Image Title

Search Results for POTUS:

Ben Fischer, Red Hat


 

(upbeat music) >> Welcome to this special CUBE program. We're going to help you better understand how to manage risk by securing your digital supply chain. And we're going to first give you a high level preview of what's happening in the market. And with me, is Ben Fischer, who's Emerging Security Technology Advocate at Red Hat. Hello, Ben. Good to see you again. >> Nice to meet you, David. I'm (indistinct) >> Yeah, so let's set it up. What can people expect to hear from this program? >> So today, I'm going to start off and you're going to, we're going to have a conversation about some of the business challenges related to the software supply chain. And then the next video will be with Vincent Danen, Red Hat's VP of product security, and Luke Hinds, our security lead from the office of the CTO. And they're going to discuss more of the security aspects of the software supply chain. Thirdly, you'll (indistinct) the newcomer director of hybrid platforms, security product management. We'll dig into some of the practices and the technologies, and that will be followed up by Andrea Hall and Andrew Block. Andrea is a specialist solution architect, and Andrew is a distinguished architect, and they're going to cover some of the change in environments. There's a lot of change in environments related to the regulations and different movements in the industry and organizations. And then lastly, we'll have a video from an interview you did with Luke Hinds, discussing a software sign in tool called Sigstore and how it can improve security supply chain. >> Excellent. Thank you for that. Okay. So Ben, people hear the term software supply chain, and makes them, "Oh. That's an interesting name." But what do we mean by the term software supply chain, Ben? >> So it's a loaded term. Simply, it's the supply chain but of software. And people think, "Oh well. I just go to a store, and I buy software and it comes packaged," maybe in the old days. But these days, we've got open source software. So there's repositories and collaboration upstream where a lot of people in a community contribute to all these different pieces of the software. It's kind of like when you go to a store. You go to a store and you just see this one piece, but that store carries lots of different products. And for each of those products, they have relationships with different vendors and different distributors to gather all those products into a store. And it's pretty complex. So there's been this kind of curation of products and softwares that's kind of come about kind of like a warehouse club. So like you would trust a warehouse club to be kind of a place to reduce the amount of shopping you might have, or you can kind of go there and you trust that they have good products that you'll like, and that fulfill most of your needs for your family, and you can go there and you can kind of get most of your shopping out of one place versus having to drive all around town to go get a bunch of different products that are carried in different stores, and then having to research all those products, warehouse clubs make that experience very simple. And so there's been kind of an upsurge of organizations like Red Hat that just help simplify your choices and do that curation. And the value there is in trying to not just give you everything, but also curate and try to make sure that what you have is secure. Make sure what you have is up to date. Kind of do all these kinds of nuanced things. The software supply chain is kind of complex in that there's all these extra details you need to be kind of aware of, and it's true. You know, you could run around town and shop for every product you would like yourself, just like in a software supply chain, you could go directly and get all the pieces of software and manage them and update them and do all the work yourself. But it it's a lot of work, and it is, as the word implies, it's a chain. So it's not just one relationship. It's a whole chain of relationships. And having a trusted entity as kind of a proxy, that you could put your faith in, and knowing that they're kind of doing some of that work for you makes life a lot easier just like in the warehouse club, right? You want to kind of go one place, get all your shopping done and be satisfied. And so just like you would in traditional times. You Know, before open source came about, there was a lot of proprietary software, and you'd put your trust and faith into them, that they would satisfy all of your needs, and they service you entirely. But even proprietary software now is an open source software so it comes into the same problem. So you need to have a trusted partner basically to help you understand and give you that level of trust in the software you're buying. >> Makes sense, yeah. And Red Hat plays that critical role. >> Yeah. >> So let's explain why all of a sudden this topic of digital supply chain, software supply chain has taken center stage. Ben, what should people understand about the digital supply chain and how it impacts their respective businesses? >> Well, the digital supply chain is really, really critical, I mean, if nothing else. I mean to bring up the kind of the COVID analogy, right? Everything changed with COVID. Things just got accelerated because we realized that the old way of doing things in person and a lot of physical ways slowed things down. And so when we were trying to social distance and have space, the pressure for doing everything in a digital form, and to make it easier to, you know, order your groceries and have them delivered to your door, or, you know, do a trunk delivery of your pizza at the local pizza shop, all this became really critical. So yeah. It's just, honestly, the COVID experience really accelerated the whole need for digital transformation. I'm not trying to go there, but that was part of the supply chain because all those companies also needed to have that digital experience with all of their vendors, and it's kind of accelerated in that respect. So the supply chain in general is something that's gotten a lot of attention. I think people actually understand, maybe have an idea what the word means over the last two years with all the incidents that have happened, and kind of the power of having it in digital electronic form, really really, I think, has hit home for a lot of people. And it's critical because now, I just don't feel like the world can ever really kind of go back from that. We're all so dependent on transacting in a digital form. Our businesses rely on it. We rely on a daily checking of phones, checking websites for information, doing everything. All this is run on software, right? And it's not just software that maybe one person wrote and can maintain for the rest of their lives, and do it in a perfect form. At some point, the software, you know, almost all of it, is using different parts of software that are open source and out there and available. And the pieces that were already developed, cause there's no reason to recreate the wheel. And they just kind of pulled in all these little open source components. If they didn't make a program, it was the programming around that to kind of make that usable for their particular use case. And everyone's just gotten very, very comfortable with this model of pulling software, what we would say, from the upstream down to the downstream and consume it and utilize it themselves. It's just pervasive everywhere. It's just, you know, open source, they say, is kind of eating the world and that's kind of where it's come from. >> Right. Yeah. And this is really a major issue for folks. We're seeing all kinds of new techniques. And for example, just imagine you've got dozens or even hundreds of suppliers, and the bad guys are targeting, you know, a victim, and they might put a piece of malware in an individual, one of the suppliers, you know. They'll get in to one of the suppliers, and that's a benign piece of code, but when it gets actually through the victims', you know, the targets' firewall, things will start to self-form in ways that we've really not seen before. And so this is really a big issue. There's a lot of talk coming from policymakers. Of course, the POTUS has issued an executive order and is putting pressure on businesses and technology companies to improve their security posture. I wish it were as easy as a sort of a swipe of a pen, but what's behind these trends, Ben? >> So, oh, there's so much behind there. So I think you're alluding to something really, really, really important. So in the security world, I mean, most of the issues in the security world is due to, you know, breaches, I should say. Hacks are due to kind of unpatched vulnerabilities. So the problem with that is then the answer is, well, you should patch and patch regularly, and that's absolutely true. You should patch as much as you can where it's not causing business disruptions. But when you get into a supply chain, or a digital supply chain issue, if you have a hacker who is able to penetrate into a vendor's software, and they're able to play something that gets placed into their update mechanism and then gets pushed out to all of our customers, it can be catastrophic and it can be, it will spread very fast and all the customers that are doing the right thing normally, by doing constant updates, will get infected. This is kind of the scary thing. Obviously, it is the right thing to do. And the right thing is for those vendors to secure their environment as much as possible and do everything they can to make that as tight as possible. But also, as in anything, it's really, we're in a world now where it's not if you're going to be breached or, you know, it's going to be when. Everybody in the world, especially the United States, we've all had breaches with our confidential information exposed, right? It's kind of the world we live in. It's what we expect. So with that understanding, you know, it becomes more about how we'll react to that. You know, if your credit card number gets exposed, you just don't throw your hands up in the air. You go, "Okay. Well, I need to put a credit freeze. I need to do certain diligent actions." Same thing in the industry. You know if something happens like that, an organization needs to respond properly and fast to share with the industry what has happened to stop those updates from continuing to perpetrate and provide guidance on what they can do. And this is one of the wonderful things, I think, about the security industry, is actually the willingness and interest to share. You'd kind of think of people in the old days wanting to hide their security secrets. Hide and protect what they do to make sure that, to safeguard all their assets and safeguard the company, their data, everything. And I'm not saying that everything is exposed, but there's a more willingness to share information on threats they're seeing and collaborate on fixes, and work through very difficult issues in a collaborative way, which is, I think it's really wonderful, and it plays perfectly in my mind, kind of the open source mentality of doing things together, out in the open, across organizations. >> Right. So, I mean, again, it's, you know, the very things that, the good behavior we're supposed to be doing with patching and what everybody's advising us to do, we have to be really careful. That can actually turn around and bite you. So how should we think about trust with software? What does that even mean today, Ben? >> Well, it's becoming more important than ever before, because before, you know, there, like I'll tell you way back when I, long time ago, when I was quite young, you'd just download software. And you would share it with friends and copy it, and there was no such thing as antivirus. And everybody was fine with that, and you didn't even think of an issue. And then I remember the first antivirus or viruses came out and then you went down to your local computer software store, and they're handing out free discs as antivirus fixes for that one particular issue. So you went down and you got it and you'd patch it up. And that was that. And you didn't really have any worries beyond that. These days, you know, and that's because you trust the store, and you knew there was only one issue and nobody was, it's kind of a free environment where nobody thought that anything bad would really happen. Today though, we hear in the news constantly about cyber attacks, about breaches, about just endless numbers of things that are happening. Ransomware. There's so many different types of attacks and it's happening in so many different ways across every industry, every geography. It's everywhere, you know. It's really, in my mind, the world's largest industry, cyber crime. And that's just a scary thing and that's because it's profitable. And so, you know, when you think of it as that, as a kind of an evil industry, if you will, it puts things into a little bit of a perspective that, okay, their motives, for the most part are money, and they're trying to do this. So if that's the case, then you're just trying to create enough friction that it's just not profitable for them. And so it's not about doing everything in terms of security. It's about trying to do, you know, for the right things to mitigate the risks for organization. And so getting back to your point about trust, how do you trust the software that you're given? You know, if you download a piece of software, you should be thinking about where's the software being downloaded from? There's lots of sites. There's lots and lots of ways to get it. There's absolutely millions of different pieces of open source code that's out there. And just because you downloaded it from a site, you don't know who posted it, you don't know a lot of these issues. So it can be scary. And as an organization, you can choose to take on all or part of that risk by trying to understand which locations are safe. You can try to understand, you know, which code is safe, and which code you can basically feel comfortable that there's a level of trust. Or simply you can shift that risk over to an organization that might do some of that work for you, like kind of in any business model. Red Hat is an entity, and it focuses on open source software. So, you know, you can go out and you could download any bit of open source software that Red Hat sells, and you can run it today. There's nothing stopping you, and that's wonderful, and we're happy that you're doing that, but Red Hat plays a particular role in that. We're trying to kind of curate that software. We're trying to pick the best piece of software that we feel we can trust. We have a lot of people in those communities, working with the people who actually work on that software. We believe in the open source model, partly because not only is it collaborative and just open and transparent, but in that transparency and in that collaboration, there is review of all the code that gets submitted. So if you can go to the right upstream article repositories, and you can work with those people, you have insight into what's happening, and you can pull down the pieces and the components that you feel are best that you can package into a product that you feel can meet all the needs for your particular customers, and you can do that in a particular way. And then having that close proximity to those communities, you also have an idea when there's updates and patches and you get to work on those, and that allows you to consume those faster, and bring those to your customers faster. And so this is part of the trust element. It's a matter of do you want to do it yourself? Like, you know, warehouse club analogy? Do you want to go to 100 stores when you do a shopping list, or, you know, 20, 30 stores driving around the whole day? I don't know. I don't want to do that on my Saturday. Or, you know, do you want to go to warehouse stuff? Yeah, you might pay a little bit more. There's a premium there. You have to have that warehouse club membership, but then you kind of go to one store and maybe get 80% of your shopping done there, and that's really good. And maybe get the 20% from a couple other stores down the street, but you're done in a matter of a few hours versus the whole day. And so I would implore you, in terms of trust, you need to think about what are the critical pieces of software that you have in your organization, right? What are the critical digital processes that your organization runs? Think about them, and also not just think about what the risks are around them, but also think about beyond them, what the risks are to the people you're trusting. So whether it's Red Hat, or whether it's a particular website you might be wanting to download that open source software from, you need to think about it's a whole chain of things. So you will need to know that, okay, I have access to these things. I have this information, and I have these risks. Now, if I extend that out one degree further, then what risks are those folks are exposed to? What do they have knowledge of? And do that, and then think about it, and think about and evaluate who has the most information? Where are the risks? And think about what makes sense for the organization in terms of mitigating those risks and giving you the best ability to respond when something does happen. I think you can reduce your risk exposure with an organization that curates open source, or even closed source, but also you can also kind of reduce the blast radius, I think, because if they can get you those updates faster, respond faster than you could yourself, then that's hugely valuable too. >> Yeah. I mean, you know, to your point about it's very lucrative for the hackers. I mean, the criminal algorithm is actually pretty simple. It's all about ROI for them, which is how much value can they extract and what does it cost them to extract that in a numerator denominator? And so to the extent that you can increase the cost to the hacker, there's less value to them, and they will go look somewhere else. So question is, what are the parameters of trust in software that can potentially help organizations increase that denominator? And how do you define trustworthy software? What are the attributes? >> Yeah. So there's a lot of attributes. Yeah. I come back to kind of warehouse club analogy. When you kind of go to the warehouse club, they've kind of already pre-picked for various use cases, kind of, you know. Here's the, you know. Here's the two brands of shavers and we have it in the disposable form and the replacement blade form. And you just have a few options there. And it's you know a nice, simple selection, and you look at it and, you know, you can see the price and you know the quantity and you have certain information. And if you did want to look up more information, it's either on the package or you pull out your phone and get more information. In the open source world, you know, some things you want to look at, you want to see its transparency. So everything in open source is very transparent. If you do want to go with a closed source provider, that's fine too. But you know, you do want to have as much transparency as possible. So you want to build up a good relationship, whether it's Red Hat, open source or a closed source vendor, you want to have that relationship to get insight. And if it's closed source, it's more important because you need to go deeper into that relationship to understand what's happening behind that veiled curtain. Accountability. So, you know, whether it is software that you're getting through another organization, you want to make sure you know who in that organization is accountable. You want to know how they're going to be accountable, how they're going to respond. If it's upstream, right now, one thing that's coming through is, and they call it S bomb, software bills and material, which has details about kind of an ingredient list, if you will, of that software. And that is something that will, in the future, make it a little bit easier for everybody, but also if you're going to get software yourself directly, give you an understanding of maybe who's accountable, who actually wrote the software or made the patch, or submitted the last update to a branch. That type of information is very useful because you need, at some point, you may need to know who did this to verify if something is trustworthy, if something was intentional or not, if you see something that might be curious or, I don't know, questionable in some nature. And traceability. You want to be able to have that ability to understand all the changes that have been done in that software, right? Software is, you know, it's highly versioned. So there's constantly new features or updates or patches. And you want to be able to go through and know what's happened there. So not only for the benefit of understanding the things that have been added and the benefits that have been added to the software, but if something happened or you were trying to make sure nothing bad happened, you'd want to make sure maybe there has been no malicious submissions into that code stream as well. And so by tracing that, that's good. And then the whole auditability of it, to go back and look at the software, and having somebody understand what might have happened by kind of digging into all the records for that particular software. I'd also say risk management, because you, as an organization, you really need to know what your risks are, and you need to be able to not just do that at the macro level, but now with the software supply chain, you need to bring that down to kind of a software level and really understand, you know, if my business relies on a particular software component, like open SSL for VPN software and site-to-site networking and whatnot, I need to make sure that if anything happens to this piece of software, which is a critical component for me operating my business, what am I going to do about it? You know do I just terminate all my VPN connections and leave my rural workers stranded and, you know, disable site-to-site networking so my different sites don't have direct networking connections? You have to kind think about what are the risks and, you know, what's my plan B? How would I possibly manage things? And it feels very overwhelming when you think about the number of components. And so this is where understanding this and trying to find ways to mitigate risk and manage it and make things a little bit simpler so you can really focus on things that matter and think are important. And then incident response, which is, there's going to be something that happens sometimes to some piece of software that your organization has. So how are you going to respond? How are you going to even find out? How are you going to know that something happened? How are you monitoring for vulnerabilities in the software? How are you connecting with the upstream communities and being aware that something is happening wrong, and there's a bunch of developers scrambling to try to fix something quick because maybe there's a known (indistinct) of some software out in the wild. So having that awareness and having that ability to building to respond really is probably one of the most critical things here. >> Ben, can you give us a sense of just kind of the scope of this problem? Are there metrics you can share to kind of frame the issue for the audience? >> Yeah. So in terms of open source supply chain attacks, some type, a software vendor, actually has reports every year. And they've reported that there was a 650% increase in open source supply chain attacks in the past year. And this is on top of a 430% increase the prior year. So it's scary, but it's basically literally exploding in terms of the threats happening in the supply chain attacks. Supply chain attacks are not new, but they've become quite popular. And the power of the supply chain, as an amplifying factor, is starting to get exploited really well by the attackers these days. >> Mm-hmm. Okay. So let's kind of go to best practice. I mean, what are businesses doing about these today? These problems today? What should they be doing that maybe they're not doing? >> So with the explosion, you can understand that with the spike of these supply chain attacks, organizations are honestly, and understandably pretty caught off guard. So while organizations have been working on their cybersecurity programs for some time now, they're mostly trying to react. And by react, they're reacting with maybe not the most efficient of incident response plans yet. And these attacks are spreading like wildfire, but as an industry, you know, it's not really helping us get ahead. So, you know, it's the unfortunate place where we're at. You mentioned that there's, obviously there's some guidance from POTUS and other folks in the industry, and various efforts in the industry to work on improving the supply chain, work on improving different components that can help make things dramatically better for the industry, but they're still pretty early stage. There's still a lot of work to be done. So as far as kind of what we can be doing as an industry, obviously, you know, I'll say collaboration again, because, you know, by working together, whether it's with the government or in an upstream organization setting standards, these things are all really important. And especially within verticals, I think it's really important to kind of get together because even if you have a general standard, things can vary quite a bit within the verticals. But besides that outwardly looking action, looking inside and trying to understand, in a sense, it's kind of a simple thing. It's a business process engineering a question of, okay, what are your critical business processes? You know, what do those business processes rely upon? You know, what software components are there? And then okay, for those pieces of software, they also have different components. So even if you go to, you know, whether you go to an open source provider or a closed source provider, there are open source components. So understanding the software that you use, understanding where you get that software from, and understanding the components in those software and how those are digested, whether it's from an organization like Red Hat that's open source, or maybe a closed source provider, is really important. Developing the relationships that you have, that bi-directional trust with those organizations that are running that critical software for your organization is really important. So it's a lot more of a mapping and awareness type exercise, because from there, you can start asking a bunch of different questions. And by engaging in conversations about those questions, you're going to learn more and more and more. And that will continue to lead forward. Eventually, you'll get an understanding of, "I have these risks," and you may not necessarily know everything, but along the way, you'll start developing awareness of risks, and then you can ask yourself along the way, "Okay. As an organization, let's come together and figure out how can we- Let's look at these risks and how can we think about mitigating these right within our budget? To meet our business needs," et cetera. But it's a hard question because there's so many software out there. Our businesses are so critical on so many ways. There's so much software, and each software has so many different components. It's a pretty overbearing problem. I just not trying to scare anybody, but it's just important to just take some time and think about it and understand what you have, and be diligent about kind of walking through those business processes, and start with the most critical ones and kind of keep walking forward. And as you're mitigating them, think about, do you want to have an organization help you with these, or do you want to hire people and have them invest their time into doing the work that an outside organization might do for you? >> Right. Hey, Ben, I've taken a lot of your time. Really appreciate your insights, and really great to have you on. Thank you. >> Well, thank you for having me, Dave. Appreciate it. >> And thank you for watching the CUBE. This is Dave Vellante, and we are the leader in enterprise technology coverage. (upbeat music)

Published Date : Dec 15 2021

SUMMARY :

We're going to help you better Nice to meet you, David. What can people expect to and they're going to cover Thank you for that. It's kind of like when you go to a store. And Red Hat plays that critical role. the digital supply At some point, the software, you know, one of the suppliers, you know. to be breached or, you again, it's, you know, and that allows you to And how do you define and really understand, you know, And the power of the supply So let's kind of go to best practice. software that you use, and really great to have you on. Well, thank you for having me, Dave. And thank you for watching the CUBE.

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
Dave VellantePERSON

0.99+

AndrewPERSON

0.99+

Vincent DanenPERSON

0.99+

Luke HindsPERSON

0.99+

AndreaPERSON

0.99+

DavidPERSON

0.99+

Ben FischerPERSON

0.99+

DavePERSON

0.99+

80%QUANTITY

0.99+

20QUANTITY

0.99+

20%QUANTITY

0.99+

Andrew BlockPERSON

0.99+

Red HatORGANIZATION

0.99+

650%QUANTITY

0.99+

430%QUANTITY

0.99+

BenPERSON

0.99+

100 storesQUANTITY

0.99+

dozensQUANTITY

0.99+

Andrea HallPERSON

0.99+

TodayDATE

0.99+

todayDATE

0.99+

United StatesLOCATION

0.99+

two brandsQUANTITY

0.99+

one pieceQUANTITY

0.99+

30 storesQUANTITY

0.99+

one degreeQUANTITY

0.99+

SaturdayDATE

0.98+

oneQUANTITY

0.98+

eachQUANTITY

0.98+

each softwareQUANTITY

0.97+

one storeQUANTITY

0.97+

one personQUANTITY

0.97+

firstQUANTITY

0.96+

one relationshipQUANTITY

0.95+

past yearDATE

0.94+

CTOORGANIZATION

0.94+

hundreds of suppliersQUANTITY

0.93+

Red HatORGANIZATION

0.93+

one particular issueQUANTITY

0.92+

one issueQUANTITY

0.92+

first antivirusQUANTITY

0.92+

COVIDOTHER

0.9+

one placeQUANTITY

0.89+

SigstoreTITLE

0.88+

millions of different piecesQUANTITY

0.87+

POTUSPERSON

0.86+

Red HatTITLE

0.8+

ThirdlyQUANTITY

0.79+

last two yearsDATE

0.75+

prior yearDATE

0.73+

couple other storesQUANTITY

0.72+

one thingQUANTITY

0.71+

HatTITLE

0.7+

CUBETITLE

0.65+

peopleQUANTITY

0.63+

of sitesQUANTITY

0.6+

openQUANTITY

0.53+

softwareQUANTITY

0.53+

RedORGANIZATION

0.51+

lotsQUANTITY

0.5+

Carrie Palin, Splunk | Splunk .conf19


 

>>Live from Las Vegas. It's the cube covering splunk.com 19 brought to you by Splunk. >>Hey, welcome back. Everyone's the cubes coverage here in Las Vegas for Splunk's dot com I'm John, the host of the cube. This is Splunk's 10th year user conference is the cube seventh year. We've been riding on the same wave with Splunk over the years and just watching the phenomenal growth and changes at the level of data at scale we've been covering. We can remember I said from day one data at the center of this, not just log files is now gone. Beyond that, we're here with Carrie Pailin, the CMO, chief marketing officer for Splunk. Welcome to the cube. Thanks for coming on. Thank you so much. It's great to be here. The folks that know us know about spunk. Notice the color changes in the background, the popping kink, burning yellow, orange underneath, new branding. You're new to Splunk story, career in technology. Um, this is exciting. And then portfolio, there's all the news is a phenomenal good news flow. >>Very relevant, right on Mark. Data is now creating value and datas like software. It's enabling value. Splunk software and solution platform has done that and this new new grounds to take. But you're now setting the agenda for the brand and the company tell us, I mean, it's a marketer's dream. What can I say? It's a, you know, I joined nine months ago and when I was interviewing for the role, I remember Doug Merritt saying to me, Hey, you know, we might be the only $2 billion enterprise software company that nobody's ever heard of. Amy said, I want to go solve for that. Right? Like the folks who know Splunk and our customers, they love us, our product is awesome and our culture is awesome, but the world doesn't know about us yet and we haven't invested there. So I want to go take the brand to the next level. >>And I want the world to understand what data use cases are out there that are so broad and so vast. And we believe that every problem ultimately can be solved through data or almost every problem. And we wanted to set the stage for that with this new brand campaign. Yeah. Just on a personal note. And following the journey of Splunk, a scrappy startup goes public and growth modes. When you're a growth Moe is hard to kind of lay down foundational things like branding and whatnot. But now sponsor leader, we did a poll within our community and for cloud and on premise security, Splunk's the number one supplier for just laws with workloads. And then now cloud security is kicking in. So the relationship to Amazon, Google cloud platform and Azure is a critical part of Splunk is now the leader. So leaders have to do things like make sure that their brand's good. >>This is what you're doing. Take us behind the scenes of the branding, the things you chose and data for everything. Yeah. D the little small nuance data to everything. Um, and the reason behind that was we believe you can bring and we can enable our customers to bring data to every question, every decision and every action to create meaningful outcomes. And the use cases are vast and enormous. We talked about some of them before the show started, but helping look at global law enforcement, get ahead of human trafficking through SPOHNC and spelunking. What's going on across all sorts of data sources, right? Helping zone Haven, which is our first investment from Splunk ventures, which startup that's actually helping firefighters figure out burn burn patterns with fire wildfires. But also when temperatures and humidity change where sensors are, they can alert firefighters 30 to 45 minutes earlier than they would usually do that. >>And then they can also help influence evacuation patterns. I mean it's, it's remarkable what folks are doing with data today and it's really at the, at the core of solving some of the world's biggest issues. It's hard to tell a story for a company that solves some of the use cases. Yes. Because depending on who you talk to, that's the company. This is what we should be telling them. I know you do this over here, so when you're horizontally creating this kind of value, yeah, it's hard to kind of brand that because it will get a lot of opinions because you're doing a lot of different things. There's not like one vertical. That's right. So this is the challenge that most B to B marketers will fall on the trip. We do this because we have a lot of customers in this one segment. But yes, you guys are hitting so much more. >>How did you deal with that? Ha, we had a lot of talks about it, a lot of discussions, a lot of debate and I love diversity of thought. It usually drives the right outcomes, but we had a lot of this, this is not an easy answer. If it had been, it would have been done years ago and we really talked about setting the stage for where, you know, I love the Wayne Gretzky quote about skate to where the puck is going and that's what he always did and that's why he was so good. We believe there will ultimately be a data platform of platforms and we believe Splunk is that platform, right? And so that's where the industry's going. We wanted to cast a net that would take us there so that this is the beginning of a brand evolution for us and not a total rebrand, but it's setting the stage for a category creation that we believe is coming in the industry. >>A few. You guys are smart and I think my observation would be looking at some of our 10 years of reporting and sharing some on digital is that all the conversations around data is impacting the real world. Yes. You see Mark Zuckerberg and on Capitol Hill having the answer to the date of debacles, he has cybersecurity attacks, national security, um, ransomware taking down cities and towns. This is a real impact. Forest fires disrupting rolling blackouts. So technology's impacting real world lives. That's right. This is really new to tech. I mean usually behind the scenes, you know, coding, but not anymore. We're the front lines of real societal, global. Yes. Jade is at the forefront and it's really exciting. It's also frightening, right? Because we believe data presents the greatest opportunity for humanity, but also some of the greatest threats. And so hence our ability to really dig in on data security. >>It's important to do that while we're actually also surfacing data to solve real world issues. You've been in the industry for a while and when you came to Splunk, boasts a couple of things that surprised you as you, you had some thoughts going in, you knew Splunk. Yes. What are some of the things that surprised you when you got here? Oh, I mean, in such a good way. A few things, you know. Well, here's the story. Three days into being at Splunk, my dad got very ill and I wasted him to Austin for heart surgery and he actually didn't make it. Um, and so it's been a rough year to say the least. And uh, the way that Splunk's culture, I knew about it before I came, but the way that this company treated me, like I had been here 10 years, uh, when I'd really only been an employee three days was something I'll never forget. >>And it's, it's special. Um, and so I believe that companies are successful if they are smart and healthy and in Splunk has the healthy and droves and not just the compassion and the empathy, but you know, a very transparent culture. We debate things, we talk about things, we support each other. We are accountable. And I believe that's a big part of why we've grown so fast because our culture is incredibly healthy and very, um, collaborative as a team. I'm sorry for your loss. Thank you. Um, you mentioned the culture is a big part of Splunk. Yes. In talking to some of the folks that spoke over the years, there's no, I will, I'll totally say this. There's no shortage of opinions, so have not volunteered. These are robustness. Yes. Diversity of thoughts, very actionable communities. How do you, um, how do you look at that? Because that's a, could be a force, a force multiplier. >>Yes. For the brand. How are you going to tie in to everything with the community? How are you going to harness that energy? Yeah. So it's coming and the reality is data to everything is actually a set up to tell the stories of everyone who is using data today. And so the community is going to be one of the first places we go to surface. Some of those amazing stories. Um, and some of the things you see here at the show are actually showcasing that in the keynote today we heard from zone Haman and Porsche and so many others around their use cases. But the community is where it all begins and that's the lifeblood of our sort of spunkiness and a something that we don't take for granted once. One second. Sorry about the Barack Obama. Yeah. Directions with him and his interest in Splunk. Yeah. So we had our big re rebrand a reveal last month we had an event and it was for C suite type of folks. >>That was a very intimate event and we wanted somebody to keynote that and headline that that really brought to life the whole notion that you can bring data to everything. And president Obama was the first POTUS that actually use data in his campaign strategy. He's very open about that. He's the first president to appoint a chief data scientist to the white house. He's actually exceptionally geeky and very data-driven. And so when we asked him to come and headline this, he actually was really excited about it. Um, and you know, in, in great fashion, his communications team was really strict on curating the questions that we had for him. And he was so cute. He showed up to the event and he said, look, um, I'm so thrilled to be here. I love what you guys are doing and you can ask me anything. It's just like ready to go. >>And he was so wonderful and teed up this, this notion of day bringing data to everything so brilliantly. He's kicking, dig and be ad live all the time. He's very colorful as well as personality. Yes. He's kind of nerdy and you know, he was very open and OpenGov too. One of the things that I remember and when big data really started rolling into the scene around 2009, 2010 yes. You saw that opening up data registries from cities and towns and actually created innovation from health care medical supplies? Yes. Yes. So this has been a big part of it. Huge. You guys are doing some things out here and I see the exhibits we're using the day you're doing demos. How do you see you guys helping society with that? Because if you get to the next level, you've got some great use cases. Yes, the public sector is a big part of some news here. >>Fed ramp is one little technicality, but you got some certification, but government's modernizing now. So you know post Obama, you're seeing modernization of procurement roll with cloud, certainly cyber security. Amazon with the CIA, department of defense, role of data in the military and public sector. Yes, education. This is going to be a disruptive enabler for faults on the public impact. I mean, look, there's, you know, Doug touched on this a little bit this morning, the reality in our press conference, but the reality is if you do it right, opening up datasets to communities of people that can do better together and you can get this collective momentum going. For instance, in healthcare, I mean I'm a little bit of a health care nerd and I don't know if you've watched the PBS special on the Mayo clinic, it's spectacular. But one of the reasons the Mayo has been amazing for years is because their doctors all work off the same systems in every discipline in that facility and they can learn more holistically about a patient. >>And I think about the impact that data could have if we could open up those data sets across every health provider for one person or the same illness with every major institution across the U S collaborating and sharing and what we could actually do to make real impact and strides against some of the diseases that are really crippling society today. So I think that the good that we can do with data, if we open up those data sets and do it in a way that, that it's safe. It's remarkable the progress we can make. You know, one of the from machine learning has been a big success story. Machine learning toolkit. Customers are raving about it. Opening up the data creates better machine learning. AI creates better business value. That's right. That's that part of how you guys see things rolling out. Sure. I mean, as a marketer we use AI today and it's really more machine learning. >>It's sad pattern recognition. But we use, uh, you know, my last stand as a CMO, the last company I was at, we use an AI bot to augment our sales headcount for following up on leads. And it looked like a human being. I mean, same thing for Splunk. I mean, the more we can see pattern recognition, proffer up insights, the better off we are to help out our customers. And so Tim Teles team is driving that hard and fast into our innovation curve with everything that we do. Innovation culture, big time here, right? Huge, huge and one of the reasons I came to Splunk is when I interviewed with Tim and I said, Hey, how are you doing on recruiting engineers in the Valley? We all know that that is liquid gold, and he said that he had hired 370 odd engineers in less than a year and from really big brands like Airbnb and I thought, all right, there's some really cool innovation going on here. >>If some of the best engineers in the Valley really want to come work here and they want to work for a great leader, and Tim and his team are that. so.com is 10 years now this year has been riding the wave together. It's been fun. Your first, my very first dotcom. Yes. Your thoughts on this, on this community, this event. Share your, your thoughts. I mean I'm blown away and this is a team sport. I'm so proud of the events team, the creative team, the sales teams, everybody who's come together to make this event so spectacular. It's just sort of mind numbing that a company of our size can put on such an experience for our user community, but I'm also thrilled with the engagement. We have over 300 sessions this week and most of them are user and customer use, case driven and the stories they are telling are magnificent. >>They're doing this all with Splunk, so it's pretty special. And the ecosystem and the app showcase is pretty hot here. You're seeing real applications, people writing code on top of Splunk? Yes, it's, it's, I'm sorry I don't use this word often. I'm 48 but it's rad. It's so cool. Yes. Harry, thanks so much for coming on the cube and sharing your insights. Absolutely. Final thoughts for the people who aren't here at the event, watching on camera, what, how would you encapsulate.com this year? What's the top story that needs to be told? I mean, look, the reality is that we are bringing data to way more than just security and it ops, which has been our core use cases forever, and they will continue to be, but folks are that are not incredibly data literate or through Splunk bringing data to everything and solving some big gnarly issues in the world. And it's pretty exciting stuff. So check us out. All right. Thanks. Gnarly red. Cool. I need a surf board, Jerry. Thanks for coming on Friday. Thank you so much. Coverage here@thetenth.com I'm Jennifer with the cube, bringing you all the action here in Las Vegas. Three days of cubed wall to wall coverage. We've got one more after this short break.

Published Date : Oct 22 2019

SUMMARY :

It's the cube covering We've been riding on the same wave with Splunk over the years and just watching and the company tell us, I mean, it's a marketer's dream. and on premise security, Splunk's the number one supplier for just laws with workloads. Um, and the reason behind that was we believe you can bring and we can enable our customers I know you do this over here, so when you're horizontally creating we really talked about setting the stage for where, you know, I love the Wayne Gretzky quote about skate to where the puck is going some on digital is that all the conversations around data is impacting the real world. You've been in the industry for a while and when you came to Splunk, boasts a couple of things that surprised and healthy and in Splunk has the healthy and droves and not just the compassion and the empathy, And so the community is going to be one of the first places we go to surface. He's the first president to appoint a chief data scientist to the white house. One of the things that I remember morning, the reality in our press conference, but the reality is if you do the progress we can make. I mean, the more we can see pattern recognition, If some of the best engineers in the Valley really want to come work here and they want to work for a great leader, I mean, look, the reality is that we are bringing data to way more than just security

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
AmyPERSON

0.99+

CIAORGANIZATION

0.99+

TimPERSON

0.99+

AmazonORGANIZATION

0.99+

Carrie PalinPERSON

0.99+

Carrie PailinPERSON

0.99+

DougPERSON

0.99+

ObamaPERSON

0.99+

JenniferPERSON

0.99+

Las VegasLOCATION

0.99+

SplunkORGANIZATION

0.99+

Doug MerrittPERSON

0.99+

three daysQUANTITY

0.99+

10 yearsQUANTITY

0.99+

JerryPERSON

0.99+

Mark ZuckerbergPERSON

0.99+

Barack ObamaPERSON

0.99+

AirbnbORGANIZATION

0.99+

HarryPERSON

0.99+

FridayDATE

0.99+

JohnPERSON

0.99+

30QUANTITY

0.99+

firstQUANTITY

0.99+

AustinLOCATION

0.99+

one personQUANTITY

0.99+

last monthDATE

0.99+

Three daysQUANTITY

0.99+

oneQUANTITY

0.99+

PorscheORGANIZATION

0.99+

370 odd engineersQUANTITY

0.99+

Tim TelesPERSON

0.99+

presidentPERSON

0.99+

first investmentQUANTITY

0.99+

Capitol HillLOCATION

0.98+

One secondQUANTITY

0.98+

less than a yearQUANTITY

0.98+

one segmentQUANTITY

0.98+

this weekDATE

0.98+

GoogleORGANIZATION

0.98+

over 300 sessionsQUANTITY

0.98+

PBSORGANIZATION

0.97+

nine months agoDATE

0.97+

this yearDATE

0.97+

10th yearQUANTITY

0.97+

todayDATE

0.97+

MayoORGANIZATION

0.97+

45 minutesQUANTITY

0.97+

JadePERSON

0.97+

first presidentQUANTITY

0.96+

here@thetenth.comOTHER

0.96+

seventh yearQUANTITY

0.96+

2010DATE

0.95+

POTUSPERSON

0.95+

MarkPERSON

0.95+

2009DATE

0.93+

Wayne GretzkyPERSON

0.93+

U SLOCATION

0.92+

$2 billionQUANTITY

0.9+

SPOHNCORGANIZATION

0.89+

first placesQUANTITY

0.88+

48QUANTITY

0.88+

this morningDATE

0.88+

yearsDATE

0.86+

day oneQUANTITY

0.83+

one verticalQUANTITY

0.83+

one little technicalityQUANTITY

0.82+