

0.99+

JonathanPERSON

0.99+

JohnPERSON

0.99+

JimPERSON

0.99+

AdamPERSON

0.99+

Lisa MartinPERSON

0.99+

Lynn LucasPERSON

0.99+

Caitlyn HalfertyPERSON

0.99+

$3QUANTITY

0.99+

Jonathan EbingerPERSON

0.99+

Munyeb MinhazuddinPERSON

0.99+

Michael DellPERSON

0.99+

Christy ParrishPERSON

0.99+

MicrosoftORGANIZATION

0.99+

Ed AmorosoPERSON

0.99+

Adam SchmittPERSON

0.99+

SoftBankORGANIZATION

0.99+

Sanjay GhemawatPERSON

0.99+

DellORGANIZATION

0.99+

VerizonORGANIZATION

0.99+

AshleyPERSON

0.99+

AmazonORGANIZATION

0.99+

Greg SandsPERSON

0.99+

Craig SandersonPERSON

0.99+

LisaPERSON

0.99+

Cockroach LabsORGANIZATION

0.99+

Jim WalkerPERSON

0.99+

GoogleORGANIZATION

0.99+

Blue Run VenturesORGANIZATION

0.99+

Ashley GaarePERSON

0.99+

DavePERSON

0.99+

2014DATE

0.99+

IBMORGANIZATION

0.99+

Rob EmsleyPERSON

0.99+

CaliforniaLOCATION

0.99+

LynnPERSON

0.99+

AWSORGANIZATION

0.99+

Allen CranePERSON

0.99+

Ven Savage, Morgan School District | Next Level Network Experience


 

>>from around the globe. It's the Cube with digital coverage of next level network experience event brought to >>you by info blocks. Okay, welcome back, everyone. This is the Cube's coverage of the next level networking experience. Virtual event within four blocks. I'm John Furrow, your host of the Cube. We're here in our Palo Alto, Calif. Studios as part of our remote access during Covic, getting the interviews and the stories and sharing that with you. We got a great guest here, then savages the network operations manager at Morgan School District in Utah. A customer of info blocks to share a story. Then thanks for coming on. >>Thanks for having >>me. First of all, the Red Sox had a plus interview. I would say right now is gonna go great. Go Sox. Which baseball was in season. Great to have you on. Um, >>we'll get there. We'll >>get there. Um, my Yankee fans say when I say that. But anyway, Miss baseball, um, you know. But that brings up covert 19 baseball season sports. Life has been impacted. Your district. Like many school districts around the world, we're told to shut down, send workers home. That meant sending kids home, too. So we got the educators, get the administration, and you've got the kids all going home. >>Yeah. >>What did you do to keep things going? Because then stop. They had to do the remote learning and new things were emerging. New patterns, new traffic, new kinds of experiences. What did you learn? What's going on? >>Well, first we tried to lock the doors and pretend we weren't there, but they found us. Um, really? I mean, real quickly in our school district, we're not a 1 to 1 operation, so the, uh that caused a big change for us. Um, we had to quickly adapt. And we chose to use chromebooks because that's what we have for the students to use in their classes. So getting that, uh, squared away and send out into the family's was was a big challenge. But then on top of that being the school district, we then had to decide. Okay, how do we protect and filter provide the filtering that the students are gonna need even though they're at home? So there's some relative safety there when they're online and and accessing your email and things like that. So those were. Our two are probably our two. Biggest hurdles was, you know, ramping up the devices and then and then providing, making sure, you know, the network access from a filtering and consistency standpoint was going to work. >>You know, I got to ask you because I see this kind of disruption you don't You don't read about this in the i t. Manual around disaster recovery and, you know, disruption to operations. But essentially, the whole thing changes, but you still got to connect to the network, DNS. You gotta get the access to the content. You got content, you get systems. You got security all to be managed while in flight of dealing with connection points that remote. So you've got the disruption and the craziness of that, and then you've got this big I o t experiment basically edge of the network, you know, in all over the place. You know, on one hand, you kind of geek out and say, Wow, this is really kind of a challenge is an opportunity to solve the problem at the same time, you know, What do you do? So take us through that because that's a is a challenge of locking down the security in a borderless environment. People are everywhere. The students business has to get done. You got to resolve to. The resource is >>so thankfully, we had migrated If it blocks several years ago. Um and just this last, I would say in October, I finally got us on. Ah, cloud the blocks. One threat defense Cloud portion of it too. So from a security standpoint, we already had a really good, um foundation in place from both the DNs aspect and the DNS security aspect. Um so that was to be honest, most users. It was seamless transition. In many regards, both users didn't even realize they were being, You know, pushed through the info blocks is cloud DNs server, you know, which was providing security and filtering. So that was a big plus for us because it it was less man hours. We had to spend troubleshooting people's DNS resolutions. Why sites Wouldn't you know? Maybe they weren't being filtered correctly. All that was was to be honest, perfect. Where other platforms we had previously were just a nightmare to manage, >>like, for example, of the old way versus the new way here and marital, is it? What files configuration will take us through? What? You >>know, it was like a separate. It was a separate product content filter that works in conjunction with the firewall. Um, and I'm not going to name the company's name. I don't want, you know, even though many company but it seemed with that product we were spending, on average about 3 to 4 hours a day fixing false positives just from a filtering aspect because it would interfere with the DNS. And it does. It didn't really do it. I mean, how it filters is not based on DNS. Totally right. So by migrating temple blocks are DNS and the filtering the security is all handling at the DNs level. And it was just much more, um, to be I mean, frankly, honestly, is much more invisible to the end user. So >>more efficient. You decouple filtering from DNs resolution. Got it. All right, this is the big topic. I've been talking with info blocks people on this program in this event is on how this new d d I layer DNs d XP and I p address management kind of altogether super important. It's critical infrastructure Yeah. No spoilers, Enterprise. You're borderless institution. Same thing you go to school as a customer. How does the d I lay out this foundational security play for delivering this next level experience? What's your take on that? >>Well, for our like, for a school platform, we we use it in a number of ways. Besides, I mean, the filtering is huge, but just for the ability, like, for example, one of the components is is response policy zones or DNS firewalls what they call it, and that allows you one to manage, um, traditional, like DNS names, right? P addresses you can. You can manage those by creating essentially a zone that is like a white list of blacklist rewrite. So you've got a lot of control, and again it's filtering at the DNs level, so it's looking based on DNS responses inquiry. The other aspect of that is, is the feeds that you receive from info blocks. So by subscribing to those, we, um we have access to a lot of information that info Blocks and their partners have created identifying, you know, bad actors, malware attack vectors based on again DNs, uh, traffic, if you will, and so that takes a load office. Not having to worry. I'm trying to do all that on our own. I mean, we've seen a lot of attacks minimized because of the feeds themselves. So that again frees us up. We're a very small school district. In some regards, there's a I am the only network person in the district, and there's like, a total of four of us that manage, you know, kind of the support aspect. And so, being able to not have to spend time researching or tracking down, you know, breaches and attacks as much because of the DNS. Security frees me up to do other things, you know, like in the more standard networking realm, from a design and implementation. >>Great. Thanks for sharing that. I want to ask about security as a very competitive space security here and everyone promising it different things at different security things. You know, by I gotta ask you, why did you guys decide to use info blocks and what's the reason behind it? >>Well, to be frankly honest, I'm actually in info blocks trainer and I've been training for 15 years, so I kind of had an agenda when I first took this job to help out the school district. In my experience, I've been doing working in networking for over 20 years. And in my experience, I ever boxes one of the most easy and in best managed DNS solutions that I've come across. So, um, you know, I might be a little biased, but I'm okay with that. And so I I pushed us to be honest, to get there and then from the security aspect has all that has evolved. It just makes to me it makes sense. Why not wrap the more things you can maybe wrapped together. And so you know, when you're talking about attacks, over 90% of attacks use DNS. So if I have a solution that is already providing my DNS and then wraps the security into it, it just makes the most sense for me. >>Yeah. I mean, go back. The info box is DNA. You got cricket. Liu Stuart Bailey, the founder, was this is zero. This didn't just wake up one day and decided to start up these air practitioners early days of the Internet. They know DNS cold and DNS is we've been evolved. I mean, and when it needs that when you get into the DNS. Hacks and then you realize Okay, let's build an abstraction layer. You've seen Internet navigation discovery, all the stuff that's been proven. It is a critical infrastructure. >>Well, and to be honest, it's It's one of those services that you can't can't filter the firewall right. You have to have it. You have to. It's that foundation layer. And so it makes sense that Attackers air leveraging it because the fire will has to let it through in and out. And so it's a natural, almost a natural path for them to break in. So having something that speaks native DNS as part of your security platform makes more sense because it it can understand and see those attacks, the more sophisticated they become as well. >>So I gotta ask you, since you're very familiar info blocks and you're actually deploying its great solution. But I got this new DD I Layer, which is an abstraction, is always a great evolution. Take away complexity and more functionality. Cloud certainly cloud natives everywhere. That's but if it's for what is the update, if if I'm watching this month, you know I've been running DNS and I know it's out there. It's been running everything. And I got a update, my foundation of my business. I got to make my DNS rock solid. What's the new update? What's info blocks doing now? I know they got DNS chops seeing that on it. What's new about info blocks? What do you say? >>Well, it's, you know, they have a couple things that they've been trying to modify over the last several years. In my opinion, making more DNS like a you know, like software as a service, you know, service on demand, type of approach. That's a yes. So you have the cloud components to where you can take a lot of the heavy lifting, maybe off of your network team's shoulders. Because it is, it is. Um, I think people will be surprised how many customers out there. I have, ah, teams that are managing the DNS and even the D HCP aspect that that's not really what their experiences and then they don't They don't have, ah, true, maybe background Indians, and so having something that can help make that easier. It's almost, you know, hey, maybe used this term it almost sounds like it's too simple, but it's almost like a plug and play approached for some. For some environments, you know you're able to pop that in, and a lot of probably the problems they've been dealing with and not realizing what the root cause was will be fixed. So that's always a huge component with with info blocks. But their security is really what's come about in the last several years, Um, and and back as a school district, you know, our besides securing traffic, which every customer has to do, um, we have our you know, we're We have a lot of laws and regulations around filtering with with students and teachers. So anyone that's using a campus own device And so for us this I don't think people realized that the maturity that the filtering aspect of the blocks one defence now it's it's really evolved over the last couple of years. It's become a really, really good product and, like I said earlier, just work seamlessly with the data security. So it is going to be using >>an SD Wan unpacked everything. You go regular root level DNs is it? So I gotta ask you. How is the info blocks helping you keep network services running in system secure? >>Well, I think I think we're more on just the DNs d It does R d eight DNS and DCP. So from that standpoint, you know, in the five years almost we've been running that aspect. We have had very little if if maybe one or two incidents of problems with, you know from a DNS TCP so so are our users are able to connect, you know, when they turn on their computer To them, the Internet's up. You know, there's no there's no bumps in the road stopping them from from being able to connect. So that's a huge thing. You know, you don't have to deal with those Those constant issues again is a small team that just takes time away from the big projects. You're trying to, um, and then to the being able to now combine things. Security filtering solution. Uh, that alone has probably saved us. Oh, we'll probably you know, upwards of 500 man hours in the last eight months. So where normally we would be spending those hours again, troubleshooting issues that false positives, things like that. And there's a small team that just sucks the life out of you when you have to. You always spend time on that. >>I mean, you always chasing your tails. Almost. You want to be productive. Automation plays >>a >>key role in that, >>right? Yeah. >>So I got to ask you, you know, just a general question. I'm curious. You know, one of the things I see is sprawling of devices. WiFi was a great example that put an access point up a rogue access point, you know, as you get more connections. De HCP was amazing about this is awesome. But also, you had also de HCP problem. You got the the key Management is not just around slinging more d HDP around. So you got the trend? Is more connections on the eyepiece? Not how does info blocks make that easier? Because for people who may not know, the DNS ends announcing TCP and IP address management. They're all kind of tied together. Right? So this >>is the >>magic of DD I in my head. I want to get your thoughts on how you see that. Evolving. >>Yeah, I think that's another kind of back twice. It's kind of almost like a plug and play for a lot of customer environments. They're getting, you know, you're getting the DSP, DNs and eye Pam all wrapped in once you have this product that speaks, well, those languages, if you will and that And, um along with some of the reporting services and things of that nature. Um, when I look for, like, a Mac address in my influx database, I'm not just going to get ah, Mac address and what the i p addresses. I'm not just going to get the DNs like the host name. Maybe you know, the beauty and fully qualified domain name. Either I have the ability to bring in all this information that one. The client is communicating with the DCP DNS server on top of things like metadata that you can configure in the database to help really color in the picture of your network. So when you're looking at what device is using this I p when we talk about rogue devices or things like that, uh, I can get so much more information out of info blocks that almost almost to the point where you're almost being able to nail down the location of where the devices that even if it's a wireless client because it works in conjunction with some of our wireless appointments, too. So within, you know, a matter of minutes we have almost all the information we would need to take whatever action is appropriate for something like that, that getting used to take us hours and hours to troubleshoot. >>Appreciate a lot of the other interviews I've done with the info blocks, folks. One of the things that came out of them is the trailing. You can see the trail they're getting. They got to get in somewhere. DNS is the footprints of there you got? That's the traffic, and that's been helping on a potential attacks in D DOS is, for example, no one knows what that is, but DNS is what he said. A lot of the surface areas, DNS. With the hackers are makes it easier to find things. >>Well, you know, by integrating with the cloud I've I've got, you know, that the cloud based with the blocks one, it added a advanced DNS security, which helps protect skins Adidas as well as any cast to help provide more availability because I'm pushing on my DNs traffic through those cloud servers. It's like I've I'm almost equivalent of a very large organization that would normally spend millions of millions of dollars trying to do this on their own. So I'm getting the benefits and kind of the equivalent from that cloud hybrid approach that normally we would never have have. The resource is, >>Well, then I really appreciate you taking the time out of your busy day to remote into the Cube studios. Talk about next level networking experience, so I want to just ask you, just put your experience hat on. You've been You've seen some waves. You've seen the technology evolve when you hear next level networking and when you hear next level networking experience almost two separate meetings. But next level networking means next level. Next level networking experience means is some experience behind it. One of those two phrases mean to you next level networking and next level networking experience. >>Well, to me, I always look at it as the evolution of being able to have a user experience that's consistent no matter where you're located, with your home in your office and special with in today's environment. We have to be able to provide that consistent experience. But what I think what a lot of people may not think about or my overlook if you're just, you know, more of an end user is along with that experience, it has to be a consistent excess security approach. So if I'm an end user, um, I should be able to have the access the, um and the security, which, you know, you know, filtering all that fun stuff to not just allow me the connectivity, but to bring me, you know, that to keep the secure wherever I met. And ah, um, I think schools, you know, obviously with code and in the one the one that everyone was forced to do. But I think businesses And generally I think that's, you know, years ago, Cisco when I worked with Cisco, we talked about, you know, the remote user of the mobile user and how Cisco is kind of leading, uh, the way on that. And I think, you know, with the nature of things like this pandemic, I think being able to have your your users again have that consistent experience, no matter where they're at is going to be key. And so that's how I see when I think of the network evolution, I think that's how it it has to go. >>Well, we appreciate your your time sharing your insights Has a lot of a lot of people are learning that you've got to pour the concrete to build the building. DNS becoming kind of critical infrastructure. But final question for you. I got you here, you know? How you doing? Actually, schools looks like they're gonna have some either fully virtual for the next semester or some sort of time or set schedule. There's all kinds of different approaches. This is the end of the day. It's still is this big i o t experiment from a traffic standpoint. So new expectations create new solutions. What do you see on the horizon? What challenges do you see as you ride this way? Because you've got a hold down the fort, their school district for 3000 students. And you got the administration and the faculty. So you know What are you expecting? And what do you hope to see Evolve Or what do you want to stay away from? What's your opinion? >>I think? I think my my biggest concern is, you know, making sure our like, our students and staff don't, uh, you know, run into trouble on by say that more from, you know, you know, by being, you know, being exposed to attacks, you know, their data with Delta becomes, you know, comes back to our data as a district. But, you know, the student data, I think I think, you know, with anything kids are very vulnerable. Ah, very role, vulnerable targets for many reasons. You know, they're quick to use technology that quick to use, like social media, things like that. But they're they're probably the first ones to do security Does not, you know, across their mind. So I think my big my big concern is as we're moving this, you know, hybrid, hybrid approach where kids can be in school where they're going to be at home. Maybe they'll change from the days of the week. It'll fluctuate, uh, keeping them secure, you know, protecting them from themselves. Maybe in a way, if I have to be the guy is kind of the grumpy old dad it looked at. I'm okay with wearing that hat. I think that's my biggest. Our concern is providing that type of, uh, stability and security. So parents at the end of that could be, you know, I have more peace of mind that their kids you know, our online even more. It's great >>that you can bring that experience because, you know, new new environments, like whether it zooming or using, try and get the different software tools that are out there that were built for on premise premises. You have now potentially a click here. Click there. They could be a target. So, you know, being safe and getting the job done to make sure they have up time. So the remote access it again. If you've got a new edge now, right? So the edge of the network is the home. Exactly. Yeah. Your service area just got bigger. >>Yeah. Yeah, we're in. You know, I'm everybody's guest, whether they like it or not. >>I appreciate that. Appreciate your time and good luck. And let's stay in touch. Thanks for your time. >>Hey, thanks for having me. You guys have a good rest of your weekend? Day two. State State. >>Thank you very much. It's the Cube's coverage with info blocks for a special next level networking experience. Pop up event. I'm John for the Cube. Your host. Thanks for watching. Yeah, yeah, yeah.

Published Date : Jul 27 2020

SUMMARY :

It's the Cube with digital coverage of next you by info blocks. Great to have you on. we'll get there. um, you know. What did you do to keep things going? making sure, you know, the network access from a filtering and consistency standpoint experiment basically edge of the network, you know, in all over the place. blocks is cloud DNs server, you know, which was providing security and filtering. I don't want, you know, even though many company but Same thing you go to school as a customer. lot of information that info Blocks and their partners have created identifying, you know, why did you guys decide to use info blocks and what's the reason behind it? And so you know, when you're talking about attacks, over 90% of attacks use DNS. I mean, and when it needs that when you get into the DNS. Well, and to be honest, it's It's one of those services that you can't can't What do you say? So you have the cloud components to where you can take a lot of the heavy lifting, maybe off How is the info blocks helping you keep network services running in system secure? So from that standpoint, you know, in the five years almost we've I mean, you always chasing your tails. Yeah. you know, as you get more connections. I want to get your thoughts on how you see that. So within, you know, a matter of minutes we have almost Appreciate a lot of the other interviews I've done with the info blocks, folks. Well, you know, by integrating with the cloud I've I've got, you know, that the cloud based You've seen the technology evolve when you hear next but to bring me, you know, that to keep the secure wherever I met. I got you here, you know? on by say that more from, you know, you know, by being, So, you know, being safe and getting the job done to make sure they have You know, I'm everybody's guest, whether they like it or not. I appreciate that. You guys have a good rest of your weekend? Thank you very much.

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
Red SoxORGANIZATION

0.99+

CiscoORGANIZATION

0.99+

15 yearsQUANTITY

0.99+

John FurrowPERSON

0.99+

OctoberDATE

0.99+

Liu Stuart BaileyPERSON

0.99+

oneQUANTITY

0.99+

twoQUANTITY

0.99+

OneQUANTITY

0.99+

3000 studentsQUANTITY

0.99+

two phrasesQUANTITY

0.99+

JohnPERSON

0.99+

DeltaORGANIZATION

0.99+

MacCOMMERCIAL_ITEM

0.99+

five yearsQUANTITY

0.99+

fourQUANTITY

0.99+

AdidasORGANIZATION

0.99+

UtahLOCATION

0.99+

over 20 yearsQUANTITY

0.98+

both usersQUANTITY

0.98+

over 90%QUANTITY

0.98+

two incidentsQUANTITY

0.98+

todayDATE

0.98+

firstQUANTITY

0.98+

bothQUANTITY

0.97+

twiceQUANTITY

0.97+

1QUANTITY

0.97+

CubeORGANIZATION

0.96+

several years agoDATE

0.96+

Day twoQUANTITY

0.96+

D DOSTITLE

0.95+

FirstQUANTITY

0.95+

four blocksQUANTITY

0.94+

YankeeORGANIZATION

0.94+

4 hours a dayQUANTITY

0.94+

about 3QUANTITY

0.93+

zeroQUANTITY

0.91+

pandemicEVENT

0.91+

500 manQUANTITY

0.91+

this monthDATE

0.9+

One threatQUANTITY

0.89+

years agoDATE

0.89+

Palo Alto, Calif. StudiosLOCATION

0.88+

Ven SavagePERSON

0.86+

millions of millions of dollarsQUANTITY

0.86+

DD I LayerOTHER

0.85+

two separate meetingsQUANTITY

0.85+

one dayQUANTITY

0.84+

first onesQUANTITY

0.83+

last couple of yearsDATE

0.83+

next semesterDATE

0.82+

Go SoxORGANIZATION

0.82+

last eight monthsDATE

0.82+

19 baseball season sportsQUANTITY

0.81+

Morgan School DistrictORGANIZATION

0.72+

lastDATE

0.69+

baseballTITLE

0.68+

School DistrictORGANIZATION

0.66+

yearsDATE

0.65+

IndiansPERSON

0.58+

coupleQUANTITY

0.55+

infoORGANIZATION

0.5+

MorganLOCATION

0.48+

influxORGANIZATION

0.43+

CovicEVENT

0.43+

CubeCOMMERCIAL_ITEM

0.35+

Next Level Network Experience Closer V1


 

>> Narrator: From around the globe, It's the CUBE with digital coverage of next level network experience event. (upbeat music) Brought to you by Infoblox. >> Everyone welcome back to the CUBE's coverage and co-hosting of the Infoblox next level networking experience virtual event. With a pop up event, only a few hours, but four great segments. Officer Stu Miniman helped me kick it off this morning, and Stu, I want to bring you in, Stu Miniman who's the... He host for the CUBE, covering networking with me Stu we do all the cloud native shows. We can, we can smell what's relevant, and I want to get your take on this, because, Infoblox putting out some pretty good content with some great guests. But, next level networking, let's just unpack that, next level networking and next level networking experience. The word experience changes the context of that definition, because going the next level with networking is one thing, having an experience is another, just what's your take, you seen, we talk about this all the time, what's your take? >> Yeah, so John, one of the words that we've talked about so much is, how do we simplify this environment? Networking is known for its complexity. Too often, it's, stuck down in protocols and just the arcane arts that I don't want to think about. Networking at its best, is just going to work. And I don't want to think about it, so, if I'm adopting SaaS models, if I'm going cloud native, it should, tie into everything else we're doing. What I was hearing, the themes, John, and the interviews you discussed, they're talking about SaaS, they're talking about cloud native, things like visibility, moving real time, really changes so much of these environments, so, IP addresses used to be a lot more static. We know now, things just change constantly and that's one of the big challenges. How do I monitor that environment? How do I keep them secure? And that's where modern environments need to go to the next level to be able to keep up with all of those changes. >> The word experience means something to me in a sense, I think contemporary, right? I think something new, relevant and cool, and still we're old enough to remember the '80s and '90s, and I was coming out of college late '80s, and I remember I never had a punch, I never did any program with a punch card. I was kind of the young gun, coming into the workforce with a technical degree, and I remember looking at the mainframe guys going, "who are those old relics?" And they, those guys hung onto their job as long as they could, and the smart ones moved and said, "Hey, I'm going to jump on this mini computer bandwagon, Oh, there's inter networking and local area networking that the PC toys are attaching to, that's interesting." And so you had a migration of systems talent move to the new, the new way. Some didn't, and I look at that and I say, hmm, that's similar to what's going on in networking, if you're the old networking guy or gal, and you're hugging onto the router, or you're hugging onto that old way, you could be extinct, because there is a new experience coming. It's programmable, it's automation, it's different. It's not, the big, old way, similar to the mainframe. So, a lot of psychology in this networking industry right now is, and the young people come in. It's like, why we do it that way? This to me is about next level networking, experience. Your reaction to that. >> Yeah, well, John, it's been interesting here in 2020, you talk about the acceleration of things moving, people that were dipping their toe in cloud and have to move in a matter of weeks, if not, hours and days to get things up and running. So, leveraging software, open source is a big component of what a lot of companies are doing, and of course, cloud and that cloud experience means in the public cloud and edge environments, you talked a bit about IOT in some of these cases, the order of magnitude of networking challenges that are out there are such that I have to have automation, it needs to be simpler because I could not do things the manual old way. John, I lived through so many generations, you work with people in the networking, it's manually done. It was done via CLI, because I knew how to do it. Maybe I did some scripting, but in today's day and era, things change too fast and the amount of work that needs to be done is so much so that that's why automation needs to be front and center. And you see Infoblox, as some of their new solutions, especially leveraging SnapRoute take advantage of the modern way that people need to do things. >> Well, we actually did a deep dive on SnapRoute and it was super impressive, again, I thought it was way too early, but they were doing some stuff with Kubernetes thinking, just thinking like Linux kernel, low level thinking. And I think Stu, this is what I want to get your thoughts on, because in the industry we cover Cisco aggressively. We saw them by open DNS, manage services versus low level, we got automation, you got Amazon out there, I mean, hell I can just have a screen that goes in and manages my DNS in the cloud, I can start thinking differently about how I wire my services together, if I think about Amazon, for instance, or hybrid and multicloud, this a whole new level of thinking. And, these are going to be new solutions, and this is the theme that came up and it's come up across every single major vendor, whether we're talking the Google cause they have a pretty damn good network. You got Cisco, you've got, all these people out there, they got to reinvent themselves. And, new expectations require new solutions. This has been something that's clearly coming out of the COVID, that, you know what I like working from home, I'm more productive. We don't need the real estate costs, wait, why do we even need a VPN? Why we over-provisioned? What are we paying for? Let's just build and secure. So again, all these projects are going to come out of the woodwork, I think that they're going to create a new vendor, a new brand or new opportunity because, these new solutions need to come because of the demand has been highlighted by COVID and other cloud scale. What's your thoughts on that, because this may not be your grandfather's networking company that comes out of the woodwork, It might be a cloud app. >> Yeah, well John, first of all, I think you nailed it. You look at a company like Infoblox, founded back in the .com era, back in 1999 and dominant in their space. So, they're not here saying, oh, we're the tried and trusted company that you work with, and you shouldn't try that new Fangled, Kubernetes piece or anything like that. It's not ready for prime time. As you said, they're getting, they're looking to skate where, to where the pack is going, they're aggressively going after these environments to make sure that they maintain their leadership in this environment. And, you're absolutely right, for the longest time, generally in networking, you were talking about, it was Cisco and everybody else out there, but now the cloud is such a big piece of what's going on, we've seen chip acquisitions by the big Hyperscalers, we've seen how they build their environments, and in many ways there's been consolidation, but there's also been dis-aggregation. So, the fundamental layer, but like what Infoblox has with their DDI stack, is something that customers need, I need to make sure my identity and my IP is something that I can manage wherever I am in all of these environment. >> It's funny Stu, we joke about SD-WAN, and now that's the internet and you think about the internet, one constant in all of it is you got to move packets from point a to point B and store a packet in a storage device, and ultimately you need to have to resolve addresses. And DNS, as old as it is, is fundamentally the standard, and a lot of people take it for granted, so to me, DNS has survived. It's a low level building block, but as things evolve, new abstraction layers come up, and I think we'll see more. I mean, I think there'll be a new naming system on how to deal with different scale across multicloud. And I think, Amazon is talking about it. We hear Ava Trix talking about it, we hear, things going on within Google talking about it, so, I think you're going to start to see new levels of innovation because, that's where the packets are moving, that's what the bad guys are, and you can't cover your footprints if you're trying to get in there. So, huge change is coming will be on it, And the CUBE we'll be monitoring it, as always, we can see the waves coming, Stu, what do you see? What's your future ball, tell you, as we come out of COVID, networking world, cloud collision, multicloud, apps, microservices, all this massive wave, what's your take, What's going to happen? >> Well yeah John, we've talked so much, It's those builders out there, how do I make sure that I can build my application, allow my users to access things wherever they are. The shift we hear for post COVID, it goes from work from home to work from anywhere. So, we were not going to see everybody just go back to the pre COVID era, this will have a lasting impact, and especially from a networking standpoint, we were starting to look at how does 5G and IOT change the way we think of networking? This just accelerates what we Needed to look at. Some networking technologies, take a long time to go through their maturation and standards, but being able to manage my entire environment, be able to spin up my new applications, and as you said John, DNS, like identity is something that is a fundamental piece that I need to make sure is rock solid so that I can get my employees access to the information while still keep things secure. >> Well, when you click on a link, that's malware, that's DNS, so this is where the action is, and people got to preserve it. Stu, We're going to be covering it, we're going to be watching all the waves, and again, this the CUBE on top of the big wave of networking and as networking evolves, I just still, I just still think, it's one big IOT world now, and it's an internet of things. They're all connected, there's no perimeter, it's borderless. This is going to change the game. I think in the next 18 months, we're going to see really different connected experiences and whoever can deliver them, will be the winner. Of course, we'll be watching it, go to siliconangle.com. We have a special report on next gen networking, Rob hope from Paul Gillin are constantly reporting, Stu has been getting a ton of great interviews, and again, we're getting the stories out, during COVID-19, with our remote interviews. Thanks for watching the CUBE, for the special next level networking experience event by Infoblox. (upbeat music)

Published Date : Jul 23 2020

SUMMARY :

Brought to you by Infoblox. and co-hosting of the Infoblox and the interviews you discussed, and said, "Hey, I'm going to jump on and have to move in a matter of weeks, because in the industry we I need to make sure my identity and my IP and now that's the internet and standards, but being able to manage and people got to preserve it.

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
JohnPERSON

0.99+

AmazonORGANIZATION

0.99+

CiscoORGANIZATION

0.99+

Paul GillinPERSON

0.99+

InfobloxORGANIZATION

0.99+

2020DATE

0.99+

GoogleORGANIZATION

0.99+

1999DATE

0.99+

Stu MinimanPERSON

0.99+

StuPERSON

0.99+

oneQUANTITY

0.99+

CUBEORGANIZATION

0.98+

siliconangle.comOTHER

0.98+

SnapRouteTITLE

0.97+

RobPERSON

0.97+

late '80sDATE

0.97+

todayDATE

0.96+

COVID-19OTHER

0.95+

Linux kernelTITLE

0.94+

bigEVENT

0.91+

Ava TrixPERSON

0.89+

next 18 monthsDATE

0.88+

COVIDEVENT

0.87+

this morningDATE

0.85+

one thingQUANTITY

0.85+

'80sDATE

0.75+

FangledORGANIZATION

0.72+

four great segmentsQUANTITY

0.72+

CLITITLE

0.71+

OfficerPERSON

0.7+

'90sDATE

0.68+

COVIDTITLE

0.58+

hoursQUANTITY

0.52+

KubernetesORGANIZATION

0.51+

singleQUANTITY

0.49+

waveEVENT

0.44+

CUBETITLE

0.44+

Next Level Network Experience Intro V1


 

>>from around the globe. It's the Cube with digital coverage of next level network experience event brought to you by Info blocks Hi ups to Minuteman and welcome to the Cube's coverage of the info blocks virtual event. Digging into the next level networking experience. I'm here with John Furrier, who is the host of the event. John. We've been talking about next level networking for for a few years now. Everything's multi cloud cloud native SAS adoption, really transforming the way that we have to think about networking. Tell us a little bit about this event. >>So as you know, yeah, again go back years from when member VM Ware bought in a sexual like Okay, you know that's going to change the game software to find networking. And we love that. We were all riffing on program ability. You saw the Dev Ops trajectory hitting networking. We would say that's where the action is on this event really kind of speaks to Info Blocks as a company which is really well known for DNS. I mean, they had cricket. Liu Stuart Bailey, that really kind of the pioneers in DNS and security have constantly been adding innovation to it, but DNS is one of those things where it's kind of like not thought about, but it runs everywhere, runs the web. It is critical infrastructure and, you know D HCP. We all know what that is. We have a home router, and then he got I p address management. These have been traditionally different things for enterprises, and everyone has it. They got to deal with it. And it's really, ultimately the location and how things resolved and connect. So you know, it really becomes a foundational opportunity to figure out where the access is not only a remote access, but security. So we had a great bunch of guests looking at looking at the info blocks. Next level networking, because they bought, had an acquisition, a Cube alumni snap route recently, and this caught our attention because they were doing Cloud Native. And one of the guests we had was Glenn Sullivan. He was the founder of Snap Route. He was the the guy who did all the Siri work for Apple. So this guy knows large scale of those cloud native We had kuna Sunni, who's the runs? Corporate development in all of the products for info blocks. He kind of went into the strategy of how they're taking the I won't say boring DNs, but the critical infrastructure of DNS and how they're extending the functionality with an abstraction layer around D D I, which is DNS DCP and management. And then we had some great guests on there. We had a Craig Sanderson from info blocks. He's on there. You'll hear from him. He talked about the security and then finally a customer who's running a big school district who, with Covert 19 exposes all these challenges around what has been called the borderless enterprise. So really, next level is that, you know, how do you deal with all this stuff? And that's been a big issue. So we're gonna unpack all that in this virtual event. We have four great interviews, and so it's going to be a great program. >>Yeah, John, as you said it to some of those foundational pieces of how network is done, a lot of times runs, you know, under the radar, something you don't need to think about. But all of these changes, as we said, you know my data. My network is now highly distributed, especially I would expect that the impact of the global pandemic and work from home are really causing even more of these challenges and to think about distributed infrastructure even more. So what are some of the themes we should be looking for here? How much of them kind of tie into what we've been talking about the last couple of years in some of these cloud native worlds? >>That's great questions to I'll get into some of the themes of the program, but you brought up the covert 19 again. We've been talking about this in our reporting. You've been doing a ton of interviews following all your your stuff as well as well as all of our team. Covert 19 really exposes the aspect of critical infrastructure, and to me it's like it's the It's the great I o T experiment happening in real time. It's forcing companies saying, Hey, the work. The future of work is about workplace. The location is now home workforce. Are the people emotional? They want ease of use. They want a different experience. They're all not in the office workloads and work flows. All of them have the common word working it so I think over 19 exposes this what I call I o t experiment because everyone is now borderless. It changes the game and really puts the pressure on security network access. And ultimately, you know, the bad guys are out there so you could have someone a teacher at home or a worker at home, and they get some malware attack and they're not sophisticated, zoom or whatever they're using for tools. All that's changed and they're vulnerable. So this brings up a huge networking challenge from whether even VP ends or even relevant or not to everything. So, to me, that is a huge point. You're gonna hear that throughout the commentary that that's kind of teased out. But the real things about innovation around the cloud you're gonna hear info blocks and they're experts talk about what they're doing and how they see cloud scale and cloud native integrating into an older paradigm like DNS. And to me, that's the That's the evolution of this DD I concept. That's an abstraction layer that creates innovation opportunities but also takes away a lot of the complexities around managing all the DNS things out there and again, that's the access of the network. It's a it's a place of truth is really kind of low level, but it's really foundational. So to me, that's the main theme. And customers want ease of use into it, whether they're at home or not, and replacing the old ways to putting a box out there. That's the way it was, DNs DNs. People would manage it all. Now they want to have it provisioned, managed a manage service cloud Native Cloud operations because it's only gonna get has to get that way. >>Yeah, it's interesting, John. You know, we watched the whole wave of software defined impact networking. I think of a company like Info blocks. They've been around for decades. They're dominant in the space is that they play in. Traditionally, it would have been an appliance that you thought of for their environment you talked about. They now have the snapper out acquisition as part of what they're doing. So it just what should we be looking for? What are they really the main point? That Info Box wants to bring people together for this next level networking experience? >>Well, Glenn Sullivan was one of my favorite discussions, and he's been on. He's a cube alumni and he's so smart. He came again from Apple. He knows that he knows what large scale looks like. Snap route was really early and was one of those technologies that just, you know, it has the core DNs built in kubernetes built in. They were doing some pretty aggressive, I would call it for lack of a better word kubernetes on bare metal. They were doing stuff, but really super cool kubernetes you combine that with DNS and info blocks actually has the core DNs that's actually in every kubernetes of in the CN CF. So everything that comes out of the CN CF from a core DNS standpoint is info blocks. So yeah, they're definitely relevant in the whole CNC of Cloud Native foundation, effort around cloud native. And as that scales just micro services, you're gonna have to have this new abstraction layer and also be compatible with automation. So that's, um, we didn't go into the weeds on that, but that was essentially the head room for all the different conversations roles of cloud native and open source technologies enabling borderless enterprises because you got to have the operation side and you got to have the program ability. So you start to get into the true dev ops that we used to riff on all the time. You know, move fast, break stuff to don't break anything. Right? So ops, ops and Dev have to come together. This is where the winners and losers of networking will be determined. You gotta provide the enablement for developers, but you gotta provide the stability of an operational checklist. >>Yeah, John, I guess the last question I want to ask you before we get to the guests, You know, that operational change, You know, we saw for so many years it was, Oh, all the networking people, they're going to have to learn to code up weight. Dev ops is actually gonna spreading the information around. And maybe I won't need a particular networking team. But we understand when things go wrong, you've gotta have somebody with the expertise that could be able to dig in. What are you know, who should be listening to this? What are some of those organizational implications for what you're talking about with info blocks? >>That's a great point. I mean, the biggest challenge that I see in all this entire digital transformation as it starts to get down into the cloud native world is, most people are asking the wrong questions. They don't even know what they're talking about When it comes down to trying to compare an apple to an orange, they're really kind of disconnected on language. You got server people in networking. We know that they have different languages, and working together is key. When you think about something like DNS, that's a technical. That's an operator that's an I t person, that someone who's running critical infrastructure. But when you start to think about the security aspect of it, it's a CSO conversation. So what I'm seeing come out of this that's critical, is when you start to get into this cloud native world. You have more stakeholders in the value proposition of all this and with covert 19. As I pointed out, you know you got hacks and you got security. So when you talk with security, that's up and down the organization. That's the CSO down to the teams themselves. We have about automation horizontally scaling with Dev ops. That's multiple teams, so you have an integration kind of stakeholders. You know DNS servers, all networking. All these people have to kind of come together. So the people who should watch this are the people who are concerned about scaling the modern enterprise, which is borderless, which is code word for multiple access points and multiple connection points. R i o t um, how do you make that work? And that's the real challenge. So it's kind of like an I t a person who wants to figure out where the puck will be so they could be there when it's there and skate to where the puck is, as we say, and and the CSO of the senior people have to understand that DNS cannot be overlooked because whether it's a managed service. So So Cloudflare had a huge out into the DNS. Setting DNS takes down everything. So it's ah, it's the most fertile ground and the most targeted ground for attacks, and that is well understood. So getting the right questions in place foundational we had to set up the modern enterprise, and then that's going to be a construct for the cloud native architecture and ultimately the developer environment. So yeah, it's a topic that's kind of nerdy with DNS, But it has implications across digital transformation. >>Jonah expecting lots of conversations around security and automation how they tie into all of the modern and modernization themes. Absolutely some pieces that shouldn't be left behind. All right, John Ferrier, Thanks so much for helping us kick off. Really interested. Make sure to stick with us off to listen to all the guest interviews here that John has done the info blocks. Next level networking experience. Instrument, man. And thank you for watching the Cube. Yeah, yeah, yeah, yeah, yeah, yeah.

Published Date : Jul 23 2020

SUMMARY :

the way that we have to think about networking. that really kind of the pioneers in DNS and security have constantly been adding innovation to it, But all of these changes, as we said, you know my data. that's the That's the evolution of this DD I concept. They now have the snapper out acquisition as part of what they're doing. You gotta provide the enablement for developers, but you gotta provide the stability of an operational checklist. Yeah, John, I guess the last question I want to ask you before we get to the guests, You know, So getting the right questions in place foundational we had to set up the modern enterprise, of the modern and modernization themes.

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
JohnPERSON

0.99+

John FerrierPERSON

0.99+

Glenn SullivanPERSON

0.99+

John FurrierPERSON

0.99+

AppleORGANIZATION

0.99+

Liu Stuart BaileyPERSON

0.99+

Craig SandersonPERSON

0.99+

SiriTITLE

0.99+

oneQUANTITY

0.99+

Snap RouteORGANIZATION

0.98+

Info BoxORGANIZATION

0.98+

CloudflareTITLE

0.98+

JonahPERSON

0.97+

CubeORGANIZATION

0.97+

Info blocksORGANIZATION

0.97+

appleORGANIZATION

0.97+

VM WareORGANIZATION

0.96+

Info BlocksORGANIZATION

0.94+

info blocksORGANIZATION

0.94+

kuna SunniPERSON

0.93+

over 19QUANTITY

0.93+

four great interviewsQUANTITY

0.92+

decadesQUANTITY

0.92+

Covert 19OTHER

0.88+

snap routeORGANIZATION

0.86+

orangeORGANIZATION

0.86+

globalEVENT

0.8+

covertTITLE

0.77+

last couple of yearsDATE

0.77+

pandemicEVENT

0.77+

MinutemanORGANIZATION

0.75+

Covert 19ORGANIZATION

0.72+

snapperORGANIZATION

0.69+

SASORGANIZATION

0.67+

Cloud NativeORGANIZATION

0.62+

19QUANTITY

0.5+

19OTHER

0.5+

CubeCOMMERCIAL_ITEM

0.44+

DevEVENT

0.28+