Image Title

Search Results for Premier League:

John Maddison, Fortinet | Fortinet Accelerate 2018


 

>> Announcer: Live from Las Vegas. It's theCUBE. Covering Fortinet Accelerate 18. Brought to you by Fortinet. (upbeat music) >> Welcome back to theCUBE. Our continuing coverage of Fortinet Accelerate 2018. We're excited to be here. I'm Lisa Martin with Peter Burris, and we're excited to talk to one of the Keynotes the big cheese from the main stage session this morning, John Maddison. >> I say, small cheese I would say. >> SVP of Products and Solutions at Fortinet. Welcome back to theCUBE. >> It's great to be here again. >> So two things I learned about you when you started off your Keynote. One you're a Man City Fan, Manchester City. >> Manchester City Blue. >> Okay. >> Through and through, for many years. >> Premier League all the way. And you have the best job at Fortinet. >> I do indeed. >> Wow. >> That is to announce the new products of course. >> So let's talk about that. So you talked about some exciting announcements today. Tell us about, start with a Security Fabric. What's new there, what's going on, what's exciting? >> Well the core of the Security Fabric is FortiOS 6.0, that's our network operating system. That's the core of he Fabric and when we do a big release like this, many different features, new functionalities. Also we have tighter integration now between all our products in the Fabric. Bus, as I said, new features as well. Things like SD-WAN has been improved, we now have probably estimate of breed SD-WAN security. The Fabric integration itself is going on. We built out some new connectors with cloud. Now we have connectors for all the public clouds. All the public clouds. We have a new CASB connector, acronym city, of course, as usual, CASB is cloud access security broker, API access the SaaS clouds. And so we've got that not only in it's standalone form but also very much integrated inside the Fabric. We've also introducing some new FortiGuard service as part of FortiOS 6.0, a new security rating which is based on a bunch of new practices or best practices that all our customers have said this is great best practices, can you put this together and apply these to our network overall. That's just skimming the surface as I say, I think I said there's 200 plus new services I could have stood up there for like six hours or whatever. But great new services are 6.0 big announcement for us. >> We just chatted with your America's Channel Chief Jon Bove, talk to us about. >> Who's an Arsenal fan by the way. >> What. >> And we beat him Sunday three nil in the Cup final. >> Excellent. >> Just to make sure you get this. >> I'm sure. >> Write that down. >> Jot that down. >> So what excitement are you hearing in, from your perspective, in the channel with respect to all of the new announcements that you made today? >> Great feedback, so this obviously is a big channel partner event here. You know what a lot of channel partners are saying is that I need to make sure I provide more of a solution to the customers. In the past, you know maybe they sell a point product, it's hard to kind of keep that relationship going with that customer. But if they sell a solution with one or two products that's part of that solution or managed and some services as part of that, it's much stickier for the partners and gives them a bit more of an architectural approach to their customers network. They really like the Fabric as I said. The Fabric doesn't have to be everything inside the Fabric, they can be components. It's what we've seen far from a Fabric components. Our partners really latched on to the network plus the advanced threat protection, plus the management or plus the access points. But they definitely prefer to sell a complete solution. It's hard for them to manage 40 different security vendors, the skill sets, the training and everything else. Now they're not saying there needs to be one security vendor, much as we would like it to be Fortinet, but they need to be reduced to maybe a set of 10 or 12 and really, our Fabric allows them to do that. >> That's a key differentiator. >> Absolutely key differentiator and as I said, you know it's very hard to build a Fabric. It's a mesh network, all these products talk to each other. You can only really do that if you build those products organically, step-by-step, alongside the network operating system. It's no good acquiring lots of bits and pieces and trying to bolt it together, it's not going to work. We spent a long time, 10 years, building out this Fabric organically to make sure it integrates but also putting the best of breed features and things like SD-WAN and CASB. >> What is the product? In this digital world what is a product? >> A security product? >> Any kind of product. As a guy who runs product management, what's a product, can we talk about what is a security product? >> I think in the past you know product management used to be very focused on I've got a box that comes out, or I've got a piece of software that comes out, these days it could be virtual machine or cloud, but it's doing a single instance, there's a single thing that it's doing inside, inside the network from a security perspective. What we believe in is that multifunction, now consolidation, multiple threat vectors I refer to this that like the digital attack surface. The digital transformation, security transformation. The biggest issue though, is that digital attack surface. That's just expanded enormously, it's very dynamic. Things are coming on on off the network was spinning up virtual machines and applications here and there. A point product these days just can't cope, can't cope. You need solutions against specific threat vectors that are applied in a dynamic way using the Fabric. >> But arguably it's even beyond solutions. You need to be able to demonstrate to the customer that there is an outcome that's consistent and that you will help achieve that outcome, You'll take some responsibility for it. In many respects, we move from a product to a solution, to an outcome orientation. Does that resonate with you and if so, how does that influence the way you think and the way that you're guiding Fortinet and partners? >> Yes, definitely. You know one of the first things they're very worried about is you know can they see that digital attack surface. It's very large now and it's moving around. Their outcome, first outcomes to say, do I know my risk on my attack surface? That's the very first out. Is it visible, can I see it, or can I protect it or can I apply the right threat protection against that. That outcome to them is they can see everything, protect everything, but as I said also, now they're moving into this more detection environment. Where you've got machine learning, artificial intelligence because you need to apply that. The bad guys these days are very smart in that they know they can morph things very quickly and provide you know targeted attacks, zero-day attacks, we probably haven't seen it before. I hate this analogy where we say somebody else got to get infected before everyone else gets protected. It shouldn't be that way. With, you know, with technologies like artificial intelligence, machine learning, we should be able to protect everybody from day one. >> Kind of pivoting on, you brought up the word outcome, and I want to go off that for a second. When you're talking with customers and you mentioned, I think, before we went live that you visited, talked to over 300 customers last year. Who is at the table, at a customer, in terms of determining the outcome we need to have? Are we talking about the CSO's team, what about folks in other organizations, operational technology departments. Who are you now seeing is in this conversation of determining this outcome. >> A new job role which I think been coming for a while, it's the security architect. Two years ago, I'll go into a room and there would be the networking team on one side of the table, this InfoSec team security side, on this side of the table, the CIO over here and the CSO over here and they be debating. I would be almost invisible in the room. They'll be debating what's going to happen because you know the CIO wants to build out more agile business applications, wants to move faster. The security team has got to answer to the Board these days, and they got to make sure everything's secure. What's their risk factor? And what I see is a new job function called the security architect, that kind of straddles a bit the networking team, understands what they're building out from an SDN, architecture, cloud perspective, but also understands the risks when you open up the network. The security architect provides more holistic, long-term architecture view for the customer, versus, I've got to fix this problem right now I've got a hold of a bucket, I've got to fix it, then we move on to the next. They're building a system on architecture long term. We have something called a Network Security Expert, it's our training education capability. We have an NSC eight, we have around 100 thousand people certified in the last two years on NSC between one and eight. And about 100 people on eight, because eight's a very high level architect level across all the security technologies. But we definitely see a lot of partners who want to get their people trained to NCE level eight because they would like to provide that security architect that's in the customer now, that advice on what should be that holistic security architecture. The big change to me is that the networking team and the security team have realized they can't just keep fixing things day to day, they need a more holistic long-term architecture. >> Let's talk about that holistic approach. At Wikibon we talk a lot about SiliconANGLE Wikibon, we talk a lot about how the difference between business and digital business is the role that data assets play in the digital business. I think it's a relatively interesting, powerful concept, but there's not a lot of expertise out there about thinking how is a data asset formed. I think security has a major role to play in defining how a data assets structured because security in many respects is the process of privatizing data so that it can be appropriated only as you want it to. What does the security architect do? Because I could take what you just said and say the security architect is in part responsible for defining and sustaining the data asset portfolio. >> Yes and you know, if you go back a few years, there's data leakage prevention was a big area, big marketplace, DLP is the best thing. Their biggest problem that they did was they couldn't tag the assets. They didn't know what assets were so then when it came to providing data protection they go well, what is it, I don't know where it's from, I don't know what it is. And so that a whole marketplace kind of just went away. We're still there a bit, but everyone's really struggling with it still. The 6.0 introduced something called tagging technology. It's inherent already inside routing systems and switching systems, SDN systems. The tagging technology allows you to look at data or devices or interfaces or firewalls from a higher level and say this is the business relationship between that device, that data and what my business objectives are. We talked about intent based network security and the ability long term is to say, hey, if I've got a user and I want to add that user to this network at security level six to that application, I say that, then it gets translated into bits and bytes and network comport and then gets translated end-to-end across the network. The tagging technology from my mind is the first step in a to be able to kind of tag interfaces and data and everything else. Once you've got that tagging done then you can apply policies as a much higher level which are data centric and business aware centric. >> I'm going to ask you a question related to that. Historically, networks in the IT world were device was the primary citizen right. Then when we went to the web the page became a primary citizen. Are we now talking about a world in which data becomes the primary citizen we're really talking about networks of data? >> I think to some extent. If you look at the users today, they have like maybe three or four devices. Because students, universities, there's something on with those lectures, they've got an iPad, their iPhone, three devices attaching there. I think the definition of one user and one device has gone away and it's multiple devices these days. And you know a lot of devices attaching that no one has any clue about. I don't think it's going to be completely data centric because I still think it's very very hard to tag and classify that data completely accurately as it's moving around. I think tends to be a part of it, I think devices going to be part of it, I think the network itself, the applications, are all going to be part of this visibility. In our 6.0 we provide this topology map where you can see devices users. You can see applications spin up, you can see the relationship between those things and the policies, the visibility is going to be extremely important going forward and then the tagging goes along with that and then you can apply the policy. >> With respect to visibility, I wanted to chat about that a little bit in the context of customers. One of the things that Ken talked about in his keynote was. >> Ken? >> Ken. >> Ken Xie. >> Yes. (laughing) >> Ken who? >> That guy? The guy that steals slides from you in keynotes. >> He did as usual. >> I know, I saw that. >> Tells me like two minutes before tells me John, I need that slide. (Peter laughing) >> That's why you have the best job. Everybody wants to copy you. In terms of what what the CEO said, that guy, that Fortinet protects 90% of the global S&P 100. There were logos of Apple, Coca-cola, Oracle, for example. In terms of visibility, as we look at either, a giant enterprise like that or maybe a smaller enterprise where they are, you mentioned this digital tax surface is expanding because they are enabling this digital business transformation, they've got cloud, multi-cloud, mobile, IoT, and they also have 20, north of 20, different security products in their environments. How did they get visibility across these disparate solutions that don't play together. How does Fortinet help them achieve that visibility, so they can continue to scale at the speed they need to? >> Well I think they use systems like SIM systems we have a Forti SIM as well where you can use standard base sys logs and SNMP to get information up there so they can see it that way. They're using orchestration systems to see parts of it, but I think long term, I think I speak to most customers they say, although there's specific, new vendors maybe for specific detection capabilities, they really want to reduce the number of vendors inside their network. You say 20, I sometimes I hear 30 and 40. It's a big investment for them. But they also realize they can't maintain it long term. Our recommendation to customers is to, if you've got some Fortinet footprint in there, look at what's the most obvious to build out from a Fortinet perspective. Sometimes we're in the data centers or sometimes we expand into the WAN and sometimes we expand into the cloud. Sometimes we'll add some advanced threat protection. We're not saying replace everything obviously with Fortinet, we're saying build what's most obvious to you and then make sure that you've got some vendors in that which are part of our Fabric alliance. We have 42 vendors now, security vendors, from end point to cloud to management that can connect in through those different APIs. And when we click them through those APIs they don't get you know the full Fabric functionality in terms of telemetry and visibility but they apply a specific functionality. A good example would be an endpoint vendor connecting through our sandbox not quite sure about files, entered our sandbox we'll give them a recommendation back. As soon as we know about that, all the Fabric knows about it instantly across the whole network because time is of the essence these days. When something gets hacked, it's inside a network. It's less than 60 seconds for something for the whole network. That's why segmentation, interim segmentation, is still a very important project for our customers to stop this lateral movement of infections once they get inside the network. >> But, very quickly, it does sound as though that notion of the security architect, this increasing complexity inside the network and I asked the question about whether data is going to be the primary decision, you get a very reasonable answer to that. But it sounds like increasingly, a security expert is going to have to ask the question how does this data integrate? How am I securing this data? And that, in many respects, becomes a central feature of how you think about security architecture and security interactions. >> Yeah but I think people used to build a network and bolt on security as an afterthought. I think what they're saying now is we need for the networking people and security people to work together to build a holistic security architecture totally integrated day one, not some afterthought that goes on there. That's why we know, we've been building the Fabric all these years to make sure it's a totally integrated Fabric end-to-end segmentation architecture where you can also then connect in different parts of the network. It has to be built day one that way. >> Last question, is sort of, I think we asked your CSO this, the balance between enabling a business to transform digitally at speed and scale. I think it was one of you this morning, that said that this is going to be the year of security transformation. Could've been that guy, that other guy, that you know, steals your slides. But how do how does a company when you're talking with customers, how do they get that balance, between we are on this digital transformation journey. We've got a ton of security products. How do they balance that? It's not chicken and egg to be able to continue transforming to grow profit, you know be profitable, with underpinning this digital business with a very secure infrastructure. >> As I said, I think most of them got that now. They kind of go, they've got this five-year plan versus a one-year plan or a six-month plan on the security side. It's integrated into the network architecture plan long term and that's the way they're building it out and that's the way they've got a plan to get, you know, you look at financial organizations who want to provide internet access or branch offices. They've got a plan to roll it out, that's safe going forward, or they want to add broadband access to their internet, like 5G or broadband interconnection, they've got a plan for it. I think people are much more aware now that when I build something out whether it be on the data side on the network side, it has to be secure from day one. It can't be something I'll do afterwards. I think that's the biggest change I've seen in my customer interactions is that they absolutely, essential is absolutely essential that they build out a secure network from day one, not an afterthought going forward. >> Well, we'll end it there, secure network from day one. John, thanks so much for stopping by theCUBE, congratulations on the announcements and we hope you have a great show. >> Great thanks. >> Thank you for watching, we are theCUBE, live from Fortinet Accelerate 2018. I'm Lisa Martin with my co-host Peter Burris. Stick around, we'll be right back.

Published Date : Feb 27 2018

SUMMARY :

Brought to you by Fortinet. We're excited to be here. Welcome back to theCUBE. when you started off your Keynote. Premier League all the way. So you talked about some exciting announcements today. and apply these to our network overall. Chief Jon Bove, talk to us about. And we beat him Sunday In the past, you know maybe they sell a point product, You can only really do that if you build can we talk about what is a security product? I think in the past you know product management how does that influence the way you think You know one of the first things they're very worried about in terms of determining the outcome we need to have? and they got to make sure everything's secure. I think security has a major role to play and the ability long term is to say, I'm going to ask you a question related to that. I think tends to be a part of it, about that a little bit in the context of customers. The guy that steals slides from you in keynotes. I need that slide. that Fortinet protects 90% of the global S&P 100. we have a Forti SIM as well where you can that notion of the security architect, It has to be built day one that way. that said that this is going to be the year and that's the way they're building it out and we hope you have a great show. Thank you for watching, we are theCUBE,

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
Lisa MartinPERSON

0.99+

AppleORGANIZATION

0.99+

Peter BurrisPERSON

0.99+

JohnPERSON

0.99+

OracleORGANIZATION

0.99+

John MaddisonPERSON

0.99+

KenPERSON

0.99+

10 yearsQUANTITY

0.99+

oneQUANTITY

0.99+

six hoursQUANTITY

0.99+

FortinetORGANIZATION

0.99+

Coca-colaORGANIZATION

0.99+

one-yearQUANTITY

0.99+

threeQUANTITY

0.99+

Jon BovePERSON

0.99+

PeterPERSON

0.99+

90%QUANTITY

0.99+

six-monthQUANTITY

0.99+

last yearDATE

0.99+

WikibonORGANIZATION

0.99+

five-yearQUANTITY

0.99+

iPhoneCOMMERCIAL_ITEM

0.99+

less than 60 secondsQUANTITY

0.99+

SundayDATE

0.99+

one deviceQUANTITY

0.99+

42 vendorsQUANTITY

0.99+

iPadCOMMERCIAL_ITEM

0.99+

12QUANTITY

0.99+

40 different security vendorsQUANTITY

0.99+

firstQUANTITY

0.99+

Ken XiePERSON

0.99+

ArsenalORGANIZATION

0.99+

around 100 thousand peopleQUANTITY

0.99+

three devicesQUANTITY

0.99+

Two years agoDATE

0.99+

Las VegasLOCATION

0.98+

over 300 customersQUANTITY

0.98+

20QUANTITY

0.98+

todayDATE

0.98+

OneQUANTITY

0.98+

InfoSecORGANIZATION

0.98+

about 100 peopleQUANTITY

0.98+

10QUANTITY

0.98+

four devicesQUANTITY

0.98+

eightQUANTITY

0.98+

first stepQUANTITY

0.98+

Manchester City BlueORGANIZATION

0.98+

one userQUANTITY

0.98+

two productsQUANTITY

0.97+

Manchester CityORGANIZATION

0.97+

Man CityORGANIZATION

0.97+

SiliconANGLEORGANIZATION

0.97+

two minutesQUANTITY

0.97+

200 plus new servicesQUANTITY

0.96+

two thingsQUANTITY

0.96+

Premier LeagueEVENT

0.94+

Accelerate 2018TITLE

0.91+

this morningDATE

0.9+

one security vendorQUANTITY

0.9+

first outcomesQUANTITY

0.89+

2018DATE

0.88+

day oneQUANTITY

0.88+

first thingsQUANTITY

0.88+

level eightOTHER

0.88+

NSCORGANIZATION

0.84+

level sixQUANTITY

0.84+

theCUBEORGANIZATION

0.84+

one sideQUANTITY

0.82+

NCEORGANIZATION

0.81+

AmericaORGANIZATION

0.81+

Ramin Sayar | AWS re:Invent 2016


 

>> Narrator: Live from Las Vegas, Nevada, it's theCUBE covering AWS re:Invent 2016. Brought to you by AWS and its ecosystem partners. Now here is your host, John Furrier. >> Hey, welcome back everyone. We are here live in Las Vegas for AWS Amazon Web Services re:Invent 2016, their annual industry conference. The center of the universe in the tech world, 32,000 attendees, broke all records. It grew from 16,000 last year, almost double. I'm John Furrier with theCUBE. We are here getting all of the signal from the noise. Three days of wall-to-wall coverage. Our next guest Ramin Sayar, who's the President and CEO of Sumo Logic. Welcome to theCube, welcome back. >> Very well, thank you much. Nice to be here. >> So, when did you move over to Sumo Logic? >> So interestingly enough, it's two years this Friday. >> Okay so give us a quick update and then I want to dive into the relationship with Amazon. You guys clearly doing big data early. In the wave of the Hadoop is big data, but those other methodologies. Quick history of what you guys are doing now and status of the company. >> Sure. So the company is about seven years old. We were founded, born, actually bred on AWS. We don't have a single server in our place and interesting enough, the premise of founding Sumo, seven and a half years ago, actually was to build a multi-tenant SAAS-based machine data analytics platform to start to address a lot of the security, but also the operational issues that customers were facing. Our founders actually came from a security background and realized that rear-view mirror technologies and looking at historical aspects wasn't good enough. So low and behold, they made a big bet at that time, six years, almost seven years ago, to build exclusively on AWS and today, on an average day, we're ingesting about 70 terabytes of data, we're analyzing over 100 petabytes of data on AWS. >> So talk about the specific implementations. Obviously using all of the services, is there any particular ones, obviously storage, Glacier, you must be using some Glacier, but is it mostly S3, is it ElasticBox Storage? >> S3, C2, we use, obviously, some of the other services, but more importantly, we enable all of the services that AWS provides for their customers to be seamlessly supported by Sumo. So when you log into Sumo or you create a brand new account you give us your credentials, everything from Kinesis to Lambda, to EC2, to ElasticBox Storage, all of those are out-of-the-box that are supported. >> And you guys had a great booth last year. This huge booth, right in the front, with sumo wrestlers. I mean that stole the show in the age of Twitter and Instagram. The share of voice on that was pretty significant. >> Yeah I think there's an underpinning tone there, which is we want to wrangle your data, right. And no one knows big data more than a sumo. And we have earned the right now, after seven years in with 100 petabytes of data that we're analyzing every single day, to be a lot more prescriptive for customers in terms of how to approach the way they build, run, and secure these modern apps. >> We've been following you guys in context of the big data space. I don't think we've had a lot of briefings on the analysis side. I think we should get you guys certainly plugged-in with George Gilbert, our analyst, but what's interesting is the predictive marketing and then a lot of certain verticals were really in early on big data and you guys were there. What's evolved since then? Because now you're seeing, with AWS certainly, you've got streaming, you got redshift doing very well, the services that they've added on over the past few years has been pretty significantly and kind of right in your wheelhouse. >> Yeah. >> John: So what new use-cases are popping up now? What are you guys doing for business? What's some of the profile customers? How are they using Sumo and what's the value for them? >> Great question. So a few things we're seeing. One is with the availability of all these services that Amazon is providing, the cycle time for releasing new code and overall applications is becoming much less. And as a result there's not just a need to move to continuous integration or continuous deployment, it's about continuous updates. So the challenge that brings for a lot of our customers they need real-time visibility. We refer to that as continuous intelligence. So our platform is predicated on the fact that we have near real-time analytics streaming engine that as data is coming in, you can get visibility for your developers, you can get visibility for your operations teams, and you can get visibility for your security compliance teams. So let me give you a couple of examples. You asked for customers, Huddle is one of the customers they spoke about today. >> John: Jeff Frick and I love Huddle. >> Football videos, but you know they support Premier League, they support Aussie rule football, I mean there's a lot of sports right? And so they're uploading video and there's a great service not for just college or high school athletes, but professional athletes to understand their game and analyze their games. So underpinning that, actually Huddle's using Sumo to run their service, to manage their service. Not too distinct from Domo or Qualtrics or other customers like SalesForce, Adobe. We have customers like Land-O-Lakes. We do a lot in media and entertainment, gaming, online retailers. So what do they all have in common? They're either migrating to the cloud, one. Two, they're doing digital transformation or some sort of digital application initiative. Three, they need some way to get visibility real-time into their applications and services from a security perspective, but also an operational perspective. >> What's the driver for customers right now? Because one of the things we hear all the time is people are trying to account for their data. So analytics is kind of like this, well data warehouse was this old mentality, but now smart people started putting into mainstream, but now there's more of a data accountability aspect. The metadata, really valuable. How are customers doing that with you guys? 'Cause I can see them getting their toes wet with Sumo and then getting up and saying "Wow I can use some prescriptive analytics, predictive marketing", whatever the use-case could be, but now you gotta start thinking where's the data coming from and where's it accounted for. Is there a data economy? >> So what's interesting about that, you mentioned metadata, and that's what it's about. Our system, we ingest any type of structured or unstructured data. And we actually analyze a lot of the metadata. In fact, like I mentioned earlier, we're analyzing over 100 petabytes every single day on AWS. And so what we're able to actually help our customers do now is be much more prescriptive and provide insights as to the 1300 customers that are on Sumo, the 74% of them that run on AWS, about a quarter of them are using things like Lambda. Another two-thirds are using EC2, but how? And what types of queries are they doing? And what types of services are they building with Docker containers, or Mesosphere, or others of that type of services? So now we've actually entered a position where we're actually the trusted advisor for a lot of these companies in moving to the cloud, building new, modern apps because we've been doing it for seven and a half years. >> Yeah. >> Ramin: And so the metadata starts to become important because we actually put out a recent survey we called "The state of the modern app". And that whole report was premised on the 100 plus petabytes every single day over a six month period, how are customers using AWS, what services are they using and not using, and what should you consider? The number one thing we found in that report was only half of the customers, of which 74% of the 1300 run on AWS, were actually doing anything with CloudTrail with respect to security. That means the other half are potentially vulnerable to breach. >> John: Yeah. >> John: What percentage? >> 50%. >> So half were exposed. >> Half are exposed >> John: No audit at all. >> Ramin: No audit at all. So now we're actually proactively notifying them saying, "Hey listen for your type of deployment you're using these types of common services. Others similar to you should use the following." >> That brings up a good point. So let's unpack that because what that brings up is a lot of people get into data and they hear all this stuff in the news. Oh big data driven and you know they can drink the Kool-Aid and go "Okay I buy that vision." But there's some pretty urgent issues on the table that people got to deal with in the enterprise and or if they're cloud native and that is security. You mentioned it. I mean that has become such the low-hanging fruit for data analytics. So Splunk being very successful with that. Cyber, we talked to Teresa Carlson earlier. Their public-sector business is exploding, certainly with the CIA and others. I'm sure you guys got some of those clients. But that highlights that yeah that's all fine and dandy to do some nice stuff over here to figure out recommendation engine for this or that, when you got security holes out there. Are you seeing that on your end too? >> Well interestingly enough, that's how we started. We started with the goal of providing analytics and more importantly we wanted to democratize analytics initially for security in the cloud. And so, we actually before Amazon Web Services really built things like PKI or public key encryption or things around encrypting data transfer, we had built that into our system and service. So what we actually are able to do now is not only show how we can encrypt the data and do all this services, but show them how they should actually start to use CloudTrail and how they should architect these modern apps, and what things they should be concerned about from a vulnerability and risk point of view. One of the newest products that we just announced is in early-access around threat vulnerability and threat intelligence because now we're getting a 360 degree view for a lot of our customers because you saw today the hybrid announcement right? That's going to be there for a while. What Sumo allows a lot of our customers to do is from their on-premise data center to their CDNs to all their SAAS applications like SalesForce, or WorkDay, or DropBox, or Box to all those things running on ASH or Amazon and the like, we provide a whole 360 view. And we can actually now >> John: So you get real-time >> John: as well on that? >> Real-time. >> Ramin: So our system and service is predicated on a real-time data streaming engine. >> Yeah so you guys can coexist in multi-cloud world. >> Absolutely. >> John: That's your premise. >> Ramin: No pun intended right? (laughing) >> All right, let's talk about contextual data and what companies should do and why they should get you guys involved in the use-cases of going forward, planning. A lot of conversation here at re:Invent is AWS 2.0. They go on to the next level, Enterprise, a little bit more complicated than say Cloud Native greefield apps. How should they be thinking about their data? You've been doing this for seven years in AWS and you probably have clients that aren't on AWS some are, some aren't, that's the makeup. But generally what's the architecture? What should be holistic concept for CIO, CXO, or down to the practitioner level, what's the guiding principles? >> It starts with a fundamental principle of form follows function. And you know this is a sports analogy, but if you're not formed right, you're not going to function right. So a lot has to do with a conscious decision customers need to make in terms of how they're going to structure their teams and whether they're going to move to a true dev-ops model where they're pushing hourly, daily, weekly, and whether they need to or not for certain applications versus others. And then it goes into function in terms of how they start to architect their applications. What services they need to use. And we've actually learned that over seven and a half, eight years ourselves, seven which years were running on AWS. And so the advice often times we give to a lot of our customers is understand where the mission critical workloads that you need to migrate, categorize those. Second is, which of the greenfield apps you're building and why. And what type of retention and security policies do you need and these are the common services you should probably consider with AWS. And then third is, the other set of applications you don't really care about, leave them for now. Focus on your expertise here. >> It's really triaging the sequence or order of app rollout, basically. Well thanks for coming on theCube. Really appreciate Ramin. I want you to take a minute to close us out and talk about for the folks watching, what's new with Sumo Logic? Why should they be working with you? What's the pitch? What's new? What's relevant for you guys? >> Great, so obviously we're a big data company, but more specifically our service and our strategy was predicated on democratizing analytics. And so we refer to that as continuous intelligence. And so as this digital transformation is taking place, and we're seeing it here, we're seeing it across every part of the businesses, we are well suited for every company that's got either a migration effort or an active, new project going on AWS. And so we can provide a simple, secure, highly scalable machine data analytics platform as a service and that's what Sumo is all about. >> And your business plan for the next year is what? Knock down more customers? Do more product development? All of the above? Channel? What's the strategy? >> So good question. So on one hand we're introducing a new product. We've kind of hinted to some of that today with some threat intelligence. Second is, we just introduced a new product about a month ago that we're starting to monetize. It's about semi-structured data. And third is, we're gonna start to really expand our routes to market and channels. One of the things that we participated in recently with Amazon is the new Amazon SAAS marketplace program. We're in with a handful of companies that participate in design and development there. And so that allows very seamlessly for customers to come try, buy, and decide whether they go month-to-month, semi-annually, or year. >> Well that will accelerate the operational nature of your product. >> Absolutely, but that's the way we sell today. In fact, our whole business model is predicated on land and expand. You're probably familiar with this whole notion of cohorts. >> Yup. >> And that dollar retention. Well the median, if you look at PACCrest and Morgan Stanely and the other firms, tend to be 103 to 105. Best in class tends to be 110 to 115. We've been well north of 160 for 19 straight quarters. >> Well Jassie said that on his keynote today. The bombastic days of handwaving are over. If you don't see it right there, the value, in front of you, don't buy it. >> Don't buy it. >> It's really the marketplace's vision. >> That's marketplace vision and that's what we're all about at Sumo Logic. >> Ramir Sayar, President and CEO of Sumo Logic. Congratulations on your success. Continued success. This is theCube bringing you all the action live in Las Vegas for re:Invent 2016, I'm John Furrier. Be right back with more after this short break. You're watching theCube.

Published Date : Dec 1 2016

SUMMARY :

Brought to you by AWS and The center of the universe Nice to be here. So interestingly enough, and status of the company. and interesting enough, the So talk about the enable all of the services I mean that stole the show how to approach the way and kind of right in your on the fact that we have to the cloud, one. that with you guys? a lot of the metadata. and what should you consider? Others similar to you that people got to deal with of our customers to do is Ramin: So our system and Yeah so you guys can and why they should get you guys involved So a lot has to do with a and talk about for the folks watching, part of the businesses, we are One of the things that we the operational nature the way we sell today. Well the median, if you look the value, in front of you, and that's what we're all about and CEO of Sumo Logic.

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
Ramin SayarPERSON

0.99+

George GilbertPERSON

0.99+

Jeff FrickPERSON

0.99+

AmazonORGANIZATION

0.99+

Ramir SayarPERSON

0.99+

JassiePERSON

0.99+

JohnPERSON

0.99+

AWSORGANIZATION

0.99+

Teresa CarlsonPERSON

0.99+

John FurrierPERSON

0.99+

CIAORGANIZATION

0.99+

QualtricsORGANIZATION

0.99+

74%QUANTITY

0.99+

AdobeORGANIZATION

0.99+

100 petabytesQUANTITY

0.99+

Amazon Web ServicesORGANIZATION

0.99+

Sumo LogicORGANIZATION

0.99+

SecondQUANTITY

0.99+

PACCrestORGANIZATION

0.99+

seven and a half yearsQUANTITY

0.99+

SumoORGANIZATION

0.99+

Las VegasLOCATION

0.99+

1300 customersQUANTITY

0.99+

todayDATE

0.99+

seven yearsQUANTITY

0.99+

100 plus petabytesQUANTITY

0.99+

32,000 attendeesQUANTITY

0.99+

103QUANTITY

0.99+

110QUANTITY

0.99+

RaminPERSON

0.99+

thirdQUANTITY

0.99+

50%QUANTITY

0.99+

next yearDATE

0.99+

DomoORGANIZATION

0.99+

OneQUANTITY

0.99+

Three daysQUANTITY

0.99+

115QUANTITY

0.99+

eight yearsQUANTITY

0.99+

last yearDATE

0.99+

105QUANTITY

0.99+

oneQUANTITY

0.99+

WorkDayTITLE

0.99+

SalesForceTITLE

0.99+

16,000QUANTITY

0.99+

last yearDATE

0.99+

over 100 petabytesQUANTITY

0.98+

DropBoxTITLE

0.98+

Land-O-LakesORGANIZATION

0.98+

two yearsQUANTITY

0.98+

seven and a half years agoDATE

0.98+

SalesForceORGANIZATION

0.98+

over seven and a halfQUANTITY

0.98+

S3TITLE

0.98+

HalfQUANTITY

0.98+

ThreeQUANTITY

0.98+

1300QUANTITY

0.98+

EC2TITLE

0.98+

Las Vegas, NevadaLOCATION

0.97+