Image Title

Search Results for Peter Births:

#DatriumCrowdChat


 

>> Hi, I'm Peter Burroughs. And welcome to another cube conversation. This one is part of a very, very special digital community event sponsored by day trip. What we're going to be talking about today. Well, date comes here with a special product announcement that's intended to help customers do a better job of matching their technology needs with the speed and opportunities to use their data differently within their business. This is a problem that every single customer faces every single enterprise faces, and it's one that's become especially acute as those digital natives increasingly hunt down and take out some of those traditional businesses that are trying to better understand how to use their data. Now, as we have with all digital community events at the end of this one, we're gonna be running a crowd chat, so stay with us, will go through a couple of day trim and datum customer conversations, and then it'LL be your turn toe. Weigh in on what you think is important. Ask the questions of Data Room and others in the community that you think need to be addressed. Let's hear what you have to say about this increasingly special relationship between data technology and storage services. So without further ado, let's get it kicked off. Tim Page is the CEO of Datum. Tim, Welcome to the Cube. Thank you, Peter. So data give us a quick take on where you guys are. >> Yeah, Day tree ums formulated as a software to find converged infrastructure company that takes that converges to the next level. And the purpose of us is to give the user the same experience, whether you're working on Prem or across multi cloud. >> Great. So let's start by saying, that's the vision, but you've been talking a lot of customers. What's the problem that you keep hearing over and over that you're pointing towards? >> Yeah, it's funny. So it's so meet with the number CEOs over the years and specifically is related to a tree, and they'LL tell you they were on an on demand economy that expects instant outcomes, which means you have to digitally transform. And to do that, you've got to transform it, which means it's got to be easy. It's got to be consistent. You've got to get rid of a lot of the management issues, and it's got a feel and take advantage of the services that cloud has to offer. >> All right, so that's the nature of the problem. You've also done a fair amount of research looking into the specifics of what they're asking for. Give us some insight into what day terms discovering as you talk to customers about what the solutions are going to look like. >> It's interesting. So if you look at how to resolve that, you've got to conf urged to transform in some form or fashion. If you look at the first level of convergence a lot of people have done, it's been directly as relates the hardware architecture. We've taken that to a whole new level until Point were saying, How do you actually automate those mundane task that take multiple groups to solve specifically primary backup disaster recovery? All the policies involved in that is a lot of work that goes into that across multiple groups, and we set out to solve those issues, >> so there's still a need for performance. There's still the need for capacity to reduce management time and overhead etcetera. But Tim, as we move forward, how our customers responding this you're getting some sense of what percentage of them are going, Teo say Yeah, that's it >> s so interesting. So we could start a survey and got over five hundred people leaders to respond to it. It's interesting is they talk about performance management security, but they're also talking about consistency of that experience. And specifically, we asked how many of you is important to have your platform have built in backup and policy services with encryption built in et cetera. We got a seventy percent rate of those applicants of those those people interviewed saying is really important for that to be part of a plan. >> So it sounds like you're really talking about something Mohr than just a couple of products. You really talking about forcing customers or you're not forcing. Customers are starting the process of rethinking your data infrastructure, and I got that right. >> That's right. If you look at how infrastructure is grown in the last twenty years, right? Twenty years ago, san technology was related, and every time you throw open app, you had to put different policies that Apple put different one tight management to how much of my resources and go to certain things. We set out to actually automate that which is why it took us four years. To build this platform with a hundred programmers is, Well, how do we actually make you not think about how you're going to back up? How do you set a policy and no disaster recovery is going to run? And to do that, you've gotta have it one code base and we know we're on to something, even based on our survey, because the old array vendors are all buying Bolton's because they know users want an experience. But you can't have that experience with the ball time. You have to have it your fundamental platform. >> Well, let me let me step in here. So I've been around for a long time him and heard a lot of people talk about platforms. And if I have kind of one rule companies and introduce platforms that just expand, typically failed companies that bring an opinion and converge more things so it's simpler tend to be more successful. Which direction's date >> going? So we definitely That's why we took time, right? If you want to be an enterprise class company, you can't build a cheap platform in eighteen months and hit the market because were you, architect, you stay. So our purpose from the beginning was purposefully to spend four years building an enterprise clap platform that did away with a lot of the mundane task seeing management That's twenty years old. Technology right? One management. So if you're buying your multi cloud type technology experience in cages, you're just buying old stuff. We took an approach saying, We want that consistent approach that whether you're running your services on from or in any type of cloud, you could instantly take advantage of that, and it feels the same. That's a big task because you're looking to run the speed of storage with the resiliency of backup right, which is a whole different type of technology. Which is how our founders, who have built the first words in this went to the second, almost third version of that type of oven. Stan she ation of a platform. >> All right, so we know what the solution is going to look like. It's going to look like a data platform that's rethought to support the needs of data assets and introduces a set of converge services that really focus the value proposition to what the enterprise needs So what do you guys announcing? >> That's exactly right. So we've finalized what we call our auto matrix platform. So auto matrix in inherently In it we'LL have primary backup Disaster recovery D Our solution All the policies within that an encryption built in from the very beginning. Soto have those five things we believe toe actually have on the next generation experience across true multi cloud. You're not bolting on hardware technologies. You're bolting on software technologies that operate in the same manner. Those five things have to be an errand or you're a bolt on type company. >> So you're not building a platform out by acquisition. You build a platform out by architecture and development. >> That's right. And we took four years to do it with one hundred guys building this thing out. It's released, it's out and it's ready to go. So our first we're announcing is that first in Stan she ation of that as a product we're calling control shift, which is really a data mobility orchestrator. True sas based you could orchestrate from the prime from the cloud cloud to cloud, and our first generation of that is disaster recovery so truly to be able to set up your policies, check those policies and make sure you're going to have true disaster recovery with an Rto zero. It's a tough thing we've done it. >> That's upstanding. Great to hear Tim Page, CEO Data Room, talking about some of the announcement that were here more about in the second. Let's now turn our attention, Teo. A short video. Let's hear more about it. >> The bank is focused on small businesses and helping them achieve their success. We want to redesign the customer engagement in defining the bank of the future. This office is our first implementation of that concept, as you can see is a much more open floor plan design that increases the interaction between our lead bank associates and our clients with day tree and split provisioning. Oliver Data is now on the host, so we have seen eighty times lower application. Leighton. See, this gives our associates instant responses to their queries so they can answer client questions in real time. That time is always expensive in our business. In the past we had a forty eight hour recovery plan, but with the atrium we were able to far exceed that plan we've been able to recover systems in minutes now instead of backing at once per day with that backup time taking eighteen hours. Now we're doing full system snapshots our league, and we're replicating those offsite stay trim is the only vendor I know of that could provide this end to end encryption. So any cyber attacks that get into our system are neutralized with the data absolution. We don't have to have storage consultants anymore. We don't have to be stored. Experts were able to manage everything from a storage perceptive through the center, obviously spending less time and money on infrastructure. We continue to leverage new technologies to improve application performance and lower costs. We also want to animate RDR fail over. So we're looking forward to implementing daydreams. Product deloused orchestrate an automaton. RDR fell over process. >> It is always great to hear from a customer. Want to get on Peterborough's? This's a Cube conversation, part of a digital community event sponsored by Data Room. We were talking about how the relationship between the new digital business outcomes highly dependent upon data and the mismatch of technology to be able to support those new classes of outcomes is causing problems in so many different enterprises. So let's dig a little bit more deeply into someone. Tatum's announcements to try to find ways to close those gaps. We've got his already who's the CTO of data on with today, says all are welcome to the Cube, >> that being a good to see you again. >> So automate tricks give us a little bit more toe tail and how it's creating value for customers. >> So if you go to any data center today, you notice that for the amount of data they have their five different vendors and five different parts to manage the data. There is the primary storage. There is the backup on DH. There is the D R. And then there's mobility. And then there is the security or think about so this five different products, our kind of causing friction for you if you want to move, if you want to be in the undermanned economy and move fast in your business, these things are causing friction. You cannot move that fast. And so what we have done is that we took. We took a step back and built this automatics platform. It's provides this data services. We shall kind of quality that autonomous data services. The idea is that you don't have to really do much for it by converging all this functions into one simple platform that we let him with all the friction you need to manage all your data. And that's kind of what we call auto metrics that >> platform. So as a consequence, I gotta believe, Then your customers are discovering that not only is it simpler, easy to use perhaps a little bit less expertise required, but they also are more likely to be operationally successful with some of the core functions like D are that they have to work with. >> Yeah, So the other thing about these five five grandpre functions and products you need is that if you want to imagine a future, where you going, you know, leverage the cloud For a simple thing like the R, for example, the thing is that if you want to move this data to a different place with five different products, how does it move? Because, you know, all these five products must move together to some of the place. That's not how it's gonna operate for you. So by having these five different functions converge into one platform is that when the data moves between the other place, the functions move with it giving the same exist same exact, consistent view for your data. That's kind of what we were built. And on top of all the stuff is something we have this global data management applications to control the all the data you have your enterprise. >> So how are customers responding to this new architecture of autumn matrix converge services and a platform for building data applications? >> Yeah, so our customers consistently Teyla's one simple thing is that it's the most easiest platform there ever used in their entire enterprise life. So that's what we do aimed for simplicity for the customer experience. Autonomous data services give you exactly that experience. So as an example, last quarter we had about forty proof of concept sort in the field out of them, about thirty of adopted already, and we're waiting for the ten of the results to come out this quarter. So generally we found that a proof of concept don't come back because once you touch it, experience simplicity offered and how how do you get all this service is simple, then people don't tend to descend it back. They like to keep it and could have operated that way. >> So you mentioned earlier, and I kind of summarizing notion of applications, Data services, applications tell us a little bit about those and how they really toward a matrix. >> Right? So once you have data in multiple places, people have not up not a cloud. And we're going to also being all these different clouds and report that uniform experience you need this date. You need this global data management applications to extract value out off your data. And that's kind of the reason why we built some global data management applications. I SAS products, I think, install nothing to manage them. Then they sit outside and then they help you manage globally. All the data you have. >> So as a result, the I and O people, the destruction operations administrators, I can think of terms of automata whose platform the rest of the business could look at in terms of services and applications that through using and support, >> that's exactly right. So you get the single dashboard to manage all the data. You have an enterprise >> now I know you're introducing some of these applications today. Can you give us a little peek into? Yeah. >> Firstly, our automatics platform is a soft is available on prime as a software defined converge infrastructure, and you can get that we call it D V X. And then we also offer in the cloud our services. It's called Cloud Devi Ex. You could get these and we're also about kind off announcing the release ofthe control shift. It's over for one of our first date. Imagine applications, which kind of helps you manage data in a two different locations. >> So go over more specific and detail in the control shift. Specifically is which of those five data services you talk about is control shift most clearly associating with >> right. So if you go toe again back to this question about like five different services, if you have to think about B r o D. R. Is a necessity for every business, it's official protection. You need it. But the challenge is that you know that three four challenges you gently round into the most common people talk about is that one is that you have a plan. You'LL have a proper plan. It's challenging to plan something, and then you think about the fire drill. We have to run when there's a problem. And then last leaving actually pushed the button. Tofail over doesn't really work for you. Like how fast is it going to come up? So those three problems we can have one to solve really like really solidly So we call our service is a dear services fail proof tr that's actually takes a little courage to say fail proof. So control shift is our service, which actually does this. The orchestration does mobility across the two different places from could be on prime time on Prem on prompted the cloud. And because we have this into end data services ourselves, the it's easy to then to compliance checks all the time so we could do compliance checks every few minutes. So what that gives you that? Is that the confidence that that your dear plan's going to work for you when you need it? And then secondly, when you push the button because you also prime restoration back up, it's then easy to bring upon your services at once like that, and the last one is that because we are able to then work across the clouds and pride, the seamless experience. So when you move the data to the cloud, have some backups there. When you push a button to fail over, we'LL bring up your services in via MacLeod so that the idea is that it look exactly the same no matter where you are in the D. R or North India and then, you know, you watch the video, watch the demos. I think they look and see that you can tell the difference. >> Well, that's great. So give us a little bit of visibility into how day Truman intends to extend these capabilities, which give us a little visibility in the road map. Next. >> So we are already on Amazon with the cloud. The next time you're gonna be delivering his azure, that's the next step. But But if I step back a little bit and how do we think about our ourselves? Like if you look at his example Google, Google, you know, fairies, all the data and Internet data and prizes that instant search for that instant like an access to all the data you know, at your finger finger tips. So we wanted something similar for enterprise data. How do we Federated? How do we aggregate data and the property? The customer, the instant management they can get from all the data. They have already extract value from the data. So those things are set off application We're building towards organic scum. Examples are we're building, like, deep search. How do you find the things you want to find? You know, I've been a very nice into to weigh. And how do you do Compliance? GPR. And also, how do you think about you know, some dependent addicts on the data? And so we also extend our control shift not to just manage the data on all platforms. Brawls hardly manage data across different platforms. So those kind of things they're thinking about as a future >> excellent stuff is already CTO daydream. Thanks very much for talking to us about auto matrix control shift and the direction that you're taking with this very, very extreme new vision about data on business come more easily be bought together. So, you know, I'll tell you what. Let's take a look at a demo >> in today's enterprise data centers. You want a simple way to deal with your data, whether in the private or public cloud, and ensure that dealing with disaster recovery is easy to set up. Always complied and in sync with the sites they address and ready to run as the situations require built on consistent backups, allowing you to leverage any current or previous recovery point in time with near zero rto as the data does not have to be moved in order to use it. Automated orchestration lets you easily test or execute recovery plans you have constructed with greater confidence, all while monitoring actions and progress from essential resource. This, along with maintaining comprehensive run books of these actions, automatically from the orchestration framework. Managing your Systems Day Tree in autumn matrix provides this solution. Run on local host flash and get the benefits of better performance and lower. Leighton sees back up and protect your data on the same converged platform without extracting it to another system while securing the data in your enterprise with end and encryption automating salas desired for your business needs with policy driven methods. The capture the what, when and where aspects of protecting your data, keeping copies locally or at other sites efficiently Move the data from one location to another weather in your private or public cloud. This is the power of the software defined converged infrastructure with cloudy are from day tree, um, that we call Oughta Matrix. >> Hi. And welcome back to another cube conversation once again on Peter Births. And one of the biggest challenges that every user faces is How did they get Mohr out of their technology suppliers, especially during periods of significant transformation? Soto have that conversation. We've got Brian Bond, who's the director of infrastructure? The meter A seaman's business. Brian, welcome to the Cube. >> Thanks for having me. >> So tell us a little about the meteor and what you do there. >> So E Meter is a developer and supplier of smart grid infrastructure software for enterprise level clients. Utilities, water, power, energy and, ah, my team was charged with managing infrastructure for that entire business units. Everything from Deb Test Q and sales. >> Well, the you know, the intelligent infrastructure as it pertains to electronica rid. That's not a small set of applications of small city use cases. What kinds of pressure is that putting on your infrastructure >> A lot of it is the typical pressures that you would see with do more with less doom or faster. But a lot of it is wrapped around our customers and our our other end users in needing more storage, needing Mohr at performance and needing things delivered faster on a daily basis. Things change, and keeping up with the Joneses gets harder and harder to do as time moves on. >> So as you think about day trims Auto Matrix. How is it creating value for you today? Give us kind of, Ah, peek into what it's doing to alleviate some of these scaling and older and researcher pressures, >> So the first thing it does is it does allow us to do a lot more with less. We get two times the performance five times the capacity, and we spend zero time managing our storage infrastructure. And when I say zero time I mean zero time, we do not manage storage anymore. With the data in product, we can deploy thanks faster. We can recover things faster are Rto and R R P. O matrix is down two seconds instead of minutes or hours, and those types of things really allow us to provide, Ah much better level of service to our customers. >> And it's especially critical. Infrastructure like electronic grid is good to hear. That the Rto Harpo is getting is close to zero as possible. But that's the baseline today. Look out and is you and vision where the needs of these technologies are going for improving protection, consolidating converging gated services and overall, providing a better experience from a business uses data. How do you anticipate that you're goingto evolve your use of autumn matrix and related data from technologies? >> Well, we fully intend to to expand our use of the existing piece that we have. But then this new autumn matrix piece is going to help us, not witches deployments. But it's also going to help us with compliance testing, data recovery, disaster recovery, um, and also being able to deploy into any type of cloud or any type of location without having to change what we do in the back in being able to use one tool across the entire set of the infrastructure they were using. >> So what about the tool set? You're using the whole thing consistently, but what about the tool set when in easiest for you within your shop, >> installing the infrastructure pieces themselves in its entirety. We're very, very easy. So putting that into what we had already and where we were headed was very, very simple. We were able to do that on the fly in production and not have to do a whole lot of changes with the environments that were doing at the time. The the operational pieces within the D. V X, which is this the storage part of the platform were seamless as far as V Center and other tools that we're using went and allowed us to just extend what we were doing already and be able to just apply that as we went forward. And we immediately found that again, we just didn't manage storage anymore. And that wasn't something we were intending and that made our r I just go through the roof. >> So it sounds like time to value for the platform was reserved for quick and also it fit into your overall operational practices. So you have to do a whole bunch of unnatural acts to get >> right. We did not have to change a lot of policies. We didn't have to change a lot of procedures, a lot of sounds. We just shortened. We took a few steps out on a lot of cases. >> So how is it changing being able to do things like that, changing your conversation with your communities that you're serving a CZ? They asked for more stores where they ask for more capabilities. >> First off, it's making me say no, a lot less, and that makes them very, very happy. The answer usually is less. And then the answer to the question of how long will it take changes from? Oh, we can get that done in a couple of days or, oh, we can get that done in a couple hours to I did that while I was sitting here in the meeting with you, and it's it's been handled and you're off to the races. >> So it sounds like you're police in a pretty big bed and a true, uh, what's it like? Working with them is a company. >> It's been a great experience from from the start, in the initial piece of talking to them and going through the POC process. They were very helpful, very knowledgeable SCS on DH, and since then They've been very, very helpful in allowing us to tell them what our needs are, rather than them telling us what our needs are and going through and working through the new processes and the and the new procedures within our environments. They've been very instrumental and performance testing and deployment testing with things, uh, that a lot of other storage providers didn't have any interest in talking with us about so they've been very, very helpful with that and very, very knowledgeable people that air there are actually really smart, which is not surprising. But the fact that they can relay that into solutions to what my actual problems are and give me something that I can push forward on to my business and have ah, positive impact from Day one has been absolutely, without question, one of the better things. >> Well, it's always one of the big, biggest challenge when working with a company that just getting going is how do you get the smarts of that organization into the business outcomes that really succeeded? Sounds like it's working well. Absolutely. All right. Brian Bond, director Vital infrastructure demeanor, Seaman's business Thanks again for being on the Cube >> has been great >> on. Once again, this has been a cube conversation, and now what we'd like to do is don't forget this is your opportunity to participate in the crowd. Chat immediately after this video ends and let's hear your thoughts. What's important in your world is you think about new classes of data platforms, new rules of data, new approaches to taking great advantage of the data assets that air differentiating your business. Have those conversations make those comments? Asked those questions. We're here to help. Once again, Peter Bourjos, Let's go out yet.

Published Date : May 15 2019

SUMMARY :

Ask the questions of Data Room and others in the community that you think need to be addressed. takes that converges to the next level. What's the problem that you keep hearing over and over that you're pointing towards? management issues, and it's got a feel and take advantage of the services that cloud has to offer. Give us some insight into what day terms discovering as you talk to customers So if you look at how to resolve that, you've got to conf urged to transform There's still the need for capacity to reduce we asked how many of you is important to have your platform have Customers are starting the process of rethinking your data infrastructure, hundred programmers is, Well, how do we actually make you not think about how you're going to back up? more things so it's simpler tend to be more successful. So our purpose from the beginning was purposefully to spend four years building services that really focus the value proposition to what the enterprise needs So what do you guys announcing? Those five things have to be an errand or you're a bolt on type company. So you're not building a platform out by acquisition. the prime from the cloud cloud to cloud, and our first generation of that is disaster recovery so talking about some of the announcement that were here more about in the second. This office is our first implementation of that concept, as you can see is a much more open It is always great to hear from a customer. So automate tricks give us a little bit more toe tail and how it's creating value for simple platform that we let him with all the friction you need to manage all your data. but they also are more likely to be operationally successful with some of the core functions like D are is something we have this global data management applications to control the all the data you have your So generally we found that a proof of concept don't come back because once you touch it, experience simplicity offered and So you mentioned earlier, and I kind of summarizing notion of applications, Data services, All the data you have. So you get the single dashboard to manage all the data. Can you give us a little peek into? as a software defined converge infrastructure, and you can get that we call it D V X. So go over more specific and detail in the control shift. that the idea is that it look exactly the same no matter where you are in the to extend these capabilities, which give us a little visibility in the road map. instant search for that instant like an access to all the data you know, at your finger finger tips. auto matrix control shift and the direction that you're taking with this very, efficiently Move the data from one location to another weather in your private or public cloud. And one of the biggest challenges So E Meter is a developer and supplier of smart grid infrastructure software for Well, the you know, the intelligent infrastructure as it pertains to A lot of it is the typical pressures that you would see with do more with less doom or faster. So as you think about day trims Auto Matrix. So the first thing it does is it does allow us to do a lot more with less. How do you anticipate that you're goingto But it's also going to help us with compliance testing, data recovery, disaster recovery, not have to do a whole lot of changes with the environments that were doing at the time. So it sounds like time to value for the platform was reserved for quick and also it fit into your overall operational We didn't have to change a lot of procedures, So how is it changing being able to do things like that, changing your conversation with your communities And then the answer to the question of how long will it So it sounds like you're police in a pretty big bed and a true, uh, what's it like? But the fact that they can relay that into Well, it's always one of the big, biggest challenge when working with a company that just getting going is how do you get the smarts of the data assets that air differentiating your business.

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
Peter BourjosPERSON

0.99+

BrianPERSON

0.99+

PeterPERSON

0.99+

Brian BondPERSON

0.99+

Tim PagePERSON

0.99+

GoogleORGANIZATION

0.99+

two secondsQUANTITY

0.99+

two timesQUANTITY

0.99+

tenQUANTITY

0.99+

eighteen hoursQUANTITY

0.99+

AppleORGANIZATION

0.99+

TimPERSON

0.99+

twenty yearsQUANTITY

0.99+

five timesQUANTITY

0.99+

Peter BurroughsPERSON

0.99+

AmazonORGANIZATION

0.99+

North IndiaLOCATION

0.99+

seventy percentQUANTITY

0.99+

SeamanPERSON

0.99+

four yearsQUANTITY

0.99+

five productsQUANTITY

0.99+

one platformQUANTITY

0.99+

first wordsQUANTITY

0.99+

secondQUANTITY

0.99+

three problemsQUANTITY

0.99+

five different productsQUANTITY

0.99+

eighteen monthsQUANTITY

0.99+

Twenty years agoDATE

0.99+

E MeterORGANIZATION

0.99+

five different servicesQUANTITY

0.99+

D. RLOCATION

0.99+

zero timeQUANTITY

0.99+

one hundred guysQUANTITY

0.99+

eighty timesQUANTITY

0.99+

fiveQUANTITY

0.99+

threeQUANTITY

0.99+

oneQUANTITY

0.99+

firstQUANTITY

0.99+

five different productsQUANTITY

0.98+

last quarterDATE

0.98+

DatumORGANIZATION

0.98+

todayDATE

0.98+

two different placesQUANTITY

0.98+

Peter BirthsPERSON

0.98+

TrumanPERSON

0.98+

TatumPERSON

0.98+

FirstQUANTITY

0.98+

zeroQUANTITY

0.97+

over five hundred peopleQUANTITY

0.97+

FirstlyQUANTITY

0.97+

about thirtyQUANTITY

0.97+

five thingsQUANTITY

0.97+

first dateQUANTITY

0.97+

one simple thingQUANTITY

0.97+

third versionQUANTITY

0.96+

five different vendorsQUANTITY

0.96+

five different partsQUANTITY

0.96+

TeoPERSON

0.96+

one toolQUANTITY

0.95+

first generationQUANTITY

0.95+

forty eight hourQUANTITY

0.95+

Data RoomORGANIZATION

0.95+

one simple platformQUANTITY

0.94+

this quarterDATE

0.94+

five different functionsQUANTITY

0.94+

five data servicesQUANTITY

0.94+

MohrORGANIZATION

0.93+

single dashboardQUANTITY

0.92+

BoltonORGANIZATION

0.92+

about forty proof of conceptQUANTITY

0.91+

Vital infrastructureORGANIZATION

0.89+

one locationQUANTITY

0.89+

first implementationQUANTITY

0.87+

LeightonORGANIZATION

0.86+

once per dayQUANTITY

0.85+

John Maddison, Fortinet | Fortinet Accelerate 2019


 

>> live from Orlando, Florida It's the que covering accelerate nineteen. By important, >> Welcome back to the cubes. Continuing coverage of Fortinet Accelerate twenty nineteen. Live from Orlando, Florida Lisa Martin with Peter Births and we're pleased to welcome back to the Cube. One of our alumni. John Madison, the executive vice president of Products and Solutions from Fortinet. John, It's great to have you back on The Cube >> is great to be here again. >> Lots of momentum. That fourteen that is coming into twenty nineteen with I can't believe we're in April. Already, lots of growth in revenue product revenue was up. You guys talked about the expansion of the partner network with some of your fabric ready partners on already today. You talked about this third generation and security. How fortunate is uniquely delivering that for our viewers who you weren't didn't have the opportunity to attend. Your keynote kind of talked to us about that in this hybrid world. How is supporting that delivering this third generation? What makes you guys difference? >> Yeah, so we talk about the third generation now. Everyone has different generations. That's fine. We call it the security driven networking, and it's really the Genesis ofthe forty nine for a long time in bringing together networking and security into one place. I think these days or in the past, people have built out the networks, the network layer. Then they try and connect users and applications. And they go, Wait a minute, this person security over here in a bit, over here and over there in our mind, start with both. Start with a security driven networking concept. Make sure it works end to end, and that will be the most sophisticated, most secure application and network you can have. >> And what enable supporting that to deliver this unique. Because a number of times today and Ken's key nodes, I think Patrice as well. I can't recall if yours competition came up where the audience was shown the strength in numbers that fourteen that has what makes us unique and what you're delivering. One of >> the key differentiators from the start is being making sure we can run a routing stacks. Sometimes today he referred to as ehs tea. When Stax or so security stacks in a very small footprint, and to do that, you need to spend a lot of money on what we call security processes which go inside our appliances, but to make sure that runs very fast. But having said that, I definitely think customer is going to be in a hybrid world forever for a very long time, at least anyway, where not only appliances but also virtual machines and FBI security. We also talk about this fabric concept that ables to cover the incomplete digital attack surface. So there's a very important point, and we find a lot of customers now agreed that they want to consolidate. They want to make it simpler. They need to move faster to this digital world, and anyway, you have to do that is through a consolidated >> approach. So let's build on this. They want to consolidate. They want to make it simpler, more common, and how the policies and management now along comes. Yet what's the dynamic there? >> But what's happening is that all the people referred to the perimeter disappearing. Okay, that's happening to a certain extent because data's moving into cloud. You've got different one implementations, but what's happening when you do that is to creating New Edge is a really good example, a zesty wherein which used to be very closed off. The one used to be something that connects branch offices back to the data center, but nobody got involved in that. Well, now you're opening up that when two different types of transport mechanism you're creating an edge I always refer to these edges is being created by different trust levels. There is a maybe a secure trust level here, less trust here. It creates an edge, and you absolutely need to protect all those edges. >> Would give us an example that So, for example, when you say differentiated trust levels, my edge might be at a customer location. Is that kind of what versus my edge might be in a branch office? Is that what you mean by different trust level? Push that concept for >> you know, It's more, for example, if I got a branch office and I've got one connective ity going back to my data center that's encrypted and secure. But I've also opened up connected to the Internet, the trust level between that encrypted link on my connection to the to the Internet's very different Internets open. Anyone can see they're so that trust level between those two is very different. and that's what creates the edge. >> And so, therefore, that becomes a key feature in how we design different edge implementations. It >> is. It's also a key requirement on what type of deployment Mody use have appliances have virtual machines. We have clouds, containers. AP eyes going forward. I'm finding that customers are still very reluctant to put software implementations of firewalls against the Internet. Appliances are hardened. They run faster. Having said that, inside the cloud, obviously, and inside software defined data centers virtual fine. >> Where some of those customer concerns that you're hearing >> well, I think what happens is, you know, if you putting a piece of software against the Internet, it's open to all sorts of attack. It's the same as giving I P addresses to anything. It's like a factory that creates an edge as well, and you need to harm that age against that. >> And how can Estevez When How Why is this such a crucial component of digital transformation? >> You know, sometimes markets are over hyped. I remember the Casby marketplace a few years ago. It just was a feature. To be honest, I think sd one extremely important. The reason is important is the SD one controller. That controller eventually tells users and devices how to get to the applications. And so I tell customers that investment for you is extremely important. You need to own it. You need to make sure it's flexible. Need to make sure it's secure. And so I think the SD, where marketplace or one edge is the kind of larger term for it is extremely important investment for customers. Do >> you anticipate that? I mean, you guys invested. You guys put forward a lot of products, made a number of different announcements again, going back to that notion of simplicity, that notion of consolidation. What is the breaking point for your typical group in terms of the complexity of that they can accommodate and absorbed? When we start adding additional function within the overall network, especially from a security standpoint, >> well, I think it's a bit broken already. They're really struggling to keep up from our perspective. No, today we announced our forty or sixty twos are major operating system, and what we try and do is consolidate functionality as much as possible. Inside our fabric through a single console, there was single operations capability, so it's easier for the operations people. For this critique people to implement things and find information. Ross implementing order made in mechanisms like security ratings. We should do a background run off best practices, for example, that make it again easier for those those teams to run a full analysis. What's going on? >> So was it about three hundred features roughly roughly >> accountable individually? >> Okay, good. We'LL do a recount of that, but a tremendous amount of feature addition to forty OS announced today. What are some of the things business outcomes? Peter and I were talking about outcomes with several of our guests earlier. Business outcomes, New revenue streams New product's going to market faster, the also being able to become less reactive, maybe more proactive in terms of security codes. Can you walk us through some of the outcomes that fourteen customers can expect to achieve from some of the O. S announcement in the handsome? It's already >> talked about one, which was the consolidation, which means they can do multiple things with single platform us, an important one for them. Also, some of the some of the cost savings around that's on the operational cost savings. I think also for our partners. For example, they like the fact that we're keeping that we keep adding services on top of that fabric. They can take those services, then apply them to their customers and make sure they can add value inside as well. So there's two angles to it. The one is making sure our customers are better protected. They can consolidate, save money, invest better training and then to our partners so that they can provide more value to their customers. >> So one of the things we're talking about is the fact that you have invested in a six it's and security processing units and content processing units, etcetera, that are capable of accelerating the rate at which these crucial security algorithms run. That opens up That creates additional capacity to add more function both for you as well as your partners. Are you starting to see some of your ecosystem grow faster as they better exploit that inherent power and performance that you have within your appliances and devices? >> Definitely. I think we're seeing new partners come from new areas. It also fragments of it, and that's why we announced this new partner initiative going forward, which is a bit more customizable, but but I, you know, I do think that going forward, both our customers and our partners are looking for more of an architecture approach again. If you go back five years, here's a box and off you go and install it, and we're good on again When you saw the security threats. Yes, we produce a point solution to fix the normal way. Keep moving on. They're now looking at architectures over the next five years, known only just cybersecurity architectures but Network Inc architectures, storage architectures and all coming together. So we definitely need to train our partners. I think here we had over fifty of are what we call Network's network security expert. Eight. It's the highest level of architecture and half of the partners, But going forward, we see much more partner involvement in architecture approach on. Our customers want that because they don't want to have a point solution that's out of date in a year's time or a new threat comes along and makes it redundant. >> So how are you? You mentioned you mentioned network security and storage. What other things are starting to inform that architectural approach that you're taking. >> It's everything now. So we know the factories now a completely automated all that. If utilities of I P addresses are running almost all the way down to the end point, just everything has more flexibility and more open eso. Definitely All that information's bouncing around inside I ot devices inside the wire inside data centers on all that data needs protecting. That's the key of protecting the data. And to do that again, we keep saying you need tohave. An integrated approach to networking and security >> Has the customer work with forty Net and your partner ecosystem to achieve that integrated approach. Assuming that there is a, you know, an enterprise out there that's got a spectrum of hybrid multiplied environment with the spectrum of Security point Solutions pointed it in a different components of an infrastructure. How do you help them on that journey of taking the many disparate security solutions and leveraging the power of fourteen and your partners to get that integrated, truly integrated, consolidate consolidated view? It's a couple >> of steps, maybe, maybe many steps. The first one is, oh, customers don't want to throw everything else straightaway. So what they want to do is build to integrating Connect. So we have some of our partners. Here, for example, are fabric ready partners way have connectors. We build into their platforms and orchestration systems, and that's their first step. Once they get there, they start looking across to see what they can to consolidate. So can they take a specific solution from this and I'm bringing inside? And then eventually they start to look at the long term architecture if they're moving APS to the cloud or they want to open up their wear or the one who provide kind of SD functionality inside their branch, So it's definitely a phase approached. I don't see many customers. Some customers would take an application and created from scratch inside the cloud. They can't do that with their infrastructure, the kind just completely wipe it clean. Start again. It's definitely more of a phase approach. >> So if you think about the face approach on you, talk way heard from, uh, we heard from the sales of sport side the notion that the S P s the service providers want greater customization. The enterprise wants a different level of access to the core technologies, so that they could do not customization. Not exactly remember Jack with the term was what What degree will customers retain control over how that architecture gets implemented versus what degree is going to get baked into the stack itself? A >> bit of >> both, I think, you know, for most customers, they're running towards a digital platform on. They need to own the digital powerful. If they give up complete control, how do they control that destiny going forward? So they want to own the digital platform, but they haven't got the resources to do everything. So that allows saw some to service providers and carriers. Some of the partners, for example. But I'm going to keep coming back to this. They want to get to a point in five years time, but they've got a digital footprint, is very flexible, but they also want to make sure it's very secure because as you open up that digital footprint, you opening up all these different edges. Inside the network, >> it's coherent, which is the are contested approach. Yes, because if they don't have a coherent approach to doing it, they don't know what interfaces are or are not competent, and that includes interfaces with partners. >> Yeah, they have to look forward and say I'm gonna implement X amount in the cloud. Arnot gonna have some edge compute going on here. I want to shake. Make sure my branches have the best quality of service for these certain applications that go back to this. So they would look at all those parameters and an architect, something from there. >> So we know that security network, security app, security info, security cloud security is our imperatives for every industry. But I didn't notice that the breakouts today feature. I think there's a couple of vertical features healthcare, financial services, retail. I was just curious. Are theirs just great use cases that show the potential power of forty nets technologies? Or are those industries that are either early adopters or maybe more leading edge? Because they have such a tremendous amount of data that needs to be secured as their ecosystem does this? >> Yeah. So the industry verticals, I think I think for the very large ones, they're very similar. All of them have I ot this expanding order and wanna have a flexible land system. Almost got something. Some computer power in the cloud and the edge going forward. So I know there's differences and industries. For the very large enterprises, it's the problem. Seems the same. This huge organizations, and they have all of these things going on in the right corner at you. Calm down, Toa mid enterprise. I think there's more reason to consolidate. But you seymour differences in the way the approach, things like health care that really, really focused on that healthcare kind of security of devices inside hospitals, et cetera. Education. Oh, they need to connect in these big data banks. Transfer the research information. So big organizations, I say pretty much the same problem. Midsize organizations become more relevant to the specific industry. >> Well, John, thank you so much for carving out some time to speak with Peter and need Today. We appreciate that. And it's exciting to see and feel the mo mentum the forty Niners bringing into twenty nineteen. >> Well, thanks for inviting me. >> Our pleasure. We want to thank you for your time is well for Peter. Boris. I'm Lisa Martin. You're watching the Cube

Published Date : Apr 9 2019

SUMMARY :

live from Orlando, Florida It's the que covering John, It's great to have you back on The Cube of the partner network with some of your fabric ready partners on already today. it the security driven networking, and it's really the Genesis ofthe forty nine the audience was shown the strength in numbers that fourteen that has what We also talk about this fabric concept that ables to cover the incomplete more common, and how the policies and management now along comes. to be very closed off. Is that what you mean by different trust level? the trust level between that encrypted link on my connection to the to the Internet's very different And so, therefore, that becomes a key feature in how we design different edge implementations. of firewalls against the Internet. It's the same as giving I P addresses to anything. And so I tell customers that investment for you is extremely made a number of different announcements again, going back to that notion of simplicity, for example, that make it again easier for those those teams to run a full New revenue streams New product's going to market faster, the also being able then apply them to their customers and make sure they can add value inside as well. So one of the things we're talking about is the fact that you have invested in a six it's and security It's the highest level of architecture and half of the partners, What other things are starting to inform that architectural And to do that again, we keep saying you need tohave. Assuming that there is a, you know, an enterprise out there that's got a spectrum of hybrid they start to look at the long term architecture if they're moving APS to the cloud or they want to open up their wear or level of access to the core technologies, so that they could do not So that allows saw some to service providers and carriers. Yes, because if they don't have a coherent approach to doing it, Yeah, they have to look forward and say I'm gonna implement X amount in the cloud. amount of data that needs to be secured as their ecosystem does this? I think there's more reason to consolidate. And it's exciting to see and feel the mo mentum the forty Niners bringing into twenty We want to thank you for your time is well for Peter.

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
Lisa MartinPERSON

0.99+

BorisPERSON

0.99+

PeterPERSON

0.99+

Peter BirthsPERSON

0.99+

John MadisonPERSON

0.99+

JohnPERSON

0.99+

AprilDATE

0.99+

FortinetORGANIZATION

0.99+

fortyQUANTITY

0.99+

Orlando, FloridaLOCATION

0.99+

Network IncORGANIZATION

0.99+

two anglesQUANTITY

0.99+

EightQUANTITY

0.99+

JackPERSON

0.99+

twoQUANTITY

0.99+

KenPERSON

0.99+

todayDATE

0.99+

fourteen customersQUANTITY

0.99+

first stepQUANTITY

0.99+

five yearsQUANTITY

0.99+

fourteenQUANTITY

0.99+

forty OSQUANTITY

0.99+

sixtyQUANTITY

0.99+

TodayDATE

0.99+

third generationQUANTITY

0.99+

2019DATE

0.99+

OneQUANTITY

0.99+

PatricePERSON

0.99+

bothQUANTITY

0.98+

sixQUANTITY

0.98+

oneQUANTITY

0.98+

first oneQUANTITY

0.97+

EstevezPERSON

0.97+

FBIORGANIZATION

0.96+

about three hundred featuresQUANTITY

0.96+

over fiftyQUANTITY

0.96+

single consoleQUANTITY

0.95+

single platformQUANTITY

0.94+

one placeQUANTITY

0.94+

halfQUANTITY

0.93+

CasbyORGANIZATION

0.92+

forty nets technologiesQUANTITY

0.9+

twenty nineteenQUANTITY

0.88+

few years agoDATE

0.85+

forty NinersQUANTITY

0.85+

Fortinet AccelerateORGANIZATION

0.84+

forty NetORGANIZATION

0.84+

StaxTITLE

0.81+

John MaddisonPERSON

0.8+

minuteQUANTITY

0.78+

two different typesQUANTITY

0.78+

one edgeQUANTITY

0.76+

single operationsQUANTITY

0.75+

twentyQUANTITY

0.75+

twosQUANTITY

0.69+

one implementationsQUANTITY

0.69+

a yearQUANTITY

0.69+

executive vice presidentPERSON

0.66+

moneyQUANTITY

0.63+

nineteenQUANTITY

0.59+

CubeORGANIZATION

0.59+

next five yearsDATE

0.57+

RossORGANIZATION

0.54+

lotQUANTITY

0.51+

nineQUANTITY

0.48+

nineteenTITLE

0.39+

Derek Manky, Fortinet | Fortinet Accelerate 2019


 

>> live from Orlando, Florida It's the que covering accelerate nineteen. Brought to you by important >> Hey, welcome back to the Cube. We are live at forty nine. Accelerate nineteen in Orlando, Florida I am Lisa Martin with Peter Births, and Peter and I are pleased to welcome one of our alumni back to the program during Mickey, the chief of security insights for forty nine. Derek. It's great to have you back on the program, >> so it's always a pleasure to be here. It's tze always good conversations. I really look forward to it and it's It's never a boring day in my office, so we're than happy to talk about this. >> Fantastic. Excellent. Well, we've been here for a few hours, talking with a lot of your leaders. Partners as well. The keynote this morning was energetic. Talked a lot about the evocation, talked a lot about the evolution of not just security and threat, but obviously of infrastructure, multi cloud hybrid environment in which we live. You have been with forty girl lives for a long time. Talk to us about the evolution that you've seen of the threat landscape and where we are today. >> Sure, Yeah, so you know? Yeah, I've been fifteen years now, forty guards. So I flashed back. Even a two thousand, for it was a vastly different landscape back there and Internet and even in terms of our security technology in terms of what the attack surface was like back then, you know, Ken Kennedy was talking about EJ computing, right? Because that's what you know. Seventy percent of data is not going to be making it to the cloud in the future. A lot of processing is happening on the edge on DH. Threats are migrating that way as well, right? But there's always this mirror image that we see with the threat landscape again. Threat landscape. Back in nineteen eighty nine, we started with the Morris Worm is very simple instructions. It took down about eighty percent of the Internet at the time, but he was It is very simple. It wasn't to quote unquote intelligence, right? Of course, if we look through the two thousands, we had a lot of these big worms that hit the scene like Conficker. I love you, Anna Kournikova. Blaster slammer. All these famous rooms I started Teo become peer to peer, right? So they were able to actually spread from network to network throughout organizations take down critical services and so forth. That was a big evolutionary piece at the time. Of course, we saw fake anti virus ransomware. Come on stage last. Whereas I called it, which was destructive Mauer That was a big shift that we saw, right? So actually physically wiping out data on systems these air typically in like star but warfare based attacks. And that takes us up to today, right? And what we're seeing today, of course, we're still seeing a lot of ransom attacks, but we're starting to see a big shift in technology because of this edge computing used case. So we're seeing now things like Swarm networks have talked about before us. So these are not only like we saw in the two thousand's threats that could shift very quickly from network to network talk to each other, right? In terms of worms and so forth. We're also seeing now in intelligence baked in. And that's a key difference in technology because these threats are actually able, just like machine to machine. Communication happens through a pea eye's protocols and so forth threats are able to do this a swell. So they ableto understand their own local environment and how to adapt to that local environment and capitalized on that effort on DH. That's a very, very big shift in terms of technology that we're seeing now the threat landscape. >> So a lot of those old threats were depending upon the action of a human being, right? So in many respects, the creativity was a combination of Can you spook somebody make it interesting so that they'll do something that was always creativity in the actual threat itself. What you're describing today is a world where it's almost like automated risk. We're just as we're trying to do automation to dramatically increase the speed of things, reduce the amount of manual intervention. The bad guy's doing the same thing with the swarms there, introducing technology that is almost an automated attack and reconfigures itself based on whatever environment, conditions of encounters. >> Yeah, and the interesting thing is, what's happening here is we're seeing a reduction in what I call a t t be a time to breach. So if you look at the attack lifecycle, everything does doesn't happen in the blink of an instant it's moving towards that right? But if you look at the good, this's what's to come. I mean, we're seeing a lot of indications of this already. So we work very closely with Miter, the minor attack framework. It describes different steps for the attack life cycle, right? You start with reconnaissance weaponization and how do you penetrator system moving the system? Collect data monetize out as a cyber criminal. So even things like reconnaissance and weaponization. So if you look at fishing campaigns, right, people trying to fish people using social engineering, understanding data points about them that's becoming automated, that you sought to be a human tryingto understand their target, try toe fish them so they could get access to their network. There's tool kits now that will actually do that on their own by learning about data points. So it's scary, yes, but we are seeing indications of that. And and look, the endgame to this is that the attacks were happening much, much quicker. So you've got to be on your game. You have to be that much quicker from the defensive point of view, of course, because otherwise, if successful breach happens, you know we're talking about some of these attacks. They could. They could be successful in matter of seconds or or minutes instead of days or hours like before. You know, we're talking about potentially millions dollars of revenue loss, you know, services. They're being taken out flying intellectual properties being reached. So far, >> though. And this is, you know, I think of health care alone and literally life and death situations. Absolutely. How is Fortinet, with your ecosystem of partners poised to help customers mitigate some of these impending risk changing risk >> coverage? Strengthen numbers. Right. So we have, ah, strong ecosystem, of course, through our public ready program. So that's a technology piece, right? And to end security, how we can integrate how we can use automation to, you know, push security policies instead of having an administrator having to do that. Humans are slow a lot of the time, so you need machine to machine speed. It's our fabric ready program. You know, we have over fifty seven partners there. It's very strong ecosystem. From my side of the House on Threat Intelligence. I had up our global threat alliances, right? So we are working with other security experts around the World Cyberthreat Alliance is a good example. We've created intelligence sharing platforms so that we can share what we call indicators of compromise. So basically, blueprints are fingerprints. You can call them of attacks as they're happening in real time. We can share that world wide on a platform so that we can actually get a heads up from other security vendors of something that we might not see on. We can integrate that into our security fabric in terms of adding new, new, you know, intelligence definitions, security packages and so forth. And that's a very powerful thing. Beyond that, I've also created other alliances with law enforcement. So we're working with Interpol that's attribution Base work right that's going after the source of the problem. Our end game is to make it more expensive for cyber criminals to operate. And so we're doing that through working with Interpol on law enforcement. As an example, we're also working with national computer emergency response, so ripping malicious infrastructure off line, that's all about partnership, right? So that's what I mean strengthen numbers collaboration. It's It's a very powerful thing, something close to my heart that I've been building up over over ten years. And, you know, we're seeing a lot of success and impact from it, I think. >> But some of the, uh if you go back and look at some of the old threats that were very invasive, very problematic moved relatively fast, but they were still somewhat slow. Now we're talking about a new class of threat that happens like that. It suggests that the arrangement of assets but a company like Ford and that requires to respond and provide valued customers has to change. Yes, talk a little about how not just the investment product, but also the investment in four guard labs is evolving. You talked about partnerships, for example, to ensure that you have the right set of resources able to be engaged in the right time and applied to the right place with the right automation. Talk about about that. >> Sure, sure. So because of the criticality of this nature way have to be on point every day. As you said, you mentioned health care. Operational technology is a big thing as well. You know, Phyllis talking about sci fi, a swell right. The cyber physical convergence so way have to be on our game and on point and how do we do that? A couple of things. One we need. People still way. Can't you know Ken was talking about his his speech in Davos at the World Economic Forum with three to four million people shortage in cyber security of professionals There's never going to be enough people. So what we've done strategically is actually repositioned our experts of forty guard labs. We have over two hundred thirty five people in forty guard lab. So as a network security vendor, it's the largest security operation center in the world. But two hundred thirty five people alone are going to be able to battle one hundred billion threat events that we process today. Forty guard lab. So so what we've done, of course, is take up over the last five years. Machine learning, artificial intelligence. We have real practical applications of a I and machine learning. We use a supervised learning set so we actually have our machines learning about threats, and we have our human experts. Instead of tackling the threat's one on one themselves on the front lines, they let them in. The machine learning models do that and their training the machine. Just it's It's like a parent and child relationship. It takes time to learn a CZ machines learn. Over time they started to become more and more accurate. The only way they become more accurate is by our human experts literally being embedded with these machines and training them >> apart for suspended training. But also, there's assortment ation side, right? Yeah, we're increasing. The machines are providing are recognizing something and then providing a range of options. Thie security, professional in particular, doesn't have to go through the process of discovery and forensics to figure out everything. Absolution is presenting that, but also presenting potential remedial remediation options. Are you starting to see that become a regular feature? Absolutely, and especially in concert with your two hundred thirty five experts? >> Yeah, absolutely. And that's that's a necessity. So in my world, that's what I refer to is actionable intelligence, right? There's a lot of data out there. There's a lot of intelligence that the world's becoming data centric right now, but sometimes we don't have too much data. Askew Mons, a CZ analysts administrators so absolutely remediation suggestions and actually enforcement of that is the next step is well, we've already out of some features in in forty six two in our fabric to be able to deal with this. So where I think we're innovating and pioneering in the space, sir, it's it's ah, matter of trust. If you have the machines O R. You know, security technology that's making decisions on its own. You really have to trust that trust doesn't happen overnight. That's why for us, we have been investing in this for over six years now for our machine learning models that we can very accurate. It's been a good success story for us. I think. The other thing going back to your original question. How do we stack up against this? Of course, that whole edge computing use case, right? So we're starting to take that machine learning from the cloud environment also into local environments, right? Because a lot of that data is unique, its local environments and stays there. It stays there, and it has to be processed that such too. So that's another shift in technology as we move towards edge computing machine learning an artificial intelligence is absolutely part of that story, too. >> You mentioned strengthen numbers and we were talking about. You know, the opportunity for Fortinet to help customers really beat successful here. I wanted to go back to forty guard labs for a second because it's a very large numbers. One hundred billion security events. Forty Guard labs ingests and analyzes daily. Really? Yes, that is a differentiator. >> Okay, that that's a huge huge differentiator. So, again, if I look back to when I started in two thousand four, that number would have been about five hundred thousand events today, compared to one hundred billion today. In fact, even just a year ago, we were sitting about seventy five to eighty billion, so that numbers increased twenty billion and say twenty percent right in in just a year. So that's that's going to continue to happen. But it's that absolutely huge number, and it's a huge number because we have very big visibility, right. We have our four hundred thousand customers worldwide. We have built a core intelligence network for almost twenty years now, since for Deena was founded, you know, we we worked together with with customers. So if customers wish to share data about attacks that are happening because attackers are always coming knocking on doors. Uh, we can digest that. We can learn about the attacks. We know you know what weapons that these cybercriminals they're trying to use where the cybercriminals are. We learned more about the cyber criminals, so we're doing a lot of big data processing. I have a date, a science team that's doing this, in fact, and what we do is processes data. We understand the threat, and then we take a multi pronged approach. So we're consuming that data from automation were pushing that out first and foremost to our customers. So that's that automated use case of pushing protection from new threats that we're learning about were contextualizing the threat. So we're creating playbooks, so that playbook is much like football, right? You have to know your your your offense, right? And you have to know how to best understand their tactics. And so we're doing that right. We're mapping these playbooks understanding, tactics, understanding where these guys are, how they operate. We take that to law enforcement. As I was saying earlier as an example, we take that to the Cyber Threat Alliance to tow our other partners. And the more that we learn about this attack surface, the more that we can do in terms of protection as well. But it's it's a huge number. We've had a scale and our data center massively to be able to support this over the years. But we are poised for scale, ability for the future to be able to consume this on our anti. So it's it's, um it's what I said You know the start. It's never a boring day in my office. >> How can it be? But it sounds like, you know, really the potential there to enable customers. Any industry too convert Transport sees for transform Since we talked about digital transformation transformed from being reactive, to being proactive, to eventually predictive and >> cost effective to write, this's another thing without cybersecurity skills gap. You know this. The solution shouldn't be for any given customer to try. Toe have two hundred and thirty people in their security center, right? This is our working relationship where we can do a lot of that proactive automation for them, you know, by the fabric by the all this stuff that we're doing through our investment in efforts on the back end. I think it's really important to and yeah, at the end of the day, the other thing that we're doing with that data is generating human readable reports. So we're actually helping our customers at a high level understand the threat, right? So that they can actually create policies on their end to be able to respond to this right hard in their own security. I deal with things like inside of threats for their, you know, networks. These air all suggestions that we give them based off of our experience. You know, we issue our quarterly threat landscape report as an example, >> come into cubes. Some of your people come in the Cuban >> talk about absolutely so That's one product of that hundred billion events that were processing every day. But like I said, it's a multi pronged approach. We're doing a lot with that data, which, which is a great story. I think >> it is. I wish we had more time. Derek, Thank you so much for coming by. And never a dull moment. Never a dull interview when you're here. We appreciate your time. I can't wait to see what that one hundred billion number is. Next year. A forty nine twenty twenty. >> It will be more. I can get you. >> I sound like a well, Derek. Thank you so much. We appreciate it for Peter Burress. I'm Lisa Martin. You're watching the Cube?

Published Date : Apr 9 2019

SUMMARY :

Brought to you by important It's great to have you back on the program, so it's always a pleasure to be here. of the threat landscape and where we are today. So these are not only like we saw in the two thousand's threats that could So a lot of those old threats were depending upon the action of a human being, right? And and look, the endgame to this is that the attacks were happening much, And this is, you know, I think of health care alone and literally life and death situations. We've created intelligence sharing platforms so that we can share what we call indicators of compromise. have the right set of resources able to be engaged in the So because of the criticality of this nature way have to be on the process of discovery and forensics to figure out everything. There's a lot of intelligence that the world's becoming data centric right now, You know, the opportunity for Fortinet to help customers So that's that's going to continue to happen. But it sounds like, you know, really the potential there to enable customers. So that they can actually create policies on their end to be able to respond to this right hard in their own Some of your people come in the Cuban talk about absolutely so That's one product of that hundred billion events that were processing Derek, Thank you so much for coming by. I can get you. Thank you so much.

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
PeterPERSON

0.99+

FordORGANIZATION

0.99+

Lisa MartinPERSON

0.99+

Peter BirthsPERSON

0.99+

Anna KournikovaPERSON

0.99+

Ken KennedyPERSON

0.99+

DerekPERSON

0.99+

KenPERSON

0.99+

Peter BurressPERSON

0.99+

Orlando, FloridaLOCATION

0.99+

InterpolORGANIZATION

0.99+

twenty percentQUANTITY

0.99+

Next yearDATE

0.99+

fifteen yearsQUANTITY

0.99+

World Cyberthreat AllianceORGANIZATION

0.99+

twenty billionQUANTITY

0.99+

Derek MankyPERSON

0.99+

Seventy percentQUANTITY

0.99+

millions dollarsQUANTITY

0.99+

one hundred billionQUANTITY

0.99+

four hundred thousand customersQUANTITY

0.99+

House on Threat IntelligenceORGANIZATION

0.99+

threeQUANTITY

0.99+

PhyllisPERSON

0.99+

Askew MonsPERSON

0.99+

two hundred thirty five expertsQUANTITY

0.99+

todayDATE

0.99+

FortinetORGANIZATION

0.99+

about five hundred thousand eventsQUANTITY

0.99+

two hundred thirty five peopleQUANTITY

0.99+

World Economic ForumEVENT

0.99+

over fifty seven partnersQUANTITY

0.98+

forty girlQUANTITY

0.98+

two thousandsQUANTITY

0.98+

one hundred billionQUANTITY

0.98+

MickeyPERSON

0.98+

a year agoDATE

0.98+

oneQUANTITY

0.98+

four million peopleQUANTITY

0.98+

eighty billionQUANTITY

0.97+

two thousandQUANTITY

0.97+

2019DATE

0.97+

about seventy fiveQUANTITY

0.97+

over two hundred thirty five peopleQUANTITY

0.97+

about eighty percentQUANTITY

0.97+

over six yearsQUANTITY

0.97+

OneQUANTITY

0.97+

Cyber Threat AllianceORGANIZATION

0.96+

hundred billion eventsQUANTITY

0.96+

One hundred billion security eventsQUANTITY

0.95+

fortyQUANTITY

0.94+

a yearQUANTITY

0.93+

one hundred billion threat eventsQUANTITY

0.93+

over ten yearsQUANTITY

0.91+

forty guardsQUANTITY

0.91+

two hundred and thirty peopleQUANTITY

0.91+

DavosLOCATION

0.89+

overQUANTITY

0.89+

two thousand fourQUANTITY

0.88+

almost twenty yearsQUANTITY

0.86+

forty six twoQUANTITY

0.85+

this morningDATE

0.83+

guard labsORGANIZATION

0.82+

nineteenQUANTITY

0.81+

guard labORGANIZATION

0.79+

last five yearsDATE

0.79+

one productQUANTITY

0.77+

FortyQUANTITY

0.76+

TeoPERSON

0.71+

labORGANIZATION

0.67+

CubeORGANIZATION

0.66+

Forty guardQUANTITY

0.66+

nineteen eightyDATE

0.65+

forty nineDATE

0.64+

firstQUANTITY

0.64+

ConfickerTITLE

0.63+

GuardORGANIZATION

0.63+

MauerPERSON

0.62+

forty nine twenty twentyDATE

0.61+

MiterORGANIZATION

0.61+

secondQUANTITY

0.6+