Image Title

Search Results for North:

Charles Carter, State of North Carolina | AWS Executive Summit 2022


 

(soft music) >> We're in Las Vegas at The Venetian for our continued coverage here of re:Invent '22, AWS's big show going on. Great success off to a wonderful start. We're in the Executive Summit sponsored by Accenture. And we're going to talk about public health and the cloud, how those have come together in the great state of North Carolina. Charles Carter is going to help us do that. He's assistant secretary for technology services with the state of North Carolina's Department of Health and Human Services. Charles, good to see you. Thanks for joining us here on "theCUBE". >> Thank you very much for having me. >> Yeah, thanks for making the time. So first off, let's talk about what you do on the homefront before what you're doing here and where you're going. But in terms of kind of what your plan has been, what your journey has been from a cloud perspective and how you've implemented that and where you are right now in your journey. >> Sure, so we started. When I got there, we didn't have a cloud footprint at all. There was a- >> Host: Which was how long ago? >> I got there in 2016, so about six years. >> Host: Six, seven years, yeah. >> Yeah, five, six years. So anyways, we started off with our first module within our Medicaid expansion. And that was the first time that we went into the cloud. We worked with AWS to do our encounter processing system. And it was an incredible success. I think the ease of use was really kind of something that people weren't quite ready for. But it was really exciting to see that. And the scalability, to be able to turn that on and cover the entirety of North Carolina was awesome. So once we saw that and get a little taste of it, then we really wanted to start implementing it throughout DHHS. And we marshaled in a cloud-only cloud-first strategy where you had to actually get an exemption not to go to the cloud. And that was a first for our state. So that was really kind of the what launched us. But then COVID hit. And once COVID came in, that took us to a new level. COVID forced us to build technologies that enabled a better treatment, a better care, a better response from our team. And so we were able to stand up platforms in 48 hours. We were able to stand up COVID vaccine management systems in six weeks. And none of that would've been possible without the cloud. >> So forced your hand in a way because all of a sudden you've got this extraordinarily remote workforce, right, and people trying to- And you're doing different tasks that were totally unexpected, right, prior to that. What kind of a shock to the system was that from I get from an IT perspective? >> Yeah, so from a state government perspective, for example, you never hear you have all the money you need and you have to do it quickly. It just doesn't work like that. But this was a rare moment in time where you had this critical need. The entire country and our state population was kind of on edge. How do we move through this? How do we factor our lives into this new integration? What is this virus? Is it spreading in my county, in my city, my zip code? Where is it? And that kind of desperation really kind of focused everybody in on build me technologies that can get me the data that I need to make good healthcare decisions, good clinical decisions. And so that was our challenge. Cloud enabled it because it can scale so quickly. We can set up things, we can exchange data. We can move data around a lot easier. And the security is better from our perspective. So that COVID experience really kind of pushed us, you know, if you will, out the door. And we're never going back because it's just too good. >> Yeah, was that the aha moment then in a way because you had to do so much so fast and before capabilities that maybe you didn't have or maybe hadn't tapped? >> Yeah, yeah. >> I mean what was the accelerant there? Was COVID that big, or was it somebody who had to make a decision to say, this is where we're going with this, somebody in your shoes or somebody with whom you work? >> Yeah, no, I mean cloud at the end of the day, we knew that in order to do what we needed to do we couldn't do it on-prem. It wasn't an option. So if we wanted to build these capabilities, if we wanted to bring in technologies that really brought data to our key, our governor, our secretary, to make good decisions on behalf of our residents in North Carolina, then we were going to have to build things quickly. And the only way you can do that is in the cloud. So it was when they came back and said, "We need these things," there's only one answer. That's a good thing about technology. It's pretty binary, so it was either go with what we had, which wasn't adequate, or build to what we knew we could do and pretty short order. And because of that, we were able to actually usher in a huge expansion of cloud footprint within DHHS. And now we've actually been able to implement it in other departments simply because of our expertise. And that's been a huge asset for the state of North Carolina as a whole. >> So what's your measuring stick then for value in terms of identifying benefit? 'Cause it's not really about cost. This is about service, I assume, right? >> Right. >> So, you know, how do you quantify the values and the benefits that you're deriving from this migration over to the cloud? >> So from our perspective, it hits several different areas. I mean, you can start in security. We know that if we're in the cloud the tools that can manage and give us visibility in the cloud are 10 times better than an on-prem environment. And so if we can take a lot of these legacy systems and move them to the cloud, we'll be in a better security posture. So we have that piece of it. The other part of it is the data aspect of it, being able to- We're 33 divisions strong, right? We have a large footprint. We have a lot of siloed data elements. And cloud allows us to start integrating those data sets in a much more usable fashion so that we can see that if Charles Carter's in one area in division, a specific division with DHHS, is he somewhere else? And if he is somewhere else, then how do we provide a better clinical care for that individual? And those are conversations that we can't really have if we don't move to the cloud. So those types of- And of course there's always the OKRs, the actual measurements that you apply to things that we're doing. But at the end of the day, can we get the requirements from our business partners, bring those requirements to bear in technology, and really enable the indoctrination of these requirements throughout our clinical and healthcare kills? >> What about they're always pillars here, right? Governance, huge pillar, security, huge pillar, especially in your world, right? >> Yeah. >> So making that move over to the cloud and still recognizing that these are essentials that you have to have in place, I wouldn't say adjustments, but what kind of, I guess, recognition have you had toward that and making sure that you're still very true to those principles that are vital in the terms of public health? >> It is a great question because our secretary at the time and our governor, Roy Cooper, were very focused on enabling transparency. We had to be very transparent with what we were doing because the residents in North Carolina were just really kind of, "What's going on?" It was a scary time for a lot of us. So transparency was a key element towards our success. And in order to do that, you've got to have proper security. You got to have proper governance. You've got to have proper builds within technology that really enable that kind of visibility. One of the things that we did very early on was we set up a governance structure for our cloud environments so that as we wanted to and stand up an easy-to environment or we wanted to do some sort of work within a cloud or stand up in a different environment, we were able actually to set up a framework for how do you introduce that. Are you doing it correctly? Do you have the proper security on it? Do you have the funding for it? Like all the steps that you need to really kind of build into the scaffolding around a lot of these efforts we had to put in place and pretty quickly to get them going. But once we did that, the acceptance and the adoption of it was just tremendous. I mean, it was a light on for all of our business partners 'cause they understood I can either build on-prem, in which case I won't be able to get what I want in any kind of reasonable time period. Or I can build on cloud. And I can have it in some cases in 48 hours. >> Right, tomorrow. >> Yeah, exactly. >> You know, it was a huge difference. >> So where are you there? I mean, this is just not like a really big old lift and shift and we're all done and this is great. Cloud's taken care of all of our needs. Where are you in terms of the journey that you're undertaking? And then ultimately where do you want to go, like how far? What kind of goals have you set for yourself for the next two, three years down the road? >> Yeah, so this is an exciting part because we have actually- Like I mentioned earlier, we are a cloud-first cloud-only strategy, right? There's no reasons for us to be on-prem. It's just a matter of us kind of sunsetting legacy systems and bringing on cloud performance. We hope to be a 60% of our applications, which we have over 400 applications. So it's pretty large footprint. But we're wanting to migrate all of that to the cloud by 2025. So if we can achieve that, I think we'll be well on our way. And the momentum will carry forward for us to do that. We've actually had to do a reorganization of our whole IT structure. I think this is an important part to maintain that momentum because we've reorganized our staff, reorganized ourselves so that we can focus more on how do you adopt cloud, how do you bring in platforms which are all cloud-based, how do you use data within those systems? And that has allowed us to kind of think differently about our responsibilities, who's accountable for what, and to kind of keep those, that momentum going. So we've got some big projects that are on right now. Some of them are lift and shift, like you mentioned. We have a project with kind of a clumsy, monolithic system. It's called (indistinct). We're trying to migrate that to the cloud. We're in the process of doing that. And it's an excellent demonstration of capability once we pull that off. And then of course any new procurement that we put out there no one's making anything for on-prem anymore. Everyone's making their SaaS products for cloud-based experiences. Or if we're going to build or just use integrators then we'll build that in house. But all of it's based on cloud. >> And you mentioned SaaS. How much of this stuff are you doing on your own? And how much are you doing through managed services? >> Yeah, so like I mentioned, we have over 400 applications. So we had a pretty large footprint, right? >> Big, it's huge, right. >> So we're only who we are, and we can only build so much. So we're kind of taking- We did a application rationalization effort, which kind of identified some threats to our systems. Like maybe they're older things, FoxPro, kind of older languages that we're using. And in some cases we got people who are retiring. And there's not many people who can support that anymore. So how do we take those and migrate them to the cloud, either put them on a Salesforce or ServiceNow or Microsoft Dynamics platform and really kind of upgrade those systems? So we're in the process of kind of analyzing those elements. But yeah, that's kind of the exciting launch, if you will, of kind of taking the existing visibility of our applications and then applying it to what we're capable of with the cloud. >> And if you had advice that you could give to your colleagues who are in public health or just in public, the public sector- And your resources, they're finite. This is kind of what you have to deal with. And yet you have needs, and you're trying to stay current. You've got talent challenges, right? You've got rev or spending challenges. So if you could sit down your colleagues in a room and say, "Okay, this has been our experience. Here's what I would keep an eye out for," what kind of headlights would you beat for them? >> Yeah, so I think the biggest aha that I'd like to share with my contemporaries out there is that you've got a great ability to lower your costs, to excite your own personnel because they want to work on the new stuff. We've actually set up a whole professional development pathway within our organization to start getting people certified on AWS, certified on other platforms, to get them ready to start working in those environments. And so all of that work that we're been doing is coming together and allowing us to maintain the momentum. So what I'd recommend to people is, A, look at your own individual staff. I don't think you need to go outside to find the talent. I think you can train the talent that you have interior. I think you've got to aggressively pursue modernization because modernization enables a lot more. It's less expensive. It enables quicker adoption of business requirements and modern business requirements. And then lastly, focus on your data sharing because what you're going to find in the platforms and in the clouds is that there is a lot more opportunities for data integrations and conjoining disparate data sources. So if you can do those elements, you'll find that your capabilities on the business side are much more, much greater on the other end. >> Don't be scared, right, jump in? (laughing) >> Definitely don't be scared. Don't be, the water's warm. (host laughing) Come on in, you're fine, you're fine. (laughing) >> No little toe dipping in there. You're going to dive into the deep end, let her rip. >> Exactly, just go right in, just go right in. >> Well, it sounds like you've done that with great success. >> I'm very happy with it. >> Congratulations on that. And wish you success down the road. >> Thank you very much, I appreciate it. >> Yeah, thank you, Charles. All right, back with more. You are watching theCUBE here in Las Vegas. theCUBE of course the leader, as you know, in tech coverage. (soft music)

Published Date : Dec 1 2022

SUMMARY :

We're in the Executive Summit and where you are right Sure, so we started. I got there in 2016, And the scalability, to to the system was that And so that was our challenge. And because of that, we were So what's your measuring fashion so that we can see And in order to do that, you've So where are you there? so that we can focus more And how much are you doing So we had a pretty large footprint, right? And in some cases we got And if you had advice talent that you have interior. Don't be, the water's warm. You're going to dive into Exactly, just go right done that with great success. And wish you success down the road. as you know, in tech coverage.

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
CharlesPERSON

0.99+

Roy CooperPERSON

0.99+

2016DATE

0.99+

Charles CarterPERSON

0.99+

North CarolinaLOCATION

0.99+

2025DATE

0.99+

10 timesQUANTITY

0.99+

AWSORGANIZATION

0.99+

Las VegasLOCATION

0.99+

60%QUANTITY

0.99+

North CarolinaLOCATION

0.99+

48 hoursQUANTITY

0.99+

AccentureORGANIZATION

0.99+

SixQUANTITY

0.99+

six yearsQUANTITY

0.99+

seven yearsQUANTITY

0.99+

fiveQUANTITY

0.99+

over 400 applicationsQUANTITY

0.99+

tomorrowDATE

0.99+

first moduleQUANTITY

0.99+

33 divisionsQUANTITY

0.99+

six weeksQUANTITY

0.99+

one answerQUANTITY

0.98+

OneQUANTITY

0.98+

three yearsQUANTITY

0.97+

Department of Health and Human ServicesORGANIZATION

0.97+

first timeQUANTITY

0.97+

firstQUANTITY

0.96+

SalesforceTITLE

0.96+

ServiceNowTITLE

0.96+

COVIDOTHER

0.95+

MicrosoftORGANIZATION

0.93+

one areaQUANTITY

0.93+

twoQUANTITY

0.85+

about six yearsQUANTITY

0.84+

DynamicsTITLE

0.81+

Invent '22EVENT

0.8+

AWS Executive Summit 2022EVENT

0.8+

first strategyQUANTITY

0.8+

MedicaidTITLE

0.78+

COVIDTITLE

0.68+

SummitEVENT

0.64+

FoxProORGANIZATION

0.59+

theCUBETITLE

0.56+

The VenetianLOCATION

0.53+

theCUBEORGANIZATION

0.52+

re:EVENT

0.52+

CloudPERSON

0.47+

Jonathan Weinert, Bosch North America | InterBike 2018


 

(techno music) >> Hey, welcome back everybody, Jeff Frick here with theCUBE. We're in Reno, Nevada at the Reno Convention Center. It's InterBike 2018, I think it's like 20,000 people, haven't got the official count yet, but this is an amazing show, it's all about bicycles. We came because we want to learn more about eBikes, and really, this kind of last mile thing that's goin' on, mobility, and right at the center of the eBike revolution is a company that's been around forever, and that's Bosch, and we're happy to have Jonathan Weinert. He's a sales and marketing manager for the Bosch eBikes. Jonathan, great to see you. >> Great to see you, Jeff. >> So, I don't know if everybody knows, you guys power like half of all the eBikes that are out there. You guys are completely in bed with all these manufacturers with really, the industry leading system. >> Thank you, yes, the Bosch eBike system, you'll find it world wide on about 70 different bike brands throughout the world. Here in North America, we're on about 30 different brands, from Trek to Electra to Cannondale. And they power all types of bikes, so commuter bikes, cargo bikes, fat bikes, mountain bikes, any type of bike that you can think of can use the Bosch eBike system to amplify the rider's power and help you go further, higher, farther, less sweat or sweat it out, whatever you want. >> Right, it's like the magic power. >> Exactly, magic carpet ride. >> The main components are you got the drive unit, which is really the heart of the system. >> Yes. >> The battery obviously to provide the power, then the control unit that's up on top of the handlebars, so you can control it. >> Exactly. >> So we were talking before we turned the cameras on, of kind of the history, you guys have been at this for like nine years, I believe you said? >> Exactly, yeah, we invented this system nine years ago, it was a combination of technology from our automotive business. So an electric power steering motor, married with technology from our power tools business, the lithium iron battery pack. And we also had some sensors, torque sensors and electronics and we put these technologies together, and the engineers back then, what they wanted to do is create something to make cycling still feel like cycling but help you conquer hills. >> Right. >> And go farther and use the bike more. >> Right, it's pretty interesting cause there's a whole lot of data that's feeding that software and the algorithms to make those feedback loops smooth, make 'em feel like bicycling, so it's really you're riding on software. >> Exactly, you're riding on software and we have three sensors that are capturing your input. Torque sensor from the pedals, how fast you're pedaling, and wheel speed. And those three sensor measurements go into the electronics and tell the motor how much extra oomph to give you. >> Right, but you have to be pedaling right? >> You always have to be pedaling, yeah. >> That's one of the data inputs. >> Exactly, these are all pedal assist eBikes, and they only assist you when you pedal, no throttle, and they can assist you up to 20 miles per hour, or 28 miles per hour for our speed system. >> Right, we saw that last night in the gazelle, they had one of the 28 mile an hour bikes. >> Yeah, which is great for people that have long distance commutes or they want to do these huge adventure rides, so yeah, both are great. >> Now, what about the maintenance for these types of systems I mean it looks like a pretty closed system. >> It is totally closed, yeah. >> It's totally closed. >> Yeah, the maintenance, they last a long time, they're warrantied for two years, but if you have a problem with anything, you take it to the dealer, the dealer takes the component off, sends it to Bosch and gives you a new one. You don't have to open anything or solder anything. >> Right, right. >> Yeah, no. It's automotive grade, sort of service and diagnostics. >> Right, so the other thing we're seeing all over the show floor here again is all about the data. There's so much more data available to the riders. We were just at the Garmin booth and I don't know how many different data sets that they can track, in terms of your pedal pressure. >> Yes. >> Whether you're tipping back and forth, whether you're even, and you guys are actually pulling some of that external data back into your systems, right? For a unified experience for the rider. I think you said, a heart rate sensor for instance? >> Exactly, that's the newest feature that we're showcasing at InterBike today, the Kiox display. Which connects man and machine, or woman and machine. You can wear a heart rate monitor and as you're riding, you can see your heart rate on your device. Which is great if you want to train on an e-mountain bike. Sometimes you want to keep your heart rate in a certain range. Sometimes you want to make sure it doesn't go above a certain limit. >> Right. Yeah, so it's our first step into connectivity. Many more connectivity features will follow. >> Right, so I'm just curious from your perspective on the bike industry, cause you sit in kind of this, cat bird seat, since you deal with so many different kinds of bikes. And I was amazed at how much of the mountain bike adoption of the eBikes is happening here. Have you seen within your dealers, kind of this new opportunity to leverage electronics and a motor to kind of reinvigorate the brands, reinvigorate the models, and reinvigorate, you know, many of the, just a wide range of cool form factors that we're seeing all over the floor? >> Yeah, so nine years ago, Bosch coupled with Haibike. Haibike sort of created this segment of e-mountain biking by putting the motor in a unique way into the bike, and since then this e-mountain bike trend has really taken off, it's huge in Europe. You'll see e-mountain bikes all over the ski resorts there. They're allowing families to e-mountain bike together, to bike together, just like they ski together in the winter. So it's reinvigorating ski resorts and we see ski resorts here in the US, also embracing e-mountain bikes. Mammoth Mountain just allowed class one e-mountain bikes on all their bike park trails. So e-mountain biking is really spreading through this resort and other resorts, North Star, right up the road. >> Right and I wonder on the city side, again, lessons we can learn from Europe, cause it seems like the regulations are, you know, they're always a little bit behind the technology in terms of, you know, how are eBikes treated. Are they a bike, are they a motor vehicle? And I know there's some laws but it still seems a little bit confused and cities aren't quite ready to realize that an eBike is better than a car, in terms of so many things happening in the city. Are you guys involved in that, kind of industry consortium and how do you see that evolving? >> So we've been involved with several other bike companies and PeopleForBikes to create a framework, how to regulate eBikes. And we've divided eBikes into three classes. Class one, two and three, pedal assist, throttle, anyway. Setting up this definition of the three classes of eBikes, we've created this eBike law in California and nine other states throughout the country. So now they know how to regulate eBikes and these three classes and they can limit where each class can go on the roads. And with this regulation, we're seeing the eBike adoption in these states really start to pick up, now that they're easier to regulate. >> Right, well Jonathan, really a cool story and it's been really fun to watch Bosch, especially as you guys have gone from your long history in the auto parts world to this new exciting space. So thanks for taking a few minutes and congrats. >> Oh, my pleasure, Jeff, thank you. >> Alright, he's Jonathan, I'm Jeff, you're watching theCUBE, we're at InterBike in Reno, Nevada. Thanks for watching, see you next time. (techno music)

Published Date : Sep 21 2018

SUMMARY :

We're in Reno, Nevada at the Reno Convention Center. So, I don't know if everybody knows, you guys power and help you go further, higher, farther, The main components are you got the drive unit, so you can control it. and the engineers back then, what they wanted to do that's feeding that software and the algorithms and tell the motor how much extra oomph to give you. and they can assist you up to 20 miles per hour, Right, we saw that last night in the gazelle, or they want to do these huge adventure rides, I mean it looks like a pretty closed system. sends it to Bosch and gives you a new one. Yeah, no. Right, so the other thing we're seeing and you guys are actually pulling Sometimes you want to keep your heart rate in a certain range. Yeah, so it's our first step into connectivity. on the bike industry, cause you sit in kind of this, and we see ski resorts here in the US, cause it seems like the regulations are, you know, and PeopleForBikes to create a framework, and it's been really fun to watch Bosch, Thanks for watching, see you next time.

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
MichaelPERSON

0.99+

HowardPERSON

0.99+

MariaPERSON

0.99+

Laura HeismanPERSON

0.99+

LauraPERSON

0.99+

JamaicaLOCATION

0.99+

Mark FaltoPERSON

0.99+

DavidPERSON

0.99+

DavePERSON

0.99+

JeffPERSON

0.99+

JohnPERSON

0.99+

Jeff FrickPERSON

0.99+

Dave ValantePERSON

0.99+

CaliforniaLOCATION

0.99+

2006DATE

0.99+

2012DATE

0.99+

Dan SavaresePERSON

0.99+

CompaqORGANIZATION

0.99+

JoePERSON

0.99+

EMCORGANIZATION

0.99+

Paul GillanPERSON

0.99+

RonPERSON

0.99+

JonathanPERSON

0.99+

DellORGANIZATION

0.99+

CiscoORGANIZATION

0.99+

RhondaPERSON

0.99+

Jonathan WeinertPERSON

0.99+

Steve BamaPERSON

0.99+

twoQUANTITY

0.99+

two yearsQUANTITY

0.99+

VegasLOCATION

0.99+

BangaloreLOCATION

0.99+

2009DATE

0.99+

John TroyerPERSON

0.99+

Amazon Web ServicesORGANIZATION

0.99+

EuropeLOCATION

0.99+

IndiaLOCATION

0.99+

2018DATE

0.99+

FortyQUANTITY

0.99+

MondayDATE

0.99+

MarkPERSON

0.99+

SeptemberDATE

0.99+

San FranciscoLOCATION

0.99+

Dave MatthewsPERSON

0.99+

AdobeORGANIZATION

0.99+

Sanjay PoonenPERSON

0.99+

Trevor DavePERSON

0.99+

BenPERSON

0.99+

1999DATE

0.99+

VMwareORGANIZATION

0.99+

Jonathan SecklerPERSON

0.99+

Howard EliasPERSON

0.99+

16 acreQUANTITY

0.99+

10QUANTITY

0.99+

80 percentQUANTITY

0.99+

JapanLOCATION

0.99+

200 acreQUANTITY

0.99+

BMCORGANIZATION

0.99+

$50 millionQUANTITY

0.99+

Ricardo Villadiego, Cyxtera | RSA North America 2018


 

>> Announcer: From downtown San Francisco, it's theCUBE, covering RSA North America 2018. >> Hey, welcome back everybody, Jeff Frick here with theCUBE. We're at the RSA conference in San Francisco 40,000 plus people talking about security, gets bigger and bigger every year. Soon it's going to eclipse Oracle Open World and Sales Force to be the biggest conference in all of San Francisco. But we've got somebody who's been coming here he said for 16 years, Ricardo Villidiego, the EDP and GM Security and Fraud for Cyxtera. Did I get that right, Cyxtera? >> Cyxtera. >> Jeff: Cyxtera Technologies, great to see you. >> Thank you Jeff, it's glad to be here. >> So you said you've been coming here for 16 years. How has it changed? >> Yeah, that's exactly right. You know it's becoming bigger, and bigger, and bigger I believe this is a representation of the size of the prowling out there. >> But are we getting better at it, or is it just the tax service is getting better? Why are there so many, why is it getting bigger and bigger? Are we going to get this thing solved or? >> I think it is that combination within we have the unique solution that is going to help significantly organizations to get better in the security landscape I think the issue that we have is there's just so many now use in general and I think that now is a representation of the disconnection that exists between the way technologies are deploying security and the way technologies are consuming IT. I think IT is completely, has a evolved significantly and is completely hybrid today and organizations are continuing to deploy security in a way like if we were in the 90s. >> Right. >> And that's the biggest connection that exists between the attacks and the protection. >> But in the 90s we still like, or you can correct me, and we can actually build some big brick walls and a moat and a couple crocodiles and we can keep the bad guys out. That's not the way anymore. >> It is not a way. And look, I believe we're up there every protection creates a reaction on the adversary. And that is absolutely true in security and it is absolutely true in the fraud landscape. Every protection measure will push the adversary to innovate and that innovation is what, for good and for bad, has created this big market which we can't complain. >> Right, right. So for folks that aren't familiar with Cyxtera give them the quick update on what you guys are all about. >> So see, I think Cyxtera is here to conquer the cyber security space. I think what we did is we put together technologies from the companies that we acquire. >> Right. >> With a combination of the call center facilities that we also acquired from Centurylink to build this vision of the secure infrastructure company and what we're launching here at the RSA conference 2018 is AppGate 4.0 which is the flagship offering around secure access. Secure access is that anchor up on which organizations can deploy a secure way to enable their workforce and their party relationships to get access the critical assets within the network in a secure way. >> Okay, and you said 4.0 so that implies that there was a three and a two and probably a one. >> Actually you're right. >> So what are some of the new things in 4.0? >> Well, it's great it gives it an evolution of the current platform we lounge what we call life entitlements which is an innovative concept upon which we can dynamically adjust the permitter of an an end point. And the user that is behind that end point. I think, you know, a permitter that's today doesn't exist as they were in the 90s. >> Right, right. >> That concept of a unique permitter that is protected by the firewall that is implemented by Enact Technology doesn't exist anymore. >> Right. >> Today is about agility, today is about mobility, today is about enabling the end user to securely access their... >> Their applications, >> The inevitable actions, >> They may need, right. >> And what AppGate does is exactly that. Is to identify what the security processor of the end point and the user behind the end point and deploy a security of one that's unique to the specific conditions of an end point and the user behind that end point when they're trying to access critical assets within the network. >> Okay, so if I heard you right, so instead of just a traditional wall it's a combination of identity, >> Ricardo: It's identity. >> The end point how their access is, and then the context within the application. >> That's exactly right. >> Oh, awesome so that's very significant change than probably when you started out years ago. >> Absolutely, and look Jeff, I think you know to some extent the way enterprises are deploying security is delusional. And I say that because there is a reality and it looks like we're ignoring ignoring the reality but the reality is the way organizations are consuming IT is totally different than what it was in the 90s and the early 2000s. >> Right. >> The way organizations are deploying security today doesn't match with the way they're consuming IT today. That's where AppGate SDP can breach that gap and enable organizations to deploy security strategies that match with the reality of IT obstacles today. >> Right. If they don't get it, they better get it quick 'cause else not, you know we see them in the Wall Street Journal tomorrow morning and that's not a happy place to be. >> Absolutely not, absolute not and we're trying to help them to stay aware of that. >> Right. Alright, Ricardo we'll have to leave it there we're crammed for time but thanks for taking a few minutes out of your day. >> Alright Jeff, thank you very much I love to be here. >> Alright. He's Ricardo I'm Jeff you're watching theCUBE from RSAC 2018 San Francisco. (upbeat music)

Published Date : Apr 18 2018

SUMMARY :

Announcer: From downtown San Francisco, it's theCUBE, and Sales Force to be the biggest So you said you've been coming here for 16 years. the size of the prowling out there. that now is a representation of the disconnection that And that's the biggest connection that exists But in the 90s we still like, in the fraud landscape. So for folks that aren't familiar with Cyxtera technologies from the With a combination of the call center facilities Okay, and you said 4.0 so that implies And the user that is behind that end point. that is protected by the firewall that is Today is about agility, today is about mobility, and the user behind that end point when and then the context within the application. than probably when you started out years ago. and the early 2000s. and enable organizations to deploy security and that's not a happy place to be. them to stay aware of that. Right. I love to be here. He's Ricardo I'm Jeff

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
JeffPERSON

0.99+

RicardoPERSON

0.99+

Ricardo VilladiegoPERSON

0.99+

Ricardo VillidiegoPERSON

0.99+

Jeff FrickPERSON

0.99+

CenturylinkORGANIZATION

0.99+

EDPORGANIZATION

0.99+

CyxteraORGANIZATION

0.99+

tomorrow morningDATE

0.99+

Enact TechnologyORGANIZATION

0.99+

90sDATE

0.99+

todayDATE

0.99+

San FranciscoLOCATION

0.99+

16 yearsQUANTITY

0.99+

TodayDATE

0.99+

early 2000sDATE

0.98+

40,000 plus peopleQUANTITY

0.98+

threeQUANTITY

0.98+

oneQUANTITY

0.98+

Cyxtera TechnologiesORGANIZATION

0.97+

RSA conference 2018EVENT

0.94+

Wall Street JournalTITLE

0.93+

GM Security and FraudORGANIZATION

0.93+

twoQUANTITY

0.93+

2018DATE

0.9+

yearsDATE

0.87+

RSACEVENT

0.87+

Open WorldEVENT

0.86+

RSA North America 2018EVENT

0.85+

AppGateTITLE

0.84+

CyxteraPERSON

0.8+

Sales ForceORGANIZATION

0.77+

RSA conferenceEVENT

0.74+

RSA North AmericaORGANIZATION

0.72+

OracleORGANIZATION

0.7+

AppGate 4.0EVENT

0.7+

4.0OTHER

0.7+

every yearQUANTITY

0.64+

couple crocodilesQUANTITY

0.64+

theCUBEORGANIZATION

0.61+

measureQUANTITY

0.59+

SDPORGANIZATION

0.5+

Matt Cauthorn, ExtraHop | RSA North America 2018


 

>> Announcer: From downtown San Francisco, it's theCUBE, covering RSA North America 2018. >> Hey, welcome back everybody. Jeff Frick here with theCUBE. We're at the RSA Conference in downtown San Francisco. Forty thousand plus security experts really trying to help us all out. Protect our borders not so much, but protects access to these machines, which is harder and harder and harder everyday with bring your own devices and all these devices. So really, it's a different strategy. And we're really excited to have ExtraHop back, we had ExtraHop on last year for the first year, he's Matt Cauthorn, the VP of security at ExtraHop. So Matt, what do you think of the show? >> Oh, amazing. Absolutely amazing. Super packed, been walking like crazy. Got all my steps in, its fantastic. >> Alright, so you guys have been in network security for a long time? >> Yeah so we've been, so we live in the East-West corridor, inside the enterprise, inside the perimeter doing wire data analytics, and network security analytics. Our source of data is the network itself. >> Okay. And the network is increasing exponentially with all the traffic that's going through, the data sources are increasing exponentially with all the traffic going through. >> That's right. >> So how are you guys keeping up with the scale, and what's really the security solution that you guys are implementing? >> So the point you make is really interesting. Yes, it is increasing exponentially, and as a data source the network is the only sort of observational point of truth in the entirety of IT. Everything else is sort of self-reported. Logs, end points, those are very valuable data sources, but as an empirical source of truth, of evidence, the network wins. That assumes you can scale. And that assumes you're fluent with the protocols that are traversing the network, and you're able to actually handle the traffic in the first place. And so for us just this week, we announced a 100gb per second capable appliance, which you know is an unprecedented amount of analytics from the network's perspective. So we're very proud about that. >> So what are you looking for? What are some of the telltale signs that you guys are sniffing for? >> So generally, we auto-classify and auto-discover all of the behaviors on the wire. From the devices themselves, to the services that those devices expose, as well as the transactions that those devices exchange. And so from a context perspective, we're able to go far deeper than almost anyone else in the space, that we know of at least. Far deeper and far more comprehensive sort of analysis as it relates to the network itself. >> And the context is really the key, right? Tag testing what, why, how. System behavior, that's what you're looking for? >> A great example is a user logging into a database, that might be part of a cluster of databases, and understanding what the user's behavior is with the database, which queries are being exchanged, what the database response is in the first place. Is it an error, is it an access denied? And does this behavior look like a denial of service, for example. And we can do all of that in real time, and we have a machine learning layer that sits over top and sort of does a lot of the analytics, and the sort of insights preemptively on your behalf. >> And it's only going to get crazier, right? With IOT and 5g. Just putting that much more data, that many more devices, that much more information on the network. Yeah, so IOT in particular is interesting, because IOT is challenging to instrument in traditional ways, and so you really do have to fall back to the network at some point for your analysis. And so that's where we're very, very strong in the IOT world and industrial controls, SCADA and beyond. Healthcare, HL7 for example. So we're able to actually give you a level of insight that's really, really difficult to get otherwise. >> And we've been hearing a lot of the keynotes and stuff, that those machines, those end points are often the easiest path in for the bad guys. >> Yes they are. >> An enormous security camera or whatever, because they don't have the same OS, they don't have all the ability to configure the protections that you would with say a laptop or a server. >> That's right. There's a surprising number of IOT devices out there that are running very, very old. And vulnerable operating systems are easy to exploit. >> Alright, so Matt I guess we're into Q2 already, hard to believe the years passing by. What's priorities for 2018 for you and ExtraHop? >> So we've announced a first class, purpose-built security solution this year, and really the plan is to continue the sort of momentum that we've accrued. Which is very encouraging, the amount of interest that we've had. It's hard to keep up, frankly. Which is fantastic. We want to continue to build on that, grow out the use cases, grow out the customer base and continue our success. >> Alright Matt, well we'll keep an eye on the story, and thanks for stopping by. >> Great, thank you. Appreciate it. >> Alrighties Matt, I'm Jeff, you're watching theCUBE from RSA Conference, San Francisco. Thanks for watching.

Published Date : Apr 18 2018

SUMMARY :

Announcer: From downtown San Francisco, it's theCUBE, he's Matt Cauthorn, the VP of security at ExtraHop. Oh, amazing. Our source of data is the network itself. the data sources are increasing exponentially and as a data source the network is the only all of the behaviors on the wire. And the context is really the key, right? and the sort of insights preemptively on your behalf. that much more information on the network. are often the easiest path in for the bad guys. that you would with say a laptop or a server. that are running very, very old. hard to believe the years passing by. and really the plan is to continue and thanks for stopping by. you're watching theCUBE from RSA Conference, San Francisco.

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
JeffPERSON

0.99+

Matt CauthornPERSON

0.99+

Jeff FrickPERSON

0.99+

MattPERSON

0.99+

2018DATE

0.99+

San FranciscoLOCATION

0.99+

last yearDATE

0.99+

ExtraHopORGANIZATION

0.99+

this weekDATE

0.98+

Q2DATE

0.97+

firstQUANTITY

0.96+

this yearDATE

0.93+

100gb per secondQUANTITY

0.9+

theCUBEORGANIZATION

0.86+

first yearQUANTITY

0.85+

downtown San FranciscoLOCATION

0.81+

NorthLOCATION

0.79+

Forty thousand plus security expertsQUANTITY

0.78+

first placeQUANTITY

0.76+

SCADAORGANIZATION

0.69+

RSAORGANIZATION

0.68+

ExtraHopCOMMERCIAL_ITEM

0.56+

RSA ConferenceEVENT

0.56+

HealthcareORGANIZATION

0.55+

RSA ConferenceORGANIZATION

0.5+

AmericaLOCATION

0.5+

RSA North America 2018TITLE

0.47+

HL7TITLE

0.39+

5gOTHER

0.35+

Michael Daniel, Cyber Threat Alliance | RSA North America 2018


 

>> Narrator: From downtown San Francisco it's the Cube covering RSA North America 2018. >> Hey, welcome back, everybody. Jeff Frick here with the Cube. We're at the RSA conference in downtown San Francisco, 40,000 plus professionals all about security and one of the big themes is how do we work together? How do we leverage our collective knowledge, look for patterns to help, you know, be better against the bad guys, and one of the really big forces for that is the Cyber Threat Alliance and we're really excited to have Michael Daniel, the president and CEO of Cyber Threat Alliance. Michael, great to see you. >> Thanks for having me. >> So, talk about kind of the genesis of this because it's such an important concept that, yes, we're competitors on this floor but if we work together, we can probably save ourselves a lot of work. >> Absolutely, I mean, part of the idea behind the Cyber Threat Alliance is that no matter how big you are, no matter how broad your coverage is of cyber security company, no one individual company ever sees all of the threats all of the time. >> Jeff: Right. >> And, so that, in order to better protect their customers and clients, sharing that threat intelligence at speed at scale is a very fundamental part of being a much better cyber security company. >> So, how hard of a sell was that a year ago? I think you started it a year ago, announced it, and how's the ecosystem kind of changed over the last year? >> Well, I would say that, you know, it's not like I run into anybody that says, "You know, Michael, that's a really "stupid idea, we shouldn't do that." Right, it's really finding the way for a cyber security company to fit it into their business model. >> Right. >> To be able to consume the threat intelligence at a speed that matters and really be able to bake it into their products. That's usually the hard part. Conceptually, everybody agrees that this is what we need to do. >> Right, and then, how 'about just the nitty gritty nuts and bolts of, you know, how do you share information? How is it picked up, how is it communicated? What are the protocols? I'd imagine that's not too simple. >> That's right, and one of the things that we settled on was we use the STIX format because it's an open format that everybody can translate back and forth. We had to build in a lot of business rules to actually make sure that people were playing fair. You know, for example, we actually require all of our members to share. So, you can't just join the alliance and consume information, you actually have to give in order to receive. >> Right, and you've got some really kind of high-level, lofty goals that you've built this around in terms of doing good for the greater good, kind of beyond the profitability of an individual customer transaction. I wonder if you can speak to a few of those. >> Well, sure, so the part of the idea behind the way that CTA is structured is that we're a 501 C6, so we're a non-profit, right, and the idea is that we function to help raise the level of cyber security across the digital ecosystem and actually enable our member companies to compete more effectively because they have better intelligence that their products and services are based on, but we, ourselves, are not in it to make money. >> Right, right, right, alright, Michael. Unfortunately, we're up against the time. >> Absolutely. >> So, we're going to have to leave it there, but love the work that you guys are doing and it makes so much sense for people to work together. >> Well, thank you very much, thank you for having me. >> Alright, he's Michael from Cyber Threat Alliance. I'm Jeff from the Cube. You're watching us from the RSA conference San Francisco, thanks for watchin'. (soft electronic beat)

Published Date : Apr 18 2018

SUMMARY :

Narrator: From downtown San Francisco it's the Cube and one of the big themes is how do we work together? So, talk about kind of the genesis of this the Cyber Threat Alliance is that no matter And, so that, in order to better protect Right, it's really finding the way To be able to consume the threat intelligence just the nitty gritty nuts and bolts of, That's right, and one of the things of doing good for the greater good, and the idea is that we function to help raise Right, right, right, alright, Michael. so much sense for people to work together. I'm Jeff from the Cube.

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
JeffPERSON

0.99+

MichaelPERSON

0.99+

Michael DanielPERSON

0.99+

Jeff FrickPERSON

0.99+

Cyber Threat AllianceORGANIZATION

0.99+

San FranciscoLOCATION

0.99+

a year agoDATE

0.99+

40,000 plus professionalsQUANTITY

0.99+

last yearDATE

0.99+

oneQUANTITY

0.98+

RSAEVENT

0.93+

501 C6OTHER

0.93+

CubeORGANIZATION

0.72+

RSAORGANIZATION

0.69+

2018DATE

0.63+

STIXOTHER

0.62+

NorthLOCATION

0.54+

CubeCOMMERCIAL_ITEM

0.53+

AmericaORGANIZATION

0.41+

Derek Manky, Fortinet | RSA North America 2018


 

>> Narrator: From downtown San Francisco it's the Cube covering RSA North America 2018. >> Hey, welcome back, everybody, Jeff Frick here at the Cube. We're at RSA's security conference, about 40,000 plus. I don't know, I got to get the number. The place is packed, it's a mob scene. Really excited to be here and joined by Derek Manky We saw Derek last year from Fortinet. Great to get an update, Derek, what do you think of the show this year? >> It's getting big for sure, as I said. That's an understatement. >> I know. >> This is my tenth year coming to RSA now, yeah. >> It's your tenth? >> And just to see how it's changed over 10 years is phenomenal. >> Alright. So, one of the things you want to talk about that you probably weren't talking about 10 years are swarms of bots. >> Yeah. >> What the heck is going on with swarms of bots? >> There's been a lot of changes on that front too, so the bad guys are clever, of course, right? If we look at 10 years ago, there was a lot of code, you know, crime kits, crime services that were being created for infrastructure. That led up to some more, you know, getting affiliates programs, kind of, business middle men to distribute crime. So, that drove a lot of the numbers up, but, literally, in the last three quarters, if we look at hacking activity, the number has doubled from FortiGuard labs. It's gone from 1.1 million to 2.2 to 4.4 million just over the last three quarters. So, we're looking at a exponential rise to attacks. The reason that's happening is because automation >> Right. >> And artificial intelligence is starting to be put into black cat code, and so the swarm concept, if you think of bees or ants in nature, what do they do? They work together, it's strength in numbers from a black cat's point of view. >> Right, right. >> They work together to achieve a common goal. So, it's intent based attacks, and that's what we're starting to see as precursors as some code, right? These IoT bot nets, we're actually seeing nodes within the bot net that can communicate to each other, say, "Hey, guys, I found this other target in the network. "Let's go launch a DDOS attack "or let's all try to take different "bits of file information from those targets." So, it's that swarm mentality where it takes the attacker more and more out of the loop. That means that the attack surge is also increasing in speed and becoming more agile too. >> So, the bad news, right, is the bad guys have all the same tools that the good guys have in terms of artificial intelligence, machine learning, automation, software to find and they don't have a lot of rules that they're supposed to follow as well. So, it kind of puts you in a tougher situation. >> Yeah, we're always in a tough situation for sure. You know, I would say, for sure, that when it comes to the tools, a lot of the tools are out there, they custom develop some tools. I would have to say on the technology side when it comes to security members especially collaborating together and the amount of infrastructure that we have set up, I think we have a foot up on the attackers there, we're at an advantage, but you're absolutely right, when it comes to rules, there are no rules when it comes to the black cat attackers and we have to be very careful of that, how we proceed, of course, right. >> And that's really the idea behind the alliance, right, so, that you guys are sharing information. >> Yeah. >> So, you're sharing best practices, you're picking up patterns. So, everybody's not out there all by themselves. >> Absolutely, it's strength in numbers concept on our end too. So, we look at Cyber Threat Alliance, Fortinet being out founding member working with all other leading security vendors in this space is how we can team up against the bad guys, share actionable intelligence, deploy that into our security controls which makes it a very effective solution, right. By teaming up, stacking up our security, it makes it much more expensive for cyber criminals to operate. >> Right, that's good. >> Yeah. >> That's a good thing. >> Yeah, yes. >> And then, what about kind of this integration of the knock and the sock? >> Yeah. >> Because security's so much more important for all aspects of the business, right? It's not layered on, it's not stand alone. It's really got to be integrated into the software, into the process and the operations. >> Absolutely, so, the good news is, if you look at things like we're doing with the security fabric, a lot of it is how do we integrate, how do we bring technology and intelligence down to the end user so that they don't have to do day-to-day mundane tasks, right? Talking about the swarm networks, what's happening on the black cats' side, attackers are gettin' much quicker so defense solutions have to be just as quick if not faster, and so that's what the knock sock integration is about, right, how we can take network's security visibility, put it into things like our FortiAnalyzer manager sim appliances, right, be able to bring those solutions so, again, to when it comes to a knock and sock operation, how do you bring visibility into threats? How do you respond to those threats? More importantly, how do you also have automated security defense, so agile defense, put up? >> Right. >> We talk about concepts like agile macrosegmentation, right? That's something we're doing with Fortinet, how we can look at attacks and actively lock down attacks as they're happening is a really concept, right? >> So, really, just to isolate 'em within kind of where they've caused the harm, keep 'em there until you can handle 'em and not let 'em just go bananas all over the orientation. >> Yeah, yeah, so you can think of it as, like, an active quarantine. We've also launched our threat intelligence services. So, this is bringing the why. There's a lot of intelligence out there. There's a lot of logs. We have, now,, threat intelligence services that we bring to security operation centers to show them here are the threats happening on your network. Here is why it is a threat. Here's the capabilities of the threat and here's how you respond to it. So, it helps from a CSOL perspective prioritized response on the incident response model to threats as well. >> Alright, well, Derek, we've got to let it go there. We are at a super crazy time crunch. >> I know. >> We'll get you back into the studio and have a little bit more time when it's not so crazy. >> Okay, I appreciate it. >> Alright, he's Derek Manky, I'm Jeff Frick. You're watching the Cube from RSA 2018, thanks for watchin'. (soft electronic beat)

Published Date : Apr 18 2018

SUMMARY :

Narrator: From downtown San Francisco it's the Cube I don't know, I got to get the number. It's getting big for sure, as I said. to RSA now, yeah. And just to see how it's changed So, one of the things you want to talk about that you So, that drove a lot of the numbers up, and so the swarm concept, if you think it takes the attacker more and more out of the loop. So, the bad news, right, is the bad guys the amount of infrastructure that we have set up, And that's really the idea behind the alliance, right, So, everybody's not out there all by themselves. So, we look at Cyber Threat Alliance, for all aspects of the business, right? So, really, just to isolate 'em within kind of on the incident response model to threats as well. We are at a super crazy We'll get you back into the studio Alright, he's Derek Manky, I'm Jeff Frick.

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
Jeff FrickPERSON

0.99+

DerekPERSON

0.99+

Derek MankyPERSON

0.99+

FortinetORGANIZATION

0.99+

tenth yearQUANTITY

0.99+

1.1 millionQUANTITY

0.99+

tenthQUANTITY

0.99+

Cyber Threat AllianceORGANIZATION

0.99+

last yearDATE

0.99+

4.4 millionQUANTITY

0.99+

FortiGuardORGANIZATION

0.99+

this yearDATE

0.99+

10 years agoDATE

0.97+

2.2QUANTITY

0.97+

over 10 yearsQUANTITY

0.96+

RSAORGANIZATION

0.94+

2018DATE

0.93+

about 40,000 plusQUANTITY

0.91+

oneQUANTITY

0.9+

agileTITLE

0.88+

10 yearsQUANTITY

0.8+

San FranciscoLOCATION

0.79+

CSOLORGANIZATION

0.77+

RSATITLE

0.73+

FortiAnalyzerTITLE

0.69+

CubeTITLE

0.67+

last three quartersDATE

0.62+

NorthLOCATION

0.59+

CubeORGANIZATION

0.58+

numbersQUANTITY

0.51+

RSA NorthTITLE

0.48+

AmericaORGANIZATION

0.41+

AmericaLOCATION

0.29+

Dr. Chase Cunningham, Forrester Research | RSA North America 2018


 

>> Narrator: From downtown San Francisco it's theCUBE covering RSA North America 2018. >> Welcome back everybody, Jeff Frick here with theCUBE. We're at the RSA Conference North America 2018 downtown San Francisco. 40,000 plus people swarming all over Moscone to the north to the south and to the west. We're excited to have our next guest on. He's Chase Cunningham, principal analyst at Forrester. Chase, great to meet you, welcome. >> Thanks for having me. >> Absolutely, so you just had an interesting blog post. Was Zero Trust on a beer budget. >> Yeah. >> What is that all about? >> Well, so Zero Trust is a pretty simple concept about accepting failure, if you will, and focusing on the internal and moving outward. And basically the premise was, I had friend of mine ask me if he could do Zero Trust for his small company. And I said sure, let's go get a beer and we'll figure this out. And literally, in about half an hour we had a Zero Trust strategy in place for less than 40 grand and his infrastructure is way more secure and it's really simple. >> So that's pretty interesting because, you Know it's easy for big companies that have a lot of resources or the big puddle of Cloud companies have a lot of resources to put a lot of implementation into place. But as we look around this conference tons and tons of companies, it's a lot harder for small and medium businesses either to have the expertise or the budgets to really bring in what they need to secure things. So what were some of the insights from your beer exercise? >> Sure, so it was really simple. If you really think about where the majority of the threat comes from, the network is there and everybody uses it but who accesses the network? The users, the individuals, the devices, everything else. So the first thing we did was we're going to lock down identity and access management because I know if I can control that I've made a fundamental shift into power position for myself. And the next thing we did was we said look you guys don't really own intellectual property but you send emails. We're going to put stuff in place to encrypt every email you send whether you like it or not. So between those two simple things, identity access management and sort of data email encryption we put a really strong security platform in place and it didn't break the bank and it wasn't really hard to do and it's something that you can get better as it goes on. >> Right. And I'm curious, had he had an event or he was just trying to get ahead of the curve? >> He had had some weird stuff showing up. He's in esports, right, so he doesn't have actual intellectual property but he's worried because if they get dossed or they get hacked or they get ransomware for every minute they're down they're losing viewers and that's business and money for them. >> Right, so it kind of ties back to this kind of next gen access where it's really important with the identity but the other one is the context. Who is it and where are they trying to get in? Do they usually come in that way? Do they usually have access? So that's another really way to kind of isolate the problems that might come in the front door. >> Yeah, and you know the, years ago the next gen firewall was really the thing to integrate lots of functions across the network and that's all there. It still exists and it's still necessary but really when you break it down and look at historically where the threats have come from and where the compromises have come from, it's access and if you can't control that you don't have the capability of actually stopping bad things from happening. >> Right, right, so as you look around and you've been coming to this probably for a couple years, as this space evolves. You know, kind of what are your general impressions? I mean, on one hand, so many vendors, so many activities. On the other hand, it was like, we've been at this for a while or are we just stuck in this race and we just got to keep running? >> Well I think we're going to continue running the race but interestingly enough there's buses driving by now with Zero Trust all over the side of it. And I'm glad to see that that strategy is starting to take hold because the problem I have is you can Frankenstein technology together all day long but if you don't have a strategic guidepost that everybody understands from the board down to the network engineer you're going to get it wrong. You're going to miss and so I'm a fan of simplicity and force multipliers and to me the Zero Trust strategy sort of drives that forward. >> All right, well Chris thanks for taking a few minutes. Everyone can log onto your site, take a look at the blog. Thanks for stopping by. >> Thanks for having me. >> All right, he's Chris Cunningham from Forrester. I'm Jeff Frick from theCUBE. Thanks for watching from RSAC 2018.

Published Date : Apr 18 2018

SUMMARY :

Narrator: From downtown San Francisco it's theCUBE to the south and to the west. Absolutely, so you just had an interesting blog post. about accepting failure, if you will, and focusing So that's pretty interesting because, you Know and it's something that you can get better as it goes on. And I'm curious, had he had an event or he was He's in esports, right, so he doesn't have actual Right, so it kind of ties back to this kind of Yeah, and you know the, years ago the next gen firewall Right, right, so as you look around and force multipliers and to me the Zero Trust Thanks for stopping by. Thanks for watching from RSAC 2018.

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
Jeff FrickPERSON

0.99+

Chris CunninghamPERSON

0.99+

ChrisPERSON

0.99+

Chase CunninghamPERSON

0.99+

Forrester ResearchORGANIZATION

0.99+

firstQUANTITY

0.99+

MosconeLOCATION

0.99+

40,000 plus peopleQUANTITY

0.99+

Zero TrustORGANIZATION

0.99+

less than 40 grandQUANTITY

0.99+

ChasePERSON

0.98+

about half an hourQUANTITY

0.97+

two simple thingsQUANTITY

0.92+

years agoDATE

0.91+

RSACEVENT

0.9+

2018DATE

0.9+

ForresterORGANIZATION

0.89+

San FranciscoLOCATION

0.89+

theCUBEORGANIZATION

0.89+

RSA North AmericaORGANIZATION

0.89+

RSA Conference North America 2018EVENT

0.86+

oneQUANTITY

0.81+

tons and tons of companiesQUANTITY

0.79+

FrankensteinPERSON

0.78+

Dr.PERSON

0.77+

couple yearsQUANTITY

0.66+

downtown San FranciscoLOCATION

0.66+

ForresterLOCATION

0.55+

2018EVENT

0.5+

RSAORGANIZATION

0.42+

AmericaLOCATION

0.3+

NorthTITLE

0.25+

Bill Mann, Centrify | RSA North America 2018


 

>> Narrator: From downtown San Francisco it's TheCUBE covering RSA North American 2018. >> Hey, welcome back everybody. Jeff Frick from TheCUBE. We're on the floor at the RSA Conference 2018. 40,000 plus people packed in Moscone North, South, West, and we're excited to be here. It's a crazy conference, Security's top of mind obviously and everybody is aware of this. And our next guest, he's Bill Mann, chief product officer from Centrify. Bill, great to see you. >> Great to see you. >> So you guys have a lot of stuff going on but what I think what's interesting to me is you guys have this kind of no trust as your starting foundation. Don't trust anybody, anything, any device. How do you work from there? Why is that the strategy? >> Well that strategy is because we've got a really new environment now. A new environment where we have to appreciate that the bad actors are already within our environment. And if you stop believing that bad actors are already in your environment, you have to start changing the way you think about security. So it's a really different way of thinking about security. So what we call this new way of thinking about security is zero trust security. And you might have heard this from Google with BeyondCorp and so forth. And with that as the overarching kind of way we are thinking about security, we're focusing on something called NextGenAccess. So how do you give people access to applications and services where they're remote. They're not on the network and they're not behind a firewall because who cares about the firewall anymore because it's not secure. >> Right. So there's four tenants of NextGenAccess. One is verify the user, verify the device that they are coming from so they're not coming from a compromised device. Then give them limited access to what they are trying to access or what we call Limit Privilege and Access. And that last one is learn and adapt which is this kind of pragmatic viewpoint which is we're never going to get security right day one, right? To learn and adapt and what we're doing look at auto tune logs and session logs to change your policy and adapt to get a better environment. >> So are you doing that every time they access the system? As they go from app to app? I mean how granular is it? Where you're consistently checking all these factors? >> We're always checking the end factor and where we use an actual machine learning to check what's happening in the environment and that machine learning is able to give that user a better experience when they are logging in. Let's say Bill's logging into Salesforce.com from the same location, from the same laptop all the time. Let's not get in the way right? But if Bill the IT worker is going from a different location and logging into a different server that's prompting for another factor of authentication because you want to make sure that this is really Bill. Because fundamentally you don't trust anybody in the network. >> And that's really what you guys call this NextGenAccess, right? [Bill]- That right, that's right, that's right. >> It's not just I got a VPN. You trust my VPN. I got my machine. Those days are long gone. >> Well VPNs, no no to VPNs as well, right? We do not trust VPNs either. >> So a bit topic ever since the election, right, has been people kind of infiltrating the election. Influencing you know how people think. And you guys are trying to do some proactive stuff even out here today for the 2018 election to try to minimize that. Tell us a little bit more about it. >> Yeah we call it Secure The Vote. And if the audience has looked at the recent 60 Minutes episode that came on. That did a really good that walked everybody through what was really happening with the elections. The way you know the Russians really got onto the servers that are storing our databases for the registration systems and changed data and created chaos in the environment. But the fundamental problem was compromised credentials. I mean 80% of all breaches believe it or not have to do with compromised credentials. They are not around all the things we think are the problem. So what we're doing here with Secure The Vote is giving our technology to state and local governments for eight months for free. And essentially they can then upgrade their systems, right? So they can secure the vote. So fundamentally securing who has access to what and why and when. And if you look at the people who are working on election boards, they're volunteers, there are a lot of temporary staff and so forth. >> Right, right. >> So you can imagine how the bad guys get into the environment. Now we've got a lot of experience on this. We sell to state and local governments. We've seen our technology being used in this kind of environment. So we're really making sure that we can do our part in terms of securing the election by providing our technology for free for eight months so election boards can use our technology and secure the vote. >> So how hard is it though for them to put it in for temporary kind of situation like that? You made it pretty easy for them to put it in if they are not an existing customer? >> Absolutely I mean one of the things, one of the fallacies around this whole NextGenAccess space is the fact that it's complicated. It's all SAS-Space, it's easy to use, and it's all in bite-sized chunks, right? So some customers can focus on the MFA aspects, right? Some customers can focus on making sure the privileged users who have access to the databases, right, are limiting their access right? So there's aspects of this that you can implement based upon where you want to be able to, what problem you want to be able to solve. We do provide a very pragmatic best practices way of implementing zero trust. So we are really providing that zero trust platform for the election boards. [Jeff]- Alright well that's great work Bill and certainly appreciated by everybody. We don't want crazy stuff going on in the elections. >> Absolutely. >> Jeff: So we'll have to leave it there. We'll catch up back in the office. It's a little chaotic here so thanks for taking a few minutes. >> Thank you very much. >> Alright, he's Bill Mann and I'm Jeff Frick. You're watching TheCUBE from RSCA 2018. Thanks for watching. (bright music)

Published Date : Apr 18 2018

SUMMARY :

Narrator: From downtown San Francisco it's TheCUBE We're on the floor at the RSA Conference 2018. So you guys have a lot of stuff going on So how do you give people access to applications And that last one is learn and adapt which is this kind Let's not get in the way right? And that's really what you guys call It's not just I got a VPN. Well VPNs, no no to VPNs as well, right? And you guys are trying to do some proactive stuff And if the audience has looked So you can imagine So there's aspects of this that you can implement Jeff: So we'll have to leave it there. Thanks for watching.

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
Jeff FrickPERSON

0.99+

JeffPERSON

0.99+

Bill MannPERSON

0.99+

eight monthsQUANTITY

0.99+

80%QUANTITY

0.99+

BillPERSON

0.99+

NextGenAccessORGANIZATION

0.99+

CentrifyORGANIZATION

0.99+

GoogleORGANIZATION

0.99+

BeyondCorpORGANIZATION

0.99+

40,000 plus peopleQUANTITY

0.98+

OneQUANTITY

0.98+

oneQUANTITY

0.98+

todayDATE

0.98+

RSA Conference 2018EVENT

0.97+

zero trustQUANTITY

0.97+

four tenantsQUANTITY

0.96+

Moscone NorthLOCATION

0.95+

zeroQUANTITY

0.95+

RSA North AmericaORGANIZATION

0.92+

2018DATE

0.89+

TheCUBEORGANIZATION

0.87+

60TITLE

0.79+

Secure The VoteOTHER

0.76+

Salesforce.comOTHER

0.75+

San FranciscoLOCATION

0.73+

RussiansPERSON

0.71+

TheCUBETITLE

0.71+

Limit PrivilegeOTHER

0.68+

day oneQUANTITY

0.66+

RSA North American 2018EVENT

0.63+

RSCAEVENT

0.6+

electionEVENT

0.57+

SpaceOTHER

0.56+

The VoteTITLE

0.54+

SASORGANIZATION

0.53+

MinutesQUANTITY

0.49+

AccessOTHER

0.48+

SecureOTHER

0.47+

Misha Govshteyn, Alert Logic | RSA North America 2018


 

(upbeat music) >> Announcer: From downtown San Francisco, it's theCUBE covering RSA North America 2018. Hey welcome back everybody, Jeff Frick here with theCUBE. We're at RSA's North American Conference 2018 at downtown San Francisco. 40,000 plus people talking about security. Security continues to be an important topic, an increasingly important topic, and a lot more complex with the, having a public cloud, hybrid cloud, all these API's and connected data sources. So, it's really an interesting topic, it continues to get complex. There is no right answer, but there's a lot of little answers to help you get kind of closer to nirvana. And we're excited to have Misha Govshteyn. He's the co-founder and SVP of Alert Logic, CUBE alumni, it's been a couple years since we've seen you, Misha, great to see you again. >> That's right, I'm glad to be back, thank you. >> Yeah, so since we've seen you last, nothing has happened more than the dominance of public cloud and they continue to eat up-- >> I think I predicted it on my past visits. >> Did you predict it? Wow that's good. >> But I think it happened. >> But it's certainly happening, right. Amazon's AWS' run rate is 20 billion last reported. Google's making moves. >> Their conference is bigger than ours right now. >> Is it? >> That's 45,000 people. >> Yeah, it's 45,000, re:Invent, it's nuts, it's crazy. and then obviously Microsoft's making big moves, as is Google cloud. So, what do you see from the client's perspective as the dominance of public cloud continues to grow, yet they still have stuff they have to keep inside? We have our GDPR regs are going to hit in about a month. >> Well one thing's for sure is, it's not getting any easier, right? Because I think cloud is turning things upside down and it's making things disruptive, right, so there's a lot of people that are sitting there and looking at their security programs, and asking themselves, "Does this stuff still work? "When more and more of my workloads "are going to cloud environments? "Does security have to change?" And the answer is obviously, it does but it always has to change because the adversaries are getting better as well, right. >> Right. >> There's no shortage of things for people to worry about. You know when I talk to security practitioners, the big thing I always hear is, "I'm having a good year if I don't get fired." >> Well it almost feels like it's inevitable, right? It's almost like you're going to, it seems like you're going to get hit. At some way, shape, or form you're going to get hit. So it's almost, you know how fast can you catch it? How do you react? >> That's a huge change from five years ago, right? Five years ago we were still kind of living in denial thinking that we can stop this stuff. Now it's all about detection and response and how does your answer to the response process works? That's the reason why, you know last year, I think we saw a whole bunch of noise about, you know machine learning and anomaly detection, and AI everywhere and a whole lot of next-generation antivirus products. This year, it seems like a lot of it is, a lot of the conversation is, "What do I do with all this stuff? "How do I make use of it?" >> Well then how do you leverage the massive investment that the public cloud people are making? So, you know, love James Hamilton's Tuesday night show and he talks about just the massive investments Amazon is making in networking, in security, and you know, he's got so many resources that he can bring to bear, to the benefit of people on that cloud. So where does the line? How do I take advantage of that as a customer? And then where are the holes that I need to augment with other types of solutions? >> You know here's the way I think about it. We had to go through this process at Alert Logic internally as well. Because we obviously are a fairly large IT organization, so we have 20 petabytes of data that we manage. So at some point we had to sit down and say, "Are we're going to keep managing things the way we have been "or are we going to overhaul the whole thing?" So, I think what I would do is I would watch where my infrastructure goes, right. If my infrastructure is still on-prem, keep investing in what you've been doing before, get it better, right? But if you're seeing more and more of your infrastructure move to the cloud, I think it's a good time to think about blowing it up and starting over again, right? Because when you rebuild it, you can build it right, and you can build it using some of the native platform offerings that AWS and Azure and GCP offer. You can work with somebody like Alert Logic. There's others as well right, to harness those abilities. I'll go out on a limb and say I can build a more secure environment now in a cloud than I ever could on-prem, right. But that requires rethinking a bunch of stuff, right. >> And then the other really important thing is you said the top, the conversation has changed. It's not necessarily about being 100% you know locked down. It's really incident response, and really, it's a business risk trade-off decision. Ultimately it's an investment, and it's kind of like insurance. You can't invest infinite resources in security, and you don't want to just stay at home and not go outside. Now that's not going to get it done. So ultimately, it's trade-offs. It's making very significant trade-off decisions as to where's the investment? How much investment? When is the investment then hit a plateau where the ROI is not there anymore? So how do people think through that? Because, the end of the day there's one person saying, "God, we need more, more, more." You know, anything is bad. At the other hand, you just can't use every nickel you have on security. >> So I'll give you two ends of the spectrum right, and on one end are those companies that are moving a lot of their infrastructure to the cloud and they're rethinking how they're going to do security. For them, the real answer becomes it's not just the investment in technology, and investing into better getting information from my cloud providers, getting a better security layer in place. Some of it is architecture right, and some of the basics right, there's thousands of applications running in most enterprises. Each one of those applications on the cloud, could be in its own virtual private cloud, right. So if it gets broken into, only one domino falls down. You don't have this scenario where the entire network falls down, because you can easily move laterally. If you're doing things right in the cloud, you're solving that problem architecturally, right. Now, aside from the cloud, I think the biggest shift we're seeing now, is towards kind of focusing on outcomes, right. You have your technology stack, but really it's all about people, analytics, data. What do you, how do you make sense of all this stuff? And this is classic I think, with the Target breach and some of the classic breaches we've seen, all the technology in the world, right? They had all the tools they needed. The real thing that broke down is analytics and people. >> Right, and people. And we hear time and time again where people had, like you said, had the architecture in place, had the systems in the place, and somebody mis-configured a switch. Or I interviewed a gal who did a live social hack at Black Hat, just using some Instagram pictures and some information on your browser. No technology, just went in through the front door, said, you know, hey, "I'm trying to get the company picnic "site up, can you please test this URL?" She's got a 100% hit rate! But I think it's really important, because as you said, you guys offer not only software solutions, but also services to help people actually be successful in implementing security. >> And the big question is, if somebody does that to you, can you really block it? And the answer a lot of times is, you can't. So the next battlefront is all about can you identify that kind of breach happening, right? Can you identify abnormal activity that starts to happen? You know, going back to the Equifax breach, right, one of the abnormal things that happened that they should've seen and for some reason didn't, you know, 30 web shells were stood up. Which is the telltale sign of, maybe you don't know how you got broken into, but because there's a web shell in your environment you know somebody's controlling your servers remotely, that should be one of those indicators that, I don't know how it happened, I don't know maybe I missed it and I didn't see the initial attack, but there's definitely somebody on a network poking around. There's still time, right? There's, you know for most companies, it takes about a hundred days on average, to steal the data. I think the latest research is if you can find the breach in less than a day, you eliminate 96% of the impact. That's a pretty big number right? That means that if you, the faster you respond, the better off you are. And most people, I think when you ask 'em, and you ask 'em, "Honestly assess your ability to quickly detect, respond, eradicate the threat." A lot of them will say, "It depends" But really the answer is "Not really." >> Right, 'cause the other, the sad stat that's similar to that one, is usually it takes many, many days, months, weeks, to even know that you've been breached, to figure out the pattern, that you can even start, you know, the investigation and the fixing. >> Somewhat not surprising, right? I don't think there's that many Security Operation Centers out there, right? There's not, you know, not every company has a SOC right? Not every company can afford a SOC. I think the latest number is, for enterprises, right, this is Fortune 2000, right, 15% of them have a SOC. What are the other 85% doing? You know, are they buying a slice of a SOC somewhere else? That's the service that we offer, but I think, suffice to say, there's not enough security people watching all this data to make sense of it right. That's the biggest battle I think going forward. We can't make enough people doing that, that requires a lot of analytics, right. >> Which really then begs, for the standalone single enterprise, that they really need help, right? They're not going to be able to hire the best of the best for their individual company. They're not going to be able to leverage you know best-in-breed, Which I think is kind of an interesting part of the whole open-source ethos, knowing that the smartest brains aren't necessarily in your four walls. That you need to leverage people outside those four walls. So, as it continues to morph, what do you see changing now? What are you looking forward to here at RSA 2018? >> So I made some big predictions five years ago, so I'll say you know, five years from now, I think we're going to see a lot more companies outsource major parts of their security right, and that's just because you can't do it all in-house right. There's got to be a lot more specialization. There's still people today buying AI products right, and having machine learning models they invest in to, there's no company I'm aware of, unless they're, you know, maybe the top five financial firms out there, that should have a, you know, security focused data scientist on staff, right? And if you have somebody like that in your environment, you're probably not spending money the right way, right. So, I think security is going to get outsourced in a pretty big way. We're going to focus on outcomes more and more. I think the question is not going to be, "What algorithm are you using to identify this breach?" The question is going to be, "How good are your identifying breaches?" Period. And some of the companies that offer those outcomes are going to grow very rapidly. And some of the companies that offer just, you know, picks and shovels, are going to probably not do nearly as well. >> Right. >> So five years from now, I'll come back and we'll talk about it then. >> Well, the other big thing, that's going to be happening in a big way five years from now, is IoT and IIoT and 5G. So, the size of the attacked surface, the opportunities to breach-- >> The data volume. >> The data volume, and the impact. You know it's not necessarily stealing credit cards, it's taking control of somebody's vehicle, moving down the freeway. So, you know, the implications are only going to get higher. >> We collect a lot of logs from our customers. Usually, the log footprint, grows at three times the rate of our revenue and customers, right. So, you know, thank god-- >> The log, the log-- >> The log volume grows-- >> volume that you're tracking for a customer, grows at three times your revenue for that customer? >> That's right. I mean, they're not growing at three times that rate, annually right, but annually, you know, we've clocked anywhere between 200% to 300% growth in data that we collect from them, IoT makes that absolutely explode, right. You know, if every device out there, if you actually are watching it, and if you have any chance of stopping the breaches on IoT networks, you got to collect a lot of that data, that's the fuel for a lot of the machine learning models, because you can't put human eyes on small RTUs and you know, in factories. That means even more data. >> Right, well and you know the model that we've seen in financial services and ad-tech, in terms of, you know, an increasing amount of the transactions are going to happen automatically, with no human intervention, right, it's hardwired stuff. >> So I think it's that balance between data size and data volume, analytics, but most important, what do you feed the humans that are sitting on top of it? Can you feed them just the right signal to know what's a breach and what's just noise? That's the hardest part. >> Right, and can you get enough good ones? >> That's right. >> Underneath your own, underneath your own shell, which is probably, "No", well, hopefully. >> I think building this from scratch for every company is madness, right. There's a handful of companies out there that can pull it off, but I think ultimately everybody will realize, you know, I'm a big audio nerd so I Looked it up, right, you used to build all of your own speakers, right. You'd buy a cabinet and you'd buy some tools, and you would build all the stuff. Now you go to the store and you buy an audio system, right? >> Right, yeah, well at least audio, you had, speakers are interesting 'cause there's a lot of mechanical interpretations about how to take that signal and to make sound, but if you're making CDs you know you got to go, with the standard right? You buy Sonos now, and Sonos is a fully integrated system. What is Sonos for security, right? It doesn't exist yet. And that's, I think that's where Security as a Service is going. Security as a Service should be something you subscribe to that gives you a set of outcomes for your business, and I think that's the only way to consume this stuff. It's too complex for somebody to integrate from best-of-breed products and assemble it just the right way. I think the parallels are going to be exactly the same. I'm not building my car either, right? I'm going to buy one. Alright Misha, well, thanks for the update, and hopefully we'll see you before five years, maybe in a couple and get an update. >> We'll do some checkpoints along the way. >> Alright. Alright, he's Misha, I'm Jeff. You're watching theCUBE from RSA North America 2018 in downtown, San Francisco. Thanks for watching. (techno music)

Published Date : Apr 18 2018

SUMMARY :

of little answers to help you get kind of closer to nirvana. Did you predict it? But it's certainly happening, right. as the dominance of public cloud continues to grow, And the answer is obviously, it does There's no shortage of things for people to worry about. So it's almost, you know how fast can you catch it? That's the reason why, you know last year, and you know, he's got so many resources and you can build it using some of At the other hand, you just can't use and some of the classic breaches we've seen, But I think it's really important, because as you said, And the answer a lot of times is, you can't. to figure out the pattern, that you can even start, There's not, you know, not every company has a SOC right? So, as it continues to morph, what do you see changing now? And some of the companies that offer just, you know, So five years from now, the opportunities to breach-- So, you know, the implications are only going to get higher. So, you know, thank god-- and you know, in factories. Right, well and you know the model what do you feed the humans that are sitting on top of it? Underneath your own, underneath your own shell, and you would build all the stuff. I think the parallels are going to be exactly the same. RSA North America 2018 in downtown, San Francisco.

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
MishaPERSON

0.99+

AmazonORGANIZATION

0.99+

Jeff FrickPERSON

0.99+

JeffPERSON

0.99+

Misha GovshteynPERSON

0.99+

100%QUANTITY

0.99+

96%QUANTITY

0.99+

last yearDATE

0.99+

James HamiltonPERSON

0.99+

30 web shellsQUANTITY

0.99+

20 billionQUANTITY

0.99+

20 petabytesQUANTITY

0.99+

SonosORGANIZATION

0.99+

15%QUANTITY

0.99+

MicrosoftORGANIZATION

0.99+

Alert LogicORGANIZATION

0.99+

85%QUANTITY

0.99+

less than a dayQUANTITY

0.99+

GoogleORGANIZATION

0.99+

45,000 peopleQUANTITY

0.99+

45,000QUANTITY

0.99+

five years agoDATE

0.99+

This yearDATE

0.99+

Five years agoDATE

0.99+

AWS'ORGANIZATION

0.99+

two endsQUANTITY

0.99+

one endQUANTITY

0.99+

thousandsQUANTITY

0.99+

200%QUANTITY

0.99+

AWSORGANIZATION

0.99+

CUBEORGANIZATION

0.98+

oneQUANTITY

0.98+

GDPRTITLE

0.98+

one personQUANTITY

0.98+

Tuesday nightDATE

0.97+

300%QUANTITY

0.97+

singleQUANTITY

0.97+

three timesQUANTITY

0.97+

EquifaxORGANIZATION

0.96+

theCUBEORGANIZATION

0.95+

Black HatORGANIZATION

0.94+

five financial firmsQUANTITY

0.94+

one thingQUANTITY

0.93+

RSA 2018EVENT

0.93+

one dominoQUANTITY

0.93+

about a hundred daysQUANTITY

0.93+

40,000 plus peopleQUANTITY

0.92+

Each oneQUANTITY

0.89+

North American Conference 2018EVENT

0.86+

todayDATE

0.85+

downtown San FranciscoLOCATION

0.83+

InstagramORGANIZATION

0.82+

Fortune 2000ORGANIZATION

0.8+

applicationsQUANTITY

0.79+

about a monthQUANTITY

0.79+

San FranciscoLOCATION

0.77+

GodPERSON

0.7+

five yearsQUANTITY

0.7+

five yearsDATE

0.69+

2018DATE

0.68+

North America 2018EVENT

0.65+

RSA North AmericaTITLE

0.63+

coupleQUANTITY

0.62+

RSAORGANIZATION

0.6+

GCPTITLE

0.6+

SecurityTITLE

0.58+

RSAEVENT

0.51+

annuallyQUANTITY

0.51+

AzureORGANIZATION

0.5+

nickelQUANTITY

0.48+

TargetORGANIZATION

0.45+

RSA North America 2018EVENT

0.43+

Michael DeCesare, ForeScout Technologies | RSA North America 2018


 

>> Announcer: From downtown San Francisco, it's theCUBE. Covering RSA North America 2018. >> Hey welcome back everybody, Jeff Frick here with theCUBE. We're at RSA North America 2018 in San Francisco. 40,000 plus people talking security, enterprise security, cloud security, a lot going on. It just continues to get more and more important. And we're really excited for our next guest who's been playing in the enterprise space for as long as I can remember, which has been a little while. Mike Decesare, he's the CEO and President of ForeScout. Mike, great to see you. >> Started my career off when I was one. (Jeff laughs) So, I've been in this for a long time. >> You have been in it a long time. So you guys now you're all about, right so there's so much stuff going on in security and security is one of these things that I have to look at it as kind of like insurance. You can't put every last nickel in security, but at the same time, you have to protect yourself. The attack surfaces are only growing with IIoT and we were at an autonomous vehicle show, and 5G is just coming around the corner, and all these connected devices and APIs. So you guys have a pretty unique approach to how you top level think about security called visibility. Explain that to us. >> So visibility is the next big thing in the world of cybersecurity and the dynamic is very basic. It's, for 20 plus years, CIOs and CSOs were substantially able to control everything that was on their network. You'd buy your servers and Windows machines and Blackberries for your employees and then there was very little tolerance for other devices being on those organization's networks. And what happened 10 years ago this year, with the birth of the iPhone was that CIOs, those same CIOs now had to deal with allowing things onto their network that don't subscribe to those same philosophies and when you can't buy it and outfit it with security before you put it into the environment. And that's the gap that ForeScout closes for organizations is we have an agentless approach which means we plug into the network infrastructure itself and we give customers visibility into everything that is connected to their network. >> So that begs a question, how do you do that without an agent? I would imagine you would put a little agent on all the various devices. So what's your technique? >> We actually don't. That's the secret sauce of the company is that >> okay >> you know over 10 years ago, we recognized this IoT trend coming because that's, that's the thing in the world of IoT is unlike the first kind o' 20 years of the internet, there was a substantially smaller number of operating systems, most of them open. The different characteristic about the current internet is that many of these use cases are coming online as closed proprietary operating systems. The example I use here is like your home. You know, you get a Nest thermostat and you put in on your network and it monitors, you know, heating and cooling but the device, the operating system, the application is all one consumer device. It doesn't run Windows. You can't install antivirus on you Nest thermostat. So our approach is we plug into the network infrastructure. We integrate to all of the network vendors, the firewall vendors, the wireless controlling vendors and we pull both active and passive techniques for gathering data off those devices and we translate that into a real-time picture of not just everything connected to the network but we know what those devices are without that client having to do anything. >> So you have what you call device cloud or yeah, ForeScout device cloud. So is that, is that a directory of all potential kind of universe of devices that you're querying off of or is that the devices within the realm of control of your of your clients directly? >> It's the second. It's the, so the way that our product works is we plug into the network infrastructure so anything that requests an IP address, whether is wired and wireless in the campus environment, whether it's data center or cloud in the data center environments or even into the OT space, anything that requests an IP address pops onto our radar the second it requests that address. And that cloud that we've built, that we've had for about nine months, we already have three million devices inside, almost three and a half million devices, is a superset of all of the different devices across our entire install base just from the clients that have been willing to share that data with us already. And that gives us optimism because what that becomes is a known set of fingerprints about all known devices so the first time that we discover a Siemens camera that might be a manufacturer, the company might have ten thousand of those in the environment, the first time that we see that device, we have to understand the pattern of traffic off that device, we label that as a security camera and any other customer world-wide that's has that same device connects, we instantaneously know it's a Siemens security camera. So we need the fingerprint of those devices once. >> Right, and so you're almost going to be like the GE Predix of connected devices down the road potentially with this cloud. >> We won't go there on that. >> He won't go there, alright. We've talked to Bill Ruh a lot of times but he does an interesting concept. The nice thing 'cause you can leverage from a single device and knowledge across the other ones which is so, so important on security so you can pick up multiple patterns, repeated patterns et cetera. >> One of the best parts about ForeScout is the fact that we deployed incredibly quickly. We have clients that have almost a million devices that got live in less than three months. And the reason we're able to do that is we plug into the infrastructure, and then our product kind o' does its own thing with very little effort from the client where we compare what we have in this repository against what they have in their environment. We typically get to an 80 or 90% auto-classification meaning that we know 80 or 90% of the time, not just what's on the network but what that device is and then the other 20% is where we have the implementation where we go through and we look at unique devices. It might be a bank has some model of ATM we've never seen before or a healthcare company has beds or machines on a hospital floor that we haven't recognized before. And the first time that we see each of those devices uniquely, we have to go through the process of fingerprinting it which means that we're looking for the unique pattern of traffic that's coming off a, you know, a router, a switch and a firewall and we're ingesting that and we're tagging that device and saying anytime we see that unique pattern of traffic, that's a certain device, a security camera or what have you. >> Right. >> The reason's that useful is then we get to put a policy in place about how those devices are allowed to behave on the network. So if you take something like the Mirai Botnet which hit about a year ago, was the thing that took down a big chunk of the Northeast, you know, utilities and you know, internet, it infected, it was a bot that infected security cameras predominantly. Nobody thought twice about having security cameras in their environment, but they're the same as they are in your house where you know, you put it online, you hit network pair and it's online. >> Right. >> But that bot was simply trying to find devices that had the default password that shipped from the security manufacturer and was able to be successful millions of time. And with our product in place, that couldn't happen because when you set us up, we would know it's a security camera, we'd put a policy in place that says security camera can speak to one server in the data center called the security camera server. And if that device tries to do anything more criminal, if it tries to dial the internet, if it tries to break into your SAP backend, any of those activities, we would give the customer the ability to automatically to take that device offline in real time. >> Right, so you're... >> And that's why our clients find us to be very useful. >> Right, so you're really segregating the devices to the places they're supposed to play, not letting 'em out of the areas they're supposed to be. Which is the >> Absolutely. >> Which is the classic kind of back door way in that the bad guys are coming in. >> Our philosophy is let everything onto the network. We take a look at that traffic. We give you a picture of all those devices and we allow each customer to put an individual policy in place that fences that in. If you take the other extreme like a Windows machine in a corporate environment, our typical policy will be you know, do you have Windows 2009 or later? 'Cause most customers have policies they don't want XP in their environments anymore. But we enforce it. So if an XP device hits the network, we can block that device or we can force a new version down. If you have Symantec, has it got a dat file update? If you've got Tenable, has it had a scan recently? If you've got, you know, any of the other products that are out there that are on those machines, our job is to enforce that the device actually matches the company's policy before that device is allowed in. >> Before you let it. Alright. >> And if at any time that it's on that network, it becomes noncompliant, we would take that device offline. >> You know, with the proliferation of devices and continuation growth of IoT and then industrial IoT, I mean, you guys are really in a good space because everything is getting an IP address and as you said, most of them have proprietary operation systems or they have some other proprietary system that's not going to allow, kind o' classic IT protections to be put into place. You've really got to have something special and it's a pretty neat approach coming at it from the connectivity. >> It's the secret sauce of the company is we recognized many years ago that the the combination of not just there being very few operating systems but they were all open. Windows, Lennox, right? I mean, you can buy a Windows machine and you can install any product you want on it. But we saw this trend coming when the next wave of devices was going to be massively heterogeneous and also in many cases, very closed. And you know, you mentioned the example of the OT space and that's one of the other, the third biggest driver for us in our business is the OT space because when you looking a WanaCry or a NotPetya and you see companies like Maersk and FedEx and others that are, that are publicly talking about the impact of these breaches on their earnings calls. What those companies are waking up and realizing is they've got 25 year old systems that have run, you know, an old version of Microsoft that's been end-of-life decades ago and the bad actors have proven very adept at trying to find any entry point into an organization, right, and the great news for ForeScout is that really lends itself very much towards our age-endless approach. I mean, many of these OT companies that we're in, devices that are in their manufacturing facilities don't even have an API. There were built so long ago so there's no concept of interacting with that machine. >> Right >> So for us, allowing that device to hit the Belden switches and then be able to interrogate the traffic coming off those switches let's us do the same thing that we do in the campus world over in the OT world as well. >> Good spot to be. So RSA 2018, what are ya looking forward to for this week? >> This is just massive in size. It's like speed dating. From a customer's perspective too, I mean, I meet so many customer's that come here and able to meet with 30 or 40 vendors in a single week and it's no different, you know, for the providers themselves so. You know, we've got some really, kind o' really high profile big wins, you know, it's very coming for us to be doing deals at this point that get up over a million devices so they're very high profile so it's a great chance to reconnect with customers. You know, one of the things I didn't mention to you is that kind o' the, the whole thing that we do of identifying devices and then understanding what they are and allowing those policies to get put in places, that's fundamentally done with our own IP, and the connections into the switch and firewall vendors. But we've built this whole other ecosystem of applications in the world of orchestration that set on top of our products. We integrate the firewall vendors, the vulnerability management vendors, the EDR vendors, the AV vendors, so it's a great chance for us to reconnect with you know, those vendors as well. In fact, we're doing a dinner tonight with CrowdStrike. They're one of our newer partners. Very excited about this week. It brings a lot of optimism. >> Well, great story Mike and excited to watch it to continue to unfold. >> We appreciate you giving us some time. >> Alright, thanks for stopping by. That's Mike Decesare. I'm Jeff Frick. You're watching theCUBE from RSA North America 2018. Thanks for watchin'. Catch you next time. (techno music)

Published Date : Apr 18 2018

SUMMARY :

Announcer: From downtown San Francisco, it's theCUBE. Mike Decesare, he's the CEO and President of ForeScout. So, I've been in this for a long time. but at the same time, you have to protect yourself. and the dynamic is very basic. all the various devices. That's the secret sauce of the company and it monitors, you know, heating and cooling or is that the devices within the realm of control of your about all known devices so the first time that we discover a of connected devices down the road from a single device and knowledge across the other ones is the fact that we deployed incredibly quickly. So if you take something like the Mirai Botnet that had the default password that shipped from the not letting 'em out of the areas they're supposed to be. Which is the classic kind of back door way in that So if an XP device hits the network, Before you let it. it becomes noncompliant, we would take that device offline. and as you said, most of them that are publicly talking about the impact of these breaches and then be able to interrogate Good spot to be. You know, one of the things I didn't mention to you is that and excited to watch it to continue to unfold. Catch you next time.

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
Jeff FrickPERSON

0.99+

30QUANTITY

0.99+

80QUANTITY

0.99+

25 yearQUANTITY

0.99+

Mike DecesarePERSON

0.99+

SymantecORGANIZATION

0.99+

FedExORGANIZATION

0.99+

MicrosoftORGANIZATION

0.99+

Michael DeCesarePERSON

0.99+

Bill RuhPERSON

0.99+

MaerskORGANIZATION

0.99+

90%QUANTITY

0.99+

MikePERSON

0.99+

20 plus yearsQUANTITY

0.99+

first timeQUANTITY

0.99+

less than three monthsQUANTITY

0.99+

eachQUANTITY

0.99+

GEORGANIZATION

0.99+

SiemensORGANIZATION

0.99+

JeffPERSON

0.99+

20%QUANTITY

0.99+

San FranciscoLOCATION

0.99+

XPTITLE

0.99+

three million devicesQUANTITY

0.99+

40,000 plus peopleQUANTITY

0.99+

40 vendorsQUANTITY

0.99+

tonightDATE

0.99+

ForeScout TechnologiesORGANIZATION

0.99+

CrowdStrikeORGANIZATION

0.99+

twiceQUANTITY

0.99+

iPhoneCOMMERCIAL_ITEM

0.99+

one serverQUANTITY

0.99+

Windows 2009TITLE

0.99+

ten thousandQUANTITY

0.98+

ForeScoutORGANIZATION

0.98+

each customerQUANTITY

0.98+

about nine monthsQUANTITY

0.98+

WindowsTITLE

0.98+

secondQUANTITY

0.97+

oneQUANTITY

0.97+

almost three and a half million devicesQUANTITY

0.97+

single deviceQUANTITY

0.97+

OneQUANTITY

0.97+

firstQUANTITY

0.97+

NotPetyaORGANIZATION

0.96+

this weekDATE

0.96+

bothQUANTITY

0.96+

WanaCryORGANIZATION

0.95+

over a million devicesQUANTITY

0.95+

RSA North AmericaORGANIZATION

0.93+

10 years ago this yearDATE

0.93+

almost a million devicesQUANTITY

0.92+

third biggest driverQUANTITY

0.9+

millions of timeQUANTITY

0.9+

ForeScoutTITLE

0.89+

LennoxORGANIZATION

0.88+

Mirai BotnetORGANIZATION

0.82+

2018DATE

0.8+

TenableORGANIZATION

0.78+

20 yearsQUANTITY

0.78+

about a year agoDATE

0.75+

RSA 2018EVENT

0.75+

decades agoDATE

0.75+

over 10 years agoDATE

0.74+

NortheastLOCATION

0.74+

single weekQUANTITY

0.73+

many years agoDATE

0.72+

SAPORGANIZATION

0.64+

waveEVENT

0.59+

2018EVENT

0.54+

theCUBEORGANIZATION

0.54+

BeldenORGANIZATION

0.33+

Sean Cunningham, ForgePoint Capital | RSA North America 2018


 

>> Presenter: From downtown San Francisco, it's theCUBE, covering RSA North America 2018. >> Hey, welcome back, everybody. Jeff Frick here with the theCUBE. We're in downtown San Francisco with RSA North America 2018 40,000 plus professionals talking about security, enterprise security. It's a growing field, it's getting baked into everything. There's a whole lot of reasons that this needs to be better and more integrated into everything that we do, as opposed to just kind of a slap on at the end. And, who better to have on, who's investing at the cutting edge, keeping an eye on the startups than Sean Cunningham, our next guest. He's a managing director ForgePoint Capital, the newly named, so welcome to ForgePoint Capital, I guess. (Sean laughs) >> Thanks, Jeff, we're pretty excited about it. So, we were branded Trident Capital Cybersecurity. We're a 300 million dollar cybersecurity only fund, we closed the fund about a year and a half ago. We've invested in a dozen companies, and we decided that now is a great time to rebrand ForgePoint really tells more about what we're doing, we're forging ahead with our Series A, Series B funded companies, as well as a few growth equity. So, it made a lot of sense, but we're pretty excited about the market, and obviously RSA, with 1700 cybersecurity companies makes it interesting. >> Right, so you've been at this for a while. I wonder if you can speak to some of the macro trends as we've seen the growth of cloud, the growth of IoT will soon be more industrial IoT, enabled by 5G. We've got all these automated systems and financial services trading, and ad tech that we're going to see more and more of that automated transaction happening. You've got APIs and everything's connected to everything else to enable my application. So, really really exciting, and huge, growing threat surface if you will, but at the same, these are the technologies that are driving forward. So, what are you seeing from your, seat at the table some of the newer, more innovative startups? >> Jeff, I think you should probably tell me. You have all the answers there. >> I talked to a lot of smart people, that's the benefit of the job. >> I think the only two buzzwords you left off was Bitcoin and fraudulent payments. >> Oh, we can work a little blockchain in if you want. >> Yeah, but it is absolutely a bit of an interesting environment. I've been doing it since 2000 with Intel Capital for 15 years, but what's really changed, what hasn't changed is the fact that it's all about the hackers are able to monetize this. So, that's not going away. The biggest change are the, I guess, overt nation state attacks. So, between all of those things, the drivers are just continuing to force cybersecurity to become better and better. And, that's why the innovative startups are really, you're seeing these 1700, because the legacy companies can't fix these problems. And, you know, you talk about all these different paths for hackers to get in. It's absolutely the case and we are really big on areas, as you mentioned Jeff, the automation. It has to be about automating. It has to be about having a real solution for a real problem. You know, you look at, let's say 1500 of these security startups, a lot of them are about technology for the sake of technology. So, we're pretty excited about a couple of areas. One, is application security. If you think about the Equifax hack, you know, it's as simple as getting into the website and being able to hack into all of the PII data if you will. And, we've invested in a company called Prevoty and what they do is they make it easy for the application security folks to meet with the DevOps folks and inject the software into these applications. The reason why that's really interesting is, if you think about how long it takes for the DevOps guys to get all their new updates out, through that whole cycle, when you could automate that process and reduce that time to market, that's what it's really all about. >> So, what's your take on GDPR. You know, it's past a little while ago, the enforcement comes into place next month. It's weird what's going on with Facebook right now. I don't ever hear GDPR in the conversation of what's going on, and yet, it's just around the corner and it seems like it would be part of that conversation. DC is just king of a Y2K moment, where there's a lot of buzz and the date hits and we get past it and then we kind of move on with our lives, or is this really a fundamental shift in the way that companies are going to have to manage their data? >> Well, I can show you my scars from investigating compliance companies. I think the winners in that space, from a business standpoint are going to be the consultant companies, initially and at some point then, the legacy guys are going to be also involved, as well as some of the startups. But, clearly, until you see some of the large penalties happen, there's not going to be a lot of movement. There's going to be a lot of hand waving and consulting firms are trying to figure out what's your problem, how do we solve it. So, you're going to see, I'm sure, around the floor a lot of GDLP stuff, but we're being very cautious about where we invest there because, as you say, Y2K and a lot of this is going to be a lot fud. The legacy guys are going to say, oh we can handle that. Same as they did with cloud. Look how long it's taking cloud to get adopted, my God. I mean-- >> Right. >> GDRP is a big piece of that. We did investments in that space, around CASB, it's called. And, we invested in a company called Prelert. It had great traction, but then it just kind of topped out. So, it's going to be investable space and there's going to be a lot of money dumped in there because it's, you know, the Lemming effect. All VCs are going to follow that. >> Right. >> We'll see what happens. >> And then on the cloud, you know, with the growth of public cloud with Amazon and Azure and Google Cloud Platform, and they've got significant resources that they're investing into the security of their clouds and their infrastructure. And, yet, we still hear things happen all the time where there's some breach because somebody forgot to turn a switch from green to blue, or whatever. How did the startups, you know, kind of find their path within these huge public cloud spaces to find a vector that they can concentrate on, that's not already covered by some of these massive investments that the big public cloud people are making? >> Yeah, I think some of the, you know you point something out, I mean we got to think about cloud, you think about the public cloud, you think of private cloud and hybrid model and so on. I think that's really where things are going to to be for a while. The big guys, the big companies, enterprises are not putting a lot of their crown jewels out in the public clouds, yet. And, so the private clouds are equally important to them. And, so they have to be secured. And, the public cloud, you know, there's definitely they have some good security, but they quietly are implementing security from innovative companies also. They're not as public about it because they want to have they're already secure, so don't worry about me, but there's a lot of opportunity there. >> Okay, and then when CIOs are talking about security and thinking about security, ultimately they cannot be 100 percent secure, right, it's just you cannot be. >> It's called job security. >> Yeah, job security for us, right. But, I was thinking of this kind of as an insurance model. At some point, you get kind of the law of diminishing returns and you got to start making business trade-offs for the investment. How are these people thinking about this, at the same time, seeing their competitors and neighbors showing up on the cover of the Wall Street Journal breach after breach after breach? What's the right balance? How should they be thinking about managing risk, and thinking of a risk problem as opposed to kind of a castle problem? >> Yeah, and that's the biggest problem with CIOs and CSOs right now. It's all about what's good enough. Where do I reach that threshold? And, so there is definitely buyer fatigue. And, I think it's a matter, there are companies out there that look at the risk profile and are actually giving ratings of, what is your environment look like. We just invested in a spin out from, we helped spin out a company called CyberCube out of Symantec, and it's insurance. And, they're looking at, from a cyber insurance perspective, of what's your risk profile within your organization and selling and that data from Symantec as well as the data they have and going back to the insurance, the under buyer and saying, hey, we can show you the risk profile of this company and you can properly price your cyber insurance now. We all know how large the cyber insurance market is, so there's a lot of opportunities in that space to really look at the risk factors. >> Alright, well before I let you go, to go visit all the 117 startups, which will be looking for your cheque, I'm sure. >> Human ATM. >> What is one or two things that you think about in some of the more progressive startups that you talk about that still hasn't kind of hit the public eye yet. That they should be thinking about, or that we're going to be talking about in a couple years that's still kind of below the radar? >> Yeah, you know, if I told you then everyone else would be-- >> That's true. >> So, I have to be a little careful. You know, I think the interesting thing is, you know, a bit of a contrarian view. Is, if you think about consumer space, people don't really want to invest. Investors don't want to put money in the consumer, but you think about Symantec again, LifeLock. Identity protection, 2.3 billion dollars Symantec paid to get LifeLock. That's a lot of money. But, if you think about five years ago, how many consumers would pull out their Visa card to buy security. So, we think that there's really a potential opportunity on the consumer side. Now, AV is pretty well scorched earth. A lot of places, a lot of these endpoint things are scorched earth, but consumer might be an interesting place to be able to take these enterprise applications and, what I call, the consumerization of security, and take some of those interesting application and solutions and bring them down to the consumer in a bundle type of environment. >> Yeah, well certainly with all the stuff going on with Facebook now, people's kind of reawakening at the consumer level of what's really happening would certainly be fuel for that fire. >> We have an investment in a company called IDEXPERTS, which does breach remediation and our goal right now is we're continuing to add products from that space to be able to give the consumers a very robust offering. >> Alright, Sean, well thanks for taking a few minutes out of your day from prospecting. >> Yeah, pleasure. >> Over on the floor, he's Sean Cunningham, I'm Jeff Frick. You're watching theCUBE from RSA North America 2018 in downtown San Francisco. Thanks for watching, I'll see you next time. (upbeat music)

Published Date : Apr 18 2018

SUMMARY :

Presenter: From downtown San Francisco, it's theCUBE, as opposed to just kind of a slap on at the end. about the market, and obviously RSA, So, what are you seeing from your, seat at the table You have all the answers there. I talked to a lot of smart people, I think the only two buzzwords you left off and being able to hack into all of the PII data if you will. and the date hits and we get past it Y2K and a lot of this is going to be a lot fud. a lot of money dumped in there because it's, you know, How did the startups, you know, kind of find their path And, the public cloud, you know, there's definitely 100 percent secure, right, it's just you cannot be. and you got to start making business trade-offs Yeah, and that's the biggest problem with CIOs Alright, well before I let you go, to go visit all about in some of the more progressive startups So, I have to be a little careful. at the consumer level of what's really happening to be able to give the consumers a very robust offering. of your day from prospecting. Over on the floor, he's Sean Cunningham, I'm Jeff Frick.

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
JeffPERSON

0.99+

Sean CunninghamPERSON

0.99+

SymantecORGANIZATION

0.99+

Jeff FrickPERSON

0.99+

SeanPERSON

0.99+

ForgePoint CapitalORGANIZATION

0.99+

oneQUANTITY

0.99+

100 percentQUANTITY

0.99+

15 yearsQUANTITY

0.99+

1500QUANTITY

0.99+

PrelertORGANIZATION

0.99+

2.3 billion dollarsQUANTITY

0.99+

AmazonORGANIZATION

0.99+

Y2KORGANIZATION

0.99+

2000DATE

0.99+

117 startupsQUANTITY

0.99+

PrevotyORGANIZATION

0.99+

next monthDATE

0.99+

IDEXPERTSORGANIZATION

0.99+

GDPRTITLE

0.99+

Series BOTHER

0.99+

FacebookORGANIZATION

0.98+

two thingsQUANTITY

0.98+

Series AOTHER

0.98+

CyberCubeORGANIZATION

0.98+

Intel CapitalORGANIZATION

0.97+

1700 cybersecurityQUANTITY

0.97+

EquifaxORGANIZATION

0.97+

Trident Capital CybersecurityORGANIZATION

0.97+

five years agoDATE

0.96+

two buzzwordsQUANTITY

0.96+

300 million dollarQUANTITY

0.95+

OneQUANTITY

0.93+

CASBORGANIZATION

0.93+

a year and a half agoDATE

0.93+

40,000 plus professionalsQUANTITY

0.92+

1700QUANTITY

0.9+

5GORGANIZATION

0.87+

San FranciscoLOCATION

0.87+

ForgePointORGANIZATION

0.87+

dozen companiesQUANTITY

0.86+

GoogleORGANIZATION

0.86+

LifeLockORGANIZATION

0.84+

2018DATE

0.82+

downtown San FranciscoLOCATION

0.81+

RSA North AmericaORGANIZATION

0.81+

GDLPORGANIZATION

0.79+

Visa cardCOMMERCIAL_ITEM

0.78+

Wall Street JournalORGANIZATION

0.75+

theCUBEORGANIZATION

0.75+

DevOpsTITLE

0.73+

LifeLockCOMMERCIAL_ITEM

0.73+

GDRPORGANIZATION

0.71+

earthLOCATION

0.71+

RSA North America 2018TITLE

0.67+

aboutDATE

0.66+

AzureORGANIZATION

0.62+

RSAORGANIZATION

0.62+

Cloud PlatformTITLE

0.62+

AmericaORGANIZATION

0.61+

2018EVENT

0.61+

DCORGANIZATION

0.6+

RSA NorthTITLE

0.59+

couple yearsQUANTITY

0.53+

Y2KEVENT

0.49+

Jason Brvenik, NSS Labs | RSA North America 2018


 

>> Announcer: From downtown San Francisco, it's The Cube, covering RSA North America 2018. >> Welcome back, Jeff Frick with The Cube. We're at RSAC, the RSA Conference North American in San Francisco, 2018. 40,000 people, it's an amazingly huge and growing conference, 'cause security is obviously at the forefront of everything, especially as everything moves to devices and services and cloud, we can't forget security and we're excited to have somebody who's kind of got to a third-party validation kind of point of view on the marketplace to get their perspective. It's Jason Brvenik and he is the Chief Technology Officer for NSS Labs. So, Jason, great to meet you. >> Great to meet you. >> So for people that aren't familiar with NSS Labs, give us kind of the overview of what you guys are all about. >> We work with enterprises to understand their needs in security, and then, build and create test environments that create real-world conditions to assess whether or not a product is a good fit. We create comparable environments, so that we can understand fundamentally whether or not the products are delivering on their claims. >> Right, and recently you've done some work around the data center intrusion prevention systems group test. >> Mm-hmm. >> It's a mouthful. What is that all about? >> Well, that's all about the recognition that data centers are the keys to access for most organizations and appropriately protecting them is not as easy as deploying a firewall. You need to have much greater inspections on the interactions with systems, whether or not security's being provided within the application layers, being properly secured, and so, latency and performance and effectiveness against attacks are all measured and then presented in a set of group test reports. >> Right. So, must be getting increasingly complex, 'cause there's all these different components now that build up a solution. Right? It's not just one set of applications, that you're pulling maybe public data sources, you've got a bring-your-own-devices, you've got this huge string of things that are all pulled together. How do you incorporate that into your testing? How do you figure out how these things work together? 'cause ultimately, that increases your attack surface area, vulnerabilities, I would imagine. >> Certainly, and we create an environment, an architecture that we propose, that based on our interactions with the enterprises, it's fairly representative of what an enterprise would have, and then we create or simulate the types of interactions you would have with the different systems, generate attacks against them, and measure whether or not the products are able to sustain a concerted attack from an adversary. All the way into creating evasive techniques, so that an attack that is known to be blocked by a technology, we would apply different techniques to make it evasive and see if we can evade the security controls and to measure those. >> So how accurate are people, not to call anybody up, but how accurate are people in assessing the effectiveness of their own products and solutions? >> That's an interesting mixed bag. >> I'm sure it must run the gamut, right? >> It does, it does. >> Well, we don't want to call out any, beat anybody up, but I would imagine there are some that are just, Are they just looking at the wrong thing? Or how do you sort that all out? >> It's interesting to see the different perspectives that exist in the security space. Everything from just make the pain stop, where they want to do simple signature blocking to, we really want to understand what's happening and dig deep into the protocols and interactions and understand what's an appropriate interaction beyond whether or not there's an attack there. The fundamental premise we have in our space is there's an absolute shortage of talent in the security space that understands that just because the standard says something should be, doesn't mean that an attacker has to adhere to it. And so there's a ton of breaks in that. >> Dang. And what are some of the things that people just miss as the attack surfaces change? And I just think of the fully automated systems like we've seen in ad tech and advanced financial trading systems that are now moving more and more into an increasing group of applications that are going to be IoT-enabled, they're all going to be connected with 5G moving very quickly, so the potential for problems becomes pretty significant if there's a bad actor that gets inserted into that process. >> Certainly and it's interesting that the attackers seem to have automation down pretty well. They can get in and move laterally pretty quickly. >> Right. >> And ferreting out attacker behavior from just bad user behavior can be very difficult. The presumptions that a lot of technologies because the standard says something should be, it will be, create these situations where people aren't effectively looking for the ambiguities and standards, and those are abused all the time. When you look at embedded devices, they get deployed and they stay for 10 years. >> Jeff: Right. >> That's 10 years of technical data that's just deployed and waiting to be exercised and exploited, and having a good general hygiene on an operational environments to understand where these rifts are is probably the biggest gap in the Enterprise world. On the security side, the reliance on standards and the reliance on assumptions of what should be tend to continue, come back, and bite vendors, all right? >> It's funny. So you say just general hygiene and we talked about that in one of the prior interviews where often we'll hear, say, there's a Amazon breach or something and you get to the second paragraph and it's because somebody forgot to set a configuration in the right way, so it's not necessarily the technology or the infrastructure or the safeguards that are put up, it's just somebody forgot to turn the switch on. >> It is. >> So, why these things, general hygiene is still such a problem, is it just because it's so complex, things are moving so fast, people are just too busy? Is it a symptom of dev ops? >> We're human, we're human. >> There we go. >> There's a 1000 things demanding our attention all the time, and without solid processes and procedures, it's easy to miss something. And it's easy in the moment when you've got a big project that needs to launch to say that can wait until next week and then the next big project comes along and next week is here and it waits until the week after. Next thing you know, it's forgotten and you've got an old piece of architecture, infrastructure or security out there that just isn't being maintained anymore. >> Right. >> It's one of the reasons we created an environment that strives to do what we call continuous security validation. So even if you had the best security technologies in the world, it's indistinguishable from no security at all until a breach occurs, right? And so, continuous security validation allows us to look at live attacks that you're usually going to face, measure whether or not your security is deployed, is delivering all protections against them, and highlights there's a gap, simply because you're human. The best technology in the world isn't going to work if you're not managing it well. >> Right. So, are you creating kind of like a digital twin of the key components of my environment back in your lab? Or are you putting things in my system so that you can do this kind of continual monitoring? >> We create, effectively, a virtual remote office and then deploy your security controls and then we attack that remote office for you. And measure whether or not your security controls are being effective and whether or not your people with those controls are able to respond effectively. >> So what's been the impact of public cloud? Of the rise of public cloud? Both obviously, for those applications that are sitting in the public cloud from the Enterprise perspective, but now it's creating this kind of hybrid situation where they've still got stuff in the data center, they've got stuff in the public cloud, there's probably some stuff that's migrating in between, maybe it's tested to have in the public cloud and it gets deployed internally, or maybe they're trying to do a lift-and-shift out of the data center, so how has the rise of public cloud and with the hybrid cloud and multi-cloud environments impacted your guys' world? >> Oh, the biggest shift there, I think, is in the proliferation of what otherwise would have been well-controlled development environments into production environments. It's so easy to move what evolved in developing a technology into a production world without going in and paying attention whether or not all of the right elements are in play. So it used to be you developed it, then you moved it into QA and then from QA, it got moved into production. Now you go right from Dev to Production and QA kind of happens in the background. >> Right, right. And we talked in an earlier conversation, too, which is before then this security would be layered on after the test dev, once it was moving in production. Well, let's slap some security on it, but now it's got to be incorporated in from day one, so another huge opportunity, I guess, to miss that, as you roll that into production. >> It seems like nobody ever thinks about security first. It just isn't the function. No developer ever wakes up in the morning and thinks, I need to do security and then develop features. Their life is all around delivering the value that the customers are looking for and security prevents them creating the feature velocity they want to deliver. There's always a push-and-pull there to get the right balance and it's easy when you're not under sustained attack to believe that security isn't important. >> So how do people adjust kind of their thinking around security? Or is it just below the surface, or it's presumed? How does it become more of an ongoing part of the conversation and a feature that's always baked in during the development versus kind of an afterthought or, oh my gosh, my neighbor just got hacked or there's a big story in the Wall Street Journal? >> I think what we're seeing now in the evolution of software and development is the supply chain involved. It used to be you created systems from scratch and you built it from scratch and you had the opportunity to layer security in as you were going. You would find a weakness, you would design around it, you would overcome it. Now it's more of an assemblage of components to produce an outcome, and the security wasn't built in when the component was built, you've pretty much lost that opportunity and it's hard to go retrofit that. I think we're going to soon see the next phase where these components are start building security assumptions in up front, but it's going to be a long time, much like IoT where things are deployed forever, where we start seeing that supply chain evolve on its own and you can assemble secure software from the start. >> Yeah, it's amazing that's it's still kind of an afterthought when these things are in the newspaper every day and it's almost an assumption maybe we're getting a little numb to the thing that you're going to be breached and you're going to have an issue and how do you react to it? How quickly can you find it? How do you limit the damage? Because it seems like everybody's getting breached every day. >> Especially, when you consider we have decades of technical data. There are companies that still run their businesses on mainframes that haven't been produced in 20 years. >> I didn't even think of that part of it. All right, last question before I let you go, Jason. Big, big week this week at RSA. What are you looking forward to? >> Ah, I'm looking forward to really the evolution of advanced end point technologies, the delivery of visibility to the enterprise, that can do new response actions based on new knowledge. I'm looking forward to the growth of automation. Automation as it relates to security elements, so we can reduce the human element. >> Jeff: Right. >> And the mistakes that are made. >> Yeah, 'cause we certainly need it, 'cause it is easy to make mistakes when you've got a 1000 little tasks, right? >> It is. >> All right, Jason. Well, thank you for taking a few minutes of your day and stopping by. >> Thanks for having me. >> All right. He's Jason, I'm Jeff. You're watching The Cube. We're at RSAC 2018 North America in San Francisco. Thanks for watching. (exciting music)

Published Date : Apr 18 2018

SUMMARY :

Announcer: From downtown San Francisco, it's The Cube, It's Jason Brvenik and he is the Chief Technology Officer So for people that aren't familiar with NSS Labs, to assess whether or not a product is a good fit. the data center intrusion prevention systems group test. What is that all about? that data centers are the keys to access How do you incorporate that into your testing? and to measure those. and dig deep into the protocols and interactions that are going to be IoT-enabled, the attackers seem to have automation down pretty well. because the standard says something should be, and the reliance on assumptions of what should be and it's because somebody forgot to set a configuration And it's easy in the moment It's one of the reasons we created an environment of the key components of my environment back in your lab? and whether or not your people with those controls and QA kind of happens in the background. after the test dev, and thinks, I need to do security and then develop features. and the security wasn't built in and how do you react to it? Especially, when you consider we have decades What are you looking forward to? the evolution of advanced end point technologies, and stopping by. We're at RSAC 2018 North America in San Francisco.

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
JasonPERSON

0.99+

Jeff FrickPERSON

0.99+

Jason BrvenikPERSON

0.99+

JeffPERSON

0.99+

10 yearsQUANTITY

0.99+

NSS LabsORGANIZATION

0.99+

AmazonORGANIZATION

0.99+

next weekDATE

0.99+

20 yearsQUANTITY

0.99+

1000 thingsQUANTITY

0.99+

second paragraphQUANTITY

0.99+

oneQUANTITY

0.99+

San FranciscoLOCATION

0.99+

40,000 peopleQUANTITY

0.99+

decadesQUANTITY

0.99+

BothQUANTITY

0.98+

RSAORGANIZATION

0.98+

1000 little tasksQUANTITY

0.97+

one setQUANTITY

0.97+

Wall Street JournalTITLE

0.96+

this weekDATE

0.96+

day oneQUANTITY

0.94+

2018DATE

0.91+

RSA North America 2018EVENT

0.9+

North AmericaLOCATION

0.88+

The CubeTITLE

0.86+

The CubeORGANIZATION

0.85+

RSA Conference North AmericanEVENT

0.84+

RSAC 2018EVENT

0.77+

RSA North AmericaORGANIZATION

0.74+

firstQUANTITY

0.72+

one of the reasonsQUANTITY

0.7+

The CubeCOMMERCIAL_ITEM

0.64+

RSACORGANIZATION

0.6+

technical dataQUANTITY

0.59+

ndQUANTITY

0.52+

Tim Jefferson, Barracuda Networks | RSA North America 2018


 

(upbeat music) >> Announcer: From downtown San Francisco, it's theCUBE. Covering RSA North America 2018. >> Welcome back everybody, Jeff Frick here, with theCUBE. We're at RSA Conference 2018 in downtown San Francisco, 40,000 plus people, it's a really busy, busy, busy conference, talking about security, enterprise security and, of course, a big, new, and growing important theme is cloud and how does public cloud work within your security structure, and your ecosystem, and your system. So we're excited to have an expert in the field, who comes from that side. He's Tim Jefferson, he's a VP Public Cloud for Barracuda Networks. Tim, great to see you. >> Yeah, thanks for having me. >> Absolutely, so you worked for Amazon for a while, for AWS, so you've seen the security from that side. Now, you're at Barracuda, and you guys are introducing an interesting concept of public cloud firewall. What does that mean exactly? >> Yeah, I think from my time at AWS, one of my roles was working with all the global ISVs, to help them re-architect their solution portfolio for public cloud, so got some interesting insight into a lot of the friction that enterprise customers had moving their datacenter security architectures into public cloud. And the great biggest friction point tend to be around the architectures that firewalls are deploying. So they ended up creating, if you think about how a firewall is architected and created, it's really designed around datacenters and tightly coupling all the traffic back into a centralized policy enforcement point that scales vertically. That ends up being a real anti-pattern in public cloud best practice, where you want to build loosely coupled architectures that scale elastically. So, just from feedback from customers, we've kind of re-architected our whole solution portfolio to embrace that, and not only that, but looking at all the native services that the public cloud IaaS platforms, you know, Amazon, Azure, and Google, provide, and integrating those solutions to give customers the benefit, all the security telemetry you can get out of the native fabric, combined with the compliance you get out of web application and next-generation firewall. >> So, it's interesting, James Hamilton, one of my favorite people at AWS, he used to have his Tuesday Nights with James Hamilton at every event, very cool. And what always impressed me every time James talked is just the massive scale that Amazon and the other public cloud vendors have at their disposal, whether it's for networking and running cables or security, et cetera. So, I mean, what is the best way for people to take advantage of that security, but then why is there still a hole, where there's a new opportunity for something like a cloud firewall? >> I think the biggest thing for customers to embrace is that there's way more security telemetry available in the APIs that the public cloud providers do than in the data plane. So most traditional network security architects consider network packets the single source of truth, and a lot of the security architecture's really built around instrumenting in visibility into the data plane so you can kind of crunch through that, but the reality is the management plane on AWS and Azure, GCP, offer tremendous amount of security telemetry. So it's really about learning what all those services are, how you can use the instrument controls, mine that telemetry out, and then combine it with control enforcement that the public cloud providers don't provide, so that kind of gives you the best of both worlds. >> It's interesting, a lot of times we'll hear about a breach and it'll be someone who's on Amazon or another public cloud provider, and then you see, well they just didn't have their settings in the right configuration, right? >> It's usually really kind of Security 101 things. But the reality is, just because it's a new sandbox, there's new rules, new services, you know, and engineers have to kind of, and the other interesting thing is that developers now own the infrastructures they're deploying on. So you don't have the traditional controls that maybe network security engineers or security professionals can build architectures to prevent that. A developer can inadvertently build an app, launch it, not really think about security vulnerabilities he put in, that's kind of what you see in the news. Those people kind of doing basic security misconfigurations that some of these tools can pick up programmatically. >> Now you guys just commissioned a survey about firewalls in the cloud. I wonder if you can share some of the high-level outcomes of that survey. What did you guys find? >> Yeah, it's similar to what we're chatting. It's just that, I think, you know, over 90% of enterprise customers acknowledge the fact that there's friction when they're deploying their datacenter security architectures, specifically network security tools, just because of the architectural friction and the fact that, it's really interesting, you know, a lot of those are really built because everything's tightly coupled into them, but in the public cloud, a lot of your policy enforcement comes from the native services. So, for instance, your segmentation policy, the route tables actually get put into the, when you're creating the networking environment. So the security tools, a network security tool, has to work in conjunction with those native services in order to build architectures that are truly compliant. >> So is firewall even the right name anymore? Should it have a different name, because really, we always think, all right, firewall was like a wall. And now it's really more like this layered risk management approach. >> There's definitely a belief, you know, among especially the cloud security evangelists, to make sure people don't think in terms of perimeter. You don't want to architect in something that's brittle in something that's meant to be truly elastic. I think there's kind of two, you know the word firewall is expanding, right, so more and more customers are now embracing web application firewalls because the applications are developing are port 80 or 443, they're public-facing web apps, and those have a unique set of protections into them. And then next-generation firewalls still provide ingress/egress policy management that the native platforms don't offer, so they're important tools for customers to use for compliance and policy enforcement. They key is just getting customers to understand thinking through specifically which controls they're trying to implement and then architect the solutions to embrace the public cloud they're playing in. So, if they're in Azure, they need to think about making sure the tools they're choosing are architected specifically for the Azure environment. If they're using AWS, the same sort of thing. Both those companies have programs where they highlight the vendors that have well-architected their solutions for those environments. So Barracuda has, you know, two security competencies, there's Amazon Web Services. We are the first security vendor for Azure, so we were their Partner of the Year. So the key is just diving in, and there's no silver bullet, just re-architecting the solutions to embrace the platforms you're deploying on. >> What's the biggest surprise to the security people at the company when they start to deploy stuff on a public cloud? There's obviously things they think about, but what do they usually get caught by surprise? >> I think it's just the depth and breadth of the services. There's just so many of them. And they overlap a little bit. And the other key thing is, especially for network security professionals, a lot of the tools are made for software developers. And they have APIs and they're tooling is really built around software development tools, so if you're not a software developer, it can be pretty intimidating to understand how to architect in the controls and especially to leverage all these native services which all tie together. So it's just bridging those two worlds, you know, software development and network security teams, and figuring out a way for them to collaborate and work together. And our advice to customers have been, we've seen comical stories for those battles between the two. Those are always fun to talk about, but I think the best practice is around getting, instead of security teams saying no, I think everybody's trying to get culturally around how do I say yes. Now the burden can be back to the software development teams. The security teams can say, here the list of controls that I need you to cover in order for this app to go live. You know, HIPAA or PCI, here are these compliance controls. You guys chose which tools and automation frameworks work as part of your CI/CD pipeline pr your development pipeline, and then I'll join your sprints and you guys can show incrementally how we're making progress to those compliance. >> And how early do they interject that data in kind of a pilot program that's on its way to a new production app? How early do the devs need to start baking that in? >> I think it has to be from day zero, because as you embrace and think through the service, and the native services you're going to use, depending on which cloud provider, each one of those has an ecosystem of other native services that can be plugged in and they all have overlapping security value, so it's kind of thinking through your security strategy. And then you can be washed away by all the services, and what they can and can't do, but if you just start from the beginning, like what policies or compliance frameworks, what's our risk management posture, and then architect back from that. You know, start from the end mine and then work back, say hey, what's the best tool or services I can instrument in. And then, it may be, starting with less cloudy tools, you know, just because you can instrument in something you know, and then as you build up more expertise, depending on which cloud platform you're on, you can sort of instrument in the native services that you get more comfortable with then. So it's kind of a journey. >> You got to start from the beginning. Bake it in from the zero >> Got to be from the zero. >> It's not a build-on anymore. All right Tim, last question. What are we looking forward to at RSA this week? >> I'm very cloud-biased, you know, so I'm always looking at the latest startups and how creative people are about rethinking how to deploy security controls and just kind of the story and the pulse around the friction with public cloud security and seeing that evolve. >> All right, well I'm sure there'll be lots of it. It never fails to fascinate me, the way that this valley keeps evolving and evolving and evolving. Whatever the next big opportunity is. All right, he's Tim Jefferson, I'm Jeff Frick, thanks for stopping by. You're watching theCUBE. We're at RSAC 2018 in San Francisco. Thanks for watching. (upbeat techno music)

Published Date : Apr 18 2018

SUMMARY :

Announcer: From downtown San Francisco, it's theCUBE. Tim, great to see you. Absolutely, so you worked for Amazon for a while, for AWS, And the great biggest friction point tend to be around is just the massive scale that Amazon and the other and a lot of the security architecture's really built around developers now own the infrastructures they're deploying on. the high-level outcomes of that survey. just because of the architectural friction and the fact So is firewall even the right name anymore? just re-architecting the solutions to embrace So it's just bridging those two worlds, you know, and the native services you're going to use, Bake it in from the zero What are we looking forward to at RSA this week? the story and the pulse around the friction with Whatever the next big opportunity is.

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
Tim JeffersonPERSON

0.99+

Jeff FrickPERSON

0.99+

AmazonORGANIZATION

0.99+

AWSORGANIZATION

0.99+

JamesPERSON

0.99+

James HamiltonPERSON

0.99+

Barracuda NetworksORGANIZATION

0.99+

Amazon Web ServicesORGANIZATION

0.99+

San FranciscoLOCATION

0.99+

TimPERSON

0.99+

443OTHER

0.99+

oneQUANTITY

0.99+

BothQUANTITY

0.99+

twoQUANTITY

0.99+

GoogleORGANIZATION

0.98+

over 90%QUANTITY

0.98+

40,000 plus peopleQUANTITY

0.97+

each oneQUANTITY

0.97+

Security 101TITLE

0.97+

RSAC 2018EVENT

0.96+

both worldsQUANTITY

0.96+

port 80OTHER

0.96+

AzureTITLE

0.96+

egressORGANIZATION

0.96+

this weekDATE

0.96+

RSA Conference 2018EVENT

0.94+

RSAORGANIZATION

0.94+

BarracudaORGANIZATION

0.94+

ingressORGANIZATION

0.93+

HIPAATITLE

0.89+

single sourceQUANTITY

0.88+

first securityQUANTITY

0.87+

downtown San FranciscoLOCATION

0.85+

two worldsQUANTITY

0.84+

day zeroQUANTITY

0.84+

two security competenciesQUANTITY

0.81+

my rolesQUANTITY

0.74+

AzureORGANIZATION

0.72+

RSA North AmericaORGANIZATION

0.71+

theCUBEORGANIZATION

0.69+

RSA North America 2018EVENT

0.62+

2018DATE

0.58+

TuesdayEVENT

0.57+

zeroQUANTITY

0.5+

NightsDATE

0.44+

Dave Frampton, SumoLogic | RSA North America 2018


 

>> Narrator: From downtown San Francisco, it's theCUBE, covering RSA North America 2018. >> And welcome back everybody, Jeff Frick here with theCUBE. We're at the RSA Conference in San Francisco, it's 40 thousand plus people talking security, really one of the biggest conferences in San Francisco, and security continues to be an ever increasing and important topic, and more and more complex and complicated and multifaceted. We're excited to have really an innovator who just recently sold his company to Sumo Logic, he's Dave Frampton, VP of security solutions now at Sumo Logic. Dave, great to see you. >> Dave: Good to be here. >> So you guys were relatively a relatively small team working on a very specific piece of this giant pie. So, tell us a little bit about what you're doing and what attracted Sumo Logic to you. >> FactorChain, acquired by Sumo Logic in Q4 of last year was focused on building an investigation platform to really help security analysts very quickly and completely identify, for an individual threat or alert of which they get an avalanche every day, what happened, where did it spread, and then what should be done about it, more importantly. >> It's funny 'cause we talk often, at all these conferences, right, everybody in the keynote will talk about it, "six months before you know you've been breached", or two years, or whatever the average, it changes all the time. But nobody ever really talks about once you've figured it out, then what? So that's really what you guys are about, the "then what?" So what are some of the things that people do wrongly, and what are some of the immediate triage and best practices that people should be aware of if they're not already? >> It's a great question, there's really a difficult work flow that exists when you start digging into one of these indicators of compromise or alerts, typically an analyst is trying to connect the dots across huge numbers of systems and huge data sets. They may have to go to five to ten different systems, run queries which take a long time to run and then take a long time to interpret, kind of stitch together the clues across all of them, and this process can often take 30 minutes, an hour, or even two hours against an inflow rate of hundreds of these per day. So there's sort of this expanding backlog of uninvestigated urgent threats. In many cases, people only get to about 10% of the most urgent threats or alerts that come in to their security operation center, or SOC. And FactorChain's innovation was to develop some new techniques to help human analysts quickly connect the dots across these huge data sets. Integrate a lot of those different systems, so you can go to one place, see huge, deep connections between data sets, and then kind of put it all together in a very concise work flow that helps you get through this process just a lot faster, a lot more skilled. >> So are you identifying patterns of past behavior, 'cause you have a database of how these things work, are you looking for consistency of behavior within one system in others, I mean, what are some of the, obviously you're not going to tell us your secret sauce, but what are some of the tricks and tips that enable you to speed up that process? It's scary to hear that they have hundreds of high priority that they can't get to. >> There's two main components of trying to accelerate this whole work flow. The first one is trying to help analysts very quickly get insight into how variables change in an environment. This investigation process is little bit like a game of whack-a-mole, you're following a particular user or particular machine, but then the name will change, and then there'll be another variable introduced but it will change four times, and you're left to try to figure out which one of these changes map to the original. This process just repeats over and over again. So part of our insight was to try to figure out how to chain, hence the name FactorChain, all of these variable changes together in a very, very concise way, so you can help the analyst find the right path through the data and ignore all the false trails, get back on the trail when they lose the trail. So it's really sort of a data navigation and insight, sort of the key core of FactorChain's innovation. >> So a big factor, shouldn't use that word again, but we'll use it again, factor happening today in the industry is everything going to cloud, right? A huge percentage of business going to cloud. AWS is up to 20 billion dollar run rate and Sumo is a big partner, and Microsoft and Google are trying to catch up from behind, and IBM's got a cloud. So cloud's a big thing and there's more and more cloud. Also, we're in this API economy now, so whether I want to use public data sets and inject those into my processes, or I've got partners that I'm, I'm connecting all these things via API's and I still have my on-prem stuff, or the stuff that just can't go to cloud or legacy for whatever reason. So the environment is becoming way more complex, the number of third party people that you're playing nice with is becoming much, much larger, and a lot of these connections are completely automated, right, when you look at ad tech and some of the financial trading systems. So how does that increasing complexity play into what you guys are doing? >> The migration to the cloud is putting enormous disruptive pressure on some of these traditional security processes. You think about, the old world involved a security operations center and a small team of analysts just going through this list of alerts that were sent in by their infrastructure. The cloud really challenges that in two fundamental ways. I think one of them you hit really well in your description of it, which is just the sheer surface area of possible attack has increased so dramatically. You hit all the key points, there's automated processes, there's a lot of customer facing and production security that didn't exist in the old worlds, so you have so many more ways for the attackers to get in. But importantly, there are new sources of information which are critical to actually orchestrating the defense, to figuring out what to pay attention to and how to pay attention to it. Application layer information is much more relevant in a cloud context. And you have a lot of the infrastructures being standardized underneath, but a lot of the interesting insight might be from the application. Is this a customer or is it a partner? Is it a sensitive piece of information or application, or not? There's all sorts of context which needs to be brought in to the forensic process to help the investigators really get to the bottom of what happened and where did it spread. There's also a need to collaborate across security and other functions in IT in a much more seamless, horizontal way. A typical example would be an analyst in the SOC might understand an awful lot about security forensics but may not really understand some of this application context or even how to interpret some of the application logs at all. So you really need a horizontal collaboration involving IT operations, you hear a lot about DevOps and sort of DevSecOps, you need a much more collaborative work flow, not just a common data set, which I think everybody recognized a few years back, but also common analytics and a common work flow, common tooling that they can collaborate in the same system on the same investigation. And so those are the ways in which the traditional security industry and the boundaries around its processes and its tools are really being challenged and disrupted by the migration to the cloud, and at Sumo Logic, this is sort of at the center of where we live. We live in a world where people are rapidly migrating to the cloud, looking for monitoring and troubleshooting and security analytics, functionality. As they do that, looking at modern applications and how their architectures are changing and what implications that has for security. So we have our sights squarely set on sort of creating that new model for that new cloud-oriented environment. >> Right, and then how much do you work with other applications, which I guess in the past may have been thought of as competitive, but when you're in an environment with all these integrated systems at a customer, and there's probably tremendous benefit to sharing some level of information in terms of the signature of threats and when threats are coming in. I'm sure there's ton of great data that, if shared across people on the good side of the fence, will probably be to the benefit of all. So has that been changing, is that evolving, how do you see kind of working with other apps within, let's just pick the AWS cloud for example, within a particular customer, whether it's AWS directly or other partners in the ecosystem? >> Right, well first, you hit it, I mean, this function of security operations has to be agnostic, right? You have to be open to ingesting context from whichever system and whichever vendor and whatever source it might come from. And so these ecosystems are really important, and integration so that you can quickly, not only take in information from third parties, but then quickly get trending and visualization and really bring insight to that data. And so to that end, Sumo Logic's a leader in the AWS ecosystem, we've been built from the ground up on AWS, and we have rich partnerships with the vast majority of the ecosystem of tools that surround the AWS environment. So we can bring that in and very quickly deliver insight, make correlations, figure out what you need to pay attention to, and then do this investigation work flow that we were talking about earlier. >> Alright, crazy times. So, 40 thousand people here, what are you looking forward to for the next couple of days here at RSAC? >> I think a couple of things. One is, I think everyone is focused, right now, on the upcoming deadline for GEPR, and sort of data protection, data privacy, how do we identify within our data what might be subject to some of these regulations and new compliance requirements, and then how many of those overlap. Though the best of intentions, it creates some dilemmas about how to approach problems, such as for example, right to be forgotten. And I think seeing the community come together and sort of in a live venue, which is really what the show is all about, and kind of discuss and debate those issues, I think that's one. Two is the center of what we've been talking about, is the impact of modern application architectures and cloud on some of these old, traditional security practices and models. And that's why we have a bigger presence this year at the show, because we think that's something that is going to change the way things have been done in the security industry, and we want to be a part of that conversation and obviously giving previews of our upcoming products that address some of those problems. Looking forward to a good week. >> Should be good of a week for you, be busy. >> Dave: Absolutely. >> Thanks for taking a few minutes, and again congratulations on the acquisition with Sumo, great marriage I'm sure, and look forward to following the story. >> Thanks so much. >> Alright, he's Dave Frampton, I'm Jeff Frick. You're watching theCUBE from RSAC 2018 San Francisco. Thanks for watching.

Published Date : Apr 18 2018

SUMMARY :

it's theCUBE, covering RSA North America 2018. and security continues to be an ever increasing and what attracted Sumo Logic to you. and then what should be done about it, more importantly. and what are some of the immediate triage and best practices and then take a long time to interpret, that enable you to speed up that process? and ignore all the false trails, in the industry is everything going to cloud, right? and disrupted by the migration to the cloud, Right, and then how much do you work and integration so that you can quickly, So, 40 thousand people here, what are you looking forward to Two is the center of what we've been talking about, and again congratulations on the acquisition Thanks for watching.

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
MichielPERSON

0.99+

AnnaPERSON

0.99+

DavidPERSON

0.99+

BryanPERSON

0.99+

JohnPERSON

0.99+

IBMORGANIZATION

0.99+

MichaelPERSON

0.99+

ChrisPERSON

0.99+

NECORGANIZATION

0.99+

EricssonORGANIZATION

0.99+

KevinPERSON

0.99+

Dave FramptonPERSON

0.99+

MicrosoftORGANIZATION

0.99+

Kerim AkgonulPERSON

0.99+

Dave NicholsonPERSON

0.99+

JaredPERSON

0.99+

Steve WoodPERSON

0.99+

PeterPERSON

0.99+

Lisa MartinPERSON

0.99+

NECJORGANIZATION

0.99+

Lisa MartinPERSON

0.99+

Mike OlsonPERSON

0.99+

AmazonORGANIZATION

0.99+

DavePERSON

0.99+

Michiel BakkerPERSON

0.99+

FCAORGANIZATION

0.99+

NASAORGANIZATION

0.99+

NokiaORGANIZATION

0.99+

Lee CaswellPERSON

0.99+

ECECTORGANIZATION

0.99+

Peter BurrisPERSON

0.99+

OTELORGANIZATION

0.99+

David FloyerPERSON

0.99+

Bryan PijanowskiPERSON

0.99+

Rich LanePERSON

0.99+

KerimPERSON

0.99+

Kevin BoguszPERSON

0.99+

Jeff FrickPERSON

0.99+

Jared WoodreyPERSON

0.99+

LincolnshireLOCATION

0.99+

KeithPERSON

0.99+

Dave NicholsonPERSON

0.99+

ChuckPERSON

0.99+

JeffPERSON

0.99+

National Health ServicesORGANIZATION

0.99+

Keith TownsendPERSON

0.99+

WANdiscoORGANIZATION

0.99+

GoogleORGANIZATION

0.99+

MarchDATE

0.99+

NutanixORGANIZATION

0.99+

San FranciscoLOCATION

0.99+

IrelandLOCATION

0.99+

Dave VellantePERSON

0.99+

Michael DellPERSON

0.99+

RajagopalPERSON

0.99+

Dave AllantePERSON

0.99+

EuropeLOCATION

0.99+

March of 2012DATE

0.99+

Anna GleissPERSON

0.99+

SamsungORGANIZATION

0.99+

Ritika GunnarPERSON

0.99+

Mandy DhaliwalPERSON

0.99+

Edna Conway, Cisco | RSA North America 2018


 

>> Announcer: From downtown San Francisco, it's theCUBE covering RSA North America 2018. >> Hey welcome back everybody, Jeff Frick here with theCUBE. We're in San Francisco at RSA conference 2018, as 40,000 plus professionals talking about security. It's quickly becoming one of the biggest conferences that we have in San Francisco right up there with Oracle OpenWorld and Salesforce.com, pretty amazing show and we're excited to get some of the insight with some of the experts that are here for the event and all the way from the East Coast, from New Hampshire Edna Conway's joining us, she's a chief security officer, global value chain for Cisco, Edna great to see you. >> Oh I'm delighted to be here Jeff, thank you. >> Absolutely so we're glad to get you out of the 21 degree weather that you said was cold and sleety when you departed. >> Cold and sleety, spring in New Hampshire, although it's not much nicer here in San Francisco. >> No, it's a little dodgy today. Well anyway let's jump into it. So you're all about value chain. What exactly when you think about value chain, explain to the people, what are you thinking? >> You know that's a great question because we define the value chain as the end to end life cycle for any solution. So it could be hardware, it could be software, it could be a service, whether it's a service afforded by a person, or a service afforded by the cloud. >> Now it's interesting because the number of components in a solution value chain just continue to grow over time as we have the API economy, and clouds, and all these things are interconnected so I would imagine that the complexity of managing and then by relation securing that value chain must be getting harder and harder over time as we continue to add all these, kind of API components to the solution. Is that what you see in the field? >> I think there's a challenge there without a doubt, but sometimes that interconnection actually gives you a hook in right, and so what we've been thinking about for years now is, is there a way to actually define a simple high level architecture that can be flexible and elastic with some rigidity that allows you to identify what your core goals are, and then allows those third party ecosystem members to join you in the effort to achieve those goals in a way that works for their business. >> Right and then how does open source play in that? Because that's also an increasing component of the value chain, is that integrated into more and more either just overtly, or you're implementing an open source solution or you've got all these people that are kind of open source plus and what they're building and delivering to the market. >> Yeah open source is a great challenge without a doubt. I think the way in which to deal with open source is to understand where you're getting it from, just like all third party ecosystem members. Who are they? What are they doing for you? And more precisely how are you going to utilize them and take a risk based approach to where you're embedding them. >> Right. >> Right. Not all things are created equally. And so your worry needs to be different depending on the utilization. >> Right. The risk based approach is a great comment because cause security in a way to me is kind of like insurance, you can't be ultimately secure unless you just lock the doors and sit in there by yourself. So it's always kind of this risk trade off, benefit versus trade off, and really a financial decision as to how much do you want to invest in that next unit of security relative to the return. So when you're thinking about it from a risk modeling basis versus just, you know, we're putting up the moat and nobody's coming in, which we know doesn't work anymore. What are some of the factors to think about so that you're achieving the right level of success at the right investment? >> I think there are a number of things to think about, and the primary one I would say is, look at what I believe is the currency of the digital economy which is trust. And in order to build trust what you need to do is understand the risks that you're taking. And those risks need to measured in the language of business. So all of a sudden, it becomes really clear when you know what someone is doing for you, and you know how they're doing it, and the invasiveness of your inquiry and partnership with them actually needs to be adjusted, and all of a sudden you develop not only a baseline, but an opportunity to enhance your trust for, let's take an example. So Cisco's working with Intel, we're going to deploy Intel threat detection technology, our first instantiation of that will be tetration. Clearly they're a third party ecosystem member. >> Right, right. >> And they have been for some time. Now what we're thinking about is how does Intel go about deploying that capability? And not only that, but how are we going to utilize it? And our view is if you take CPU telemetry and you combine it with our edge as well as our network telemetry, you have a better solution down the road, better solution for alerts, better solution for quicker decisions for the inevitable. That risk based approach says we're embedding into and partnering at a core solution level. >> Right. >> That's a different area of inquiry then somebody, we were talking earlier and I said, you know, if you're a sheet metal provider on the external part of a chassis, great. >> Don't they love the diligence on that piece? >> Quality due diligence, but security limited, yeah? >> So but it's interesting because on one hand you're opening up kind of new kind of threat surfaces if you will, the more components that are in a solution from the more providers. On the positive side, now you're leveraging their security expertise within the components that they're bringing to the solution. So as most things in life right, it's really kind of two sides of the same coin, opening up more threats, but leveraging another group of resources who have an expertise within that piece of the value chain. >> Absolutely. Look none of us make something from nothing, you know, the reality is we're relying more and more on the digital economy on those third parties. So understanding precisely how they're doing something is important, but we also have to be respectful of one another's intellectual property. And that is a unique wrinkle in a day and age of integration that we haven't seen previously. The other thing I think that's really important is we're seeing a wonderful, I think explosion of IOT, there's a downside obviously, the question is have folks deployed their IOT in a way that included the security community. You should have security at the table, but what IOT does is give you edge visibility that you've never had before. So I see it as a positive, but it needs to be informed by things like AI, it needs to be informed by things like machine learning, and they need to be gates within at the end of the day where the information is managed, which is at the network. >> Right, cause again it's just another entry point in as well, so good thing, bad thing. I want to circle back on kind of the boardroom discussion that we talked about a little bit earlier. Everyone's talking about securities and board conversation, clouds and board conversation, a lot of these big, kind of IT transformational things that are happening are now being elevated to the board cause everybody's a digital company and everybody's a digital business. When you want to talk to the board, and how should people talk to the board about security vis a vis kind of this risk analysis versus just a pure, you know, we're secure, or we're not secure, and I'm sure every CEO and board is worried for that announcement to come out in the paper that they were breached some time ago. And you almost think it's inevitable at some point in time, so what does the board discussion look like? How's the board decision changing as security gets elevated beyond kind of the basics? >> So let me answer that in the context of value chain security. >> Absolutely. >> I think we need to get to the point where security speaks the language of business. We need to walk into the board and say we have an architecture, we are deploying measures to achieve the architecture at a certain level of compliance and goal setting across the ecosystem on a risk based approach. Fabulous words, I'm a board member. What does that mean to me? >> Help me, help me, gimme a number. Exactly, well, and the number comes out of tolerance levels. So if you have this architecture and you have goals set we have 11 domains, we set goals flexibly based on the nature of the third party and what they do for us. Now we have a tolerance level and guess what you can report? I'm at tolerance, I'm above tolerance, I'm below tolerance. And if you start to model through a variety of techniques, there are a number of standards out there and processes some folks have written about them, where you can translate that risk of tolerance into dollars if you're in the US or currency of your choice and the reality is you're walking in and saying at tolerance means this degree of risk, below tolerance means I've reduced my risk to this. It might afford you an opportunity to say hmmm, perhaps you can share some of that benefit with me to take the program to a new level. >> Right, right or in a different area. >> About tolerance, higher degree of risk, what do we do about it? Now you're speaking the language of business. >> So that's pretty old school business right? I want to talk to you about something that's a little bit newer school which is block chain. And you've used the word trust I don't know how many times in this interview, we'll check the transcript, but trust is a really important thing obviously, and some people have said that they view block chain as trust as a service. I'm just curious to get your perspective as we hear more and more about block chain, and big companies like IBM and a lot of companies are putting a bunch of resources behind it, where do you see block chain fitting? What is Cisco's position or I don't know if they have a official position yet as block chain now is introduced into this world of trust. >> So I think we're all looking at it, Cisco included block chain is an incredibly useful tool without a doubt. I'm not sure that block chain's going to solve world hunger or world peace. >> Shoot. >> However, just as we said trust has elements of use artificial intelligence to inform your decisions, achieve a higher degree of trust, what you can have is a set of let's say, hashes, date and time stamps, as something passes through the network because remember, if the currency is trust the integrity of the data is the fuel that allows you to earn trust. And digital, digital ledger technology or block chain is something that I think allows us to develop what I call a passport for the data. So we have a chain of custody, you know I'm an old homicide prosecutor from many, many, years ago chain of custody was important in the trial so too chain of custody of your data and your actions across the full spectrum of a life cycle add a degree of integrity we've never had the ability to do easily before. >> Interesting times. >> Alright Edna well thank you for spending some of your day with us, I'm sure you have a crazy, busy RSA planned out for the next couple days so thanks again. >> My pleasure, thank you so much for having me. >> Alright she's Edna Conway, I'm Jeff Frick. You're watching theCUBE from RSA Conference 2018 thanks for watching. (theme music)

Published Date : Apr 18 2018

SUMMARY :

Announcer: From downtown San Francisco, it's theCUBE and all the way from the East Coast, from New Hampshire Absolutely so we're glad to get you out of the 21 degree Cold and sleety, spring in New Hampshire, explain to the people, what are you thinking? or a service afforded by the cloud. Is that what you see in the field? to join you in the effort to achieve those goals of the value chain, is that integrated into more and more And more precisely how are you going to utilize them depending on the utilization. What are some of the factors to think about so that you're And in order to build trust what you need to do And our view is if you take CPU telemetry and you combine we were talking earlier and I said, you know, On the positive side, now you're leveraging their security Look none of us make something from nothing, you know, beyond kind of the basics? So let me answer that in the context of of compliance and goal setting across the ecosystem and the reality is you're walking in and saying Now you're speaking the language of business. I want to talk to you about something that's a little bit I'm not sure that block chain's going to solve the integrity of the data is the fuel that allows you Alright Edna well thank you for spending Alright she's Edna Conway, I'm Jeff Frick.

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
IBMORGANIZATION

0.99+

EdnaPERSON

0.99+

Jeff FrickPERSON

0.99+

CiscoORGANIZATION

0.99+

JeffPERSON

0.99+

Edna ConwayPERSON

0.99+

San FranciscoLOCATION

0.99+

21 degreeQUANTITY

0.99+

New HampshireLOCATION

0.99+

two sidesQUANTITY

0.99+

USLOCATION

0.99+

11 domainsQUANTITY

0.99+

40,000 plus professionalsQUANTITY

0.99+

todayDATE

0.99+

RSAORGANIZATION

0.98+

Salesforce.comORGANIZATION

0.98+

RSA conference 2018EVENT

0.97+

Oracle OpenWorldORGANIZATION

0.96+

oneQUANTITY

0.96+

IntelORGANIZATION

0.93+

RSA Conference 2018EVENT

0.92+

first instantiationQUANTITY

0.92+

East CoastLOCATION

0.9+

RSA North America 2018EVENT

0.82+

theCUBEORGANIZATION

0.68+

couple daysDATE

0.62+

yearsQUANTITY

0.56+

America 2018EVENT

0.46+

yearsDATE

0.45+

NorthLOCATION

0.4+

Patrick Williams, North Carolina State University | Dell EMC World 2017


 

>> Announcer: Live from Las Vegas, it's The Cube covering Dell EMC World 2017 brought to you by Dell EMC. >> Welcome back here on The Cube, the Flagship broadcast of SiliconANGLE TV. We rap up our coverage today, day two of Dell EMC World 2017. We're live in Las Vegas. I'm John Walls along with Rebecca Knight and joining us now all the way from Tobacco Road Patrick Williams, who is the IT Infrastructure Architect at North Carolina State University in beautiful Raleigh, North Carolina. Patrick, thank you for joining us. >> Thank you. >> Tell us first of all, you know, academically, you're the first, somebody from that community that we have a chance to speak with over the past two days. What are you seeing here that you are going to find of interest that you might want to take back with you to Raleigh, that maybe you're going to put into practice? >> Right, so we're really taking a look at the technologies that we have in play, and there's been a lot of new announcements at the conference this year, so we have Unity Storage, we have Data Domain and there's been announcements pretty much across that product spectrum, so we've been looking, going to breakout sessions talking to the experts and trying to take a look at the technology and see how we can take advantage of the new features that are offered in our environment. >> So before the cameras were rolling, you were setting the scene a little bit and describing the kinds of data needs, security needs that you have for a busy, thriving, and large college campus. Can you lay that out for our viewers? >> Right so for a college campus, one of the biggest concerns is around security, so there's a mandate or desire, probably as part of the academic culture to be as open as possible because the goal is to exchange ideas and to share resources between the university and across our set of institutions. So contrast that with the reality that we have to maintain a high level of security now, so there's obviously a lot of incidents. We are a Google Mail university and as you know, there was recently an attack on Gmail, right? So one of the things that we've had to do is to say, "We're going to implement Two Factor Authentication. "We're going to develop a classification system "around how we assess and manage data," so depending on the category, there's different levels of security that are in put in place in our (mumbles) environment, while also trying to remain as open as possible. >> So you have a lot of competing interests, it seems, in trying to balance those interests, is how much of your job? >> 100%. (laughing) Yeah, so what I would say is that in order to be able to get proposals forward, I have to be able to make the case on all sides of the equation, so I have to make the correct academic case. I have to make the correct business case. I have to make the correct cultural case and if I can make those cases coincide, then we can succeed and move things forward and get proposals. >> 'Cause you're saying that at NC State, it's not central IT. You're in IT, but there are some more schools that have options, they can make their own decisions, and so I would think coordination, integration, are not barriers, but certainly challenges. >> That's right, so we are, we call ourselves a central IT group; however, there is no mandate for each of the colleges to use central IT services, so our goal is to create kind of a foundational set of services that the consumers then in come and build on top of rather than building their own resources and we like to see that grow kind of organically rather than to mandate it, use of central services, and we've actually had great success. So we've had a lot of resources to come back from the edge into the central folds and be able to grow that centrally, put a higher level of resiliency on top of those services and satisfy our customers. >> In terms of one of the challenges, though, cost is a huge one, and then making sure that things do come within budget and not a penny over. Can you talk a little bit about some of those obstacles and how you've overcome them? >> Right, so cost is everything for us. Our budgets have been flat for the past three years, but the demand for growth in capacity and existing environments and the demand for new services is ongoing. What we've been able to do is to work really hard on assessing our resources. We've implemented Cloud IQ a year ago when it was first announced to get a kind of a long-term view of our environment and kind of track our growth, and that has enabled us to put the right data in the appropriate tier and be able to maximize our investment and that's really helped us be able to continue to grow our environments as we move forward. >> When you're talking about the different clients or constituencies you're trying to please: you've got the students, the faculty, the administration, and the staff, what do students want, what do faculty want, and how do you give them what they want? >> That's right. So students, is really interesting because the student perspective has really changed over the past couple of years and it caught us off-guard. We have a pervasive data network on our campus. We have all the dorms wired. We have about 21,000 students total. About 8000 stay on campus. All those dorms were hard-wired, but we did not have wifi enabled in all the dorms and we survey students every year. Last year we surveyed them and we got very bad marks because that, even a jack was not enough for them. If you look at what you typically show up with now, how many devices have a hard-wired jack, none, right? So they show up with four devices. They couldn't use any of them on our data network and their response on the survey was, the one that I remember the most was, "Our lives depend on wifi," that was the quote. >> Of course. >> We, of course, immediately went and looked at how we roll out 4000 access points right away. We did that over a summer. That was able to succeed. We also have a very unique set of challenges in that because I mentioned that, we only have 4000 students, slightly more than that, that stay on campus. The majority of them move back and forth between classes so 10 AM when 5000 people walk by one access point. >> When they've just woken up. >> That's right. >> 10 AM. >> Or log in to check their email, et cetera. So those are unique challenges so what we had to do is what are the tools to track the application resources? What's normal application performance? What's a normal peak and what's a breakout that's outside of the normal, and how do we profile that and we want to be well ahead of the demand so that we can put those resources in place ahead of the need. >> So what do you do about the challenge of future deployments? Your budget's going to be somewhat constrained. You know your needs are increasing. You know your constituents have new and growing demand. So, I mean, tough nut to crack, isn't it? You're trying to make your cloud strategy. What are you going to do with that? The 4GG server coming on board now, how do you find, or how do you balance that from the academic perspective? >> You mentioned that and also I didn't mention that one of our data centers is aging and so on top of all that, we're also starting to see, put a strain on our data center resources. What we really hope to be able to do is to leverage some type of a hybrid cloud strategy. The challenge for us has been, what is our application profile? If you look at applications that are a great fit in cloud and applications that are not a great fit in cloud, the traditional backend applications, the core infrastructure applications are not necessarily a great fit, and so what we're trying to figure out is what is the best hybrid solution that will help you move our environment forward and still leverage existing resources. >> So looking ahead, what does the college campus of the future, the technology-enabled college campus of the future look like? Give us a picture. >> I think one of the best examples i can give is our Hunt Library, so we opened a new library on what we call our Centennial Campus a few years ago. It was designed from the ground up as kind of a new model of what does the next generational library look like because it's not, if you think of a library now, you don't think of a traditional, okay, here's a building and stacks and stacks and stacks of books. So they put the books off in a corner and there is a large robotic library that's designed to handle the books and the bulk of it is about collaborative spaces, so there are high-end collaborative work stations, consolidated areas. There are students that are in the design school. If you want to go and practice your DJ skills, you can do that there as well, so that's where things are really headed. >> So Patrick, before we let you go, my final question is, when are you going to beat Carolina and Duke at basketball? >> We're waiting, so we have that US Championship banners from the '80s and I'm tired of looking at that, so we're really looking forward to-- >> Those days are long-gone. >> Right. >> Right, Patrick Williams, NC State, thank you for being with us here on The Cube. Safe travels back home and continued success at Raleigh. >> Thank you. >> Appreciate the time. >> Alright. >> Good. That raps it up here on The Cube, day two is in the books. We'll see you back here tomorrow morning at 11:30 central time, that's 2:30 on the East Coast, for more interviews live from Las Vegas, until then. For Rebecca Knight, I'm John Walls. Have a good night.

Published Date : May 10 2017

SUMMARY :

brought to you by Dell EMC. the Flagship broadcast of SiliconANGLE TV. that you might want to take back with you to Raleigh, and see how we can take advantage of the new features and describing the kinds of data needs, So one of the things that we've had to do is so I have to make the correct academic case. and so I would think coordination, integration, of the colleges to use central IT services, In terms of one of the challenges, though, and existing environments and the demand enabled in all the dorms and we survey students every year. We did that over a summer. so that we can put those resources in place So what do you do about the challenge and so on top of all that, we're also starting to see, of the future, the technology-enabled college campus There are students that are in the design school. thank you for being with us here on The Cube. We'll see you back here tomorrow morning at 11:30

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
Rebecca KnightPERSON

0.99+

PatrickPERSON

0.99+

John WallsPERSON

0.99+

Las VegasLOCATION

0.99+

Patrick WilliamsPERSON

0.99+

10 AMDATE

0.99+

Dell EMCORGANIZATION

0.99+

Last yearDATE

0.99+

5000 peopleQUANTITY

0.99+

4000 studentsQUANTITY

0.99+

4000 access pointsQUANTITY

0.99+

DukeORGANIZATION

0.99+

CarolinaORGANIZATION

0.99+

Tobacco RoadLOCATION

0.99+

oneQUANTITY

0.99+

RaleighLOCATION

0.99+

North Carolina State UniversityORGANIZATION

0.99+

a year agoDATE

0.99+

firstQUANTITY

0.99+

2:30DATE

0.98+

about 21,000 studentsQUANTITY

0.98+

this yearDATE

0.98+

Raleigh, North CarolinaLOCATION

0.98+

Google MailORGANIZATION

0.98+

four devicesQUANTITY

0.98+

one access pointQUANTITY

0.98+

East CoastLOCATION

0.98+

SiliconANGLE TVORGANIZATION

0.97+

todayDATE

0.96+

eachQUANTITY

0.95+

2017DATE

0.93+

About 8000 stayQUANTITY

0.92+

Dell EMC World 2017EVENT

0.92+

Hunt LibraryORGANIZATION

0.91+

tomorrow morning atDATE

0.91+

GmailTITLE

0.91+

few years agoDATE

0.9+

100%QUANTITY

0.88+

11:30 central timeDATE

0.88+

day twoQUANTITY

0.86+

NC StateORGANIZATION

0.84+

past couple of yearsDATE

0.84+

Cloud IQTITLE

0.84+

NCLOCATION

0.83+

Centennial CampusLOCATION

0.81+

4GGORGANIZATION

0.76+

Two FactorOTHER

0.75+

The CubeTITLE

0.74+

80sDATE

0.66+

The CubeORGANIZATION

0.64+

Unity StorageORGANIZATION

0.61+

past three yearsDATE

0.61+

past two daysDATE

0.61+

Dell EMC WorldORGANIZATION

0.6+

CubeORGANIZATION

0.57+

USEVENT

0.42+

CubeTITLE

0.29+

Robert Nishihara, Anyscale | AWS Startup Showcase S3 E1


 

(upbeat music) >> Hello everyone. Welcome to theCube's presentation of the "AWS Startup Showcase." The topic this episode is AI and machine learning, top startups building foundational model infrastructure. This is season three, episode one of the ongoing series covering exciting startups from the AWS ecosystem. And this time we're talking about AI and machine learning. I'm your host, John Furrier. I'm excited I'm joined today by Robert Nishihara, who's the co-founder and CEO of a hot startup called Anyscale. He's here to talk about Ray, the open source project, Anyscale's infrastructure for foundation as well. Robert, thank you for joining us today. >> Yeah, thanks so much as well. >> I've been following your company since the founding pre pandemic and you guys really had a great vision scaled up and in a perfect position for this big wave that we all see with ChatGPT and OpenAI that's gone mainstream. Finally, AI has broken out through the ropes and now gone mainstream, so I think you guys are really well positioned. I'm looking forward to to talking with you today. But before we get into it, introduce the core mission for Anyscale. Why do you guys exist? What is the North Star for Anyscale? >> Yeah, like you mentioned, there's a tremendous amount of excitement about AI right now. You know, I think a lot of us believe that AI can transform just every different industry. So one of the things that was clear to us when we started this company was that the amount of compute needed to do AI was just exploding. Like to actually succeed with AI, companies like OpenAI or Google or you know, these companies getting a lot of value from AI, were not just running these machine learning models on their laptops or on a single machine. They were scaling these applications across hundreds or thousands or more machines and GPUs and other resources in the Cloud. And so to actually succeed with AI, and this has been one of the biggest trends in computing, maybe the biggest trend in computing in, you know, in recent history, the amount of compute has been exploding. And so to actually succeed with that AI, to actually build these scalable applications and scale the AI applications, there's a tremendous software engineering lift to build the infrastructure to actually run these scalable applications. And that's very hard to do. So one of the reasons many AI projects and initiatives fail is that, or don't make it to production, is the need for this scale, the infrastructure lift, to actually make it happen. So our goal here with Anyscale and Ray, is to make that easy, is to make scalable computing easy. So that as a developer or as a business, if you want to do AI, if you want to get value out of AI, all you need to know is how to program on your laptop. Like, all you need to know is how to program in Python. And if you can do that, then you're good to go. Then you can do what companies like OpenAI or Google do and get value out of machine learning. >> That programming example of how easy it is with Python reminds me of the early days of Cloud, when infrastructure as code was talked about was, it was just code the infrastructure programmable. That's super important. That's what AI people wanted, first program AI. That's the new trend. And I want to understand, if you don't mind explaining, the relationship that Anyscale has to these foundational models and particular the large language models, also called LLMs, was seen with like OpenAI and ChatGPT. Before you get into the relationship that you have with them, can you explain why the hype around foundational models? Why are people going crazy over foundational models? What is it and why is it so important? >> Yeah, so foundational models and foundation models are incredibly important because they enable businesses and developers to get value out of machine learning, to use machine learning off the shelf with these large models that have been trained on tons of data and that are useful out of the box. And then, of course, you know, as a business or as a developer, you can take those foundational models and repurpose them or fine tune them or adapt them to your specific use case and what you want to achieve. But it's much easier to do that than to train them from scratch. And I think there are three, for people to actually use foundation models, there are three main types of workloads or problems that need to be solved. One is training these foundation models in the first place, like actually creating them. The second is fine tuning them and adapting them to your use case. And the third is serving them and actually deploying them. Okay, so Ray and Anyscale are used for all of these three different workloads. Companies like OpenAI or Cohere that train large language models. Or open source versions like GPTJ are done on top of Ray. There are many startups and other businesses that fine tune, that, you know, don't want to train the large underlying foundation models, but that do want to fine tune them, do want to adapt them to their purposes, and build products around them and serve them, those are also using Ray and Anyscale for that fine tuning and that serving. And so the reason that Ray and Anyscale are important here is that, you know, building and using foundation models requires a huge scale. It requires a lot of data. It requires a lot of compute, GPUs, TPUs, other resources. And to actually take advantage of that and actually build these scalable applications, there's a lot of infrastructure that needs to happen under the hood. And so you can either use Ray and Anyscale to take care of that and manage the infrastructure and solve those infrastructure problems. Or you can build the infrastructure and manage the infrastructure yourself, which you can do, but it's going to slow your team down. It's going to, you know, many of the businesses we work with simply don't want to be in the business of managing infrastructure and building infrastructure. They want to focus on product development and move faster. >> I know you got a keynote presentation we're going to go to in a second, but I think you hit on something I think is the real tipping point, doing it yourself, hard to do. These are things where opportunities are and the Cloud did that with data centers. Turned a data center and made it an API. The heavy lifting went away and went to the Cloud so people could be more creative and build their product. In this case, build their creativity. Is that kind of what's the big deal? Is that kind of a big deal happening that you guys are taking the learnings and making that available so people don't have to do that? >> That's exactly right. So today, if you want to succeed with AI, if you want to use AI in your business, infrastructure work is on the critical path for doing that. To do AI, you have to build infrastructure. You have to figure out how to scale your applications. That's going to change. We're going to get to the point, and you know, with Ray and Anyscale, we're going to remove the infrastructure from the critical path so that as a developer or as a business, all you need to focus on is your application logic, what you want the the program to do, what you want your application to do, how you want the AI to actually interface with the rest of your product. Now the way that will happen is that Ray and Anyscale will still, the infrastructure work will still happen. It'll just be under the hood and taken care of by Ray in Anyscale. And so I think something like this is really necessary for AI to reach its potential, for AI to have the impact and the reach that we think it will, you have to make it easier to do. >> And just for clarification to point out, if you don't mind explaining the relationship of Ray and Anyscale real quick just before we get into the presentation. >> So Ray is an open source project. We created it. We were at Berkeley doing machine learning. We started Ray so that, in order to provide an easy, a simple open source tool for building and running scalable applications. And Anyscale is the managed version of Ray, basically we will run Ray for you in the Cloud, provide a lot of tools around the developer experience and managing the infrastructure and providing more performance and superior infrastructure. >> Awesome. I know you got a presentation on Ray and Anyscale and you guys are positioning as the infrastructure for foundational models. So I'll let you take it away and then when you're done presenting, we'll come back, I'll probably grill you with a few questions and then we'll close it out so take it away. >> Robert: Sounds great. So I'll say a little bit about how companies are using Ray and Anyscale for foundation models. The first thing I want to mention is just why we're doing this in the first place. And the underlying observation, the underlying trend here, and this is a plot from OpenAI, is that the amount of compute needed to do machine learning has been exploding. It's been growing at something like 35 times every 18 months. This is absolutely enormous. And other people have written papers measuring this trend and you get different numbers. But the point is, no matter how you slice and dice it, it' a astronomical rate. Now if you compare that to something we're all familiar with, like Moore's Law, which says that, you know, the processor performance doubles every roughly 18 months, you can see that there's just a tremendous gap between the needs, the compute needs of machine learning applications, and what you can do with a single chip, right. So even if Moore's Law were continuing strong and you know, doing what it used to be doing, even if that were the case, there would still be a tremendous gap between what you can do with the chip and what you need in order to do machine learning. And so given this graph, what we've seen, and what has been clear to us since we started this company, is that doing AI requires scaling. There's no way around it. It's not a nice to have, it's really a requirement. And so that led us to start Ray, which is the open source project that we started to make it easy to build these scalable Python applications and scalable machine learning applications. And since we started the project, it's been adopted by a tremendous number of companies. Companies like OpenAI, which use Ray to train their large models like ChatGPT, companies like Uber, which run all of their deep learning and classical machine learning on top of Ray, companies like Shopify or Spotify or Instacart or Lyft or Netflix, ByteDance, which use Ray for their machine learning infrastructure. Companies like Ant Group, which makes Alipay, you know, they use Ray across the board for fraud detection, for online learning, for detecting money laundering, you know, for graph processing, stream processing. Companies like Amazon, you know, run Ray at a tremendous scale and just petabytes of data every single day. And so the project has seen just enormous adoption since, over the past few years. And one of the most exciting use cases is really providing the infrastructure for building training, fine tuning, and serving foundation models. So I'll say a little bit about, you know, here are some examples of companies using Ray for foundation models. Cohere trains large language models. OpenAI also trains large language models. You can think about the workloads required there are things like supervised pre-training, also reinforcement learning from human feedback. So this is not only the regular supervised learning, but actually more complex reinforcement learning workloads that take human input about what response to a particular question, you know is better than a certain other response. And incorporating that into the learning. There's open source versions as well, like GPTJ also built on top of Ray as well as projects like Alpa coming out of UC Berkeley. So these are some of the examples of exciting projects in organizations, training and creating these large language models and serving them using Ray. Okay, so what actually is Ray? Well, there are two layers to Ray. At the lowest level, there's the core Ray system. This is essentially low level primitives for building scalable Python applications. Things like taking a Python function or a Python class and executing them in the cluster setting. So Ray core is extremely flexible and you can build arbitrary scalable applications on top of Ray. So on top of Ray, on top of the core system, what really gives Ray a lot of its power is this ecosystem of scalable libraries. So on top of the core system you have libraries, scalable libraries for ingesting and pre-processing data, for training your models, for fine tuning those models, for hyper parameter tuning, for doing batch processing and batch inference, for doing model serving and deployment, right. And a lot of the Ray users, the reason they like Ray is that they want to run multiple workloads. They want to train and serve their models, right. They want to load their data and feed that into training. And Ray provides common infrastructure for all of these different workloads. So this is a little overview of what Ray, the different components of Ray. So why do people choose to go with Ray? I think there are three main reasons. The first is the unified nature. The fact that it is common infrastructure for scaling arbitrary workloads, from data ingest to pre-processing to training to inference and serving, right. This also includes the fact that it's future proof. AI is incredibly fast moving. And so many people, many companies that have built their own machine learning infrastructure and standardized on particular workflows for doing machine learning have found that their workflows are too rigid to enable new capabilities. If they want to do reinforcement learning, if they want to use graph neural networks, they don't have a way of doing that with their standard tooling. And so Ray, being future proof and being flexible and general gives them that ability. Another reason people choose Ray in Anyscale is the scalability. This is really our bread and butter. This is the reason, the whole point of Ray, you know, making it easy to go from your laptop to running on thousands of GPUs, making it easy to scale your development workloads and run them in production, making it easy to scale, you know, training to scale data ingest, pre-processing and so on. So scalability and performance, you know, are critical for doing machine learning and that is something that Ray provides out of the box. And lastly, Ray is an open ecosystem. You can run it anywhere. You can run it on any Cloud provider. Google, you know, Google Cloud, AWS, Asure. You can run it on your Kubernetes cluster. You can run it on your laptop. It's extremely portable. And not only that, it's framework agnostic. You can use Ray to scale arbitrary Python workloads. You can use it to scale and it integrates with libraries like TensorFlow or PyTorch or JAX or XG Boost or Hugging Face or PyTorch Lightning, right, or Scikit-learn or just your own arbitrary Python code. It's open source. And in addition to integrating with the rest of the machine learning ecosystem and these machine learning frameworks, you can use Ray along with all of the other tooling in the machine learning ecosystem. That's things like weights and biases or ML flow, right. Or you know, different data platforms like Databricks, you know, Delta Lake or Snowflake or tools for model monitoring for feature stores, all of these integrate with Ray. And that's, you know, Ray provides that kind of flexibility so that you can integrate it into the rest of your workflow. And then Anyscale is the scalable compute platform that's built on top, you know, that provides Ray. So Anyscale is a managed Ray service that runs in the Cloud. And what Anyscale does is it offers the best way to run Ray. And if you think about what you get with Anyscale, there are fundamentally two things. One is about moving faster, accelerating the time to market. And you get that by having the managed service so that as a developer you don't have to worry about managing infrastructure, you don't have to worry about configuring infrastructure. You also, it provides, you know, optimized developer workflows. Things like easily moving from development to production, things like having the observability tooling, the debug ability to actually easily diagnose what's going wrong in a distributed application. So things like the dashboards and the other other kinds of tooling for collaboration, for monitoring and so on. And then on top of that, so that's the first bucket, developer productivity, moving faster, faster experimentation and iteration. The second reason that people choose Anyscale is superior infrastructure. So this is things like, you know, cost deficiency, being able to easily take advantage of spot instances, being able to get higher GPU utilization, things like faster cluster startup times and auto scaling. Things like just overall better performance and faster scheduling. And so these are the kinds of things that Anyscale provides on top of Ray. It's the managed infrastructure. It's fast, it's like the developer productivity and velocity as well as performance. So this is what I wanted to share about Ray in Anyscale. >> John: Awesome. >> Provide that context. But John, I'm curious what you think. >> I love it. I love the, so first of all, it's a platform because that's the platform architecture right there. So just to clarify, this is an Anyscale platform, not- >> That's right. >> Tools. So you got tools in the platform. Okay, that's key. Love that managed service. Just curious, you mentioned Python multiple times, is that because of PyTorch and TensorFlow or Python's the most friendly with machine learning or it's because it's very common amongst all developers? >> That's a great question. Python is the language that people are using to do machine learning. So it's the natural starting point. Now, of course, Ray is actually designed in a language agnostic way and there are companies out there that use Ray to build scalable Java applications. But for the most part right now we're focused on Python and being the best way to build these scalable Python and machine learning applications. But, of course, down the road there always is that potential. >> So if you're slinging Python code out there and you're watching that, you're watching this video, get on Anyscale bus quickly. Also, I just, while you were giving the presentation, I couldn't help, since you mentioned OpenAI, which by the way, congratulations 'cause they've had great scale, I've noticed in their rapid growth 'cause they were the fastest company to the number of users than anyone in the history of the computer industry, so major successor, OpenAI and ChatGPT, huge fan. I'm not a skeptic at all. I think it's just the beginning, so congratulations. But I actually typed into ChatGPT, what are the top three benefits of Anyscale and came up with scalability, flexibility, and ease of use. Obviously, scalability is what you guys are called. >> That's pretty good. >> So that's what they came up with. So they nailed it. Did you have an inside prompt training, buy it there? Only kidding. (Robert laughs) >> Yeah, we hard coded that one. >> But that's the kind of thing that came up really, really quickly if I asked it to write a sales document, it probably will, but this is the future interface. This is why people are getting excited about the foundational models and the large language models because it's allowing the interface with the user, the consumer, to be more human, more natural. And this is clearly will be in every application in the future. >> Absolutely. This is how people are going to interface with software, how they're going to interface with products in the future. It's not just something, you know, not just a chat bot that you talk to. This is going to be how you get things done, right. How you use your web browser or how you use, you know, how you use Photoshop or how you use other products. Like you're not going to spend hours learning all the APIs and how to use them. You're going to talk to it and tell it what you want it to do. And of course, you know, if it doesn't understand it, it's going to ask clarifying questions. You're going to have a conversation and then it'll figure it out. >> This is going to be one of those things, we're going to look back at this time Robert and saying, "Yeah, from that company, that was the beginning of that wave." And just like AWS and Cloud Computing, the folks who got in early really were in position when say the pandemic came. So getting in early is a good thing and that's what everyone's talking about is getting in early and playing around, maybe replatforming or even picking one or few apps to refactor with some staff and managed services. So people are definitely jumping in. So I have to ask you the ROI cost question. You mentioned some of those, Moore's Law versus what's going on in the industry. When you look at that kind of scale, the first thing that jumps out at people is, "Okay, I love it. Let's go play around." But what's it going to cost me? Am I going to be tied to certain GPUs? What's the landscape look like from an operational standpoint, from the customer? Are they locked in and the benefit was flexibility, are you flexible to handle any Cloud? What is the customers, what are they looking at? Basically, that's my question. What's the customer looking at? >> Cost is super important here and many of the companies, I mean, companies are spending a huge amount on their Cloud computing, on AWS, and on doing AI, right. And I think a lot of the advantage of Anyscale, what we can provide here is not only better performance, but cost efficiency. Because if we can run something faster and more efficiently, it can also use less resources and you can lower your Cloud spending, right. We've seen companies go from, you know, 20% GPU utilization with their current setup and the current tools they're using to running on Anyscale and getting more like 95, you know, 100% GPU utilization. That's something like a five x improvement right there. So depending on the kind of application you're running, you know, it's a significant cost savings. We've seen companies that have, you know, processing petabytes of data every single day with Ray going from, you know, getting order of magnitude cost savings by switching from what they were previously doing to running their application on Ray. And when you have applications that are spending, you know, potentially $100 million a year and getting a 10 X cost savings is just absolutely enormous. So these are some of the kinds of- >> Data infrastructure is super important. Again, if the customer, if you're a prospect to this and thinking about going in here, just like the Cloud, you got infrastructure, you got the platform, you got SaaS, same kind of thing's going to go on in AI. So I want to get into that, you know, ROI discussion and some of the impact with your customers that are leveraging the platform. But first I hear you got a demo. >> Robert: Yeah, so let me show you, let me give you a quick run through here. So what I have open here is the Anyscale UI. I've started a little Anyscale Workspace. So Workspaces are the Anyscale concept for interactive developments, right. So here, imagine I'm just, you want to have a familiar experience like you're developing on your laptop. And here I have a terminal. It's not on my laptop. It's actually in the cloud running on Anyscale. And I'm just going to kick this off. This is going to train a large language model, so OPT. And it's doing this on 32 GPUs. We've got a cluster here with a bunch of CPU cores, bunch of memory. And as that's running, and by the way, if I wanted to run this on instead of 32 GPUs, 64, 128, this is just a one line change when I launch the Workspace. And what I can do is I can pull up VS code, right. Remember this is the interactive development experience. I can look at the actual code. Here it's using Ray train to train the torch model. We've got the training loop and we're saying that each worker gets access to one GPU and four CPU cores. And, of course, as I make the model larger, this is using deep speed, as I make the model larger, I could increase the number of GPUs that each worker gets access to, right. And how that is distributed across the cluster. And if I wanted to run on CPUs instead of GPUs or a different, you know, accelerator type, again, this is just a one line change. And here we're using Ray train to train the models, just taking my vanilla PyTorch model using Hugging Face and then scaling that across a bunch of GPUs. And, of course, if I want to look at the dashboard, I can go to the Ray dashboard. There are a bunch of different visualizations I can look at. I can look at the GPU utilization. I can look at, you know, the CPU utilization here where I think we're currently loading the model and running that actual application to start the training. And some of the things that are really convenient here about Anyscale, both I can get that interactive development experience with VS code. You know, I can look at the dashboards. I can monitor what's going on. It feels, I have a terminal, it feels like my laptop, but it's actually running on a large cluster. And I can, with however many GPUs or other resources that I want. And so it's really trying to combine the best of having the familiar experience of programming on your laptop, but with the benefits, you know, being able to take advantage of all the resources in the Cloud to scale. And it's like when, you know, you're talking about cost efficiency. One of the biggest reasons that people waste money, one of the silly reasons for wasting money is just forgetting to turn off your GPUs. And what you can do here is, of course, things will auto terminate if they're idle. But imagine you go to sleep, I have this big cluster. You can turn it off, shut off the cluster, come back tomorrow, restart the Workspace, and you know, your big cluster is back up and all of your code changes are still there. All of your local file edits. It's like you just closed your laptop and came back and opened it up again. And so this is the kind of experience we want to provide for our users. So that's what I wanted to share with you. >> Well, I think that whole, couple of things, lines of code change, single line of code change, that's game changing. And then the cost thing, I mean human error is a big deal. People pass out at their computer. They've been coding all night or they just forget about it. I mean, and then it's just like leaving the lights on or your water running in your house. It's just, at the scale that it is, the numbers will add up. That's a huge deal. So I think, you know, compute back in the old days, there's no compute. Okay, it's just compute sitting there idle. But you know, data cranking the models is doing, that's a big point. >> Another thing I want to add there about cost efficiency is that we make it really easy to use, if you're running on Anyscale, to use spot instances and these preemptable instances that can just be significantly cheaper than the on-demand instances. And so when we see our customers go from what they're doing before to using Anyscale and they go from not using these spot instances 'cause they don't have the infrastructure around it, the fault tolerance to handle the preemption and things like that, to being able to just check a box and use spot instances and save a bunch of money. >> You know, this was my whole, my feature article at Reinvent last year when I met with Adam Selipsky, this next gen Cloud is here. I mean, it's not auto scale, it's infrastructure scale. It's agility. It's flexibility. I think this is where the world needs to go. Almost what DevOps did for Cloud and what you were showing me that demo had this whole SRE vibe. And remember Google had site reliability engines to manage all those servers. This is kind of like an SRE vibe for data at scale. I mean, a similar kind of order of magnitude. I mean, I might be a little bit off base there, but how would you explain it? >> It's a nice analogy. I mean, what we are trying to do here is get to the point where developers don't think about infrastructure. Where developers only think about their application logic. And where businesses can do AI, can succeed with AI, and build these scalable applications, but they don't have to build, you know, an infrastructure team. They don't have to develop that expertise. They don't have to invest years in building their internal machine learning infrastructure. They can just focus on the Python code, on their application logic, and run the stuff out of the box. >> Awesome. Well, I appreciate the time. Before we wrap up here, give a plug for the company. I know you got a couple websites. Again, go, Ray's got its own website. You got Anyscale. You got an event coming up. Give a plug for the company looking to hire. Put a plug in for the company. >> Yeah, absolutely. Thank you. So first of all, you know, we think AI is really going to transform every industry and the opportunity is there, right. We can be the infrastructure that enables all of that to happen, that makes it easy for companies to succeed with AI, and get value out of AI. Now we have, if you're interested in learning more about Ray, Ray has been emerging as the standard way to build scalable applications. Our adoption has been exploding. I mentioned companies like OpenAI using Ray to train their models. But really across the board companies like Netflix and Cruise and Instacart and Lyft and Uber, you know, just among tech companies. It's across every industry. You know, gaming companies, agriculture, you know, farming, robotics, drug discovery, you know, FinTech, we see it across the board. And all of these companies can get value out of AI, can really use AI to improve their businesses. So if you're interested in learning more about Ray and Anyscale, we have our Ray Summit coming up in September. This is going to highlight a lot of the most impressive use cases and stories across the industry. And if your business, if you want to use LLMs, you want to train these LLMs, these large language models, you want to fine tune them with your data, you want to deploy them, serve them, and build applications and products around them, give us a call, talk to us. You know, we can really take the infrastructure piece, you know, off the critical path and make that easy for you. So that's what I would say. And, you know, like you mentioned, we're hiring across the board, you know, engineering, product, go-to-market, and it's an exciting time. >> Robert Nishihara, co-founder and CEO of Anyscale, congratulations on a great company you've built and continuing to iterate on and you got growth ahead of you, you got a tailwind. I mean, the AI wave is here. I think OpenAI and ChatGPT, a customer of yours, have really opened up the mainstream visibility into this new generation of applications, user interface, roll of data, large scale, how to make that programmable so we're going to need that infrastructure. So thanks for coming on this season three, episode one of the ongoing series of the hot startups. In this case, this episode is the top startups building foundational model infrastructure for AI and ML. I'm John Furrier, your host. Thanks for watching. (upbeat music)

Published Date : Mar 9 2023

SUMMARY :

episode one of the ongoing and you guys really had and other resources in the Cloud. and particular the large language and what you want to achieve. and the Cloud did that with data centers. the point, and you know, if you don't mind explaining and managing the infrastructure and you guys are positioning is that the amount of compute needed to do But John, I'm curious what you think. because that's the platform So you got tools in the platform. and being the best way to of the computer industry, Did you have an inside prompt and the large language models and tell it what you want it to do. So I have to ask you and you can lower your So I want to get into that, you know, and you know, your big cluster is back up So I think, you know, the on-demand instances. and what you were showing me that demo and run the stuff out of the box. I know you got a couple websites. and the opportunity is there, right. and you got growth ahead

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
Robert NishiharaPERSON

0.99+

JohnPERSON

0.99+

RobertPERSON

0.99+

John FurrierPERSON

0.99+

NetflixORGANIZATION

0.99+

35 timesQUANTITY

0.99+

AmazonORGANIZATION

0.99+

$100 millionQUANTITY

0.99+

UberORGANIZATION

0.99+

AWSORGANIZATION

0.99+

100%QUANTITY

0.99+

GoogleORGANIZATION

0.99+

Ant GroupORGANIZATION

0.99+

firstQUANTITY

0.99+

PythonTITLE

0.99+

20%QUANTITY

0.99+

32 GPUsQUANTITY

0.99+

LyftORGANIZATION

0.99+

hundredsQUANTITY

0.99+

tomorrowDATE

0.99+

AnyscaleORGANIZATION

0.99+

threeQUANTITY

0.99+

128QUANTITY

0.99+

SeptemberDATE

0.99+

todayDATE

0.99+

Moore's LawTITLE

0.99+

Adam SelipskyPERSON

0.99+

PyTorchTITLE

0.99+

RayORGANIZATION

0.99+

second reasonQUANTITY

0.99+

64QUANTITY

0.99+

each workerQUANTITY

0.99+

each workerQUANTITY

0.99+

PhotoshopTITLE

0.99+

UC BerkeleyORGANIZATION

0.99+

JavaTITLE

0.99+

ShopifyORGANIZATION

0.99+

OpenAIORGANIZATION

0.99+

AnyscalePERSON

0.99+

thirdQUANTITY

0.99+

two thingsQUANTITY

0.99+

ByteDanceORGANIZATION

0.99+

SpotifyORGANIZATION

0.99+

OneQUANTITY

0.99+

95QUANTITY

0.99+

AsureORGANIZATION

0.98+

one lineQUANTITY

0.98+

one GPUQUANTITY

0.98+

ChatGPTTITLE

0.98+

TensorFlowTITLE

0.98+

last yearDATE

0.98+

first bucketQUANTITY

0.98+

bothQUANTITY

0.98+

two layersQUANTITY

0.98+

CohereORGANIZATION

0.98+

AlipayORGANIZATION

0.98+

RayPERSON

0.97+

oneQUANTITY

0.97+

InstacartORGANIZATION

0.97+

Kelly Hoang, Gilead | WiDS 2023


 

(upbeat music) >> Welcome back to The Cubes coverage of WIDS 2023 the eighth Annual Women in Data Science Conference which is held at Stanford University. I'm your host, Lisa Martin. I'm really excited to be having some great co-hosts today. I've got Hannah Freytag with me, who is a data journalism master student at Stanford. We have yet another inspiring woman in technology to bring to you today. Kelly Hoang joins us, data scientist at Gilead. It's so great to have you, Kelly. >> Hi, thank you for having me today. I'm super excited to be here and share my journey with you guys. >> Let's talk about that journey. You recently got your PhD in information sciences, congratulations. >> Thank you. Yes, I just graduated, I completed my PhD in information sciences from University of Illinois Urbana-Champaign. And right now I moved to Bay Area and started my career as a data scientist at Gilead. >> And you're in better climate. Well, we do get snow here. >> Kelly: That's true. >> We proved that the last... And data science can show us all the climate change that's going on here. >> That's true. That's the topic of the data fund this year, right? To understand the changes in the climate. >> Yeah. Talk a little bit about your background. You were mentioning before we went live that you come from a whole family of STEM students. So you had that kind of in your DNA. >> Well, I consider myself maybe I was a lucky case. I did grew up in a family in the STEM environment. My dad actually was a professor in computer science. So I remember when I was at a very young age, I already see like datas, all of these computer science concepts. So grew up to be a data scientist is always something like in my mind. >> You aspired to be. >> Yes. >> I love that. >> So I consider myself in a lucky place in that way. But also, like during this journey to become a data scientist you need to navigate yourself too, right? Like you have this roots, like this foundation but then you still need to kind of like figure out yourself what is it? Is it really the career that you want to pursue? But I'm happy that I'm end up here today and where I am right now. >> Oh, we're happy to have you. >> Yeah. So you' re with Gilead now after you're completing your PhD. And were you always interested in the intersection of data science and health, or is that something you explored throughout your studies? >> Oh, that's an excellent question. So I did have background in computer science but I only really get into biomedical domain when I did my PhD at school. So my research during my PhD was natural language processing, NLP and machine learning and their applications in biomedical domains. And then when I graduated, I got my first job in Gilead Science. Is super, super close and super relevant to what my research at school. And at Gilead, I am working in the advanced analytics department, and our focus is to bring artificial intelligence and machine learning into supporting clinical decision making. And really the ultimate goal is how to use AI to accelerate the precision medicine. So yes, it's something very like... I'm very lucky to get the first job that which is very close to my research at school. >> That's outstanding. You know, when we talk about AI, we can't not talk about ethics, bias. >> Kelly: Right. >> We know there's (crosstalk) Yes. >> Kelly: In healthcare. >> Exactly. Exactly. Equities in healthcare, equities in so many things. Talk a little bit about what excites you about AI, what you're doing at Gilead to really influence... I mean this, we're talking about something that's influencing life and death situations. >> Kelly: Right. >> How are you using AI in a way that is really maximizing the opportunities that AI can bring and maximizing the value in the data, but helping to dial down some of the challenges that come with AI? >> Yep. So as you may know already with the digitalization of medical records, this is nowaday, we have a tremendous opportunities to fulfill the dream of precision medicine. And what I mean by precision medicines, means now the treatments for people can be really tailored to individual patients depending on their own like characteristic or demographic or whatever. And nature language processing and machine learning, and AI in general really play a key role in that innovation, right? Because like there's a vast amount of information of patients and patient journeys or patient treatment is conducted and recorded in text. So that's why our group was established. Actually our department, advanced analytic department in Gilead is pretty new. We established our department last year. >> Oh wow. >> But really our mission is to bring AI into this field because we see the opportunity now. We have a vast amount of data about patient about their treatments, how we can mine these data how we can understand and tailor the treatment to individuals. And give everyone better care. >> I love that you brought up precision medicine. You know, I always think, if I kind of abstract everything, technology, data, connectivity, we have this expectation in our consumer lives. We can get anything we want. Not only can we get anything we want but we expect whoever we're engaging with, whether it's Amazon or Uber or Netflix to know enough about me to get me that precise next step. I don't think about precision medicine but you bring up such a great point. We expect these tailored experiences in our personal lives. Why not expect that in medicine as well? And have a tailored treatment plan based on whatever you have, based on data, your genetics, and being able to use NLP, machine learning and AI to drive that is really exciting. >> Yeah. You recap it very well, but then you also bring up a good point about the challenges to bring AI into this field right? Definitely this is an emerging field, but also very challenging because we talk about human health. We are doing the work that have direct impact to human health. So everything need to be... Whatever model, machine learning model that you are building, developing you need to be precise. It need to be evaluated properly before like using as a product, apply into the real practice. So it's not like recommendation systems for shopping or anything like that. We're talking about our actual health. So yes, it's challenging that way. >> Yeah. With that, you already answered one of the next questions I had because like medical data and health data is very sensitive. And how you at Gilead, you know, try to protect this data to protect like the human beings, you know, who are the data in the end. >> The security aspect is critical. You bring up a great point about sensitive data. We think of healthcare as sensitive data. Or PII if you're doing a bank transaction. We have to be so careful with that. Where is security, data security, in your everyday work practices within data science? Is it... I imagine it's a fundamental piece. >> Yes, for sure. We at Gilead, for sure, in data science organization we have like intensive trainings for employees about data privacy and security, how you use the data. But then also at the same time, when we work directly with dataset, it's not that we have like direct information about patient at like very granular level. Everything is need to be kind of like anonymized at some points to protect patient privacy. So we do have rules, policies to follow to put that in place in our organization. >> Very much needed. So some of the conversations we heard, were you able to hear the keynote this morning? >> Yes. I did. I attended. Like I listened to all of them. >> Isn't it fantastic? >> Yes, yes. Especially hearing these women from different backgrounds, at different level of their professional life, sharing their journeys. It's really inspiring. >> And Hannah, and I've been talking about, a lot of those journeys look like this. >> I know >> You just kind of go... It's very... Yours is linear, but you're kind of the exception. >> Yeah, this is why I consider my case as I was lucky to grow up in STEM environment. But then again, back to my point at the beginning, sometimes you need to navigate yourself too. Like I did mention about, I did my pa... Sorry, my bachelor degree in Vietnam, in STEM and in computer science. And that time, there's only five girls in a class of 100 students. So I was not the smartest person in the room. And I kept my minority in that areas, right? So at some point I asked myself like, "Huh, I don't know. Is this really my careers." It seems that others, like male people or students, they did better than me. But then you kind of like, I always have this passion of datas. So you just like navigate yourself, keep pushing yourself over those journey. And like being where I am right now. >> And look what you've accomplished. >> Thank you. >> Yeah. That's very inspiring. And yeah, you mentioned how you were in the classroom and you were only one of the few women in the room. And what inspired or motivated you to keep going, even though sometimes you were at these points where you're like, "Okay, is this the right thing?" "Is this the right thing for me?" What motivated you to keep going? >> Well, I think personally for me, as a data scientist or for woman working in data science in general, I always try to find a good story from data. Like it's not, when you have a data set, well it's important for you to come up with methodologies, what are you going to do with the dataset? But I think it's even more important to kind of like getting the context of the dataset. Like think about it like what is the story behind this dataset? What is the thing that you can get out of it and what is the meaning behind? How can we use it to help use it in a useful way. To have in some certain use case. So I always have that like curiosity and encouragement in myself. Like every time someone handed me a data set, I always think about that. So it's helped me to like build up this kind of like passion for me. And then yeah. And then become a data scientist. >> So you had that internal drive. I think it's in your DNA as well. When you were one of five. You were 5% women in your computer science undergrad in Vietnam. Yet as Hannah was asking you, you found a lot of motivation from within. You embrace that, which is so key. When we look at some of the statistics, speaking of data, of women in technical roles. We've seen it hover around 25% the last few years, probably five to 10. I was reading some data from anitab.org over the weekend, and it shows that it's now, in 2022, the number of women in technical roles rose slightly, but it rose, 27.6%. So we're seeing the needle move slowly. But one of the challenges that still remains is attrition. Women who are leaving the role. You've got your PhD. You have a 10 month old, you've got more than one child. What would you advise to women who might be at that crossroads of not knowing should I continue my career in climbing the ladder, or do I just go be with my family or do something else? What's your advice to them in terms of staying the path? >> I think it's really down to that you need to follow your passion. Like in any kind of job, not only like in data science right? If you want to be a baker, or you want to be a chef, or you want to be a software engineer. It's really like you need to ask yourself is it something that you're really passionate about? Because if you really passionate about something, regardless how difficult it is, like regardless like you have so many kids to take care of, you have the whole family to take care of. You have this and that. You still can find your time to spend on it. So it's really like let yourself drive your own passion. Drive the way where you leading to. I guess that's my advice. >> Kind of like following your own North Star, right? Is what you're suggesting. >> Yeah. >> What role have mentors played in your career path, to where you are now? Have you had mentors on the way or people who inspired you? >> Well, I did. I certainly met quite a lot of women who inspired me during my journey. But right now, at this moment, one person, particular person that I just popped into my mind is my current manager. She's also data scientist. She's originally from Caribbean and then came to the US, did her PhDs too, and now led a group, all women. So believe it or not, I am in a group of all women working in data science. So she's really like someone inspire me a lot, like someone I look up to in this career. >> I love that. You went from being one of five females in a class of 100, to now having a PhD in information sciences, and being on an all female data science team. That's pretty cool. >> It's great. Yeah, it's great. And then you see how fascinating that, how things shift right? And now today we are here in a conference that all are women in data science. >> Yeah. >> It's extraordinary. >> So this year we're fortunate to have WIDS coincide this year with the actual International Women's Day, March 8th which is so exciting. Which is always around this time of year, but it's great to have it on the day. The theme of this International Women's Day this year is embrace equity. When you think of that theme, and your career path, and what you're doing now, and who inspires you, how can companies like Gilead benefit from embracing equity? What are your thoughts on that as a theme? >> So I feel like I'm very lucky to get my first job at Gilead. Not only because the work that we are doing here very close to my research at school, but also because of the working environment at Gilead. Inclusion actually is one of the five core values of Gilead. >> Nice. >> So by that, we means we try to create and creating a working environment that all of the differences are valued. Like regardless your background, your gender. So at Gilead, we have women at Gilead which is a global network of female employees, that help us to strengthen our inclusion culture, and also to influence our voices into the company cultural company policy and practice. So yeah, I'm very lucky to work in the environment nowadays. >> It's impressive to not only hear that you're on an all female data science team, but what Gilead is doing and the actions they're taking. It's one thing, we've talked about this Hannah, for companies, and regardless of industry, to say we're going to have 50% women in our workforce by 2030, 2035, 2040. It's a whole other ballgame for companies like Gilead to actually be putting pen to paper. To actually be creating a strategy that they're executing on. That's awesome. And it must feel good to be a part of a company who's really adapting its culture to be more inclusive, because there's so much value that comes from inclusivity, thought diversity, that ultimately will help Gilead produce better products and services. >> Yeah. Yes. Yeah. Actually this here is the first year Gilead is a sponsor of the WIDS Conference. And we are so excited to establish this relationship, and looking forward to like having more collaboration with WIDS in the future. >> Excellent. Kelly we've had such a pleasure having you on the program. Thank you for sharing your linear path. You are definitely a unicorn. We appreciate your insights and your advice to those who might be navigating similar situations. Thank you for being on theCUBE today. >> Thank you so much for having me. >> Oh, it was our pleasure. For our guests, and Hannah Freytag this is Lisa Martin from theCUBE. Coming to you from WIDS 2023, the eighth annual conference. Stick around. Our final guest joins us in just a minute.

Published Date : Mar 8 2023

SUMMARY :

in technology to bring to you today. and share my journey with you guys. You recently got your PhD And right now I moved to Bay Area And you're in better climate. We proved that the last... That's the topic of the So you had that kind of in your DNA. in the STEM environment. that you want to pursue? or is that something you and our focus is to bring we can't not talk about ethics, bias. what excites you about AI, really tailored to individual patients to bring AI into this field I love that you brought about the challenges to bring And how you at Gilead, you know, We have to be so careful with that. Everything is need to be So some of the conversations we heard, Like I listened to all of them. at different level of And Hannah, and I've kind of the exception. So you just like navigate yourself, And yeah, you mentioned how So it's helped me to like build up So you had that internal drive. I think it's really down to that you Kind of like following and then came to the US, five females in a class of 100, And then you see how fascinating that, but it's great to have it on the day. but also because of the So at Gilead, we have women at Gilead And it must feel good to be a part and looking forward to like Thank you for sharing your linear path. Coming to you from WIDS 2023,

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
KellyPERSON

0.99+

Kelly HoangPERSON

0.99+

Hannah FreytagPERSON

0.99+

Lisa MartinPERSON

0.99+

HannahPERSON

0.99+

CaribbeanLOCATION

0.99+

AmazonORGANIZATION

0.99+

VietnamLOCATION

0.99+

GileadORGANIZATION

0.99+

2030DATE

0.99+

2035DATE

0.99+

2022DATE

0.99+

2040DATE

0.99+

Bay AreaLOCATION

0.99+

USLOCATION

0.99+

27.6%QUANTITY

0.99+

UberORGANIZATION

0.99+

50%QUANTITY

0.99+

NetflixORGANIZATION

0.99+

5%QUANTITY

0.99+

last yearDATE

0.99+

WIDSORGANIZATION

0.99+

fiveQUANTITY

0.99+

five girlsQUANTITY

0.99+

oneQUANTITY

0.99+

first jobQUANTITY

0.99+

todayDATE

0.99+

100 studentsQUANTITY

0.99+

March 8thDATE

0.99+

more than one childQUANTITY

0.99+

this yearDATE

0.99+

International Women's DayEVENT

0.98+

five coreQUANTITY

0.98+

Gilead ScienceORGANIZATION

0.98+

10QUANTITY

0.98+

one personQUANTITY

0.98+

eighth Annual Women in Data Science ConferenceEVENT

0.97+

five femalesQUANTITY

0.97+

University of Illinois Urbana-ChampaignORGANIZATION

0.97+

10 month oldQUANTITY

0.96+

North StarORGANIZATION

0.96+

theCUBEORGANIZATION

0.93+

first yearQUANTITY

0.93+

The CubesORGANIZATION

0.93+

around 25%QUANTITY

0.91+

one thingQUANTITY

0.89+

WIDS 2023EVENT

0.88+

WIDSEVENT

0.88+

this morningDATE

0.88+

anitab.orgOTHER

0.86+

GileadPERSON

0.86+

StanfordORGANIZATION

0.85+

100QUANTITY

0.79+

Stanford UniversityLOCATION

0.79+

eighth annual conferenceQUANTITY

0.78+

Nancy Wang & Kate Watts | International Women's Day


 

>> Hello everyone. Welcome to theCUBE's coverage of International Women's Day. I'm John Furrier, host of theCUBE been profiling the leaders in the technology world, women in technology from developers to the boardroom, everything in between. We have two great guests promoting in from Malaysia. Nancy Wang is the general manager, also CUBE alumni from AWS Data Protection, and founder and board chair of Advancing Women in Tech, awit.org. And of course Kate Watts who's the executive director of Advancing Women in Tech.org. So it's awit.org. Nancy, Kate, thanks for coming all the way across remotely from Malaysia. >> Of course, we're coming to you as fast as our internet bandwidth will allow us. And you know, I'm just thrilled today that you get to see a whole nother aspect of my life, right? Because typically we talk about AWS, and here we're talking about a topic near and dear to my heart. >> Well, Nancy, I love the fact that you're spending a lot of time taking the empowerment to go out and help the industries and helping with the advancement of women in tech. Kate, the executive director it's a 501C3, it's nonprofit, dedicating to accelerating the careers of women in groups in tech. Can you talk about the organization? >> Yes, I can. So Advancing Women in Tech was founded in 2017 in order to fix some of the pathway problems that we're seeing on the rise to leadership in the industry. And so we specifically focus on supporting mid-level women in technical roles, get into higher positions. We do that in a few different ways through mentorship programs through building technical skills and by connecting people to a supportive community. So you have your peer network and then a vertical sort of relationships to help you navigate the next steps in your career. So to date we've served about 40,000 individuals globally and we're just looking to expand our reach and impact and be able to better support women in the industry. >> Nancy, talk about the creation, the origination story. How'd this all come together? Obviously the momentum, everyone in the industry's been focused on this for a long time. Where did AWIT come from? Advancing Women in Technology, that's the acronym. Advancing Women in Technology.org, where'd it come from? What's the origination story? >> Yeah, so AWIT really originated from this desire that I had, to Kate's point around, well if you look around right and you know, don't take my word for it, right? Look at stats, look at news reports, or just frankly go on your LinkedIn and see how many women in underrepresented groups are in senior technical leadership roles right out in the companies whose names we all know. And so that was my case back in 2016. And so when I first got the idea and back then I was actually at Google, just another large tech company in the valley, right? It was about how do we get more role models, how we get more, for example, women into leadership roles so they can bring up the next generation, right? And so this is actually part of a longer speech that I'm about to give on Wednesday and part of the US State Department speaker program. In fact, that's why Kate and I are here in Malaysia right now is working with over 200 women entrepreneurs from all over in Southeast Asia, including Malaysia Philippines, Vietnam, Borneo, you know, so many countries where having more women entrepreneurs can help raise the GDP right, and that fits within our overall mission of getting more women into top leadership roles in tech. >> You know, I was talking about Teresa Carlson she came on the program as well for this year this next season we're going to do. And she mentioned the decision between the US progress and international. And she's saying as much as it's still bad numbers, it's worse than outside the United States and needs to get better. Can you comment on the global aspect? You brought that up. I think it's super important to highlight that it's just not one area, it's a global evolution. >> Absolutely, so let me start, and I'd love to actually have Kate talk about our current programs and all of the international groups that we're working with. So as Teresa aptly mentioned there is so much work to be done not just outside the US and North Americas where typically tech nonprofits will focus, but rather if you think about the one to end model, right? For example when I was doing the product market fit workshop for the US State Department I had women dialing in from rice fields, right? So let me just pause there for a moment. They were holding their cell phones up near towers near trees just so that they can get a few minutes of time with me to do a workshop and how to accelerate their business. So if you don't call that the desire to propel oneself or accelerate oneself, not sure what is, right. And so it's really that passion that drove me to spend the next week and a half here working with local entrepreneurs working with policy makers so we can take advantage and really leverage that passion that people have, right? To accelerate more business globally. And so that's why, you know Kate will be leading our contingent with the United Nations Women Group, right? That is focused on women's economic empowerment because that's super important, right? One aspect can be sure, getting more directors, you know vice presidents into companies like Google and Amazon. But another is also how do you encourage more women around the world to start businesses, right? To reach economic and freedom independence, right? To overcome some of the maybe social barriers to becoming a leader in their own country. >> Yes, and if I think about our own programs and our model of being very intentional about supporting the learning development and skills of women and members of underrepresented groups we focused very much on providing global access to a number of our programs. For instance, our product management certification on Coursera or engineering management our upcoming women founders accelerator. We provide both access that you can get from anywhere. And then also very intentional programming that connects people into the networks to be able to further their networks and what they've learned through the skills online, so. >> Yeah, and something Kate just told me recently is these courses that Kate's mentioning, right? She was instrumental in working with the American Council on Education and so that our learners can actually get up to six college credits for taking these courses on product management engineering management, on cloud product management. And most recently we had our first organic one of our very first organic testimonials was from a woman's tech bootcamp in Nigeria, right? So if you think about the worldwide impact of these upskilling courses where frankly in the US we might take for granted right around the world as I mentioned, there are women dialing in from rice patties from other, you know, for example, outside the, you know corporate buildings in order to access this content. >> Can you think about the idea of, oh sorry, go ahead. >> Go ahead, no, go ahead Kate. >> I was going to say, if you can't see it, you can't become it. And so we are very intentional about ensuring that we have we're spotlighting the expertise of women and we are broadcasting that everywhere so that anybody coming up can gain the skills and the networks to be able to succeed in this industry. >> We'll make sure we get those links so we can promote them. Obviously we feel the same way getting the word out. I think a couple things I'd like to ask you guys cause I think you hit a great point. One is the economic advantage the numbers prove that diverse teams perform better number one, that's clear. So good point there. But I want to get your thoughts on the entrepreneurial equation. You mentioned founders and startups and there's also different makeups in different countries. It's not like the big corporations sometimes it's smaller business in certain areas the different cultures have different business sizes and business types. How do you guys see that factoring in outside the United States, say the big tech companies? Okay, yeah. The easy lower the access to get in education than stay with them, in other countries is it the same or is it more diverse in terms of business? >> So what really actually got us started with the US State Department was around our work with women founders. And I love for Kate to actually share her experience working with AWS startups in that capacity. But frankly, you know, we looked at the content and the mentor programs that were providing women who wanted to be executives, you know, quickly realize a lot of those same skills such as finding customers, right? Scaling your product and building channels can also apply to women founders, not just executives. And so early supporters of our efforts from firms such as Moderna up in Seattle, Emergence Ventures, Decibel Ventures in, you know, the Bay Area and a few others that we're working with right now. Right, they believed in the mission and really helped us scale out what is now our existing platform and offerings for women founders. >> Those are great firms by the way. And they also are very founder friendly and also understand the global workforce. I mean, that's a whole nother dimension. Okay, what's your reaction to all that? >> Yes, we have been very intentional about taking the product expertise and the learnings of women and in our network, we first worked with AWS startups to support the development of the curriculum for the recent accelerator for women founders that was held last spring. And so we're able to support 25 founders and also brought in the expertise of about 20 or 30 women from Advancing Women in Tech to be able to be the lead instructors and mentors for that. And so we have really realized that with this network and this individual sort of focus on product expertise building strong teams, we can take that information and bring it to folks everywhere. And so there is very much the intentionality of allowing founders allowing individuals to take the lessons and bring it to their individual circumstances and the cultures in which they are operating. But the product sense is a skill that we can support the development of and we're proud to do so. >> That's awesome. Nancy, I want to ask you some never really talk about data storage and AWS cloud greatness and goodness, here's different and you also work full-time at AWS and you're the founder or the chairman of this great organization. How do you balance both and do you get, they're getting behind you on this, Amazon is getting behind you on this. >> Well, as I say it's always easier to negotiate on the way in. But jokes aside, I have to say the leadership has been tremendously supportive. If you think about, for example, my leaders Wayne Duso who's also been on the show multiple times, Bill Vaas who's also been on the show multiple times, you know they're both founders and also operators entrepreneurs at heart. So they understand that it is important, right? For all of us, it's really incumbent on all of us who are in positions to do so, to create a pathway for more people to be in leadership roles for more people to be successful entrepreneurs. So, no, I mean if you just looked at LinkedIn they're always uploading my vote so they reach to more audiences. And frankly they're rooting for us back home in the US while we're in Malaysia this week. >> That's awesome. And I think that's a good culture to have that empowerment and I think that's very healthy. What's next for you guys? What's on the agenda? Take us through the activities. I know that you got a ton of things happening. You got your event out there, which is why you're out there. There's a bunch of other activities. I think you guys call it the Advancing Women in Tech week. >> Yes, this week we are having a week of programming that you can check out at Advancing Women in Tech.org. That is spotlighting the expertise of a number of women in our space. So it is three days of programming Tuesday, Wednesday and Thursday if you are in the US so the seventh through the ninth, but available globally. We are also going to be in New York next week for the event at the UN and are looking to continue to support our mentorship programs and also our work supporting women founders throughout the year. >> All right. I have to ask you guys if you don't mind get a little market data so you can share with us here at theCUBE. What are you hearing this year that's different in the conversation space around the topics, the interests? Obviously I've seen massive amounts of global acceleration around conversations, more video, things like this more stories are scaling, a lot more LinkedIn activity. It just seems like it's a lot different this year. Can you guys share any kind of current trends you're seeing relative to the conversations and topics being discussed across the the community? >> Well, I think from a needle moving perspective, right? I think due to the efforts of wonderful organizations including the Q for spotlighting all of these awesome women, right? Trailblazing women and the nonprofits the government entities that we work with there's definitely more emphasis on creating access and creating pathways. So that's probably one thing that you're seeing is more women, more investors posting about their activities. Number two, from a global trend perspective, right? The rise of women in security. I noticed that on your agenda today, you had Lena Smart who's a good friend of mine chief information security officer at MongoDB, right? She and I are actually quite involved in helping founders especially early stage founders in the security space. And so globally from a pure technical perspective, right? There's right more increasing regulations around data privacy, data sovereignty, right? For example, India's in a few weeks about to get their first data protection regulation there locally. So all of that is giving rise to yet another wave of opportunity and we want women founders uniquely positioned to take advantage of that opportunity. >> I love it. Kate, reaction to that? I mean founders, more pathways it sounds like a neural network, it sounds like AI enabled. >> Yes, and speaking of AI, with the rise of that we are also hearing from many community members the importance of continuing to build their skills upskill learn to be able to keep up with the latest trends. There's a lot of people wondering what does this mean for my own career? And so they're turning to organizations like Advancing Women in Tech to find communities to both learn the latest information, but also build their networks so that they are able to move forward regardless of what the industry does. >> I love the work you guys are doing. It's so impressive. I think the economic angle is new it's more amplified this year. It's always kind of been there and continues to be. What do you guys hope for by next year this time what do you hope to see different from a needle moving perspective, to use your word Nancy, for next year? What's the visual output in your mind? >> I want to see real effort made towards 50-50 representation in all tech leadership roles. And I'd like to see that happen by 2050. >> Kate, anything on your end? >> I love that. I'm going to go a little bit more touchy-feely. I want everybody in our space to understand that the skills that they build and that the networks they have carry with them regardless of wherever they go. And so to be able to really lean in and learn and continue to develop the career that you want to have. So whether that be at a large organization or within your own business, that you've got the potential to move forward on that within you. >> Nancy, Kate, thank you so much for your contribution. I'll give you the final word. Put a plug in for the organization. What are you guys looking for? Any kind of PSA you want to share with the folks watching? >> Absolutely, so if you're in a position to be a mentor, join as a mentor, right? Help elevate and accelerate the next generation of women leaders. If you're an investor help us invest in more women started companies, right? Women founded startups and lastly, if you are women looking to accelerate your career, come join our community. We have resources, we have mentors and who we have investors who are willing to come in on the ground floor and help you accelerate your business. >> Great work. Thank you so much for participating in our International Women's Day 23 program and we'd look to keep this going quarterly. We'll see you next year, next time. Thanks for coming on. Appreciate it. >> Thanks so much John. >> Thank you. >> Okay, women leaders here. >> Nancy: Thanks for having us >> All over the world, coming together for a great celebration but really highlighting the accomplishments, the pathways the investment, the mentoring, everything in between. It's theCUBE. Bring as much as we can. I'm John Furrier, your host. Thanks for watching.

Published Date : Mar 7 2023

SUMMARY :

in the technology world, that you get to see a whole nother aspect of time taking the empowerment to go on the rise to leadership in the industry. in the industry's been focused of the US State Department And she mentioned the decision and all of the international into the networks to be able to further in the US we might take for Can you think about the and the networks to be able The easy lower the access to get and the mentor programs Those are great firms by the way. and also brought in the or the chairman of this in the US while we're I know that you got a of programming that you can check I have to ask you guys if you don't mind founders in the security space. Kate, reaction to that? of continuing to build their skills I love the work you guys are doing. And I'd like to see that happen by 2050. and that the networks Any kind of PSA you want to and accelerate the next Thank you so much for participating All over the world,

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
KatePERSON

0.99+

NancyPERSON

0.99+

TeresaPERSON

0.99+

Bill VaasPERSON

0.99+

AmazonORGANIZATION

0.99+

Teresa CarlsonPERSON

0.99+

JohnPERSON

0.99+

MalaysiaLOCATION

0.99+

Kate WattsPERSON

0.99+

NigeriaLOCATION

0.99+

Nancy WangPERSON

0.99+

Wayne DusoPERSON

0.99+

AWSORGANIZATION

0.99+

GoogleORGANIZATION

0.99+

ModernaORGANIZATION

0.99+

WednesdayDATE

0.99+

American Council on EducationORGANIZATION

0.99+

John FurrierPERSON

0.99+

Lena SmartPERSON

0.99+

2017DATE

0.99+

VietnamLOCATION

0.99+

BorneoLOCATION

0.99+

Emergence VenturesORGANIZATION

0.99+

New YorkLOCATION

0.99+

2016DATE

0.99+

United Nations Women GroupORGANIZATION

0.99+

Decibel VenturesORGANIZATION

0.99+

USLOCATION

0.99+

United StatesLOCATION

0.99+

Southeast AsiaLOCATION

0.99+

LinkedInORGANIZATION

0.99+

2050DATE

0.99+

MongoDBORGANIZATION

0.99+

US State DepartmentORGANIZATION

0.99+

next yearDATE

0.99+

International Women's DayEVENT

0.99+

25 foundersQUANTITY

0.99+

SeattleLOCATION

0.99+

North AmericasLOCATION

0.99+

AWS Data ProtectionORGANIZATION

0.99+

CUBEORGANIZATION

0.99+

three daysQUANTITY

0.99+

seventhQUANTITY

0.99+

Bay AreaLOCATION

0.99+

bothQUANTITY

0.99+

todayDATE

0.99+

next weekDATE

0.99+

30 womenQUANTITY

0.98+

One aspectQUANTITY

0.98+

ThursdayDATE

0.98+

this yearDATE

0.98+

about 40,000 individualsQUANTITY

0.98+

this yearDATE

0.98+

last springDATE

0.98+

this weekDATE

0.98+

TuesdayDATE

0.98+

Rachel Skaff, AWS | International Women's Day


 

(gentle music) >> Hello, and welcome to theCUBE's coverage of International Women's Day. I'm John Furrier, host of theCUBE. I've got a great guest here, CUBE alumni and very impressive, inspiring, Rachel Mushahwar Skaff, who's a managing director and general manager at AWS. Rachel, great to see you. Thanks for coming on. >> Thank you so much. It's always a pleasure to be here. You all make such a tremendous impact with reporting out what's happening in the tech space, and frankly, investing in topics like this, so thank you. >> It's our pleasure. Your career has been really impressive. You worked at Intel for almost a decade, and that company is very tech, very focused on Moore's law, cadence of technology power in the industry. Now at AWS, powering next-generation cloud. What inspired you to get into tech? How did you get here and how have you approached your career journey, because it's quite a track record? >> Wow, how long do we have? (Rachel and John laugh) >> John: We can go as long as you want. (laughs) It's great. >> You know, all joking aside, I think at the end of the day, it's about this simple statement. If you don't get goosebumps every single morning that you're waking up to do your job, it's not good enough. And that's a bit about how I've made all of the different career transitions that I have. You know, everything from building out data centers around the world, to leading network and engineering teams, to leading applications teams, to going and working for, you know, the largest semiconductor in the world, and now at AWS, every single one of those opportunities gave me goosebumps. And I was really focused on how do I surround myself with humans that are better than I am, smarter than I am, companies that plan in decades, but live in moments, companies that invest in their employees and create like artists? And frankly, for me, being part of a company where people know that life is finite, but they want to make an infinite impact, that's a bit about my career journey in a nutshell. >> Yeah. What's interesting is that, you know, over the years, a lot's changed, and a theme that we're hearing from leaders now that are heading up large teams and running companies, they have, you know, they have 20-plus years of experience under their belt and they look back and they say, "Wow, "things have changed and it's changing faster now, "hopefully faster to get change." But they all talk about confidence and they talk about curiosity and building. When did you know that this was going to be something that you got the goosebumps? And were there blockers in your way and how did you handle that? (Rachel laughs) >> There's always blockers in our way, and I think a lot of people don't actually talk about the blockers. I think they make it sound like, hey, I had this plan from day one, and every decision I've made has been perfect. And for me, I'll tell you, right, there are moments in your life that mark a differentiation and those moments that you realize nothing will be the same. And time is kind of divided into two parts, right, before this moment and after this moment. And that's everything from, before I had kids, that's a pretty big moment in people's lives, to after I had kids, and how do you work through some of those opportunities? Before I got married, before I got divorced. Before I went to this company, after I left this company. And I think the key for all of those is just having an insatiable curiosity around how do you continue to do better, create better and make better? And I'll tell you, those blockers, they exist. Coming back from maternity leave, hard. Coming back from a medical leave, hard. Coming back from caring for a sick parent or a sick friend, hard. But all of those things start to help craft who you are as a human being, not as a leader, but as a human being, and allows you to have some empathy with the people that you surround yourself with, right? And for me, it's, (sighs) you can think about these blockers in one of two ways. You can think about it as, you know, every single time that you're tempted to react in the same way to a blocker, you can be a prisoner of your past, or you can change how you react and be a pioneer of the future. It's not a blocker when you think about it in those terms. >> Mindset matters, and that's really a great point. You brought up something that's interesting, I want to bring this up. Some of the challenges in different stages of our lives. You know, one thing that's come out of this set of interviews, this, of day and in conversations is, that I haven't heard before, is the result of COVID, working at home brought empathy about people's personal lives to the table. That came up in a couple interviews. What's your reaction to that? Because that highlights that we're human, to your point of view. >> It does. It does. And I'm so thankful that you don't ask about balance because that is a pet peeve of mine, because there is no such thing as balance. If you're in perfect balance, you are not moving and you're not changing. But when you think about, you know, the impact of COVID and how the world has changed since that, it has allowed all of us to really think about, you know, what do we want to do versus what do we have to do? And I think so many times, in both our professional lives and our personal lives, we get caught up in doing what we think we have to do to get ahead versus taking a step back and saying, "Hey, what do I want to do? "And how do I become a, you know, "a better human?" And many times, John, I'm asked, "Hey, "how do you define success or achievement?" And, you know, my answer is really, for me, the greatest results that I've achieved, both personally and professionally, is when I eliminate the word success and balance from my vocabulary, and replace them with two words: What's my contribution and what's my impact? Those things make a difference, regardless of gender. And I'll tell you, none of it is easy, ever. I think all of us have been broken, we've been stretched, we've been burnt out. But I also think what we have to talk about as leaders in the industry is how we've also found endurance and resilience. And when we felt unsteady, we've continued to go forward, right? When we can't decide, the best answer is do what's uncomfortable. And all of those things really stemmed from a part of what happened with COVID. >> Yeah, yeah, I love the uncomfortable and the balance highlight. You mentioned being off balance. That means you're growing, you're not standing still. I want to get your thoughts on this because one thing that has come out again this year, and last year as well, is having a team with you when you do it. So if you're off balance and you're going to stretch, if you have a good team with you, that's where people help each other. Not just pick them up, but like maybe get 'em back on track again. So, but if you're solo, you fall, (laughs) you fall harder. So what's your reaction to that? 'Cause this has come up, and this comes up in team building, workforce formation, goal setting, contribution. What's your reaction to that? >> So my reaction to that that is pretty simple. Nobody gets there on their own at all, right? Passion and ambition can only take you so far. You've got to have people and teams that are supporting you. And here's the funny thing about people, and frankly, about being a leader that I think is really important: People don't follow for you. People follow for who you help them become. Think about that for a second. And when you think about all the amazing things that companies and teams are able to do, it's because of those people. And it's because you have leaders that are out there, inspiring them to take what they believe is impossible and turn it into the possible. That's the power of teams. >> Can you give an example of your approach on how you do that? How do you build your teams? How do you grow them? How do you lead them effectively and also make 'em inclusive, diverse and equitable? >> Whew. I'll give you a great example of some work that we're doing at AWS. This year at re:Invent, for the first time in its history, we've launched an initiative with theCUBE called Women of the Cloud. And part of Women of the Cloud is highlighting the business impact that so many of our partners, our customers and our employees have had on the social, on the economic and on the financials of many companies. They just haven't had the opportunity to tell their story. And at Amazon, right, it is absolutely integral to us to highlight those examples and continue to extend that ethos to our partners and our customers. And I think one of the things that I shared with you at re:Invent was, you know, as U2's Bono put it, (John laughs) "We'll build it better than we did before "and we are the people "that we've been waiting for." So if we're not out there, advocating and highlighting all the amazing things that other women are doing in the ecosystem, who will? >> Well, I've got to say, I want to give you props for that program. Not only was it groundbreaking, it's still running strong. And I saw some things on LinkedIn that were really impressive in its network effect. And I met at least half a dozen new people I never would have met before through some of that content interaction and engagement. And this is like the power of the current world. I mean, getting the voices out there creates momentum. And it's good for Amazon. It's not just personal brand building for my next job or whatever, you know, reason. It's sharing and it's attracting others, and it's causing people to connect and meet each other in that world. So it's still going strong. (laughs) And this program we did last year was part of Rachel Thornton, who's now at MessageBird, and Mary Camarata. They were the sponsors for this International Women's Day. They're not there anymore, so we decided we're going to do it again because the impact is so significant. We had the Amazon Education group on. It's amazing and it's free, and we've got to get the word out. I mean, talk about leveling up fast. You get in and you get trained and get certified, and there's a zillion jobs out (laughs) there in cloud, right, and partners. So this kind of leadership is really important. What was the key learnings that you've taken away and how do you extend this opportunity to nurture the talent out there in the field? Because when you throw the content out there from great leaders and practitioners and developers, it attracts other people. >> It does. It does. So look, I think there's two types of people, people that are focused on being and people who are focused on doing. And let me give you an example, right? When we think about labels of, hey, Rachel's a female executive who launched Women of the Cloud, that label really limits me. I'd rather just be a great executive. Or, hey, there's a great entrepreneur. Let's not be a great entrepreneur. Just go build something and sell it. And that's part of this whole Women of the cloud, is I don't want people focused on what their label is. I want people sharing their stories about what they're doing, and that's where the lasting impact happens, right? I think about something that my grandmother used to tell me, and she used to tell me, "Rachel, how successful "you are, doesn't matter. "The lasting impact that you have "is your legacy in this very finite time "that you have on Earth. "Leave a legacy." And that's what Women of the Cloud is about. So that people can start to say, "Oh, geez, "I didn't know that that was possible. "I didn't think about my career in that way." And, you know, all of those different types of stories that you're hearing out there. >> And I want to highlight something you said. We had another Amazonian on the program for this day earlier and she coined a term, 'cause inside Amazon, you have common language. One of them is bar raising. Raise the bar, that's an Amazonian (Rachel laughs) term. It means contribute and improve and raise the bar of capability. She said, "Bar raising is gender neutral. "The bar is a bar." And I'm like, wow, that was amazing. Now, that means your contribution angle there highlights that. What's the biggest challenge to get that mindset set in culture, in these- >> Oh. >> 'Cause it's that simple, contribution is neutral. >> It absolutely is neutral, but it's like I said earlier, I think so many times, people are focused on success and being a great leader versus what's the contribution I'm making and how am I doing as a leader, you know? And when it comes to a lot of the leadership principles that Amazon has, including bar raising, which means insisting on the highest standards, and then those standards continue to raise every single time. And what that is all about is having all of our employees figure out, how do I get better every single day, right? That's what it's about. It's not about being better than the peer next to you. It's about how do I become a better leader, a better human being than I was yesterday? >> Awesome. >> You know, I read this really cute quote and I think it really resonates. "You meditate to upgrade your software "and you work out to upgrade your hardware." And while it's important that we're all ourselves at work, we can't deny that a lot of times, ourselves still need that meditation or that workout. >> Well, I hope I don't have any zero days in my software out there, so, but I'm going to definitely work on that. I love that quote. I'm going to use that. Thank you very much. That was awesome. I got to ask you, I know you're really passionate about, and we've talked about this, around, so you're a great leader but you're also focused on what's behind you in the generation, pipelining women leaders, okay? Seats at the table, mentoring and sponsorship. What can we do to build a strong pipeline of leaders in technology and business? And where do you see the biggest opportunity to nurture the talent in these fields? >> Hmm, you know, that's great, great question. And, you know, I just read a "Forbes" article by another Amazonian, Tanuja Randery, who talked about, you know, some really interesting stats. And one of the stats that she shared was, you know, by 2030, less than 25% of tech specialists will be female, less than 25%. That's only a 6% growth from where we are in 2023, so in seven years. That's alarming. So we've really got to figure out what are the kinds of things that we're going to go do from an Amazon perspective to impact that? And one of the obvious starting points is showcasing tech careers to girls and young women, and talking openly about what a technology career looks like. So specifically at Amazon, we've got an AWS Git IT program that helps schools and educators bring in tech role models to show them what potential careers look like in tech. I think that's one great way that we can help build the pipeline, but once we get the pipeline, we also have to figure out how we don't let that pipeline leak. Meaning how do we keep women and, you know, young women on their tech career? And I think big part of that, John, is really talking about how hard it is, but it's also greater than you can ever imagine. And letting them see executives that are very authentic and will talk about, geez, you know, the challenges of COVID were a time of crisis and accelerated change, and here's what it meant to me personally and here's what we were able to solve professionally. These younger generations are all about social impact, they're about economic impact and they're about financial impact. And if we're not talking about all three of those, both from how AWS is leading from the front, but how its executives are also taking that into their personal lives, they're not going to want to go into tech. >> Yeah, and I think one of the things you mentioned there about getting people that get IT, good call out there, but also, Amazon's going to train 30 million people, put hundreds of millions of dollars into education. And not only are they making it easier to get in to get trained, but once you're in, even savvy folks that are in there still have to accelerate. And there's more ways to level up, more things are happening, but there's a big trend around people changing careers either in their late 20s, early 30s, or even those moments you talk about, where it's before and after, even later in the careers, 40s, 50s. Leaders like, well, good experience, good training, who were in another discipline who re-skilled. So you have, you know, more certifications coming in. So there's still other pivot points in the pipeline. It's not just down here. And that, I find that interesting. Are you seeing that same leadership opportunities coming in where someone can come into tech older? >> Absolutely. You know, we've got some amazing programs, like Amazon Returnity, that really focuses on how do we get other, you know, how do we get women that have taken some time off of work to get back into the workforce? And here's the other thing about switching careers. If I look back on my career, I started out as a civil engineer, heavy highway construction. And now I lead a sales team at the largest cloud company in the world. And there were, you know, twists and turns around there. I've always focused on how do we change and how do we continue to evolve? So it's not just focused on, you know, young women in the pipeline. It's focused on all gender and all diverse types throughout their career, and making sure that we're providing an inclusive environment for them to bring in their unique skillsets. >> Yeah, a building has good steel. It's well structured. Roads have great foundations. You know, you got the builder in you there. >> Yes. >> So I have to ask you, what's on your mind as a tech athlete, as an executive at AWS? You know, you got your huge team, big goals, the economy's got a little bit of a headwind, but still, cloud's transforming, edge is exploding. What's your outlook as you look out in the tech landscape these days and how are you thinking about it? What your plans? Can you share a little bit about what's on your mind? >> Sure. So, geez, there's so many trends that are top of mind right now. Everything from zero trust to artificial intelligence to security. We have more access to data now than ever before. So the opportunities are limitless when we think about how we can apply technology to solve some really difficult customer problems, right? Innovation sometimes feels like it's happening at a rapid pace. And I also say, you know, there are years when nothing happens, and then there's years when centuries happen. And I feel like we're kind of in those years where centuries are happening. Cloud technologies are refining sports as we know them now. There's a surge of innovation in smart energy. Everyone's supply chain is looking to transform. Custom silicon is going mainstream. And frankly, AWS's customers and partners are expecting us to come to them with a point of view on trends and on opportunities. And that's what differentiates us. (John laughs) That's what gives me goosebumps- >> I was just going to ask you that. Does that give you goosebumps? How could you not love technology with that excitement? I mean, AI, throw in AI, too. I just talked to Swami, who heads up the AI and database, and we just talked about the past 24 months, the change. And that is a century moment happening. The large language models, computer vision, more compute. Compute's booming than ever before. Who thought that was going to happen, is still happening? Massive change. So, I mean, if you're in tech, how can you not love tech? >> I know, even if you're not in tech, I think you've got to start to love tech because it gives you access to things you've never had before. And frankly, right, change is the only constant. And if you don't like change, you're going to like being irrelevant even less than you like change. So we've got to be nimble, we've got to adapt. And here's the great thing, once we figure it out, it changes all over again. And it's not something that's easy for any of us to operate. It's hard, right? It's hard learning new technology, it's hard figuring out what do I do next? But here's the secret. I think it's hard because we're doing it right. It's not hard because we're doing it wrong. It's just hard to be human and it's hard to figure out how we apply all this different technology in a way that positively impacts us, you know, economically, financially, environmentally and socially. >> And everyone's different, too. So you got to live those (mumbles). I want to get one more question in before we, my last question, which is about you and your impact. When you talk to your team, your sales, you got a large sales team, North America. And Tanuja, who you mentioned, is in EMEA, we're going to speak with her as well. You guys lead the front lines, helping customers, but also delivering the revenue to the company, which has been fantastic, by the way. So what's your message to the troops and the team out there? When you say, "Take that hill," like what is the motivational pitch, in a few sentences? What's the main North Star message in today's marketplace when you're doing that big team meeting? >> I don't know if it's just limited to a team meeting. I think this is a universal message, and the universal message for me is find your edge, whatever that may be. Whether it is the edge of what you know about artificial intelligence and neural networks or it's the edge of how do we migrate our applications to the cloud more quickly. Or it's the edge of, oh, my gosh, how do I be a better parent and still be great at work, right? Find your edge, and then sharpen it. Go to the brink of what you think is possible, and then force yourself to jump. Get involved. The world is run by the people that show up, professionally and personally. (John laughs) So show up and get started. >> Yeah as Steve Jobs once said, "The future "that everyone looks at was created "by people no smarter than you." And I love that quote. That's really there. Final question for you. I know we're tight on time, but I want to get this in. When you think about your impact on your company, AWS, and the industry, what's something you want people to remember? >> Oh, geez. I think what I want people to remember the most is it's not about what you've said, and this is a Maya Angelou quote. "It's not about what you've said to people "or what you've done, "it's about how you've made them feel." And we can all think back on leaders or we can all think back on personal moments in our lives where we felt like we belonged, where we felt like we did something amazing, where we felt loved. And those are the moments that sit with us for the rest of our lives. I want people to remember how they felt when they were part of something bigger. I want people to belong. It shouldn't be uncommon to talk about feelings at work. So I want people to feel. >> Rachel, thank you for your time. I know you're really busy and we stretched you a little bit there. Thank you so much for contributing to this wonderful day of great leaders sharing their stories. And you're an inspiration. Thanks for everything you do. We appreciate you. >> Thank you. And let's go do some more Women of the Cloud videos. >> We (laughs) got more coming. Bring those stories on. Back up the story truck. We're ready to go. Thanks so much. >> That's good. >> Thank you. >> Okay, this is theCUBE's coverage of International Women's Day. It's not just going to be March 8th. That's the big celebration day. It's going to be every quarter, more stories coming. Stay tuned at siliconangle.com and thecube.net here, with bringing all the stories. I'm John Furrier, your host. Thanks for watching. (gentle music)

Published Date : Mar 6 2023

SUMMARY :

and very impressive, inspiring, Thank you so much. and how have you approached long as you want. to going and working for, you know, and how did you handle that? and how do you work through Some of the challenges in And I'm so thankful that you don't ask and the balance highlight. And it's because you have leaders that I shared with you at re:Invent and how do you extend this opportunity And let me give you an example, right? and raise the bar of capability. contribution is neutral. than the peer next to you. "and you work out to And where do you see And one of the stats that she shared the things you mentioned there And there were, you know, twists You know, you got the and how are you thinking about it? And I also say, you know, I was just going to ask you that. And if you don't like change, And Tanuja, who you mentioned, is in EMEA, of what you know about And I love that quote. And we can all think back on leaders Rachel, thank you for your time. Women of the Cloud videos. We're ready to go. It's not just going to be March 8th.

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
TelcoORGANIZATION

0.99+

RachelPERSON

0.99+

Tim CookPERSON

0.99+

Jeff FrickPERSON

0.99+

TelcosORGANIZATION

0.99+

Tanuja RanderyPERSON

0.99+

Rachel ThorntonPERSON

0.99+

AmazonORGANIZATION

0.99+

NayakiPERSON

0.99+

SanjayPERSON

0.99+

Peter BurrisPERSON

0.99+

2014DATE

0.99+

FordORGANIZATION

0.99+

TanujaPERSON

0.99+

Rachel SkaffPERSON

0.99+

Todd SkidmorePERSON

0.99+

NokiaORGANIZATION

0.99+

BarcelonaLOCATION

0.99+

JohnPERSON

0.99+

AustraliaLOCATION

0.99+

FacebookORGANIZATION

0.99+

Bob StefanskiPERSON

0.99+

Steve JobsPERSON

0.99+

Tom JoycePERSON

0.99+

Lisa MartinPERSON

0.99+

Laura CooneyPERSON

0.99+

John FurrierPERSON

0.99+

ToddPERSON

0.99+

AWSORGANIZATION

0.99+

2011DATE

0.99+

Mary CamarataPERSON

0.99+

Meg WhitmanPERSON

0.99+

IBMORGANIZATION

0.99+

TeslaORGANIZATION

0.99+

BlackberryORGANIZATION

0.99+

Coca-ColaORGANIZATION

0.99+

Palo AltoLOCATION

0.99+

Sanjay SrivastavaPERSON

0.99+

Silicon ValleyLOCATION

0.99+

BMC SoftwareORGANIZATION

0.99+

U.S.LOCATION

0.99+

SiriTITLE

0.99+

BMCORGANIZATION

0.99+

HPORGANIZATION

0.99+

MotorolaORGANIZATION

0.99+

JeffPERSON

0.99+

SamsungORGANIZATION

0.99+

Mihir ShuklaPERSON

0.99+

2023DATE

0.99+

Nayaki NayyarPERSON

0.99+

AppleORGANIZATION

0.99+

Rachel Mushahwar SkaffPERSON

0.99+

6%QUANTITY

0.99+

GoogleORGANIZATION

0.99+

Share A CokeORGANIZATION

0.99+

Pierluca Chiodelli, Dell Technologies & Dan Cummins, Dell Technologies | MWC Barcelona 2023


 

(intro music) >> "theCUBE's" live coverage is made possible by funding from Dell Technologies, creating technologies that drive human progress. (upbeat music) >> We're not going to- >> Hey everybody, welcome back to the Fira in Barcelona. My name is Dave Vellante, I'm here with Dave Nicholson, day four of MWC23. I mean, it's Dave, it's, it's still really busy. And you walking the floors, you got to stop and start. >> It's surprising. >> People are cheering. They must be winding down, giving out the awards. Really excited. Pier, look at you and Elias here. He's the vice president of Engineering Technology for Edge Computing Offers Strategy and Execution at Dell Technologies, and he's joined by Dan Cummins, who's a fellow and vice president of, in the Edge Business Unit at Dell Technologies. Guys, welcome. >> Thank you. >> Thank you. >> I love when I see the term fellow. You know, you don't, they don't just give those away. What do you got to do to be a fellow at Dell? >> Well, you know, fellows are senior technical leaders within Dell. And they're usually tasked to help Dell solve you know, a very large business challenge to get to a fellow. There's only, I think, 17 of them inside of Dell. So it is a small crowd. You know, previously, really what got me to fellow, is my continued contribution to transform Dell's mid-range business, you know, VNX two, and then Unity, and then Power Store, you know, and then before, and then after that, you know, they asked me to come and, and help, you know, drive the technology vision for how Dell wins at the Edge. >> Nice. Congratulations. Now, Pierluca, I'm looking at this kind of cool chart here which is Edge, Edge platform by Dell Technologies, kind of this cube, like cubes course, you know. >> AK project from here. >> Yeah. So, so tell us about the Edge platform. What, what's your point of view on all that at Dell? >> Yeah, absolutely. So basically in a, when we create the Edge, and before even then was bringing aboard, to create this vision of the platform, and now building the platform when we announced project from here, was to create solution for the Edge. Dell has been at the edge for 30 years. We sold a lot of compute. But the reality was people want outcome. And so, and the Edge is a new market, very exciting, but very siloed. And so people at the Edge have different personas. So quickly realize that we need to bring in Dell, people with expertise, quickly realize as well that doing all these solution was not enough. There was a lot of problem to solve because the Edge is outside of the data center. So you are outside of the wall of the data center. And what is going to happen is obviously you are in the land of no one. And so you have million of device, thousand of million of device. All of us at home, we have all connected thing. And so we understand that the, the capability of Dell was to bring in technology to secure, manage, deploy, with zero touch, zero trust, the Edge. And all the edge the we're speaking about right now, we are focused on everything that is outside of a normal data center. So, how we married the computer that we have for many years, the new gateways that we create, so having the best portfolio, number one, having the best solution, but now, transforming the way that people deploy the Edge, and secure the Edge through a software platform that we create. >> You mentioned Project Frontier. I like that Dell started to do these sort of project, Project Alpine was sort of the multi-cloud storage. I call it "The Super Cloud." The Project Frontier. It's almost like you develop, it's like mission based. Like, "Okay, that's our North Star." People hear Project Frontier, they know, you know, internally what you're talking about. Maybe use it for external communications too, but what have you learned since launching Project Frontier? What's different about the Edge? I mean you're talking about harsh environments, you're talking about new models of connectivity. So, what have you learned from Project Frontier? What, I'd love to hear the fellow perspective as well, and what you guys are are learning so far. >> Yeah, I mean start and then I left to them, but we learn a lot. The first thing we learn that we are on the right path. So that's good, because every conversation we have, there is nobody say to us, you know, "You are crazy. "This is not needed." Any conversation we have this week, start with the telco thing. But after five minutes it goes to, okay, how I can solve the Edge, how I can bring the compute near where the data are created, and how I can do that secure at scale, and with the right price. And then can speak about how we're doing that. >> Yeah, yeah. But before that, we have to really back up and understand what Dell is doing with Project Frontier, which is an Edge operations platform, to simplify your Edge use cases. Now, Pierluca and his team have a number of verticalized applications. You want to be able to securely deploy those, you know, at the Edge. But you need a software platform that's going to simplify both the life cycle management, and the security at the Edge, with the ability to be able to construct and deploy distributed applications. Customers are looking to derive value near the point of generation of data. We see a massive explosion of data. But in particular, what's different about the Edge, is the different computing locations, and the constraints that are on those locations. You know, for example, you know, in a far Edge environment, the people that service that equipment are not trained in the IT, or train, trained in it. And they're also trained in the safety and security protocols of that environment. So you necessarily can't apply the same IT techniques when you're managing infrastructure and deploying applications, or servicing in those locations. So Frontier was designed to solve for those constraints. You know, often we see competitors that are doing similar things, that are starting from an IT mindset, and trying to shift down to cover Edge use cases. What we've done with Frontier, is actually first understood the constraints that they have at the Edge. Both the operational constraints and technology constraints, the service constraints, and then came up with a, an architecture and technology platform that allows them to start from the Edge, and bleed into the- >> So I'm laughing because you guys made the same mistake. And you, I think you learned from that mistake, right? You used to take X86 boxes and throw 'em over the fence. Now, you're building purpose-built systems, right? Project Frontier I think is an example of the learnings. You know, you guys an IT company, right? Come on. But you're learning fast, and that's what I'm impressed about. >> Well Glenn, of course we're here at MWC, so it's all telecom, telecom, telecom, but really, that's a subset of Edge. >> Yes. >> Fair to say? >> Yes. >> Can you give us an example of something that is, that is, orthogonal to, to telecom, you know, maybe off to the side, that maybe overlaps a little bit, but give us an, give us an example of Edge, that isn't specifically telecom focused. >> Well, you got the, the Edge verticals. and Pierluca could probably speak very well to this. You know, you got manufacturing, you got retail, you got automotive, you got oil and gas. Every single one of them are going to make different choices in the software that they're going to use, the hyperscaler investments that they're going to use, and then write some sort of automation, you know, to deploy that, right? And the Edge is highly fragmented across all of these. So we certainly could deploy a private wireless 5G solution, orchestrate that deployment through Frontier. We can also orchestrate other use cases like connected worker, or overall equipment effectiveness in manufacturing. But Pierluca you have a, you have a number. >> Well, but from your, so, but just to be clear, from your perspective, the whole idea of, for example, private 5g, it's a feature- >> Yes. >> That might be included. It happened, it's a network topology, a network function that might be a feature of an Edge environment. >> Yes. But it's not the center of the discussion. >> So, it enables the outcome. >> Yeah. >> Okay. >> So this, this week is a clear example where we confirm and establish this. The use case, as I said, right? They, you say correctly, we learned very fast, right? We brought people in that they came from industry that was not IT industry. We brought people in with the things, and we, we are Dell. So we have the luxury to be able to interview hundreds of customers, that just now they try to connect the OT with the IT together. And so what we learn, is really, at the Edge is different personas. They person that decide what to do at the Edge, is not the normal IT administrator, is not the normal telco. >> Who is it? Is it an engineer, or is it... >> It's, for example, the store manager. >> Yeah. >> It's, for example, the, the person that is responsible for the manufacturing process. Those people are not technology people by any means. But they have a business goal in mind. Their goal is, "I want to raise my productivity by 30%," hence, I need to have a preventive maintenance solution. How we prescribe this preventive maintenance solution? He doesn't prescribe the preventive maintenance solution. He goes out, he has to, a consult or himself, to deploy that solution, and he choose different fee. Now, the example that I was doing from the houses, all of us, we have connected device. The fact that in my house, I have a solar system that produce energy, the only things I care that I can read, how much energy I produce on my phone, and how much energy I send to get paid back. That's the only thing. The fact that inside there is a compute that is called Dell or other things is not important to me. Same persona. Now, if I can solve the security challenge that the SI, or the user need to implement this technology because it goes everywhere. And I can manage this in extensively, and I can put the supply chain of Dell on top of that. And I can go every part in the world, no matter if I have in Papua New Guinea, or I have an oil ring in Texas, that's the winning strategy. That's why people, they are very interested to the, including Telco, the B2B business in telco is looking very, very hard to how they recoup the investment in 5g. One of the way, is to reach out with solution. And if I can control and deploy things, more than just SD one or other things, or private mobility, that's the key. >> So, so you have, so you said manufacturing, retail, automotive, oil and gas, you have solutions for each of those, or you're building those, or... >> Right now we have solution for manufacturing, with for example, PTC. That is the biggest company. It's actually based in Boston. >> Yeah. Yeah, it is. There's a company that the market's just coming right to them. >> We have a, very interesting. Another solution with Litmus, that is a startup that, that also does manufacturing aggregation. We have retail with Deep North. So we can do detecting in the store, how many people they pass, how many people they doing, all of that. And all theses solution that will be, when we will have Frontier in the market, will be also in Frontier. We are also expanding to energy, and we going vertical by vertical. But what is they really learn, right? You said, you know you are an IT company. What, to me, the Edge is a pre virtualization area. It's like when we had, you know, I'm, I've been in the company for 24 years coming from EMC. The reality was before there was virtualization, everybody was starting his silo. Nobody thought about, "Okay, I can run this thing together "with security and everything, "but I need to do it." Because otherwise in a manufacturing, or in a shop, I can end up with thousand of devices, just because someone tell to me, I'm a, I'm a store manager, I don't know better. I take this video surveillance application, I take these things, I take a, you know, smart building solution, suddenly I have five, six, seven different infrastructure to run this thing because someone say so. So we are here to democratize the Edge, to secure the Edge, and to expand. That's the idea. >> So, the Frontier platform is really the horizontal platform. And you'll build specific solutions for verticals. On top of that, you'll, then I, then the beauty is ISV's come in. >> Yes. >> 'Cause it's open, and the developers. >> We have a self certification program already for our solution, as well, for the current solution, but also for Frontier. >> What does that involve? Self-certification. You go through you, you go through some- >> It's basically a, a ISV can come. We have a access to a lab, they can test the thing. If they pass the first screen, then they can become part of our ecosystem very easily. >> Ah. >> So they don't need to spend days or months with us to try to architect the thing. >> So they get the premature of being certified. >> They get the Dell brand associated with it. Maybe there's some go-to-market benefits- >> Yes. >> As well. Cool. What else do we need to know? >> So, one thing I, well one thing I just want to stress, you know, when we say horizontal platform, really, the Edge is really a, a distributed edge computing problem, right? And you need to almost create a mesh of different computing locations. So for example, even though Dell has Edge optimized infrastructure, that we're going to deploy and lifecycle manage, customers may also have compute solutions, existing compute solutions in their data center, or at a co-location facility that are compute destinations. Project Frontier will connect to those private cloud stacks. They'll also collect to, connect to multiple public cloud stacks. And then, what they can do, is the solutions that we talked about, they construct that using an open based, you know, protocol, template, that describes that distributed application that produces that outcome. And then through orchestration, we can then orchestrate across all of these locations to produce that outcome. That's what the platform's doing. >> So it's a compute mesh, is what you just described? >> Yeah, it's, it's a, it's a software orchestration mesh. >> Okay. >> Right. And allows customers to take advantage of their existing investments. Also allows them to, to construct solutions based on the ISV of their choice. We're offering solutions like Pierluca had talked about, you know, in manufacturing with Litmus and PTC, but they could put another use case that's together based on another ISV. >> Is there a data mesh analog here? >> The data mesh analog would run on top of that. We don't offer that as part of Frontier today, but we do have teams working inside of Dell that are working on this technology. But again, if there's other data mesh technology or packages, that they want to deploy as a solution, if you will, on top of Frontier, Frontier's extensible in that way as well. >> The open nature of Frontier is there's a, doesn't, doesn't care. It's just a note on the mesh. >> Yeah. >> Right. Now, of course you'd rather, you'd ideally want it to be Dell technology, and you'll make the business case as to why it should be. >> They get additional benefits if it's Dell. Pierluca talked a lot about, you know, deploying infrastructure outside the walls of an IT data center. You know, this stuff can be tampered with. Somebody can move it to another room, somebody can open up. In the supply chain with, you know, resellers that are adding additional people, can open these devices up. We're actually deploying using an Edge technology called Secure Device Onboarding. And it solves a number of things for us. We, as a manufacturer can initialize the roots of trust in the Dell hardware, such that we can validate, you know, tamper detection throughout the supply chain, and securely transfer ownership. And that's different. That is not an IT technique. That's an edge technique. And that's just one example. >> That's interesting. I've talked to other people in IT about how they're using that technique. So it's, it's trickling over to that side of the business. >> I'm almost curious about the friction that you, that you encounter because the, you know, you paint a picture of a, of a brave new world, a brave new future. Ideally, in a healthy organization, they have, there's a CTO, or at least maybe a CIO, with a CTO mindset. They're seeking to leverage technology in the service of whatever the mission of the organization is. But they've got responsibilities to keep the lights on, as well as innovate. In that mix, what are you seeing as the inhibitors? What's, what's the push back against Frontier that you're seeing in most cases? Is it, what, what is it? >> Inside of Dell? >> No, not, I'm saying out, I'm saying with- >> Market friction. >> Market, market, market friction. What is the push back? >> I think, you know, as I explained, do yourself is one of the things that probably is the most inhibitor, because some people, they think that they are better already. They invest a lot in this, and they have the content. But those are again, silo solutions. So, if you go into some of the huge things that they already established, thousand of store and stuff like that, there is an opportunity there, because also they want to have a refresh cycle. So when we speak about softer, softer, softer, when you are at the Edge, the software needs to run on something that is there. So the combination that we offer about controlling the security of the hardware, plus the operating system, and provide an end-to-end platform, allow them to solve a lot of problems that today they doing by themselves. Now, I met a lot of customers, some of them, one actually here in Spain, I will not make the name, but it's a large automotive. They have the same challenge. They try to build, but the problem is this is just for them. And they want to use something that is a backup and provide with the Dell service, Dell capability of supply chain in all the world, and the diversity of the portfolio we have. These guys right now, they need to go out and find different types of compute, or try to adjust thing, or they need to have 20 people there to just prepare the device. We will take out all of this. So I think the, the majority of the pushback is about people that they already established infrastructure, and they want to use that. But really, there is an opportunity here. Because the, as I said, the IT/OT came together now, it's a reality. Three years ago when we had our initiative, they've pointed out, sarcastically. We, we- >> Just trying to be honest. (laughing) >> I can't let you get away with that. >> And we, we failed because it was too early. And we were too focused on, on the fact to going. Push ourself to the boundary of the IOT. This platform is open. You want to run EdgeX, you run EdgeX, you want OpenVINO, you want Microsoft IOT, you run Microsoft IOT. We not prescribe the top. We are locking down the bottom. >> What you described is the inertia of, of sunk dollars, or sunk euro into an infrastructure, and now they're hanging onto that. >> Yeah. >> But, I mean, you know, I, when we say horizontal, we think scale, we think low cost, at volume. That will, that will win every time. >> There is a simplicity at scale, right? There is a, all the thing. >> And the, and the economics just overwhelm that siloed solution. >> And >> That's inevitable. >> You know, if you want to apply security across the entire thing, if you don't have a best practice, and a click that you can do that, or bring down an application that you need, you need to touch each one of these silos. So, they don't know yet, but we going to be there helping them. So there is no pushback. Actually, this particular example I did, this guy said you know, there are a lot of people that come here. Nobody really described the things we went through. So we are on the right track. >> Guys, great conversation. We really appreciate you coming on "theCUBE." >> Thank you. >> Pleasure to have you both. >> Okay. >> Thank you. >> All right. And thank you for watching Dave Vellante for Dave Nicholson. We're live at the Fira. We're winding up day four. Keep it right there. Go to siliconangle.com. John Furrier's got all the news on "theCUBE.net." We'll be right back right after this break. "theCUBE," at MWC 23. (outro music)

Published Date : Mar 2 2023

SUMMARY :

that drive human progress. And you walking the floors, in the Edge Business Unit the term fellow. and help, you know, drive cubes course, you know. about the Edge platform. and now building the platform when I like that Dell started to there is nobody say to us, you know, and the security at the Edge, an example of the learnings. Well Glenn, of course you know, maybe off to the side, in the software that they're going to use, a network function that might be a feature But it's not the center of the discussion. is really, at the Edge Who is it? that the SI, or the user So, so you have, so That is the biggest company. There's a company that the market's just I take a, you know, is really the horizontal platform. and the developers. We have a self What does that involve? We have a access to a lab, to try to architect the thing. So they get the premature They get the Dell As well. is the solutions that we talked about, it's a software orchestration mesh. on the ISV of their choice. that they want to deploy It's just a note on the mesh. as to why it should be. In the supply chain with, you know, to that side of the business. In that mix, what are you What is the push back? So the combination that we offer about Just trying to be honest. on the fact to going. What you described is the inertia of, you know, I, when we say horizontal, There is a, all the thing. overwhelm that siloed solution. and a click that you can do that, you coming on "theCUBE." And thank you

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
TelcoORGANIZATION

0.99+

Dave VellantePERSON

0.99+

Dan CumminsPERSON

0.99+

Dave NicholsonPERSON

0.99+

SpainLOCATION

0.99+

DellORGANIZATION

0.99+

EliasPERSON

0.99+

PierlucaPERSON

0.99+

TexasLOCATION

0.99+

Papua New GuineaLOCATION

0.99+

Pierluca ChiodelliPERSON

0.99+

30%QUANTITY

0.99+

BostonLOCATION

0.99+

Dave NicholsonPERSON

0.99+

GlennPERSON

0.99+

telcoORGANIZATION

0.99+

Dell TechnologiesORGANIZATION

0.99+

30 yearsQUANTITY

0.99+

DavePERSON

0.99+

FrontierORGANIZATION

0.99+

EdgeORGANIZATION

0.99+

John FurrierPERSON

0.99+

LitmusORGANIZATION

0.99+

20 peopleQUANTITY

0.99+

fiveQUANTITY

0.99+

hundredsQUANTITY

0.99+

BarcelonaLOCATION

0.99+

24 yearsQUANTITY

0.99+

EMCORGANIZATION

0.99+

PTCORGANIZATION

0.99+

siliconangle.comOTHER

0.99+

one exampleQUANTITY

0.99+

this weekDATE

0.99+

five minutesQUANTITY

0.99+

MicrosoftORGANIZATION

0.99+

first screenQUANTITY

0.98+

sixQUANTITY

0.98+

bothQUANTITY

0.98+

oneQUANTITY

0.98+

PierPERSON

0.98+

sevenQUANTITY

0.98+

Three years agoDATE

0.98+

EdgeTITLE

0.98+

OpenVINOTITLE

0.97+

Project FrontierORGANIZATION

0.97+

firstQUANTITY

0.97+

thousandQUANTITY

0.97+

BothQUANTITY

0.96+

first thingQUANTITY

0.96+

EdgeXTITLE

0.96+

Jillian Kaplan, Dell Technologies & Meg Knauth, T Mobile | MWC Barcelona 2023


 

(low-key music) >> The cube's live coverage is made possible by funding from Dell Technologies. Creating technologies that drive human progress. (uplifting electronic music) (crowd chattering in background) >> Welcome back to Spain, everybody. My name's Dave Vellante. I'm here with Dave Nicholson. We are live at the Fira in Barcelona, covering MWC23 day four. We've been talking about, you know, 5G all week. We're going to talk about it some more. Jillian Kaplan is here. She's the head of Global Telecom Thought Leadership at Dell Technologies, and we're pleased to have Meg Knauth, who's the Vice President for Digital Platform Engineering at T-Mobile. Ladies, welcome to theCUBE. Thanks for coming on. >> Thanks for having us. >> Yeah, thank you. >> All right, Meg, can you explain 5G and edge to folks that may not be familiar with it? Give us the 101 on 5G and edge. >> Sure, I'd be happy to. So, at T-Mobile, we want businesses to be able to focus on their business outcomes and not have to stress about network technology. So we're here to handle the networking behind the scenes for you to achieve your business goals. The main way to think about 5G is speed, reduced latency, and heightened security. And you can apply that to so many different business goals and objectives. You know, some of the use cases that get touted out the most are in the retail manufacturing sectors with sensors and with control of inventory and things of that nature. But it can be applied to pretty much any industry because who doesn't need more (chuckles) more speed and lower latency. >> Yeah. And reliability, right? >> Exactly. >> I mean, that's what you're going to have there. So it's not like it's necessarily going to- you know, you think about 5G and these private networks, right? I mean, it's not going to, oh, maybe it is going to eat into, there's a Venn there, I know, but it's not going to going to replace wireless, right? I mean, it's new use cases. >> Yeah. >> Maybe you could talk about that a little bit. >> Yeah, they definitely coexist, right? And Meg touched a little bit on like all the use cases that are coming to be, but as we look at 5G, it's really the- we call it like the Enterprise G, right? It's where the enterprise is going to be able to see changes in their business and the way that they do things. And for them, it's going to be about reducing costs and heightening ROI, and safety too, right? Like being able to automate manufacturing facilities where you don't have workers, like, you know, getting hit by various pieces of equipment and you can take them out of harm's way and put robots in their place. And having them really work in an autonomous situation is going to be super, super key. And 5G is just the, it's the backbone of all future technologies if you look at it. We have to have a network like that in order to build things like AI and ML, and we talk about VR and the Metaverse. You have to have a super reliable network that can handle the amount of devices that we're putting out today, right? So, extremely important. >> From T-Mobile's perspective, I mean we hear a lot about, oh, we spent a lot on CapEx, we know that. You know, trillion and a half over the next seven years, going into 5G infrastructure. We heard in the early keynotes at MWC, we heard the call to you know, tax the over the top vendors. We heard the OTT, Netflix shot back, they said, "Why don't you help us pay for the content that we're creating?" But, okay, so I get that, but telcos have a great business. Where's T-Mobile stand on future revenue opportunities? Are you looking to get more data and monetize that data? Are you looking to do things like partner with Dell to do, you know, 5G networks? Where are the opportunities for T-Mobile? >> I think it's more, as Jillian said, it's the opportunities for each business and it's unique to those businesses. So we're not in it just for ourselves. We're in it to help others achieve their business goals and to do more with all of the new capabilities that this network provides. >> Yeah, man, I like that answer because again, listening to some of the CEOs of the large telcos, it's like, hmm, what's in it for me as the customer or the business? I didn't hear enough of that. And at least in the early keynotes, I'm hearing it more, you know, as the show goes on. But I don't know, Dave, what do you think about what you've heard at the event? >> Well, I'm curious from T-Mobile's perspective, you know when a consumer thinks about 5G, we think of voice, text, and data. And if we think about the 5G network that you already have in place, I'm curious, if you can share this kind of information, what percentage of that's being utilized now? How much is available for the, you know, for the Enterprise G that we're talking about, and maybe, you know, in five years in the future, do you have like a projected mix of consumer use versus all of these back office, call them processes that a consumer's not aware of, but you know the factory floor being connected via 5G, that frontiers that emerges, where are we now and what are you looking towards? Does that make sense? Kind of the mixed question? >> Hand over the business plan! (all laugh) >> Yeah! Yeah, yeah, yeah. >> Yeah, I- >> I want numbers Meg, numbers! >> Wow. (Dave and Dave laugh) I'm probably actually not the right person to speak to that. But as you know, T-Mobile has the largest 5G network in North America, and we just say, bring it, right? Let's talk- >> So you got room, you got room for Jillian's stuff? >> Yeah, let's solve >> Well, we can build so many >> business problems together. >> private 5G networks, right? Like I would say like the opportunities are... There's not a limit, right? Because as we build out these private networks, right? We're not on a public network when we're talking about like connecting these massive factories or connecting like a retail store to you and your house to be able to basically continue to try on the clothes remotely, something like that. It's limitless and what we can build- >> So they're related, but they're not necessarily mutually exclusive in the sense that what you are doing in the factory example is going to interfere with my ability to get my data through T-mobile. >> No, no, I- >> These are separated. >> Yeah. Yeah. >> Okay. >> As we build out these private networks and these private facilities, and there are so many applications in the consumer space that haven't even been realized yet. Like, when we think about 4G, when 4G launched, there were no applications that needed 4G to run on our cell phones, right? But then the engineers got to work, right? And we ended up with Uber and Instagram stories and all these applications that require 4G to launch. And that's what's going to happen with 5G too, it's like, as the network continues to get built, in the consumer space as well as the enterprise space, there's going to be new applications realized on this is all the stuff that we can do with this amazing network and look how many more devices and look how much faster it is, and the lower latency and the higher bandwidth, and you know, what we can really build. And I think what we're seeing at this show compared to last year is this stuff actually in practice. There was a lot of talk last year, like about, oh, this is what we can build, but now we're building it. And I think that's really key to show that companies like T-Mobile can help the enterprise in this space with cooperation, right? Like, we're not just talking about it now, we're actually putting it into practice. >> So how does it work? If I put in a private network, what are you doing? You slice out a piece of the network and charge me for it and then I get that as part of my private network. How does it actually work for the customer? >> You want to take that one? >> So I was going to say, yeah, you can do a network slice. You can actually physically build a private network, right? It depends, there's so many different ways to engineer it. So I think you can do it either way, basically. >> We just, we don't want it to be scary, right? >> Yep. >> So it starts with having a conversation about the business challenges that you're facing and then backing it into the technology and letting the technology power those solutions. But we don't want it to be scary for people because there's so much buzz around 5G, around edge, and it can be overwhelming and you can feel like you need a PhD in engineering to have a conversation. And we just want to kind of simplify things and talk in your language, not in our language. We'll figure out the tech behind the scenes. Just tell us what problems we can solve together. >> And so many non-technical companies are having to transform, right? Like retail, like manufacturing, that haven't had to be tech companies before. But together with T-Mobile and Dell, we can help enable that and make it not scary like Meg said. >> Right, so you come into my factory, I say, okay, look around. I got all these people there, and they're making hoses and they're physically putting 'em together. And we go and we have to take a physical measurement as to, you know, is it right? And because if we don't do that, then we have to rework it. Okay, now that's a problem. Okay, can you help me digitize that business? I need a network to do that. I'm going to put in some robots to do that. This is, I mean, I'm making this up but this has got to be a common use case, right? >> Yeah. >> So how do you simplify that for the business owner? >> So we start with what we can provide, and then in some cases you need additional solution providers. You might need a robotics company, you might need a sensor company. But we have those contacts to bring that together for you so that you don't have to be the expert in all those things. >> And what do I do with all the data that I'm collecting? Because, you know, I'm not really a data expert. Maybe, you know, I'm good at putting hoses together, but what's the data layer look like here? (all laughing) >> It's a hose business! >> I know! >> Great business. >> Back to the hoses again. >> There's a lot of different things you can do with it, right? You can collect it in a database, you can send it up to a cloud, you can, you know, use an edge device. It depends how we build the network. >> Dave V.: Can you guys help me do that? Can you guys- >> Sure, yeah. >> Help me figure that out. Should I put it into cloud? Should I use this database or that data? What kind of skills do I need? >> And it depends on the size of the network, right? And the size of the business. Like, you know, there's very simple. You don't have to be a massive manufacturer in order to install this stuff. >> No, I'm asking small business questions. >> Yeah. >> Right, I might not have this giant IT team. I might not have somebody who knows how to do ETL and PBA. >> Exactly. And we can talk to you too about what data matters, right? And we can, together, talk about what data might be the most valuable to you. We can talk to you about how we use data. But again, simplifying it down and making it personal to your business. >> Your point about scary is interesting, because no one has mentioned that until you did in four days. Three? Four days. Somebody says, let's do a private 5G network. That sounds like you're offering, you know, it's like, "Hey, you know what we should do Dave? We'll build you a cruise ship." It's like, I don't need a cruise ship, I just want to go bass fishing. >> Right, right, right. >> But in fact, these things are scalable in the sense that it can be scaled down from the trillions of dollars of infrastructure investment. >> Yeah. >> Yeah. It needs to be focused on your outcome, right? And not on the tech. >> When I was at the Dell booth I saw this little private network, it was about this big. I'm like, how much is that? I want one of those. (all laugh) >> I'm not the right person to talk about that! >> The little black one? >> Yes. >> I wanted one of those, too! >> I saw it, it had a little case to carry it around. I'm like, that could fit in my business. >> Just take it with you. >> theCUBE could use that! (all laugh) >> Anything that could go in a pelican case, I want. >> It's true. Like, it's so incredibly important, like you said, to focus on outcomes, right? Not just tech for the sake of tech. What's the problem? Let's solve the problem together. And then you're getting the outcome you want. You'll know what data you need. If you know what the problem is, you're like, okay this is the data I need to know if this problem is solved or not. >> So it sounds like 2022 was the year of talking about it. 2023, I'm inferring is the year of seeing it. >> Yep. >> And 2024 is going to be the year of doing it? >> I think we're doing it now. >> We're doing it now. >> Yeah. >> Okay. >> Yeah, yeah. We're definitely doing it now. >> All right. >> I see a lot of this stuff being put into place and a lot more innovation and a lot more working together. And Meg mentioned working with other partners. No one's going to do this alone. You've got to like, you know, Dell especially, we're focused on open and making sure that, you know, we have the right software partners. We're bringing in smaller players, right? Like ISVs too, as well as like the big software guys. Incredibly, incredibly important. The sensor companies, whatever we need you've got to be able to solve your customer's issue, which in this case, we're looking to help the enterprise together to transform their space. And Dell knows a little bit about the enterprise, so. >> So if we are there in 2023, then I assume 2024 will be the year that each of your companies sets up a dedicated vertical to address the hose manufacturing market. (Meg laughing) >> Oh, the hose manufacturing market. >> Further segmentation is usually a hallmark of the maturity of an industry. >> I got a lead for you. >> Yeah, there you go. >> And that's one thing we've done at Dell, too. We've built like this use case directory to help the service providers understand what, not just say like, oh, you can help manufacturers. Yeah, but how, what are the use cases to do that? And we worked with a research firm to figure out, like, you know these are the most mature, these are the best ROIs. Like to really help hone in on exactly what we can deploy for 5G and edge solutions that make the most sense, not only for service providers, right, but also for the enterprises. >> Where do you guys want to see this partnership go? Give us the vision. >> To infinity and beyond. To 5G! (Meg laughing) To 5G and beyond. >> I love it. >> It's continuation. I love that we're partnering together. It's incredibly important to the future of the business. >> Good deal. >> To bring the strengths of both together. And like Jillian said, other partners in the ecosystem, it has to be approached from a partnership perspective, but focused on outcomes. >> Jillian: Yep. >> To 5G and beyond. I love it. >> To 5G and beyond. >> Folks, thanks for coming on theCUBE. >> Thanks for having us. >> Appreciate your insights. >> Thank you. >> All right. Dave Vellante for Dave Nicholson, keep it right there. You're watching theCUBE. Go to silliconANGLE.com. John Furrier is banging out all the news. theCUBE.net has all the videos. We're live at the Fira in Barcelona, MWC23. We'll be right back. (uplifting electronic music)

Published Date : Mar 2 2023

SUMMARY :

that drive human progress. We are live at the Fira in Barcelona, to folks that may not be familiar with it? behind the scenes for you to I know, but it's not going to Maybe you could talk about VR and the Metaverse. we heard the call to you know, and to do more with all of But I don't know, Dave, what do you think and maybe, you know, in Yeah, yeah, yeah. But as you know, T-Mobile store to you and your house sense that what you are doing and the higher bandwidth, and you know, network, what are you doing? So I think you can do it and you can feel like you need that haven't had to be I need a network to do that. so that you don't have to be Because, you know, I'm to a cloud, you can, you Dave V.: Can you guys help me do that? Help me figure that out. And it depends on the No, I'm asking small knows how to do ETL and PBA. We can talk to you about how we use data. offering, you know, it's like, in the sense that it can be scaled down And not on the tech. I want one of those. it had a little case to carry it around. Anything that could go the outcome you want. the year of talking about it. definitely doing it now. You've got to like, you the year that each of your of the maturity of an industry. but also for the enterprises. Where do you guys want To 5G and beyond. the future of the business. it has to be approached from To 5G and beyond. John Furrier is banging out all the news.

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
JillianPERSON

0.99+

Dave NicholsonPERSON

0.99+

Dave VellantePERSON

0.99+

Meg KnauthPERSON

0.99+

Jillian KaplanPERSON

0.99+

Dave NicholsonPERSON

0.99+

DellORGANIZATION

0.99+

T-MobileORGANIZATION

0.99+

Four daysQUANTITY

0.99+

DavePERSON

0.99+

ThreeQUANTITY

0.99+

Dell TechnologiesORGANIZATION

0.99+

2023DATE

0.99+

MegPERSON

0.99+

four daysQUANTITY

0.99+

NetflixORGANIZATION

0.99+

SpainLOCATION

0.99+

John FurrierPERSON

0.99+

2024DATE

0.99+

last yearDATE

0.99+

2022DATE

0.99+

North AmericaLOCATION

0.99+

CapExORGANIZATION

0.99+

bothQUANTITY

0.99+

eachQUANTITY

0.99+

Dave V.PERSON

0.99+

UberORGANIZATION

0.98+

trillion and a halfQUANTITY

0.98+

MWC23EVENT

0.98+

trillions of dollarsQUANTITY

0.98+

silliconANGLE.comOTHER

0.97+

5GORGANIZATION

0.97+

BarcelonaLOCATION

0.96+

telcosORGANIZATION

0.96+

InstagramORGANIZATION

0.96+

five yearsQUANTITY

0.95+

each businessQUANTITY

0.95+

todayDATE

0.94+

oneQUANTITY

0.93+

Global TelecomORGANIZATION

0.93+

FiraLOCATION

0.92+

Vice PresidentPERSON

0.91+

MWCEVENT

0.85+

theCUBE.netOTHER

0.85+

next seven yearsDATE

0.82+

MetaverseORGANIZATION

0.81+

101QUANTITY

0.75+

Barcelona,LOCATION

0.72+

edgeORGANIZATION

0.71+

day fourQUANTITY

0.65+

Platform EngineeringPERSON

0.6+

theCUBEORGANIZATION

0.58+

theCUBETITLE

0.56+

T MobileORGANIZATION

0.55+

Barcelona 2023LOCATION

0.55+

MWC23LOCATION

0.53+

5GOTHER

0.48+

Odded Solomon, VMware & Jared Woodrey, Dell Technologies | MWC Barcelona 2023


 

>> Narrator: theCUBE's live coverage is made possible by funding from Dell Technologies. Creating technologies that drive human progress. (upbeat music) >> Welcome back to Barcelona, Spain, everyone. It's theCUBE live at MWC '23, day three of four days of CUBE coverage. It's like a cannon of CUBE content coming right at you. I'm Lisa Martin with Dave Nicholson. We've got Dell and VMware here. Going to be talking about the ecosystem partnerships and what they're doing to further organizations in the telco industry. Please welcome Jared Woodrey, Director of Partner Engineering Open Telecom Ecosystem Lab, OTEL. Odded Solomon is here as well, Director of Product Management, VMware Service Provider and Edge Business Unit at VMware. Guys, great to have you on the program. >> Thank you for having me. >> Welcome to theCUBE. So Jared, first question for you. Talk about OTEL. I know there's a big announcement this week, but give the audience context and understanding of what OTEL is and how it works. >> Sure. So the Open Telecom Ecosystem Lab is physically located at Round Rock, Texas, it's the heart and soul of it. But this week we also just announced opening up the Cork, Ireland extension of OTEL. The reason for our existence is to to try and make it as easy as possible for both partners and customers to come together and to re-aggregate this disaggregated ecosystem. So that comes with a number of automation tools and basically just giving a known good testing environment so that tests that happen in our lab are as close to real world as they possibly can be and make it as transparent and open as possible for both partners like VMware as well as customers. >> Odded, talk about what you're doing with Dell and OTEL and give us a customer example of maybe one that you're working with or even even mentioning it by a high level descriptor if you have to. >> Yeah. So we provide a telco cloud platform, which is essentially a vertical in VMware. The telco cloud platform is serving network function vendors, such as Ericsson, Nokia, Mavenir, and so on. What we do with Dell as part of this partnership is essentially complementing the platform with some additional functionality that is not coming out of the box. We used to have a data protection in the past, but this is no longer our main business focus. So we do provide APIs that we can expose and work together with Dell PPDM solution so customer can benefit from this and leverage the partnership and have overall solution that is not coming out of the box from VMware. >> I'm curious, from a VMware perspective. VMware is associated often with the V in VMware, virtualization, and we've seen a transition over time between sort of flavors of virtualization and what is the mix currently today in the telecom space between environments that are leveraging what we would think of as more traditional virtualization with full blown Linux, Windows operating systems in a VM versus the world of containerized microservices? What does that mix look like today? Where do you see it going? >> Yeah, so the VMware telco cloud platform exists for about eight years. And the V started around that time. You might heard about open stack in addition to VMware. So this has definitely helped the network equipment providers with virtualizing their network functions. Those are typically VNF, virtualized network functions, inside the VMs. Essentially we have 4G applications, so core applications, EPC, we have IMS. Those are typically, I would say maybe 80 or 90% of the ecosystem right now. 5G is associated with cloud native network functions. So 5G is getting started now, getting deployed. There is an exponential growth on the core side. Now, when we expand towards the edge of the network we see more potential growth. This is 5G ran, we see the vRAN, we see the open RAN, we see early POCs, we see field trials that are starting. We obviously has production customer now. You just spoke to one. So this is really starting, cloud native is really starting I would say about 10 to 20% of the network functions these days are cloud native. >> Jared, question for you. You mentioned data protection, a huge topic there obviously from a security perspective. Data protection used to be the responsibility of the CSPs. You guys are changing that. Can you talk a little bit about how you're doing that and what Dell's play there is? >> Yeah, so PowerProtect Data Management is a product, but it's produced by Dell. So what this does is it enables data protection over virtual cloud as well as the physical infrastructure of specifically in this case of a telecoms ecosystem. So what this does is enables an ability to rapidly redeploy and back up existing configurations all the way up to the TCP and TCA that pulls the basis of our work here with VMware. >> So you've offloaded that responsibility from the CSPs. You freed them from that. >> So the work that we did, honestly was to make sure that we have a very clear and concise and accurate procedures for how to conduct this as well. And to put this through a realistic and real world as if it was in a telecoms own production network, what did that would actually look like, and what it would take to bring it back up as well. So our responsibility is to make sure that when we when we provide these products to the customers that not only do they work exactly as their intended to, but there is also documentation to help support them and to enable them to have their exact specifications met by as well. >> Got it. So talk about a little bit about OTEL expansion into Cork. What you guys are doing together to enable CSPs here in EMEA? >> Yeah, so the reason why we opened up a facility in Cork Island was to give, for an EMEA audience, for an EMEA CSPs and ability to look and feel and touch some of the products that we're working on. It also just facilitates and ease especially for European-based partners to have a chance to very easily come to a lab environment. The difference though, honestly, is the between Round Rock, Texas and Cork Island is that it's virtually an extension of the same thing. Like the physical locations can make it easier to provide access and obviously to showcase the products that we've developed with partners. But the reality is that it's more than just the physical location. It's more about the ability and ease by which customers and partners can access the labs. >> So we should be expecting a lot of Tito's vodka to be consumed in Cork at some point. Might change the national beverage. >> We do need to have some international exchange. >> Yeah, no, that's good to know. Odded, on the VMware side of things. There's a large group of folks who have VMware skillsets. >> Odded: Correct. >> The telecom industry is moving into this world of the kind of agility that those folks are familiar with. How do people come out of the traditional VMware virtualization world and move into that world of cloud native applications and serve the telecom space? What would your recommendation be? If you were speaking at a VMUG, a VMware Users Group meeting with all of your telecom background, what would you share with them that's critical to understand about how telecom is different, or how telecom's spot in its evolution might be different than the traditional IT space? >> So we're talking about the people with the knowledge and the background of. >> Yeah, I'm a V expert, let's say. And I'm looking into the future and I hear that there are 80,000 people in Barcelona at this event, and I hear that Dell is building optimized infrastructure specifically for telecom, and that VMware is involved. And I'm an expert in VMware and I want to be involved. What do I need to do? I know it's a little bit outside of the box question, but especially against the backdrop of economic headwinds globally, there are a lot of people facing transitions. What are your thoughts there? >> So, first of all, we understand the telco requirements, we understand the telco needs, and we make sure that what we learn from the customers, what we learn from the partners is being built into the VMware products. And simplicity is number one thing that is important for us. We want the customer experience, we want the user experience to be the same as they know even though we are transitioning into cloud native networks that require more frequent upgrades and they have more complexity to be honest. And what we do in our vertical inside VMware we are focusing on automation, telco cloud automation, telco cloud service assurance. Think of it as a wrapper around the SDDC stack that we have from VMware that really simplifies the operations for the telcos because it's really a challenge about skillset. You need to be a DevOps, SRE in order to operate these networks. And things are becoming really complex. We simplify it for them with the same VMware experience. We have a very good ability to do that. We sell products in VMware. Unlike our competition that is mostly selling professional services and support, we try to focus more on the products and delivering the value. Of course, we have services offering because telcos requires some customizations, but we do focus on automation simplicity throughout our staff. >> So just follow up. So in other words the investment in education in this VMware ecosystem absolutely can be extended and applied into the telecom world. I think it's an important thing. >> I was going to add to that. Our engagement in OTEL was also something that we created a solutions brief whether we released from Mobile World Congress this week. But in conjunction with that, we also have a white paper coming out that has a much more expansive explanation and documentation of what it was that we accomplished in the work that we've done together. And that's not something that is going to be a one-off thing. This is something that will stay evergreen that we'll continue to expand both the testing scope as well as the documentation for what this solution looks like and how it can be used as well as documentation on for the V experts for how they can then leverage and realize the the potential for what we're creating together. >> Jared, does Dell look at OTEL as having the potential to facilitate the continued evolution of the actual telco industry? And if so, how? >> Well, I mean, it would be a horrible answer if I were to say no to that. >> Right. >> I think, I honestly believe that one of the most difficult things about this idea of having desired ecosystem is not just trying to put it back together, but then also how to give yourself choice. So each time that you build one of those solution sets like that exists as an island out of all the other possibilities that comes with it. And OTEL seeks to not just be able to facilitate building that first solution set. Like that's what solutions engineering can do. And that's generally done relatively protected and internally. The Open Telecom Ecosystem seeks to build that then to also provide the ability to very easily change specific components of that whether that's a hardware component, a NIC, whether a security pass just came out or a change in either TCP or TCA or we talked a little bit about for this specific engagement that it was done on TCP 2.5. >> Odded: Correct. >> Obviously there's already a 2.7 and 3.0 is coming out. It's not like we're going to sit around and write our coattails of what 2.7 has happened. So this isn't intended to be a one and done thing. So when we talk about trying to make that easier and simpler and de-risk all of the risk that comes from trying to put all these things together, it's not just the the one single solution that you built in the lab. It's what's the next one? And how do I optimize this? And I have specific requirements as a CSP, how can I take something you built that doesn't quite match it, but how do I make that adjustment? So that's what we see to do and make it as easy and as painless as possible. >> What's the engagement model with CSPs? Is it led by Dell only, VMware partner? How does that work? >> Yeah, I can take that. So that depends on the customer, but typically customers they want to choose the cloud vendor. So they come to VMware, we want VMware. Typically, they come from the IT side. They said, "Oh, we want to manage the network side of the house the same way as we manage the IT. We don't want to have special skill sets, special teams." So they move from the IT to the network side and they want VMware there. And then obviously they have an RSP process and they have hardware choices. They can go with Dell, they can go with others. We leverage vSphere, other compatibility. So we can be flexible with the customer choice. And then depending on which customer, how large they are, they select the network equipment provider that the runs on top. We position our platform as multi-vendor. So many of them choose multiple network functions providers. So we work with Dell. So assuming that the customer is choosing Dell. We work very closely with them, offering the best solution for the customer. We work with them sometimes to even design the boxes to make sure that it fits their use cases and to make sure that it works properly. So we have a partnership validation certification end-to-end from the applications all the way down to the hardware. >> It's a fascinating place in history to be right now with 5G. Something that a lot of consumers sort of assume. It's like, "Oh, hey, yeah, we're already there. What's the 6G thing going to look like?" Well, wait a minute, we're just at the beginning stages. And so you talk about disaggregation, re-aggregation, or reintegration, the importance of that. Folks like Dell have experience in that space. Folks at VMware have a lot of experience in the virtualization space, but I heard that VMware is being acquired by Broadcom, if it all goes through, of course. You don't need to comment on it. But you mentioned something, SDDC, software-defined data center. That stack is sometimes misunderstood by the public at large and maybe the folks in the EU, I will editorialize for a moment here. It is eliminating capture in a way by larger hyperscale cloud providers. It absolutely introduces more competition into the market space. So it's interesting to hear Broadcom acknowledging that this is part of the future of VMware, no matter what else happens. These capabilities that spill into the telecom space are something that they say they're going to embrace and extend. I think that's important for anyone who's evaluating this if they're concern. Well, wait a minute. Yeah, when I reintegrate, do I want VMware as part of this mix? Is that an unknown? It's pretty clear that that's something that is part of the future of VMware moving forward. That's my personal opinion based on analysis. But you brought up SDDC, so I wanted to mention that. Again, I'm not going to ask you to get into trouble on that at all. What should we be, from a broad perspective, are there any services, outcomes that are going to come out of all of this work? The agility that's being built by you folks and folks in the open world. Are there any specific things that you personally are excited about? Or when we think about consumer devices, getting data, what are the other kinds of things that this facilitates? Anything cool, either one of you. >> So specific use cases? >> Yeah, anything. It's got to be cool though. If it's not cool we're going to ask you to leave. >> All right. I'll take that challenge. (laughs) I think one of the things that is interesting for something like OTEL as an exist, as being an Open Telecom Ecosystem, there are going to be some CSPs that it's very difficult for them to have this optionality existing for themselves. Especially when you start talking about tailoring it for specific CSPs and their needs. One of the things that becomes much more available to some of the smaller CSPs is the ability to leverage OTEL and basically act as one of their pre-production labs. So this would be something that would be very specific to a customer and we would obviously make sure that it's completely isolated but the intention there would be that it would open up the ability for what would normally take a much longer time period for them to receive some of the benefits of some of the changes that are happening within the industry. But they would have immediate benefit by leveraging specifically looking OTEL to provide them some of their solutions. And I know that you were also looking for specific use cases out of it, but like that's a huge deal for a lot of CSPs around the world that don't have the ability to lay out all the different permutations that they are most interested in and start to put each one of those through a test cycle. A specific use cases for what this looks like is honestly the most exciting that I've seen for right now is on the private 5G networks. Specifically within mining industry, we have a, sorry for the audience, but we have a demo at our booth that starts to lay out exactly how it was deployed and kind of the AB of what this looked like before the world of private 5G for this mining company and what it looks like afterwards. And the ability for both safety, as well as operational costs, as well as their ability to obviously do their job better is night and day. It completely opened up a very analog system and opened up to a very digitalized system. And I would be remiss, I didn't also mention OpenBrew, which is also an example in our booth. >> We saw it last night in action. >> We saw it. >> I hope you did. So OpenBrew is small brewery in Northeast America and we basically took a very manual process of checking temperature and pressure on multiple different tanks along the entire brewing process and digitized everything for them. All of that was enabled by a private 5G deployment that's built on Dell hardware. >> You asked for cool. I think we got it. >> Yeah, it's cool. >> Jared: I think beer. >> Cool brew, yes. >> Root beer, I think is trump card there. >> At least for folks from North America, we like our brew cool. >> Exactly. Guys, thank you so much for joining Dave and me talking about what Dell, OTEL, and VMware are doing together, what you're enabling CSPs to do and achieve. We appreciate your time and your insights. >> Absolutely. >> Thank you. >> All right, our pleasure. For our guests and for Dave Nicholson, I'm Lisa Martin. You watching theCUBE live from MWC '23. Day three of our coverage continues right after a short break. (upbeat music)

Published Date : Mar 1 2023

SUMMARY :

that drive human progress. in the telco industry. but give the audience context So the Open Telecom Ecosystem Lab of maybe one that you're working with that is not coming out of the box. and what is the mix currently of the network functions responsibility of the CSPs. that pulls the basis of responsibility from the CSPs. So the work that we did, to enable CSPs here in EMEA? and partners can access the labs. Might change the national beverage. We do need to have some Odded, on the VMware side of things. and serve the telecom space? So we're talking about the people and I hear that there are 80,000 people that really simplifies the and applied into the telecom world. and realize the the potential Well, I mean, it would that one of the most difficult and simpler and de-risk all of the risk So that depends on the customer, that is part of the future going to ask you to leave. that don't have the ability to lay out All of that was enabled I think we got it. we like our brew cool. CSPs to do and achieve. You watching theCUBE live from MWC '23.

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
MichielPERSON

0.99+

AnnaPERSON

0.99+

DavidPERSON

0.99+

BryanPERSON

0.99+

JohnPERSON

0.99+

IBMORGANIZATION

0.99+

MichaelPERSON

0.99+

ChrisPERSON

0.99+

NECORGANIZATION

0.99+

EricssonORGANIZATION

0.99+

KevinPERSON

0.99+

Dave FramptonPERSON

0.99+

MicrosoftORGANIZATION

0.99+

Kerim AkgonulPERSON

0.99+

Dave NicholsonPERSON

0.99+

JaredPERSON

0.99+

Steve WoodPERSON

0.99+

PeterPERSON

0.99+

Lisa MartinPERSON

0.99+

NECJORGANIZATION

0.99+

Lisa MartinPERSON

0.99+

Mike OlsonPERSON

0.99+

AmazonORGANIZATION

0.99+

DavePERSON

0.99+

Michiel BakkerPERSON

0.99+

FCAORGANIZATION

0.99+

NASAORGANIZATION

0.99+

NokiaORGANIZATION

0.99+

Lee CaswellPERSON

0.99+

ECECTORGANIZATION

0.99+

Peter BurrisPERSON

0.99+

OTELORGANIZATION

0.99+

David FloyerPERSON

0.99+

Bryan PijanowskiPERSON

0.99+

Rich LanePERSON

0.99+

KerimPERSON

0.99+

Kevin BoguszPERSON

0.99+

Jeff FrickPERSON

0.99+

Jared WoodreyPERSON

0.99+

LincolnshireLOCATION

0.99+

KeithPERSON

0.99+

Dave NicholsonPERSON

0.99+

ChuckPERSON

0.99+

JeffPERSON

0.99+

National Health ServicesORGANIZATION

0.99+

Keith TownsendPERSON

0.99+

WANdiscoORGANIZATION

0.99+

GoogleORGANIZATION

0.99+

MarchDATE

0.99+

NutanixORGANIZATION

0.99+

San FranciscoLOCATION

0.99+

IrelandLOCATION

0.99+

Dave VellantePERSON

0.99+

Michael DellPERSON

0.99+

RajagopalPERSON

0.99+

Dave AllantePERSON

0.99+

EuropeLOCATION

0.99+

March of 2012DATE

0.99+

Anna GleissPERSON

0.99+

SamsungORGANIZATION

0.99+

Ritika GunnarPERSON

0.99+

Mandy DhaliwalPERSON

0.99+

Jim Harris, International Best Selling Author of Blindsided & Carolina Milanesi, Creative Strategies


 

>> Narrator: "theCUBE's" live coverage is made possible by funding from Dell Technologies. Creating technologies that drive human progress. (intro music) >> Good afternoon, everyone. Welcome back to "theCUBE's" day three coverage of MWC23. Lisa Martin here in Spain, Barcelona, Spain with Dave Nicholson. We're going to have a really interesting conversation next. We're going to really dig into MWC, it's history, where it's going, some of the controversy here. Please welcome our guests. We have Jim Harris, International Best Selling Author of "Blindsided." And Carolina Milanese is here, President and Principle Analyst of creative strategies. Welcome to "theCUBE" guys. Thank you. >> Thanks. So great to be here. >> So this is day three. 80,000 people or so. You guys have a a lot of history up at this event. Caroline, I want to start with you. Talk a little bit about that. This obviously the biggest one in, in quite a few years. People are ready to be back, but there's been some, a lot of news here, but some controversy going on. Give us the history, and your perspective on some of the news that's coming out from this week's event. >> It feels like a very different show. I don't know if I would say growing up show, because we are still talking about networks and mobility, but there's so much more now around what the networks actually empower, versus the network themselves. And a little bit of maybe that's where some of the controversy is coming from, carriers still trying to find their identity, right, of, of what their role is in all there is to do with a connected world. I go back a long way. I go back to when Mobile World Congress was called, was actually called GSM, and it was in Khan. So, you know, we went from France to Spain. But just looking at the last full Mobile World Congress here in Barcelona, in pre-pandemic to now, very different show. We went from a show that was very much focused on mobility and smartphones, to a show that was all about cars. You know, we had cars everywhere, 'cause we were talking about smart cities and connected cars, to now a show this year that is very much focused on B2B. And so a lot of companies that are here to either work with the carriers, or also talk about sustainability for instance, or enable what is the next future evolution of computing with XR and VR. >> So Jim, talk to us a little bit about your background. You, I was doing a little sleuthing on you. You're really focusing on disruptive innovation. We talk about disruption a lot in different industries. We're seeing a lot of disruption in telco. We're seeing a lot of frenemies going on. Give us your thoughts about what you're seeing at this year's event. >> Well, there's some really exciting things. I listened to the keynote from Orange's CEO, and she was complaining that 55% of the traffic on her network is from five companies. And then the CEO of Deutsche Telecom got up, and he was complaining that 60% of the traffic on his network is from six entities. So do you think they coordinated pre, pre-show? But really what they're saying is, these OTT, you know, Netflix and YouTube, they should be paying us for access. Now, this is killer funny. The front page today of the show, "Daily," the CO-CEO of Netflix says, "Hey, we make less profit than the telcos, "so you should be paying us, "not the other way around." You know, we spend half of the money we make just on developing content. So, this is really interesting. The orange CEO said, "We're not challenging net neutrality. "We don't want more taxes." But boom. So this is disruptive. Huge pressure. 67% of all mobile traffic is video, right? So it's a big hog bandwidth wise. So how are they going to do this? Now, I look at it, and the business model for the, the telcos, is really selling sim cards and smartphones. But for every dollar of revenue there, there's five plus dollars in apps, and consulting and everything else. So really, but look at how they're structured. They can't, you know, take somebody who talks to the public and sells sim cards, and turn 'em in, turn 'em in to an app developer. So how are they going to square this circle? So I see some, they're being disrupted because they're sticking to what they've historically done. >> But it's interesting because at the end of the day, the conversation that we are having right now is the conversation that we had 10 years ago, where carriers don't want to just be a dumb pipe, right? And that's what they are now returning to. They tried to be media as well, but that didn't work out for most carriers, right? It is a little bit better in the US. We've seen, you know, some success there. But, but here has been more difficult. And I think that's the, the concern, that even for the next, you know, evolution, that's the, their role. >> So how do they, how do they balance this dumb pipe idea, with the fact that if you make the toll high enough, being a dumb pipe is actually a pretty good job. You know, sit back, collect check, go to the beach, right? So where, where, where, where does this end up? >> Well, I think what's going to happen is, if you see five to 15 X the revenue on top of a pipe, you know, the hyperscalers are going to start going after the business. The consulting companies like PWC, McKinsey, the app developers, they're... So how do you engage those communities as a telco to get more revenue? I think this is a question that they really need to look at. But we tend to stick within our existing business model. I'll just give you one stat that blows me away. Uber is worth more than every taxi cab company in North America added together. And so the taxi industry owns billions in assets in cars and limousines. Uber doesn't own a single vehicle. So having a widely distributed app, is a huge multiplier on valuation. And I look to a company like Safari in Kenya, which developed M-Pesa, which Pesa means mo, it's mobile money in Swahili. And 25% of the country's GDP is facilitated by M-Pesa. And that's not even on smartphones. They're feature phones, Nokia phones. I call them dumb phones, but Nokia would call them "feature phones." >> Yeah. >> So think about that. Like 25, now transactions are very small, and the cut is tiny. But when you're facilitating 25% of a country's GDP, >> Yeah. >> Tiny, over billions of transactions is huge. But that's not the way telcos have historically thought or worked. And so M-Pesa and Safari shows the way forward. What do you think on that? >> I, I think that the experience, and what they can layer on top from a services perspective, especially in the private sector, is also important. I don't, I never believe that a carrier, given how they operate, is the best media company in the world, right? It is a very different world. But I do think that there's opportunity, first of all, to, to actually tell their story in a different way. If you're thinking about everything that a network actually empowers, there's a, there's a lot there. There's a lot that is good for us as, as society. There's a lot that is good for business. What can they do to start talking about differently about their services, and then layer on top of what they offer? A better way to actually bring together private and public network. It's not all about cellular, wifi and cellular coming together. We're talking a lot about satellite here as well. So, there's definitely more there about quality of service. Is, is there though, almost a biological inevitability that prevents companies from being able to navigate that divide? >> Hmm. >> Look at, look at when, when, when we went from high definition 720P, very exciting, 1080P, 4K. Everybody ran out and got a 4K TV. Well where was the, where was the best 4K content coming from? It wasn't, it wasn't the networks, it wasn't your cable operator, it was YouTube. It was YouTube. If you had suggested that 10 years before, that that would happen, people would think that you were crazy. Is it possible for folks who are now leading their companies, getting up on stage, and daring to say, "This content's coming over, "and I want to charge you more "for using my pipes." It's like, "Really? Is that your vision? "That's the vision that you want to share with us here?" I hear the sound of dead people walking- (laughing) when I hear comments like that. And so, you know, my students at Wharton in the CTO program, who are constantly looking at this concept of disruption, would hear that and go, "Ooh, gee, did the board hear what that person said?" I, you know, am I being too critical of people who could crush me like a bug? (laughing) >> I mean, it's better that they ask the people with money than not consumers to pay, right? 'Cause we've been through a phase where the carriers were actually asking for more money depending on critical things. Like for instance, if you're doing business email, then were going to charge you more than if you were a consumer. Or if you were watching video, they would charge you more for that. Then they understood that a consumer would walk away and go somewhere else. So they stopped doing that. But to your point, I think, and, and very much to what you focus from a disruption perspective, look at what Chat GTP and what Microsoft has been doing. Not much talk about this here at the show, which is interesting, but the idea that now as a consumer, I can ask new Bing to get me the 10 best restaurants in Barcelona, and I no longer go to Yelp, or all the other businesses where I was going to before, to get their recommendation, what happens to them? You're, you're moving away, and you're taking eyeballs away from those websites. And, and I think that, that you know, your point is exactly right. That it's, it's about how, from a revenue perspective, you are spending a lot of money to facilitate somebody else, and what's in it for you? >> Yeah. And to be clear, consumers pay for everything. >> Always. Always. (laughs) >> Taxpayers and consumers always pay for everything. So there is no, "Well, we're going to make them pay, so you don't have to pay." >> And if you are not paying, you are the product. Exactly. >> Yes. (laughing) >> Carolina, talk a little bit about what you're seeing at the event from some of the infrastructure players, the hyperscalers, obviously a lot of enterprise focus here at this event. What are some of the things that you're seeing? Are you impressed with, with their focus in telco, their focus to partner, build an ecosystem? What are you seeing? >> I'm seeing also talk about sustainability, and enabling telco to be more sustainable. You know, there, there's a couple of things that are a little bit different from the US where I live, which is that telcos in Europe, have put money into sustainability through bonds. And so they use the money that they then get from the bonds that they create, to, to supply or to fuel their innovation in sustainability. And so there's a dollar amount on sustainability. There's also an opportunity obviously from a growth perspective. And there's a risk mitigation, right? Especially in Europe, more and more you're going to be evaluated based on how sustainable you are. So there are a lot of companies here, if you're thinking about the Ciscos of the world. Dell, IBM all talking about sustainability and how to help carriers measure, and then obviously be more sustainable with their consumption and, and power. >> Going to be interesting to see where that goes over the years, as we talk to, every company we talk to at whatever show, has an ESG sustainability initiative, and only, well, many of them only want to work with other companies who have the same types of initiative. So a lot of, great that there's focus on sustainability, but hopefully we'll see more action down the road. Wanted to ask you about your book, "Blind," the name is interesting, "Blindsided." >> Well, I just want to tag on to this. >> Sure. >> One of the most exciting things for me is fast charging technology. And Shalmie, cell phone, or a smartphone maker from China, just announced yesterday, a smartphone that charges from 0 to 100% in five minutes. Now this is using GAN FEST technology. And the leader in the market is a company called Navitas. And this has profound implications. You know, it starts with the smartphone, right? But then it moves to the laptops. And then it'll move to EV's. So, as we electrify the $10 trillion a year transportation industry, there's a huge opportunity. People want charging faster. There's also a sustainability story that, to Carolina's point, that it uses less electricity. So, if we electrify the grid in order to support transportation, like the Tesla Semi's coming out, there are huge demands over a period. We need energy efficiency technologies, like this GAN FEST technology. So to me, this is humongous. And it, we only see it here in the show, in Shalmie, saying, "Five minutes." And everybody, the consumers go, "Oh, that's cool." But let's look at the bigger story, which is electrifying transportation globally. And this is going to be big. >> Yeah. And, and to, and to double click on that a little bit, to be clear, when we talk about fast charging today, typically it's taking the battery from a, not a zero state of charge, but a relatively low state of charge to 80%. >> Yep. >> Then it tapers off dramatically. And that translates into less range in an EV, less usable time on any other device, and there's that whole linkage between the power in, and the battery's ability to be charged, and how much is usable. And from a sustainability perspective, we are going to have an avalanche of batteries going into secondary use cases over time. >> They don't get tossed into landfills contrary to what people might think. >> Yep. >> In fact, they are used in a variety of ways after their primary lifespan. But that, that is, that in and of itself is a revolutionary thing. I'm interested in each of your thoughts on the China factor. Glaringly absent here, from my perspective, as sort of an Apple fanboy, where are they? Why aren't they talking about their... They must, they must feel like, "Well we just don't need to." >> We don't need to. We just don't need to. >> Absolutely. >> And then you walk around and you see these, these company names that are often anglicized, and you don't necessarily immediately associate them with China, but it's like, "Wait a minute, "that looks better than what I have, "and I'm not allowed to have access to that thing." What happens in the future there geopolitically? >> It's a pretty big question for- >> Its is. >> For a short little tech show. (Caroline laughs) But what happens as we move forward? When is the entire world going to be able to leverage in a secure way, some of the stuff that's coming out of, if they're not the largest economy in the world yet, they shortly will be. >> What's the story there? >> Well, it's interesting that you mentioned First Apple that has never had a presence at Mobile World Congress. And fun enough, I'm part of the GSMA judges for the GLOMO Awards, and last night I gave out Best Mobile Phone for last year, and it was to the iPhone4 Team Pro. and best disruptive technology, which was for the satellite function feature on, on the new iPhone. So, Apple might not be here, but they are. >> Okay. >> And, and so that's the first thing. And they are as far as being top of mind to every competitor in the smartphone market still. So a lot of the things that, even from a design perspective that you see on some of the Chinese brands, really remind you of, of Apple. What is interesting for me, is how there wouldn't be, with the exception of Samsung and Motorola, there's no one else here that is non-Chinese from a smartphone point of view. So that's in itself, is something that changed dramatically over the years, especially for somebody like me that still remember Nokia being the number one in the market. >> Huh. >> So. >> Guys, we could continue this conversation. We are unfortunately out of time. But thank you so much for joining Dave and me, talking about your perspectives on the event, the industry, the disruptive forces. It's going to be really interesting to see where it goes. 'Cause at the end of the day, it's the consumers that just want to make sure I can connect wherever I am 24 by seven, and it just needs to work. Thank you so much for your insights. >> Thank you. >> Lisa, it's been great. Dave, great. It's a pleasure. >> Our pleasure. For our guests, and for Dave Nicholson, I'm Lisa Martin. You're watching, "theCUBE," the leader in live and emerging tech coverage coming to you day three of our coverage of MWC 23. Stick around. Our next guest joins us momentarily. (outro music)

Published Date : Mar 1 2023

SUMMARY :

that drive human progress. We're going to have a really So great to be here. People are ready to be back, And so a lot of companies that are here to So Jim, talk to us a little So how are they going to do this? It is a little bit better in the US. check, go to the beach, right? And 25% of the country's GDP and the cut is tiny. But that's not the way telcos is the best media company "That's the vision that you and I no longer go to Yelp, consumers pay for everything. Always. so you don't have to pay." And if you are not (laughing) from some of the infrastructure and enabling telco to be more sustainable. Wanted to ask you about And this is going to be big. and to double click on that a little bit, and the battery's ability to be charged, contrary to what people might think. each of your thoughts on the China factor. We just don't need to. What happens in the future When is the entire world for the GLOMO Awards, So a lot of the things that, and it just needs to work. It's a pleasure. coming to you day three

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
DavePERSON

0.99+

JimPERSON

0.99+

Dave NicholsonPERSON

0.99+

CarolinePERSON

0.99+

SamsungORGANIZATION

0.99+

Lisa MartinPERSON

0.99+

Carolina MilanesePERSON

0.99+

Jim HarrisPERSON

0.99+

NokiaORGANIZATION

0.99+

EuropeLOCATION

0.99+

MotorolaORGANIZATION

0.99+

SpainLOCATION

0.99+

PWCORGANIZATION

0.99+

IBMORGANIZATION

0.99+

five companiesQUANTITY

0.99+

UberORGANIZATION

0.99+

LisaPERSON

0.99+

six entitiesQUANTITY

0.99+

BarcelonaLOCATION

0.99+

FranceLOCATION

0.99+

McKinseyORGANIZATION

0.99+

80%QUANTITY

0.99+

NetflixORGANIZATION

0.99+

AppleORGANIZATION

0.99+

DellORGANIZATION

0.99+

60%QUANTITY

0.99+

OrangeORGANIZATION

0.99+

ChinaLOCATION

0.99+

Deutsche TelecomORGANIZATION

0.99+

five minutesQUANTITY

0.99+

67%QUANTITY

0.99+

Carolina MilanesiPERSON

0.99+

55%QUANTITY

0.99+

North AmericaLOCATION

0.99+

25%QUANTITY

0.99+

NavitasORGANIZATION

0.99+

M-PesaORGANIZATION

0.99+

MicrosoftORGANIZATION

0.99+

YouTubeORGANIZATION

0.99+

USLOCATION

0.99+

yesterdayDATE

0.99+

24QUANTITY

0.99+

telcoORGANIZATION

0.99+

KenyaLOCATION

0.99+

Mobile World CongressEVENT

0.99+

fiveQUANTITY

0.99+

iPhoneCOMMERCIAL_ITEM

0.99+

KhanLOCATION

0.99+

BlindsidedTITLE

0.99+

YelpORGANIZATION

0.99+

Dell TechnologiesORGANIZATION

0.99+

last yearDATE

0.99+

five plus dollarsQUANTITY

0.99+

MWC23EVENT

0.99+

MWC 23EVENT

0.99+

0QUANTITY

0.99+

10 best restaurantsQUANTITY

0.98+

theCUBEORGANIZATION

0.98+

720PQUANTITY

0.98+

todayDATE

0.98+

GLOMO AwardsEVENT

0.98+

billionsQUANTITY

0.98+

15 XQUANTITY

0.98+

last nightDATE

0.98+

first thingQUANTITY

0.98+

CarolinaPERSON

0.98+

SafariORGANIZATION

0.98+

this yearDATE

0.98+

OneQUANTITY

0.97+

GAN FESTORGANIZATION

0.97+

sevenQUANTITY

0.97+

1080PQUANTITY

0.97+

80,000 peopleQUANTITY

0.97+

Five minutesQUANTITY

0.97+

FirstQUANTITY

0.97+

ShalmieORGANIZATION

0.97+

10 years agoDATE

0.97+

10 years beforeDATE

0.97+

TeslaORGANIZATION

0.96+

100%QUANTITY

0.96+

Juan Carlos Garcia, Telefónica & Ihab Tarazi, Dell Technologies | MWC Barcelona 2023


 

>> Narrator: TheCUBE's live coverage is made possible by funding from Dell Technologies, creating technologies that drive human progress. (upbeat music) (logo background tingles) >> Hey everyone, it's so good to see you, welcome back to theCube's day two coverage of MWC 23. We are live in Barcelona, Lisa Martin with Dave Nicholson, Dave we have had no signage of people dropping out, this conference is absolutely jam packed. There's so much interest in the industry, you've had a lot of interviews this morning, before we introduce our guests and have a great conversation about the industry and challenges and how they're being solved, what are some of the things that stuck out to you in conversations today? >> Well, I think the interesting, kind of umbrella conversation, that seems to be overlapping you know, overlying everything is this question about Open RAN and open standards in radio access network technology and where the operators of networks and the providers of technology come together to chart a better path forward. A lot of discussion of private 5G networks, it's very interesting, I think I've said this a few times, from a consumer's perspective, we feel like 5G has been with us for a long time- >> We do. >> But it's very clear that this, that we're really at the beginning of stages of this and I'm super excited for our guests that we have here because we're going to be able to talk to an actual operator- >> Yes. >> And hear what they have to say, we've heard a lot of people talking about the cool stuff they build, but we're going to get to hear from someone who actually works with this stuff, so- >> Who actually built it, absolutely. Please welcome our two guests, we have Ihab Tarazi CTO and SVP at Dell Technologies, and Juan Carlos Garcia SVP Technology Innovation and Ecosystems at Telephonica, it's great to have you guys on the program. >> So, thank you very much. >> So the buzz around this conference is incredible, 80,000 plus people, 2000 exhibitors, it's standing room only. Lot of opportunity in the industry, a lot of challenges though, Juan Carlos we'd love to get your perspective on, what are some of the industry challenges that Telephonica has faced that your peers are probably facing as well? >> Well we have two kinds of challenges, one is a business challenge, I would say that we may find in other industries, like profitability and growth and I will talk about it. And the second challenge is our technology challenge, we need the network to be ready to embrace a new wave of technologies and applications that are, you know, very demanding in terms of network characteristics and features. On the efficiency and profitability and growth, the solution comes as a challenge from changing the way networks are built and operated, from the traditional way to make them become software platforms. And this is not just at the knowledge challenge, it's also changing the mindset of network operators from a network and service provider to a digital service provider, okay? And this means several things, your network needs to become software-based so that you can manage it digitally and on top of it, you need to be able to deliver detail services digitally, okay? So there are three aspects, making your network so (indistinct) and cloud and cloud waste and then be able to sell in a different way to our customers. >> So some pretty significant challenges, but to your point, Juan Carlos, you share some of those challenges with other industries so there's some commonality there. I wanted to bring Ihab into the conversation, from Dell's perspective, we're seeing, you know, the explosion of data. Every company has to be a data company, we expect to have access to data in real time, if it's a new app, whatever it is. What are some of the challenges that you're seeing from your seat at Dell? >> Yeah, I think Juan Carlos explained that really well, what all the operators are talking about here between new applications, think metaverse, think video streaming, going all the way to the edge, think all the automation of factories and everything that's happening. It's not only requiring a whole new model for delivery and for building networks, but it's throwing out enormous amount of data and the data needs to be acted on to get the value of it. So the challenge is how do I collect the data? How do I catalog it? How do I make it usable? And then how do I make it persistent? So you know, it's high performance data storage and then after that, how do I move it to where I want to and be able to use it. And for many applications that has to happen in milliseconds for the value to come out. So now we've seen this before with enterprise but now I would say this digital transformation is happening at very large scale for all the telcos and starting to deal with very familiar themes we've seen before. >> So Juan Carlos, Telephonica, you hear from partners, vendors that they've done this before, don't worry, you're in good hands. >> Juan Carlos: Yeah, yeah. >> But as a practical matter, when you look at the challenges that you have and you think about the things you'll do to address them as you move forward, what are the immediate short term priorities? >> Okay. >> Versus the longer term priorities? What's realistic? You have a network to operate- >> Yeah. >> You're not just building something out of nothing, so you have to keep the lights on. >> Yeah. >> And you have to innovate, we call that by the way, in the CTO trade, ambidextrous, management using both hands, so what's your order of priorities? >> Well, the first thing, new technologies you are getting into the network need to come with a detail shape, so being cloud native, working by software. On the legacies that you need to keep alive, you need to go for a program to switch (indistinct) off progressively, okay? In fact, in Spain we are going to switch up the copper network in two years, so in 2024, Telephonica will celebrate 100 years and the celebration will be switching up the copper network and we'll have on the fixed access only fiber, okay. So more than likely, the network is necessary, all this digitalization may happen only on the new technologies because the new technologies are cloud-based, cloud native, become already ready for this digitalization process. And not only that, so you need also to build new things, we need an abstraction layer on top of the physical infrastructure to be able to manage the network by software, okay. This is something that happened in the computing world, okay, where the servers, you know, were covered with a cloud stack layer and we are doing the same thing in the network. We are trained to abstract the network services and capabilities and be able to offer them digitally to our customers. And this is a process that we are ongoing with many initiatives in the market, so one was the CAMARA community that was opened in Linux Foundation and the other one was the announcement we made yesterday of the open gateway initiative here at Mobile World Congress where all telecom operators have agreed to launch in this year a set of service APIs that are common worldwide, okay. This is a similar thing to what we did with 2G 35 years ago, to agree on a standard way of delivering a service and in this case is digital services based on APIs. >> What's the net result of? What are the benefits of having those open standards? Is it a benefit that myself as a consumer would enjoy? It seems, I mean, I've been, I'm old enough to remember, you know, a time before cellular telephones and I remember a time when it was very, very difficult to travel from North America to Europe with a cell phone. Now I land and my provider says, "Hey, welcome-" >> Juan Carlos: Yes. >> "Welcome, we're going to charge you a little extra money." And I say, "Hallelujah, awesome." So is part of that interoperability a benefit to consumers or, how, what? >> Yeah, you touch the right point. So in the same way you travel anywhere and you want to still make a call and send an SMS and connect to the internet, you will like your applications in your smartphone to work being them edge applications, okay, and these applications, each application will have to work to be executed very close to where you are, in a way that if you travel abroad the visitor network is serving you, okay. So this means that we are somehow extending the current interconnection and roaming agreements between operators to be able also to deliver edge applications wherever you are, in whatever network, with whatever technology. >> We have that expectation on the consumer side, that it's just going to work no matter where we are, we want apps to be updated, whether I'm banking or I'm shopping for groceries, I want to make sure that they know who I am, the data's got to be there, it's got to be real time, it's got to be right, it's got to serve me personally, but it just has to work. You guys talked about some of the big challenges, but also the opportunities in terms of the future of networking, the data turning companies in the data companies. Walk us through the future of networking from Telephonica's lens, you talked about some of the big initiatives that you have by 2024. >> Yes. >> But if you had a crystal ball and you could look in there and go it looks like this for operators, what would you say? And I'd love to get your feedback too. >> Yeah, I liked how Juan Carlos talked about how the future is, I think I want to add one thing to it, to say, a lot of times the user is no longer a consumer, it's an automated thing, you know, AI think robots, so a lot of times, more and more the usage is happening by some autonomous thing and it needs to always connect. And more and more these things are extending to places where even cellular coverage doesn't exist today, so you have edge compute show up. So, and when you think about it, the things we have to solve as a community here and this is all the discussions is, number one, how you make it a fully open standard model, so everything plugs and play, more and more, there's so many pieces coming, software, hardware, from different components and the integration of all of that is probably one of the biggest challenges people want solved. You know, how it's no longer one box, you buy from one person and put it away, now you have a complex combination of hardware and software. Also the operational model is very important and that is one of the areas we're focused on at Dell, is that while the operational model works inside the data centers for certain application, for telcos, it looks different when you're out at the cell tower and you're going to have these extended temperature changes. And sometimes this may not be inside a cabinet, maybe outside and the person servicing it is not an IT technician. This is somebody that needs to know exactly how to plug it, to be able to place equipment quickly and add capacity, those are just two of the areas, the cloud, making it work like a cloud, where it's intuitive, automated and you can easily add capacity, you can, you know, get a lot of monitoring, a lot of metrics, those are some of the things that we're all solving in this community. >> Let's talk about exactly how you're achieving this, Telephonica and Dell have been working together for a couple of years, you said before we went live. Talk about, you're doing this, you talked about the challenges, the opportunities how are you solving them and why with Dell? >> Okay, well you need to go with the right partners, not to this kind of process of transforming your network into a digital platform. There are big challenges on creating the cloud infrastructure that you need to support the complex, functionality and network requires. And I think you need to have with you, companies that know about the processors, that know about the hardware, the server, that know about how to make an abstraction of that hardware layer so that you can manage that digitally and this is not something any company can do, so you need companies that are very specialized. Telecom operators are changing the way to work, we work in the past with traditionally, with network equipment vendors, now we need to start working with technology providers, hardware (indistinct) providers with cloud providers with an ecosystem that is probably wider than what we had in the past. >> Yes. >> So I come from a background, I call myself a "knuckle dragging hardware engineer" sort of guy, so I'm almost fascinated by the physical part of this. You have a network, part of that network includes towers that have transmitters, receivers, at the base of those towers and like you mentioned, they're not all necessarily in urban areas or easy to access. There's equipment there, let's say that, that tower has been there for 5 years, 10 years, in the traditional world of IT, we have this this concept of the "refresh cycle" >> Juan Carlos: Yeah. >> Where a server may have a useful life of 36 months before it's consuming more power than it should based on the technology. How do you move from, kind of a legacy more proprietary, all-inclusive stack to an open system? I mean, is this a, "Okay, we're planning for an outage for the tower and you're wheeling out old equipment and wheeling in new equipment?" >> Juan Carlos: Yeah. >> I mean that's not, that's what we say as a non-trivial exercise, it's something that isn't, it's not something that's just easy to do, but is that what progress looks like? Sort of, methodically one site at a time? >> Yeah, well, I mean, you have touched an important point. In the technology renewal cycles, we were taking an appliance and replacing that by another one. Now with the current technology, you have the couple, the hardware from the software and the hardware, you need to replace it only when you run out of processing capacity to do what you want, okay? So then we'll be there 2, 3, 4, 5 years, whatever, when you need additional capacity, you replace it, but on the software side you can make the replacement every hour, every week. And this is something that the new technologies are bringing, a flexibility for the telecom operator to introduce a new feature without having to be physically there in the place, okay, by software remotely and this is the kind of software network we want to build. >> Lisa Martin: You know- >> Yeah, I want to add to that if I can- >> Please. >> Yeah. >> I think this is one of the biggest benefits of the open model. If the stack is all integrated as one appliance, when a new technology, we all know how quickly selecon technology comes out and now we have GPU's coming out for AI more increasingly, in an appliance model it may take you two years to take advantage of some new selecon that just came out. In this new open model, as Juan Carlos was saying, you just swap out, you know, you have time to market CPUs launched, it can be put out there at the cell tower and it could double capacity instantly and we're going to need that in that world, that easily going to be AI enabled- >> Lisa Martin: Right. >> So- >> So my last question to you, we only got a minute left or so, is given everything that we've talked about, the challenges, the opportunities, what you're doing together, how would you Juan Carlos summarize how the business is benefiting from the Dell partnership and the technologies that you're enabling with this new future network? >> Well, as I said before, we will need to be able to cover all the characteristics and performance of our network. We will need the right kind of processing capacity, the right kind of hardware solutions. We know that the functionality of the network is a very demanding one, we need hardware acceleration, we need a synchronization, we need time-sensitive solutions and all these can only done by hardware, so you need a good hardware partner, that ensures that you have the processing capacity you need to be able then to run your software, you know, with the confidence that it will work and with the performance that you need. >> That confidence is key. Well it sounds like what Telephonica and Dell have achieved together has been quite successful. Congratulations on the first couple of years, sounds like it's really helping Telephonica's business move in the strategic direction that it wants. We appreciate you joining us on the program today, describing all this, thank you both so much for your time. >> Thank you very much. >> Thank you, this was fun. >> A pleasure. >> Good, our pleasure. For our guests and for Dave Nicholson, I'm Lisa Martin, you're watching theCUBE live day two from Barcelona, MWC 23. Don't go anywhere, Dave and I will be right back with our next guests. (cheerful bouncy music)

Published Date : Feb 28 2023

SUMMARY :

that drive human progress. to you in conversations today? and the providers of it's great to have you So the buzz around this and on top of it, you What are some of the and the data needs to be acted you hear from partners, so you have to keep the lights on. into the network need to What are the benefits of we're going to charge you So in the same way you travel anywhere the data's got to be there, And I'd love to get your feedback too. and that is one of the areas for a couple of years, you that know about the hardware, the server, and like you mentioned, for the tower and you're and the hardware, you need to replace it benefits of the open model. and with the performance that you need. Congratulations on the and I will be right back

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
Dave NicholsonPERSON

0.99+

Juan CarlosPERSON

0.99+

Lisa MartinPERSON

0.99+

DavePERSON

0.99+

Dave NicholsonPERSON

0.99+

SpainLOCATION

0.99+

BarcelonaLOCATION

0.99+

DellORGANIZATION

0.99+

5 yearsQUANTITY

0.99+

EuropeLOCATION

0.99+

10 yearsQUANTITY

0.99+

36 monthsQUANTITY

0.99+

TelephonicaORGANIZATION

0.99+

2QUANTITY

0.99+

two guestsQUANTITY

0.99+

North AmericaLOCATION

0.99+

twoQUANTITY

0.99+

2024DATE

0.99+

Dell TechnologiesORGANIZATION

0.99+

two yearsQUANTITY

0.99+

Juan Carlos GarciaPERSON

0.99+

2000 exhibitorsQUANTITY

0.99+

Linux FoundationORGANIZATION

0.99+

TelefónicaORGANIZATION

0.99+

second challengeQUANTITY

0.99+

yesterdayDATE

0.99+

80,000 plus peopleQUANTITY

0.99+

oneQUANTITY

0.99+

both handsQUANTITY

0.98+

two kindsQUANTITY

0.98+

100 yearsQUANTITY

0.98+

MWC 23EVENT

0.98+

each applicationQUANTITY

0.98+

3QUANTITY

0.98+

bothQUANTITY

0.98+

one boxQUANTITY

0.98+

35 years agoDATE

0.98+

coupleQUANTITY

0.98+

this yearDATE

0.98+

first thingQUANTITY

0.97+

three aspectsQUANTITY

0.97+

Ihab TaraziPERSON

0.96+

CAMARAORGANIZATION

0.96+

todayDATE

0.95+

one thingQUANTITY

0.95+

one personQUANTITY

0.95+

4QUANTITY

0.95+

day twoQUANTITY

0.93+

first couple of yearsQUANTITY

0.92+

this morningDATE

0.91+

MWCEVENT

0.9+

2GORGANIZATION

0.9+

SVPPERSON

0.88+

Mobile World CongressEVENT

0.85+

one applianceQUANTITY

0.85+

one siteQUANTITY

0.84+

a minuteQUANTITY

0.83+

CTOPERSON

0.82+