Phil Kippen, Snowflake, Dave Whittington, AT&T & Roddy Tranum, AT&T | | MWC Barcelona 2023
(gentle music) >> Narrator: "TheCUBE's" live coverage is made possible by funding from Dell Technologies, creating technologies that drive human progress. (upbeat music) >> Hello everybody, welcome back to day four of "theCUBE's" coverage of MWC '23. We're here live at the Fira in Barcelona. Wall-to-wall coverage, John Furrier is in our Palo Alto studio, banging out all the news. Really, the whole week we've been talking about the disaggregation of the telco network, the new opportunities in telco. We're really excited to have AT&T and Snowflake here. Dave Whittington is the AVP, at the Chief Data Office at AT&T. Roddy Tranum is the Assistant Vice President, for Channel Performance Data and Tools at AT&T. And Phil Kippen, the Global Head Of Industry-Telecom at Snowflake, Snowflake's new telecom business. Snowflake just announced earnings last night. Typical Scarpelli, they beat earnings, very conservative guidance, stocks down today, but we like Snowflake long term, they're on that path to 10 billion. Guys, welcome to "theCUBE." Thanks so much >> Phil: Thank you. >> for coming on. >> Dave and Roddy: Thanks Dave. >> Dave, let's start with you. The data culture inside of telco, We've had this, we've been talking all week about this monolithic system. Super reliable. You guys did a great job during the pandemic. Everything shifting to landlines. We didn't even notice, you guys didn't miss a beat. Saved us. But the data culture's changing inside telco. Explain that. >> Well, absolutely. So, first of all IoT and edge processing is bringing forth new and exciting opportunities all the time. So, we're bridging the world between a lot of the OSS stuff that we can do with edge processing. But bringing that back, and now we're talking about working, and I would say traditionally, we talk data warehouse. Data warehouse and big data are now becoming a single mesh, all right? And the use cases and the way you can use those, especially I'm taking that edge data and bringing it back over, now I'm running AI and ML models on it, and I'm pushing back to the edge, and I'm combining that with my relational data. So that mesh there is making all the difference. We're getting new use cases that we can do with that. And it's just, and the volume of data is immense. >> Now, I love ChatGPT, but I'm hoping your data models are more accurate than ChatGPT. I never know. Sometimes it's really good, sometimes it's really bad. But enterprise, you got to be clean with your AI, don't you? >> Not only you have to be clean, you have to monitor it for bias and be ethical about it. We're really good about that. First of all with AT&T, our brand is Platinum. We take care of that. So, we may not be as cutting-edge risk takers as others, but when we go to market with an AI or an ML or a product, it's solid. >> Well hey, as telcos go, you guys are leaning into the Cloud. So I mean, that's a good starting point. Roddy, explain your role. You got an interesting title, Channel Performance Data and Tools, what's that all about? >> So literally anything with our consumer, retail, concenters' channels, all of our channels, from a data perspective and metrics perspective, what it takes to run reps, agents, all the way to leadership levels, scorecards, how you rank in the business, how you're driving the business, from sales, service, customer experience, all that data infrastructure with our great partners on the CDO side, as well as Snowflake, that comes from my team. >> And that's traditionally been done in a, I don't mean the pejorative, but we're talking about legacy, monolithic, sort of data warehouse technologies. >> Absolutely. >> We have a love-hate relationship with them. It's what we had. It's what we used, right? And now that's evolving. And you guys are leaning into the Cloud. >> Dramatic evolution. And what Snowflake's enabled for us is impeccable. We've talked about having, people have dreamed of one data warehouse for the longest time and everything in one system. Really, this is the only way that becomes a reality. The more you get in Snowflake, we can have golden source data, and instead of duplicating that 50 times across AT&T, it's in one place, we just share it, everybody leverages it, and now it's not duplicated, and the process efficiency is just incredible. >> But it really hinges on that separation of storage and compute. And we talk about the monolithic warehouse, and one of the nightmares I've lived with, is having a monolithic warehouse. And let's just go with some of my primary, traditional customers, sales, marketing and finance. They are leveraging BSS OSS data all the time. For me to coordinate a deployment, I have to make sure that each one of these units can take an outage, if it's going to be a long deployment. With the separation of storage, compute, they own their own compute cluster. So I can move faster for these people. 'Cause if finance, I can implement his code without impacting finance or marketing. This brings in CI/CD to more reality. It brings us faster to market with more features. So if he wants to implement a new comp plan for the field reps, or we're reacting to the marketplace, where one of our competitors has done something, we can do that in days, versus waiting weeks or months. >> And we've reported on this a lot. This is the brilliance of Snowflake's founders, that whole separation >> Yep. >> from compute and data. I like Dave, that you're starting with sort of the business flexibility, 'cause there's a cost element of this too. You can dial down, you can turn off compute, and then of course the whole world said, "Hey, that's a good idea." And a VC started throwing money at Amazon, but Redshift said, "Oh, we can do that too, sort of, can't turn off the compute." But I want to ask you Phil, so, >> Sure. >> it looks from my vantage point, like you're taking your Data Cloud message which was originally separate compute from storage simplification, now data sharing, automated governance, security, ultimately the marketplace. >> Phil: Right. >> Taking that same model, break down the silos into telecom, right? It's that same, >> Mm-hmm. >> sorry to use the term playbook, Frank Slootman tells me he doesn't use playbooks, but he's not a pattern matcher, but he's a situational CEO, he says. But the situation in telco calls for that type of strategy. So explain what you guys are doing in telco. >> I think there's, so, what we're launching, we launched last week, and it really was three components, right? So we had our platform as you mentioned, >> Dave: Mm-hmm. >> and that platform is being utilized by a number of different companies today. We also are adding, for telecom very specifically, we're adding capabilities in marketplace, so that service providers can not only use some of the data and apps that are in marketplace, but as well service providers can go and sell applications or sell data that they had built. And then as well, we're adding our ecosystem, it's telecom-specific. So, we're bringing partners in, technology partners, and consulting and services partners, that are very much focused on telecoms and what they do internally, but also helping them monetize new services. >> Okay, so it's not just sort of generic Snowflake into telco? You have specific value there. >> We're purposing the platform specifically for- >> Are you a telco guy? >> I am. You are, okay. >> Total telco guy absolutely. >> So there you go. You see that Snowflake is actually an interesting organizational structure, 'cause you're going after verticals, which is kind of rare for a company of your sort of inventory, I'll say, >> Absolutely. >> I don't mean that as a negative. (Dave laughs) So Dave, take us through the data journey at AT&T. It's a long history. You don't have to go back to the 1800s, but- (Dave laughs) >> Thank you for pointing out, we're a 149-year-old company. So, Jesse James was one of the original customers, (Dave laughs) and we have no longer got his data. So, I'll go back. I've been 17 years singular AT&T, and I've watched it through the whole journey of, where the monolithics were growing, when the consolidation of small, wireless carriers, and we went through that boom. And then we've gone through mergers and acquisitions. But, Hadoop came out, and it was going to solve all world hunger. And we had all the aspects of, we're going to monetize and do AI and ML, and some of the things we learned with Hadoop was, we had this monolithic warehouse, we had this file-based-structured Hadoop, but we really didn't know how to bring this all together. And we were bringing items over to the relational, and we were taking the relational and bringing it over to the warehouse, and trying to, and it was a struggle. Let's just go there. And I don't think we were the only company to struggle with that, but we learned a lot. And so now as tech is finally emerging, with the cloud, companies like Snowflake, and others that can handle that, where we can create, we were discussing earlier, but it becomes more of a conducive mesh that's interoperable. So now we're able to simplify that environment. And the cloud is a big thing on that. 'Cause you could not do this on-prem with on-prem technologies. It would be just too cost prohibitive, and too heavy of lifting, going back and forth, and managing the data. The simplicity the cloud brings with a smaller set of tools, and I'll say in the data space specifically, really allows us, maybe not a single instance of data for all use cases, but a greatly reduced ecosystem. And when you simplify your ecosystem, you simplify speed to market and data management. >> So I'm going to ask you, I know it's kind of internal organizational plumbing, but it'll inform my next question. So, Dave, you're with the Chief Data Office, and Roddy, you're kind of, you all serve in the business, but you're really serving the, you're closer to those guys, they're banging on your door for- >> Absolutely. I try to keep the 130,000 users who may or may not have issues sometimes with our data and metrics, away from Dave. And he just gets a call from me. >> And he only calls when he has a problem. He's never wished me happy birthday. (Dave and Phil laugh) >> So the reason I asked that is because, you describe Dave, some of the Hadoop days, and again love-hate with that, but we had hyper-specialized roles. We still do. You've got data engineers, data scientists, data analysts, and you've got this sort of this pipeline, and it had to be this sequential pipeline. I know Snowflake and others have come to simplify that. My question to you is, how is that those roles, how are those roles changing? How is data getting closer to the business? Everybody talks about democratizing business. Are you doing that? What's a real use example? >> From our perspective, those roles, a lot of those roles on my team for years, because we're all about efficiency, >> Dave: Mm-hmm. >> we cut across those areas, and always have cut across those areas. So now we're into a space where things have been simplified, data processes and copying, we've gone from 40 data processes down to five steps now. We've gone from five steps to one step. We've gone from days, now take hours, hours to minutes, minutes to seconds. Literally we're seeing that time in and time out with Snowflake. So these resources that have spent all their time on data engineering and moving data around, are now freed up more on what they have skills for and always have, the data analytics area of the business, and driving the business forward, and new metrics and new analysis. That's some of the great operational value that we've seen here. As this simplification happens, it frees up brain power. >> So, you're pumping data from the OSS, the BSS, the OKRs everywhere >> Everywhere. >> into Snowflake? >> Scheduling systems, you name it. If you can think of what drives our retail and centers and online, all that data, scheduling system, chat data, call center data, call detail data, all of that enters into this common infrastructure to manage the business on a day in and day out basis. >> How are the roles and the skill sets changing? 'Cause you're doing a lot less ETL, you're doing a lot less moving of data around. There were guys that were probably really good at that. I used to joke in the, when I was in the storage world, like if your job is bandaging lungs, you need to look for a new job, right? So, and they did and people move on. So, are you able to sort of redeploy those assets, and those people, those human resources? >> These folks are highly skilled. And we were talking about earlier, SQL hasn't gone away. Relational databases are not going away. And that's one thing that's made this migration excellent, they're just transitioning their skills. Experts in legacy systems are now rapidly becoming experts on the Snowflake side. And it has not been that hard a transition. There are certainly nuances, things that don't operate as well in the cloud environment that we have to learn and optimize. But we're making that transition. >> Dave: So just, >> Please. >> within the Chief Data Office we have a couple of missions, and Roddy is a great partner and an example of how it works. We try to bring the data for democratization, so that we have one interface, now hopefully know we just have a logical connection back to these Snowflake instances that we connect. But we're providing that governance and cleansing, and if there's a business rule at the enterprise level, we provide it. But the goal at CDO is to make sure that business units like Roddy or marketing or finance, that they can come to a platform that's reliable, robust, and self-service. I don't want to be in his way. So I feel like I'm providing a sub-level of platform, that he can come to and anybody can come to, and utilize, that they're not having to go back and undo what's in Salesforce, or ServiceNow, or in our billers. So, I'm sort of that layer. And then making sure that that ecosystem is robust enough for him to use. >> And that self-service infrastructure is predominantly through the Azure Cloud, correct? >> Dave: Absolutely. >> And you work on other clouds, but it's predominantly through Azure? >> We're predominantly in Azure, yeah. >> Dave: That's the first-party citizen? >> Yeah. >> Okay, I like to think in terms sometimes of data products, and I know you've mentioned upfront, you're Gold standard or Platinum standard, you're very careful about personal information. >> Dave: Yeah. >> So you're not trying to sell, I'm an AT&T customer, you're not trying to sell my data, and make money off of my data. So the value prop and the business case for Snowflake is it's simpler. You do things faster, you're in the cloud, lower cost, et cetera. But I presume you're also in the business, AT&T, of making offers and creating packages for customers. I look at those as data products, 'cause it's not a, I mean, yeah, there's a physical phone, but there's data products behind it. So- >> It ultimately is, but not everybody always sees it that way. Data reporting often can be an afterthought. And we're making it more on the forefront now. >> Yeah, so I like to think in terms of data products, I mean even if the financial services business, it's a data business. So, if we can think about that sort of metaphor, do you see yourselves as data product builders? Do you have that, do you think about building products in that regard? >> Within the Chief Data Office, we have a data product team, >> Mm-hmm. >> and by the way, I wouldn't be disingenuous if I said, oh, we're very mature in this, but no, it's where we're going, and it's somewhat of a journey, but I've got a peer, and their whole job is to go from, especially as we migrate from cloud, if Roddy or some other group was using tables three, four and five and joining them together, it's like, "Well look, this is an offer for data product, so let's combine these and put it up in the cloud, and here's the offer data set product, or here's the opportunity data product," and it's a journey. We're on the way, but we have dedicated staff and time to do this. >> I think one of the hardest parts about that is the organizational aspects of it. Like who owns the data now, right? It used to be owned by the techies, and increasingly the business lines want to have access, you're providing self-service. So there's a discussion about, "Okay, what is a data product? Who's responsible for that data product? Is it in my P&L or your P&L? Somebody's got to sign up for that number." So, it sounds like those discussions are taking place. >> They are. And, we feel like we're more the, and CDO at least, we feel more, we're like the guardians, and the shepherds, but not the owners. I mean, we have a role in it all, but he owns his metrics. >> Yeah, and even from our perspective, we see ourselves as an enabler of making whatever AT&T wants to make happen in terms of the key products and officers' trade-in offers, trade-in programs, all that requires this data infrastructure, and managing reps and agents, and what they do from a channel performance perspective. We still ourselves see ourselves as key enablers of that. And we've got to be flexible, and respond quickly to the business. >> I always had empathy for the data engineer, and he or she had to service all these different lines of business with no business context. >> Yeah. >> Like the business knows good data from bad data, and then they just pound that poor individual, and they're like, "Okay, I'm doing my best. It's just ones and zeros to me." So, it sounds like that's, you're on that path. >> Yeah absolutely, and I think, we do have refined, getting more and more refined owners of, since Snowflake enables these golden source data, everybody sees me and my organization, channel performance data, go to Roddy's team, we have a great team, and we go to Dave in terms of making it all happen from a data infrastructure perspective. So we, do have a lot more refined, "This is where you go for the golden source, this is where it is, this is who owns it. If you want to launch this product and services, and you want to manage reps with it, that's the place you-" >> It's a strong story. So Chief Data Office doesn't own the data per se, but it's your responsibility to provide the self-service infrastructure, and make sure it's governed properly, and in as automated way as possible. >> Well, yeah, absolutely. And let me tell you more, everybody talks about single version of the truth, one instance of the data, but there's context to that, that we are taking, trying to take advantage of that as we do data products is, what's the use case here? So we may have an entity of Roddy as a prospective customer, and we may have a entity of Roddy as a customer, high-value customer over here, which may have a different set of mix of data and all, but as a data product, we can then create those for those specific use cases. Still point to the same data, but build it in different constructs. One for marketing, one for sales, one for finance. By the way, that's where your data engineers are struggling. >> Yeah, yeah, of course. So how do I serve all these folks, and really have the context-common story in telco, >> Absolutely. >> or are these guys ahead of the curve a little bit? Or where would you put them? >> I think they're definitely moving a lot faster than the industry is generally. I think the enabling technologies, like for instance, having that single copy of data that everybody sees, a single pane of glass, right, that's definitely something that everybody wants to get to. Not many people are there. I think, what AT&T's doing, is most definitely a little bit further ahead than the industry generally. And I think the successes that are coming out of that, and the learning experiences are starting to generate momentum within AT&T. So I think, it's not just about the product, and having a product now that gives you a single copy of data. It's about the experiences, right? And now, how the teams are getting trained, domains like network engineering for instance. They typically haven't been a part of data discussions, because they've got a lot of data, but they're focused on the infrastructure. >> Mm. >> So, by going ahead and deploying this platform, for platform's purpose, right, and the business value, that's one thing, but also to start bringing, getting that experience, and bringing new experience in to help other groups that traditionally hadn't been data-centric, that's also a huge step ahead, right? So you need to enable those groups. >> A big complaint of course we hear at MWC from carriers is, "The over-the-top guys are killing us. They're riding on our networks, et cetera, et cetera. They have all the data, they have all the client relationships." Do you see your client relationships changing as a result of sort of your data culture evolving? >> Yes, I'm not sure I can- >> It's a loaded question, I know. >> Yeah, and then I, so, we want to start embedding as much into our network on the proprietary value that we have, so we can start getting into that OTT play, us as any other carrier, we have distinct advantages of what we can do at the edge, and we just need to start exploiting those. But you know, 'cause whether it's location or whatnot, so we got to eat into that. Historically, the network is where we make our money in, and we stack the services on top of it. It used to be *69. >> Dave: Yeah. >> If anybody remembers that. >> Dave: Yeah, of course. (Dave laughs) >> But you know, it was stacked on top of our network. Then we stack another product on top of it. It'll be in the edge where we start providing distinct values to other partners as we- >> I mean, it's a great business that you're in. I mean, if they're really good at connectivity. >> Dave: Yeah. >> And so, it sounds like it's still to be determined >> Dave: Yeah. >> where you can go with this. You have to be super careful with private and for personal information. >> Dave: Yep. >> Yeah, but the opportunities are enormous. >> There's a lot. >> Yeah, particularly at the edge, looking at, private networks are just an amazing opportunity. Factories and name it, hospital, remote hospitals, remote locations. I mean- >> Dave: Connected cars. >> Connected cars are really interesting, right? I mean, if you start communicating car to car, and actually drive that, (Dave laughs) I mean that's, now we're getting to visit Xen Fault Tolerance people. This is it. >> Dave: That's not, let's hold the traffic. >> Doesn't scare me as much as we actually learn. (all laugh) >> So how's the show been for you guys? >> Dave: Awesome. >> What're your big takeaways from- >> Tremendous experience. I mean, someone who doesn't go outside the United States much, I'm a homebody. The whole experience, the whole trip, city, Mobile World Congress, the technologies that are out here, it's been a blast. >> Anything, top two things you learned, advice you'd give to others, your colleagues out in general? >> In general, we talked a lot about technologies today, and we talked a lot about data, but I'm going to tell you what, the accelerator that you cannot change, is the relationship that we have. So when the tech and the business can work together toward a common goal, and it's a partnership, you get things done. So, I don't know how many CDOs or CIOs or CEOs are out there, but this connection is what accelerates and makes it work. >> And that is our audience Dave. I mean, it's all about that alignment. So guys, I really appreciate you coming in and sharing your story in "theCUBE." Great stuff. >> Thank you. >> Thanks a lot. >> All right, thanks everybody. Thank you for watching. I'll be right back with Dave Nicholson. Day four SiliconANGLE's coverage of MWC '23. You're watching "theCUBE." (gentle music)
SUMMARY :
that drive human progress. And Phil Kippen, the Global But the data culture's of the OSS stuff that we But enterprise, you got to be So, we may not be as cutting-edge Channel Performance Data and all the way to leadership I don't mean the pejorative, And you guys are leaning into the Cloud. and the process efficiency and one of the nightmares I've lived with, This is the brilliance of the business flexibility, like you're taking your Data Cloud message But the situation in telco and that platform is being utilized You have specific value there. I am. So there you go. I don't mean that as a negative. and some of the things we and Roddy, you're kind of, And he just gets a call from me. (Dave and Phil laugh) and it had to be this sequential pipeline. and always have, the data all of that enters into How are the roles and in the cloud environment that But the goal at CDO is to and I know you've mentioned upfront, So the value prop and the on the forefront now. I mean even if the and by the way, I wouldn't and increasingly the business and the shepherds, but not the owners. and respond quickly to the business. and he or she had to service Like the business knows and we go to Dave in terms doesn't own the data per se, and we may have a entity and really have the and having a product now that gives you and the business value, that's one thing, They have all the data, on the proprietary value that we have, Dave: Yeah, of course. It'll be in the edge business that you're in. You have to be super careful Yeah, but the particularly at the edge, and actually drive that, let's hold the traffic. much as we actually learn. the whole trip, city, is the relationship that we have. and sharing your story in "theCUBE." Thank you for watching.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Dave | PERSON | 0.99+ |
Dave Whittington | PERSON | 0.99+ |
Frank Slootman | PERSON | 0.99+ |
Roddy | PERSON | 0.99+ |
Amazon | ORGANIZATION | 0.99+ |
Phil | PERSON | 0.99+ |
Phil Kippen | PERSON | 0.99+ |
AT&T | ORGANIZATION | 0.99+ |
Jesse James | PERSON | 0.99+ |
AT&T. | ORGANIZATION | 0.99+ |
five steps | QUANTITY | 0.99+ |
Dave Nicholson | PERSON | 0.99+ |
John Furrier | PERSON | 0.99+ |
50 times | QUANTITY | 0.99+ |
Snowflake | ORGANIZATION | 0.99+ |
Roddy Tranum | PERSON | 0.99+ |
10 billion | QUANTITY | 0.99+ |
one step | QUANTITY | 0.99+ |
17 years | QUANTITY | 0.99+ |
130,000 users | QUANTITY | 0.99+ |
United States | LOCATION | 0.99+ |
1800s | DATE | 0.99+ |
last week | DATE | 0.99+ |
Barcelona | LOCATION | 0.99+ |
Palo Alto | LOCATION | 0.99+ |
Dell Technologies | ORGANIZATION | 0.99+ |
last night | DATE | 0.99+ |
MWC '23 | EVENT | 0.98+ |
telco | ORGANIZATION | 0.98+ |
one system | QUANTITY | 0.98+ |
one | QUANTITY | 0.98+ |
40 data processes | QUANTITY | 0.98+ |
today | DATE | 0.98+ |
one place | QUANTITY | 0.97+ |
P&L | ORGANIZATION | 0.97+ |
telcos | ORGANIZATION | 0.97+ |
CDO | ORGANIZATION | 0.97+ |
149-year-old | QUANTITY | 0.97+ |
five | QUANTITY | 0.97+ |
single | QUANTITY | 0.96+ |
three components | QUANTITY | 0.96+ |
One | QUANTITY | 0.96+ |
Jeetu Patel, Cisco | MWC Barcelona 2023
>> Narrator: theCUBE's live coverage is made possible by funding from Dell Technologies, creating technologies that drive human progress. (bright upbeat music plays) >> Welcome back to Barcelona, everybody. You're watching theCUBE's coverage of MWC '23, my name is Dave Vellante. Just left a meeting with the CEO of Cisco, Chuck Robbins, to meet with Jeetu Patel, who's our Executive Vice President and General Manager of security and collaboration at Cisco. Good to see you. >> You never leave a meeting with Chuck Robbins to meet with Jeetu Patel. >> Well, I did. >> That's a bad idea. >> Walked right out. I said, hey, I got an interview to do, right? So, and I'm excited about this. Thanks so much for coming on. >> Thank you for having me. It's a pleasure. >> So, I mean you run such an important part of the business. I mean, obviously the collaboration business but also security. So many changes going on in the security market. Maybe we could start there. I mean, there hasn't been a ton of security talk here Jeetu, because I think it's almost assumed. It was 45 minutes into the keynote yesterday before anybody even mentioned security. >> Huh. >> Right? And so, but it's the most important topic in the enterprise IT world. And obviously is important here. So why is it you think that it's not the first topic that people mention. >> You know, it's a complicated subject area and it's intimidating. And actually that's one of the things that the industry screwed up on. Where we need to simplify security so it actually gets to be relatable for every person on the planet. But, if you think about what's happening in security, it's not just important for business it's critical infrastructure that if you had a breach, you know lives are cost now. Because hospitals could go down, your water supply could go down, your electricity could go down. And so it's one of these things that we have to take pretty seriously. And, it's 51% of all breaches happen because of negligence, not because of malicious intent. >> It's that low. Interesting. I always- >> Someone else told me the same thing, that they though it'd be higher, yeah. >> I always say bad user behavior is going to trump good security every time. >> Every single time. >> You can't beat it. But, you know, it's funny- >> Jeetu: Every single time. >> Back, the earlier part of last decade, you could see that security was becoming a board level issue. It became, it was on the agenda every quarter. And, I remember doing some research at the time, and I asked, I was interviewing Robert Gates, former Defense Secretary, and I asked him, yeah, but we're getting attacked but don't we have the best offense? Can't we have the best technology? He said, yeah but we have so much critical infrastructure the risks to United States are higher. So we have to be careful about how we use security as an offensive weapon, you know? And now you're seeing the future of war involves security and what's going on in Ukraine. It's a whole different ballgame. >> It is, and the scales always tip towards the adversary, not towards the defender, because you have to be right every single time. They have to be right once. >> Yeah. And, to the other point, about bad user behavior. It's going now beyond the board level, to it's everybody's responsibility. >> That's right. >> And everybody's sort of aware of it, everybody's been hacked. And, that's where it being such a complicated topic is problematic. >> It is, and it's actually, what got us this far will not get us to where we need to get to if we don't simplify security radically. You know? The experience has to be almost invisible. And what used to be the case was sophistication had to get to a certain level, for efficacy to go up. But now, that sophistication has turned to complexity. And there's an inverse relationship between complexity and efficacy. So the simpler you make security, the more effective it gets. And so I'll give you an example. We have this great kind of innovation we've done around passwordless, right? Everyone hates passwords. You shouldn't have passwords in 2023. But, when you get to passwordless security, not only do you reduce a whole lot of friction for the user, you actually make the system safer. And that's what you need to do, is you have to make it simpler while making it more effective. And, I think that's what the future is going to hold. >> Yeah, and CISOs tell me that they're, you know zero trust before the pandemic was like, yeah, yeah zero trust. And now it's like a mandate. >> Yeah. >> Every CISO you talk to says, yes we're implementing a zero trust architecture. And a big part of that is that, if they can confirm zero trust, they can get to market a lot faster with revenue generating or critical projects. And many projects as we know are being pushed back, >> Yeah. >> you know? 'Cause of the macro. But, projects that drive revenue and value they want to accelerate, and a zero trust confirmation allows people to rubber stamp it and go faster. >> And the whole concept of zero trust is least privileged access, right? But what we want to make sure that we get to is continuous assessment of least privileged access, not just a one time at login. >> Dave: 'Cause things change so frequently. >> So, for example, if you happen to be someone that's logged into the system and now you start doing some anomalous behavior that doesn't sound like Dave, we want to be able to intercept, not just do it at the time that you're authenticating Dave to come in. >> So you guys got a good business. I mentioned the macro before. >> Yeah. >> The big theme is consolidating redundant vendors. So a company with a portfolio like Cisco's obviously has an advantage there. You know, you guys had great earnings. Palo Alto is another company that can consolidate. Tom Gillis, great pickup. Guy's amazing, you know? >> Love Tom. >> Great respect. Just had a little webinar session with him, where he was geeking out with the analyst and so- >> Yeah, yeah. >> Learned a lot there. Now you guys have some news, at the event event with Mercedes? >> We do. >> Take us through that, and I want to get your take on hybrid work and what's happening there. But what's going on with Mercedes? >> Yeah so look, it all actually stems from the hybrid work story, which is the future is going to be hybrid, people are going to work in mixed mode. Sometimes you'll be in the office, sometimes at home, sometimes somewhere in the middle. One of the places that people are working more and more from is their cars. And connected cars are getting to be a reality. And in fact, cars sometimes become an extension of your home office. And many a times I have found myself in a parking lot, because I didn't have enough time to get home and I was in a parking lot taking a conference call. And so we've made that section easier, because we have now partnered with Mercedes. And they aren't the first partner, but they're a very important partner where we are going to have Webex available, through the connected car, natively in Mercedes. >> Ah, okay. So I could take a call, I can do it all the time. I find good service, pull over, got to take the meeting. >> Yeah. >> I don't want to be driving. I got to concentrate. >> That's right. >> You know, or sometimes, I'll have the picture on and it's not good. >> That's right. >> Okay, so it'll be through the console, and all through the internet? >> It'll be through the console. And many people ask me like, how's safety going to work over that? Because you don't want to do video calls while you're driving. Exactly right. So when you're driving, the video automatically turns off. And you'll have audio going on, just like a conference call. But the moment you stop and put it in park, you can have video turned on. >> Now, of course the whole hybrid work trend, we, seems like a long time ago but it doesn't, you know? And it's really changed the security dynamic as well, didn't it? >> It has, it has. >> I mean, immediately you had to go protect new endpoints. And those changes, I felt at the time, were permanent. And I think it's still the case, but there's an equilibrium now happening. People as they come back to the office, you see a number of companies are mandating back to work. Maybe the central offices, or the headquarters, were underfunded. So what's going on out there in terms of that balance? >> Well firstly, there's no unanimous consensus on the way that the future is going to be, except that it's going to be hybrid. And the reason I say that is some companies mandate two days a week, some companies mandate five days a week, some companies don't mandate at all. Some companies are completely remote. But whatever way you go, you want to make sure that regardless of where you're working from, people can have an inclusive experience. You know? And, when they have that experience, you want to be able to work from a managed device or an unmanaged device, from a corporate network or from a Starbucks, from on the road or stationary. And whenever you do any of those things, we want to make sure that security is always handled, and you don't have to worry about that. And so the way that we say it is the company that created the VPN, which is Cisco, is the one that's going to kill it. Because what we'll do is we'll make it simple enough so that you don't, you as a user, never have to worry about what connection you're going to use to dial in to what app. You will have one, seamless way to dial into any application, public application, private application, or directly to the internet. >> Yeah, I got a love, hate with my VPN. I mean, it's protecting me, but it's in the way a lot. >> It's going to be simple as ever. >> Do you have kids? >> I do, I have a 12 year old daughter. >> Okay, so not quite high school age yet. She will be shortly. >> No, but she's already, I'm not looking forward to high school days, because she has a very, very strong sense of debate and she wins 90% of the arguments. >> So when my kids were that age, I've got four kids, but the local high school banned Wikipedia, they can't use Wikipedia for research. Many colleges, I presume high schools as well, they're banning Chat GPT, can't use it. Now at the same time, I saw recently on Medium a Wharton school professor said he's mandating Chat GPT to teach his students how to prompt in progressively more sophisticated prompts, because the future is interacting with machines. You know, they say in five years we're all going to be interacting in some way, shape, or form with AI. Maybe we already are. What's the intersection between AI and security? >> So a couple very, very consequential things. So firstly on Chat GPT, the next generation skill is going to be to learn how to go out and have the right questions to ask, which is the prompt revolution that we see going on right now. But if you think about what's happening in security, and there's a few areas which are, firstly 3,500 hundred vendors in this space. On average, most companies have 50 to 70 vendors in security. Not a single vendor owns more than 10% of the market. You take out a couple vendors, no one owns more than 5%. Highly fractured market. That's a problem. Because it's untenable for companies to go out and manage 70 policy engines. And going out and making sure that there's no contention. So as you move forward, one of the things that Chat GPT will be really good for is it's fundamentally going to change user experiences, for how software gets built. Because rather than it being point and click, it's going to be I'm going to provide an instruction and it's going to tell me what to do in natural language. Imagine Dave, when you joined a company if someone said, hey give Dave all the permissions that he needs as a direct report to Chuck. And instantly you would get all of the permissions. And it would actually show up in a screen that says, do you approve? And if you hit approve, you're done. The interfaces of the future will get more natural language kind of dominated. The other area that you'll see is the sophistication of attacks and the surface area of attacks is increasing quite exponentially. And we no longer can handle this with human scale. You have to handle it in machine scale. So detecting breaches, making sure that you can effectively and quickly respond in real time to the breaches, and remediate those breaches, is all going to happen through AI and machine learning. >> So, I agree. I mean, just like Amazon turned the data center into an API, I think we're now going to be interfacing with technology through human language. >> That's right. >> I mean I think it's a really interesting point you're making. Now, from a security standpoint as well, I mean, the state of the art today in my email is be careful, this person's outside your organization. I'm like, yeah I know. So it's a good warning sign, but it's really not automated in any way. So two part question. One is, can AI help? You know, with the phishing, obviously it can, but the bad guys have AI too. >> Yeah. >> And they're probably going to be smarter than I am about using it. >> Yeah, and by the way, Talos is our kind of threat detection and response >> Yes. >> kind of engine. And, they had a great kind of piece that came out recently where they talked about this, where Chat GPT, there is going to be more sophistication of the folks that are the bad actors, the adversaries in using Chat GPT to have more sophisticated phishing attacks. But today it's not something that is fundamentally something that we can't handle just yet. But you still need to do the basic hygiene. That's more important. Over time, what you will see is attacks will get more bespoke. And in order, they'll get more sophisticated. And, you will need to have better mechanisms to know that this was actually not a human being writing that to you, but it was actually a machine pretending to be a human being writing something to you. And that you'll have to be more clever about it. >> Oh interesting. >> And so, you will see attacks get more bespoke and we'll have to get smarter and smarter about it. >> The other thing I wanted to ask you before we close is you're right on. I mean you take the top security vendors and they got a single digit market share. And it's like it's untenable for organizations, just far too many tools. We have a partner at ETR, they do quarterly survey research and one of the things they do is survey emerging technology companies. And when we look at in the security sector just the number of emerging technology companies that are focused on cybersecurity is as many as there are out there already. And so, there's got to be consolidation. Maybe that's through M & A. I mean, what do you think happens? Are company's going to go out of business? There's going to be a lot of M & A? You've seen a lot of companies go private. You know, the big PE companies are sucking up all these security companies and may be ready to spit 'em out and go back public. How do you see the landscape? You guys are obviously an inquisitive company. What are your thoughts on that? >> I think there will be a little bit of everything. But the biggest change that you'll see is a shift that's going to happen with an integrated platform, rather than point solution vendors. So what's going to happen is the market's going to consolidate towards very few, less than a half a dozen, integrated platforms. We believe Cisco is going to be one. Microsoft will be one. There'll be others over there. But these, this platform will essentially be able to provide a unified kind of policy engine across a multitude of different services to protect multiple different entities within the organization. And, what we found is that platform will also be something that'll provide, through APIs, the ability for third parties to be able to get their technology incorporated in, and their telemetry ingested. So we certainly intend to do that. We don't believe, we are not arrogant enough to think that every single new innovation will be built by us. When there's someone else who has built that, we want to make sure that we can ingest that telemetry as well, because the real enemy is not the competitor. The real enemy is the adversary. And we all have to get together, so that we can keep humanity safe. >> Do you think there's been enough collaboration in the industry? I mean- >> Jeetu: Not nearly enough. >> We've seen companies, security companies try to monetize private data before, instead of maybe sharing it with competitors. And so I think the industry can do better there. >> Well I think the industry can do better. And we have this concept called the security poverty line. And the security poverty line is the companies that fall below the security poverty line don't have either the influence or the resources or the know how to keep themselves safe. And when they go unsafe, everyone else that communicates with them also gets that exposure. So it is in our collective interest for all of us to make sure that we come together. And, even if Palo Alto might be a competitor of ours, we want to make sure that we invite them to say, let's make sure that we can actually exchange telemetry between our companies. And we'll continue to do that with as many companies that are out there, because actually that's better for the market, that's better for the world. >> The enemy of the enemy is my friend, kind of thing. >> That's right. >> Now, as it relates to, because you're right. I mean I, I see companies coming up, oh, we do IOT security. I'm like, okay, but what about cloud security? Do you that too? Oh no, that's somebody else. But, so that's another stove pipe. >> That's a huge, huge advantage of coming with someone like Cisco. Because we actually have the entire spectrum, and the broadest portfolio in the industry of anyone else. From the user, to the device, to the network, to the applications, we provide the entire end-to-end story for security, which then has the least amount of cracks that you can actually go out and penetrate through. The biggest challenges that happen in security is you've got way too many policy engines with way too much contention between the policies from these different systems. And eventually there's a collision course. Whereas with us, you've actually got a broad portfolio that operates as one platform. >> We were talking about the cloud guys earlier. You mentioned Microsoft. They're obviously a big competitor in the security space. >> Jeetu: But also a great partner. >> So that's right. To my opinion, the cloud has been awesome as a first line of defense if you will. But the shared responsibility model it's different for each cloud, right? So, do you feel that those guys are working together or will work together to actually improve? 'Cause I don't see that yet. >> Yeah so if you think about, this is where we feel like we have a structural advantage in this, because what does a company like Cisco become in the future? I think as the world goes multicloud and hybrid cloud, what'll end up happening is there needs to be a way, today all the CSPs provide everything from storage to computer network, to security, in their own stack. If we can abstract networking and security above them, so that we can acquire and steer any and all traffic with our service providers and steer it to any of those CSPs, and make sure that the security policy transcends those clouds, you would actually be able to have the public cloud economics without the public cloud lock-in. >> That's what we call super cloud Jeetu. It's securing the super cloud. >> Yeah. >> Hey, thanks so much for coming to theCUBE. >> Thank you for having me. >> Really appreciate you coming on our editorial program. >> Such a pleasure. >> All right, great to see you again. >> Cheers. >> All right, keep it right there. Dave Vellante with David Nicholson and Lisa Martin. We'll be back, right after this short break from MWC '23 live, in the Fira, in Barcelona. (bright music resumes) (music fades out)
SUMMARY :
that drive human progress. Chuck Robbins, to meet with Jeetu Patel, meet with Jeetu Patel. interview to do, right? Thank you for having I mean, obviously the And so, but it's the most important topic And actually that's one of the things It's that low. Someone else is going to trump good But, you know, it's funny- the risks to United States are higher. It is, and the scales always It's going now beyond the board level, And everybody's So the simpler you make security, Yeah, and CISOs tell me that they're, And a big part of that is that, 'Cause of the macro. And the whole concept of zero trust Dave: 'Cause things change so not just do it at the time I mentioned the macro before. You know, you guys had great earnings. geeking out with the analyst and so- at the event event with Mercedes? But what's going on with Mercedes? One of the places that people I can do it all the time. I got to concentrate. the picture on and it's not good. But the moment you stop or the headquarters, were underfunded. is the one that's going to kill it. but it's in the way a lot. Okay, so not quite high school age yet. to high school days, because she has because the future is and have the right questions to ask, I mean, just like Amazon I mean, the state of the going to be smarter than folks that are the bad actors, you will see attacks get more bespoke And so, there's got to be consolidation. is the market's going to And so I think the industry or the know how to keep themselves safe. The enemy of the enemy is my friend, Do you that too? and the broadest portfolio in competitor in the security space. But the shared responsibility model and make sure that the security policy It's securing the super cloud. to theCUBE. Really appreciate you coming great to see you again. the Fira, in Barcelona.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Jeetu Patel | PERSON | 0.99+ |
Dave Vellante | PERSON | 0.99+ |
Lisa Martin | PERSON | 0.99+ |
David Nicholson | PERSON | 0.99+ |
Mercedes | ORGANIZATION | 0.99+ |
Cisco | ORGANIZATION | 0.99+ |
Amazon | ORGANIZATION | 0.99+ |
Microsoft | ORGANIZATION | 0.99+ |
Tom Gillis | PERSON | 0.99+ |
Tom | PERSON | 0.99+ |
Dave | PERSON | 0.99+ |
Robert Gates | PERSON | 0.99+ |
50 | QUANTITY | 0.99+ |
Chuck | PERSON | 0.99+ |
90% | QUANTITY | 0.99+ |
Starbucks | ORGANIZATION | 0.99+ |
Chuck Robbins | PERSON | 0.99+ |
51% | QUANTITY | 0.99+ |
ETR | ORGANIZATION | 0.99+ |
One | QUANTITY | 0.99+ |
Barcelona | LOCATION | 0.99+ |
Dell Technologies | ORGANIZATION | 0.99+ |
yesterday | DATE | 0.99+ |
more than 10% | QUANTITY | 0.99+ |
45 minutes | QUANTITY | 0.99+ |
two part | QUANTITY | 0.99+ |
one time | QUANTITY | 0.99+ |
four kids | QUANTITY | 0.99+ |
Jeetu | PERSON | 0.99+ |
five years | QUANTITY | 0.99+ |
less than a half a dozen | QUANTITY | 0.99+ |
first topic | QUANTITY | 0.99+ |
3,500 hundred vendors | QUANTITY | 0.99+ |
2023 | DATE | 0.99+ |
two days a week | QUANTITY | 0.99+ |
70 vendors | QUANTITY | 0.99+ |
first partner | QUANTITY | 0.99+ |
today | DATE | 0.98+ |
five days a week | QUANTITY | 0.98+ |
Ukraine | LOCATION | 0.98+ |
one platform | QUANTITY | 0.98+ |
12 year old | QUANTITY | 0.98+ |
more than 5% | QUANTITY | 0.98+ |
each cloud | QUANTITY | 0.98+ |
MWC '23 | EVENT | 0.98+ |
first line | QUANTITY | 0.98+ |
pandemic | EVENT | 0.97+ |
Chat GPT | TITLE | 0.96+ |
one | QUANTITY | 0.96+ |
last decade | DATE | 0.96+ |
Fira | LOCATION | 0.95+ |
single vendor | QUANTITY | 0.95+ |
Chat GPT | TITLE | 0.92+ |
Webex | ORGANIZATION | 0.92+ |
firstly | QUANTITY | 0.91+ |
70 policy engines | QUANTITY | 0.89+ |
zero trust | QUANTITY | 0.87+ |
couple vendors | QUANTITY | 0.86+ |
Alto | LOCATION | 0.86+ |
United States | LOCATION | 0.84+ |
theCUBE | ORGANIZATION | 0.82+ |
single time | QUANTITY | 0.82+ |
M & A. | ORGANIZATION | 0.82+ |
cloud | ORGANIZATION | 0.8+ |
Srinivas Mukkamala & David Shepherd | Ivanti
(gentle music) >> Announcer: "theCube's" live coverage is made possible by funding from Dell Technologies, creating technologies that drive human progress. (upbeat music) (logo whooshing) >> Hey, everyone, welcome back to "theCube's" coverage of day one, MWC23 live from Barcelona, Lisa Martin here with Dave Vellante. Dave, we've got some great conversations so far This is the biggest, most packed show I've been to in years. About 80,000 people here so far. >> Yeah, down from its peak of 108, but still pretty good. You know, a lot of folks from China come to this show, but with the COVID situation in China, that's impacted the attendance, but still quite amazing. >> Amazing for sure. We're going to be talking about trends and mobility, and all sorts of great things. We have a couple of guests joining us for the first time on "theCUBE." Please welcome Dr. Srinivas Mukkamala or Sri, chief product officer at Ivanti. And Dave Shepherd, VP Ivanti. Guys, welcome to "theCUBE." Great to have you here. >> Thank you. >> So, day one of the conference, Sri, we'll go to you first. Talk about some of the trends that you're seeing in mobility. Obviously, the conference renamed from Mobile World Congress to MWC mobility being part of it, but what are some of the big trends? >> It's interesting, right? I mean, I was catching up with Dave. The first thing is from the keynotes, it took 45 minutes to talk about security. I mean, it's quite interesting when you look at the shore floor. We're talking about Edge, we're talking about 5G, the whole evolution. And there's also the concept of are we going into the Cloud? Are we coming back from the Cloud, back to the Edge? They're really two different things. Edge is all decentralized while you recompute. And one thing I observed here is they're talking about near real-time reality. When you look at automobiles, when you look at medical, when you look at robotics, you can't have things processed in the Cloud. It'll be too late. Because you got to make millisecond-based stations. That's a big trend for me. When I look at staff... Okay, the compute it takes to process in the Cloud versus what needs to happen on-prem, on device, is going to revolutionize the way we think about mobility. >> Revolutionize. David, what are some of the things that you're saying? Do you concur? >> Yeah, 100%. I mean, look, just reading some of the press recently, they're predicting 22 billion IoT devices by 2024. Everything Sri just talked about there. It's growing exponentially. You know, problems we have today are a snapshot. We're probably in the slowest place we are today. Everything's just going to get faster and faster and faster. So it's a, yeah, 100% concur with that. >> You know, Sri, on your point, so Jose Maria Alvarez, the CEO of Telefonica, said there are three pillars of the future of telco, low latency, programmable networks, and Cloud and Edge. So, as to your point, Cloud and low latency haven't gone hand in hand. But the Cloud guys are saying, "All right, we're going to bring the Cloud to the Edge." That's sort of an interesting dynamic. We're going to bypass them. We heard somebody, another speaker say, "You know, Cloud can't do it alone." You know? (chuckles) And so, it's like these worlds need each other in a way, don't they? >> Definitely right. So that's a fantastic way to look at it. The Cloud guys can say, "We're going to come closer to where the computer is." And if you really take a look at it with data localization, where are we going to put the Cloud in, right? I mean, so the data sovereignty becomes a very interesting thing. The localization becomes a very interesting thing. And when it comes to security, it gets completely different. I mean, we talked about moving everything to a centralized compute, really have massive processing, and give you the addition back wherever you are. Whereas when you're localized, I have to process everything within the local environment. So there's already a conflict right there. How are we going to address that? >> Yeah. So another statement, I think, it was the CEO of Ericsson, he was kind of talking about how the OTT guys have heard, "We can't let that happen again. And we're going to find new ways to charge for the network." Basically, he's talking about monetizing the API access. But I'm interested in what you're hearing from customers, right? 'Cause our mindset is, what value you're going to give to customers that they're going to pay for, versus, "I got this data I'm going to charge developers for." But what are you hearing from customers? >> It's amazing, Dave, the way you're looking at it, right? So if we take a look at what we were used to perpetual, and we said we're going to move to a subscription, right? I mean, everybody talks about subscription economy. Telcos on the other hand, had subscription economy for a long time, right? They were always based on usage, right? It's a usage economy. But today, we are basically realizing on compute. We haven't even started charging for compute. If you go to AWS, go to Azure, go to GCP, they still don't quite charge you for actual compute, right? It's kind of, they're still leaning on it. So think about API-based, we're going to break the bank. What people don't realize is, we do millions of API calls for any high transaction environment. A consumer can't afford that. What people don't realize is... I don't know how you're going to monetize. Even if you charge a cent a call, that is still going to be hundreds and thousands of dollars a day. And that's where, if you look at what you call low-code no-code motion? You see a plethora of companies being built on that. They're saying, "Hey, you don't have to write code. I'll give you authentication as a service. What that means is, Every single time you call my API to authenticate a user, I'm going to charge you." So just imagine how many times we authenticate on a single day. You're talking a few dozen times. And if I have to pay every single time I authenticate... >> Real friction in the marketplace, David. >> Yeah, and I tell you what. It's a big topic, right? And it's a topic that we haven't had to deal with at the Edge before, and we hear it probably daily really, complexity. The complexity's growing all the time. That means that we need to start to get insight, visibility. You know? I think a part of... Something that came out of the EU actually this week, stated, you know, there's a cyber attack every 11 seconds. That's fast, right? 2016, that was 40 seconds. So actually that speed I talked about earlier, everything Sri says that's coming down to the Edge, we want to embrace the Edge and that is the way we're going to move. But customers are mindful of the complexity that's involved in that. And that, you know, lens thought to how are we going to deal with those complexities. >> I was just going to ask you, how are you planning to deal with those complexities? You mentioned one ransomware attack every 11 seconds. That's down considerably from just a few years ago. Ransomware is a household word. It's no longer, "Are we going to get attacked?" It's when, it's to what extent, it's how much. So how is Ivanti helping customers deal with some of the complexities, and the changes in the security landscape? >> Yeah. Shall I start on that one first? Yeah, look, we want to give all our customers and perspective customers full visibility of their environment. You know, devices that are attached to the environment. Where are they? What are they doing? How often are we going to look for those devices? Not only when we find those devices. What applications are they running? Are those applications secure? How are we going to manage those applications moving forward? And overall, wrapping it round, what kind of service are we going to do? What processes are we going to put in place? To Sri's point, the low-code no-code angle. How do we build processes that protect our organization? But probably a point where I'll pass to Sri in a moment is how do we add a level of automation to that? How do we add a level of intelligence that doesn't always require a human to be fixing or remediating a problem? >> To Sri, you mentioned... You're right, the keynote, it took 45 minutes before it even mentioned security. And I suppose it's because they've historically, had this hardened stack. Everything's controlled and it's a safe environment. And now that's changing. So what would you add? >> You know, great point, right? If you look at telcos, they're used to a perimeter-based network. >> Yep. >> I mean, that's what we are. Boxed, we knew our perimeter. Today, our perimeter is extended to our home, everywhere work, right? >> Yeah- >> We don't have a definition of a perimeter. Your browser is the new perimeter. And a good example, segueing to that, what we have seen is horizontal-based security. What we haven't seen is verticalization, especially in mobile. We haven't seen vertical mobile security solutions, right? Yes, you hear a little bit about automobile, you hear a little bit about healthcare, but what we haven't seen is, what about food sector? What about the frontline in food? What about supply chain? What security are we really doing? And I'll give you a simple example. You brought up ransomware. Last night, Dole was attacked with ransomware. We have seen the beef producer colonial pipeline. Now, if we have seen agritech being hit, what does it mean? We are starting to hit humanity. If you can't really put food on the table, you're starting to really disrupt the supply chain, right? In a massive way. So you got to start thinking about that. Why is Dole related to mobility? Think about that. They don't carry service and computers. What they carry is mobile devices. that's where the supply chain works. And then that's where you have to start thinking about it. And the evolution of ransomware, rather than a single-trick pony, you see them using multiple vulnerabilities. And Pegasus was the best example. Spyware across all politicians, right? And CEOs. It is six or seven vulnerabilities put together that actually was constructed to do an attack. >> Yeah. How does AI kind of change this? Where does it fit in? The attackers are going to have AI, but we could use AI to defend. But attackers are always ahead, right? (chuckles) So what's your... Do you have a point of view on that? 'Cause everybody's crazy about ChatGPT, right? The banks have all banned it. Certain universities in the United States have banned it. Another one's forcing his students to learn how to use ChatGPT to prompt it. It's all over the place. You have a point of view on this? >> So definitely, Dave, it's a great point. First, we all have to have our own generative AI. I mean, I look at it as your digital assistant, right? So when you had calculators, you can't function without a calculator today. It's not harmful. It's not going to take you away from doing multiplication, right? So we'll still teach arithmetic in school. You'll still use your calculator. So to me, AI will become an integral part. That's one beautiful thing I've seen on the short floor. Every little thing there is a AI-based solution I've seen, right? So ChatGPT is well played from multiple perspective. I would rather up level it and say, generated AI is the way to go. So there are three things. There is human intense triaging, where humans keep doing easy work, minimal work. You can use ML and AI to do that. There is human designing that you need to do. That's when you need to use AI. >> But, I would say this, in the Enterprise, that the quality of the AI has to be better than what we've seen so far out of ChatGPT, even though I love ChatGPT, it's amazing. But what we've seen from being... It's got to be... Is it true that... Don't you think it has to be cleaner, more accurate? It can't make up stuff. If I'm going to be automating my network with AI. >> I'll answer that question. It comes down to three fundamentals. The reason ChatGPT is giving addresses, it's not trained on the latest data. So for any AI and ML method, you got to look at three things. It's your data, it's your domain expertise, who is training it, and your data model. In ChatGPT, it's older data, it's biased to the people that trained it, right? >> Mm-hmm. >> And then, the data model is it's going to spit out what it's trained on. That's a precursor of any GPT, right? It's pre-trained transformation. >> So if we narrow that, right? Train it better for the specific use case, that AI has huge potential. >> You flip that to what the Enterprise customers talk about to us is, insight is invaluable. >> Right. >> But then too much insight too quickly all the time means we go remediation crazy. So we haven't got enough humans to be fixing all the problems. Sri's point with the ChatGPT data, some of that data we are looking at there could be old. So we're trying to triage something that may still be an issue, but it might have been superseded by something else as well. So that's my overriding when I'm talking to customers and we talk ChatGPT, it's in the news all the time. It's very topical. >> It's fun. >> It is. I even said to my 13-year-old son yesterday, your homework's out a date. 'Cause I knew he was doing some summary stuff on ChatGPT. So a little wind up that's out of date just to make that emphasis around the model. And that's where we, with our Neurons platform Ivanti, that's what we want to give the customers all the time, which is the real-time snapshot. So they can make a priority or a decision based on what that information is telling them. >> And we've kind of learned, I think, over the last couple of years, that access to real-time data, real-time AI, is no longer nice to have. It's a massive competitive advantage for organizations, but it's going to enable the on-demand, everything that we expect in our consumer lives, in our business lives. This is going to be table stakes for organizations, I think, in every industry going forward. >> Yeah. >> But assumes 5G, right? Is going to actually happen and somebody's going to- >> Going to absolutely. >> Somebody's going to make some money off it at some point. When are they going to make money off of 5G, do you think? (all laughing) >> No. And then you asked a very good question, Dave. I want to answer that question. Will bad guys use AI? >> Yeah. Yeah. >> Offensive AI is a very big thing. We have to pay attention to it. It's got to create an asymmetric war. If you look at the president of the United States, he said, "If somebody's going to attack us on cyber, we are going to retaliate." For the first time, US is willing to launch a cyber war. What that really means is, we're going to use AI for offensive reasons as well. And we as citizens have to pay attention to that. And that's where I'm worried about, right? AI bias, whether it's data, or domain expertise, or algorithmic bias, is going to be a big thing. And offensive AI is something everybody have to pay attention to. >> To your point, Sri, earlier about critical infrastructure getting hacked, I had this conversation with Dr. Robert Gates several years ago, and I said, "Yeah, but don't we have the best offensive, you know, technology in cyber?" And he said, "Yeah, but we got the most to lose too." >> Yeah, 100%. >> We're the wealthiest nation of the United States. The wealthiest is. So you got to be careful. But to your point, the president of the United States saying, "We'll retaliate," right? Not necessarily start the war, but who started it? >> But that's the thing, right? Attribution is the hardest part. And then you talked about a very interesting thing, rich nations, right? There's emerging nations. There are nations left behind. One thing I've seen on the show floor today is, digital inequality. Digital poverty is a big thing. While we have this amazing technology, 90% of the world doesn't have access to this. >> Right. >> What we have done is we have created an inequality across, and especially in mobility and cyber, if this technology doesn't reach to the last mile, which is emerging nations, I think we are creating a crater back again and putting societies a few miles back. >> And at much greater risk. >> 100%, right? >> Yeah. >> Because those are the guys. In cyber, all you need is a laptop and a brain to attack. >> Yeah. Yeah. >> If I don't have it, that's where the civil war is going to start again. >> Yeah. What are some of the things in our last minute or so, guys, David, we'll start with you and then Sri go to you, that you're looking forward to at this MWC? The theme is velocity. We're talking about so much transformation and evolution in the telecom industry. What are you excited to hear and learn in the next couple of days? >> Just getting a complete picture. One is actually being out after the last couple of years, so you learn a lot. But just walking around and seeing, from my perspective, some vendor names that I haven't seen before, but seeing what they're doing and bringing to the market. But I think goes back to the point made earlier around APIs and integration. Everybody's talking about how can we kind of do this together in a way. So integrations, those smart things is what I'm kind of looking for as well, and how we plug into that as well. >> Excellent, and Sri? >> So for us, there is a lot to offer, right? So while I'm enjoying what I'm seeing here, I'm seeing at an opportunity. We have an amazing portfolio of what we can do. We are into mobile device management. We are the last (indistinct) company. When people find problems, somebody has to go remediators. We are the world's largest patch management company. And what I'm finding is, yes, all these people are embedding software, pumping it like nobody's business. As you find one ability, somebody has to go fix them, and we want to be the (indistinct) company. We had the last smile. And I find an amazing opportunity, not only we can do device management, but do mobile threat defense and give them a risk prioritization on what needs to be remediated, and manage all that in our ITSM. So I look at this as an amazing, amazing opportunity. >> Right. >> Which is exponential than what I've seen before. >> So last question then. Speaking of opportunities, Sri, for you, what are some of the things that customers can go to? Obviously, you guys talk to customers all the time. In terms of learning what Ivanti is going to enable them to do, to take advantage of these opportunities. Any webinars, any events coming up that we want people to know about? >> Absolutely, ivanti.com is the best place to go because we keep everything there. Of course, "theCUBE" interview. >> Of course. >> You should definitely watch that. (all laughing) No. So we have quite a few industry events we do. And especially there's a lot of learning. And we just raised the ransomware report that actually talks about ransomware from a global index perspective. So one thing what we have done is, rather than just looking at vulnerabilities, we showed them the weaknesses that led to the vulnerabilities, and how attackers are using them. And we even talked about DHS, how behind they are in disseminating the information and how it's actually being used by nation states. >> Wow. >> And we did cover mobility as a part of that as well. So there's a quite a bit we did in our report and it actually came out very well. >> I have to check that out. Ransomware is such a fascinating topic. Guys, thank you so much for joining Dave and me on the program today, sharing what's going on at Ivanti, the changes that you're seeing in mobile, and the opportunities that are there for your customers. We appreciate your time. >> Thank you >> Thank you. >> Yes. Thanks, guys. >> Thanks, guys. >> For our guests and for Dave Vellante, I'm Lisa Martin. You're watching "theCUBE" live from MWC23 in Barcelona. As you know, "theCUBE" is the leader in live tech coverage. Dave and I will be right back with our next guest. (gentle upbeat music)
SUMMARY :
that drive human progress. This is the biggest, most packed from China come to this show, Great to have you here. Talk about some of the trends is going to revolutionize the Do you concur? Everything's just going to get bring the Cloud to the Edge." I have to process everything that they're going to pay for, And if I have to pay every the marketplace, David. to how are we going to deal going to get attacked?" of automation to that? So what would you add? If you look at telcos, extended to our home, And a good example, segueing to that, The attackers are going to have AI, It's not going to take you away the AI has to be better it's biased to the people the data model is it's going to So if we narrow that, right? You flip that to what to be fixing all the problems. I even said to my This is going to be table stakes When are they going to make No. And then you asked We have to pay attention to it. got the most to lose too." But to your point, have access to this. reach to the last mile, laptop and a brain to attack. is going to start again. What are some of the things in But I think goes back to a lot to offer, right? than what I've seen before. to customers all the time. is the best place to go that led to the vulnerabilities, And we did cover mobility I have to check that out. As you know, "theCUBE" is the
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Lisa Martin | PERSON | 0.99+ |
Dave Vellante | PERSON | 0.99+ |
David | PERSON | 0.99+ |
Dave Vellante | PERSON | 0.99+ |
Dave | PERSON | 0.99+ |
Dave Shepherd | PERSON | 0.99+ |
Jose Maria Alvarez | PERSON | 0.99+ |
Ericsson | ORGANIZATION | 0.99+ |
David Shepherd | PERSON | 0.99+ |
six | QUANTITY | 0.99+ |
Telefonica | ORGANIZATION | 0.99+ |
Srinivas Mukkamala | PERSON | 0.99+ |
40 seconds | QUANTITY | 0.99+ |
China | LOCATION | 0.99+ |
45 minutes | QUANTITY | 0.99+ |
100% | QUANTITY | 0.99+ |
2024 | DATE | 0.99+ |
United States | LOCATION | 0.99+ |
2016 | DATE | 0.99+ |
90% | QUANTITY | 0.99+ |
ChatGPT | TITLE | 0.99+ |
Robert Gates | PERSON | 0.99+ |
First | QUANTITY | 0.99+ |
AWS | ORGANIZATION | 0.99+ |
Sri | ORGANIZATION | 0.99+ |
Barcelona | LOCATION | 0.99+ |
today | DATE | 0.99+ |
yesterday | DATE | 0.99+ |
millions | QUANTITY | 0.99+ |
this week | DATE | 0.99+ |
Dell Technologies | ORGANIZATION | 0.99+ |
Telcos | ORGANIZATION | 0.99+ |
US | ORGANIZATION | 0.99+ |
Last night | DATE | 0.98+ |
Today | DATE | 0.98+ |
Sri | PERSON | 0.98+ |
Mobile World Congress | EVENT | 0.98+ |
one | QUANTITY | 0.98+ |
Edge | ORGANIZATION | 0.98+ |
three things | QUANTITY | 0.98+ |
first time | QUANTITY | 0.98+ |
Dr. | PERSON | 0.98+ |
108 | QUANTITY | 0.98+ |
telco | ORGANIZATION | 0.98+ |
several years ago | DATE | 0.97+ |
first | QUANTITY | 0.97+ |
MWC | EVENT | 0.96+ |
hundreds and thousands of dollars a day | QUANTITY | 0.96+ |
MWC23 | EVENT | 0.96+ |
About 80,000 people | QUANTITY | 0.95+ |
one thing | QUANTITY | 0.95+ |
13-year-old | QUANTITY | 0.95+ |
theCUBE | TITLE | 0.95+ |
theCUBE | ORGANIZATION | 0.95+ |
two different things | QUANTITY | 0.94+ |
day one | QUANTITY | 0.93+ |
Ivanti | PERSON | 0.92+ |
seven vulnerabilities | QUANTITY | 0.91+ |
VP | PERSON | 0.91+ |
president | PERSON | 0.9+ |
three pillars | QUANTITY | 0.89+ |
first thing | QUANTITY | 0.89+ |
Horizon3.ai Signal | Horizon3.ai Partner Program Expands Internationally
hello I'm John Furrier with thecube and welcome to this special presentation of the cube and Horizon 3.ai they're announcing a global partner first approach expanding their successful pen testing product Net Zero you're going to hear from leading experts in their staff their CEO positioning themselves for a successful Channel distribution expansion internationally in Europe Middle East Africa and Asia Pacific in this Cube special presentation you'll hear about the expansion the expanse partner program giving Partners a unique opportunity to offer Net Zero to their customers Innovation and Pen testing is going International with Horizon 3.ai enjoy the program [Music] welcome back everyone to the cube and Horizon 3.ai special presentation I'm John Furrier host of thecube we're here with Jennifer Lee head of Channel sales at Horizon 3.ai Jennifer welcome to the cube thanks for coming on great well thank you for having me so big news around Horizon 3.aa driving Channel first commitment you guys are expanding the channel partner program to include all kinds of new rewards incentives training programs help educate you know Partners really drive more recurring Revenue certainly cloud and Cloud scale has done that you got a great product that fits into that kind of Channel model great Services you can wrap around it good stuff so let's get into it what are you guys doing what are what are you guys doing with this news why is this so important yeah for sure so um yeah we like you said we recently expanded our Channel partner program um the driving force behind it was really just um to align our like you said our Channel first commitment um and creating awareness around the importance of our partner ecosystems um so that's it's really how we go to market is is through the channel and a great International Focus I've talked with the CEO so you know about the solution and he broke down all the action on why it's important on the product side but why now on the go to market change what's the what's the why behind this big this news on the channel yeah for sure so um we are doing this now really to align our business strategy which is built on the concept of enabling our partners to create a high value high margin business on top of our platform and so um we offer a solution called node zero it provides autonomous pen testing as a service and it allows organizations to continuously verify their security posture um so we our company vision we have this tagline that states that our pen testing enables organizations to see themselves Through The Eyes of an attacker and um we use the like the attacker's perspective to identify exploitable weaknesses and vulnerabilities so we created this partner program from a perspective of the partner so the partner's perspective and we've built It Through The Eyes of our partner right so we're prioritizing really what the partner is looking for and uh will ensure like Mutual success for us yeah the partners always want to get in front of the customers and bring new stuff to them pen tests have traditionally been really expensive uh and so bringing it down in one to a service level that's one affordable and has flexibility to it allows a lot of capability so I imagine people getting excited by it so I have to ask you about the program What specifically are you guys doing can you share any details around what it means for the partners what they get what's in it for them can you just break down some of the mechanics and mechanisms or or details yeah yep um you know we're really looking to create business alignment um and like I said establish Mutual success with our partners so we've got two um two key elements that we were really focused on um that we bring to the partners so the opportunity the profit margin expansion is one of them and um a way for our partners to really differentiate themselves and stay relevant in the market so um we've restructured our discount model really um you know highlighting profitability and maximizing profitability and uh this includes our deal registration we've we've created deal registration program we've increased discount for partners who take part in our partner certification uh trainings and we've we have some other partner incentives uh that we we've created that that's going to help out there we've we put this all so we've recently Gone live with our partner portal um it's a Consolidated experience for our partners where they can access our our sales tools and we really view our partners as an extension of our sales and Technical teams and so we've extended all of our our training material that we use internally we've made it available to our partners through our partner portal um we've um I'm trying I'm thinking now back what else is in that partner portal here we've got our partner certification information so all the content that's delivered during that training can be found in the portal we've got deal registration uh um co-branded marketing materials pipeline management and so um this this portal gives our partners a One-Stop place to to go to find all that information um and then just really quickly on the second part of that that I mentioned is our technology really is um really disruptive to the market so you know like you said autonomous pen testing it's um it's still it's well it's still still relatively new topic uh for security practitioners and um it's proven to be really disruptive so um that on top of um just well recently we found an article that um that mentioned by markets and markets that reports that the global pen testing markets really expanding and so it's expected to grow to like 2.7 billion um by 2027. so the Market's there right the Market's expanding it's growing and so for our partners it's just really allows them to grow their revenue um across their customer base expand their customer base and offering this High profit margin while you know getting in early to Market on this just disruptive technology big Market a lot of opportunities to make some money people love to put more margin on on those deals especially when you can bring a great solution that everyone knows is hard to do so I think that's going to provide a lot of value is there is there a type of partner that you guys see emerging or you aligning with you mentioned the alignment with the partners I can see how that the training and the incentives are all there sounds like it's all going well is there a type of partner that's resonating the most or is there categories of partners that can take advantage of this yeah absolutely so we work with all different kinds of Partners we work with our traditional resale Partners um we've worked we're working with systems integrators we have a really strong MSP mssp program um we've got Consulting partners and the Consulting Partners especially with the ones that offer pen test services so we they use us as a as we act as a force multiplier just really offering them profit margin expansion um opportunity there we've got some technology partner partners that we really work with for co-cell opportunities and then we've got our Cloud Partners um you'd mentioned that earlier and so we are in AWS Marketplace so our ccpo partners we're part of the ISP accelerate program um so we we're doing a lot there with our Cloud partners and um of course we uh we go to market with uh distribution Partners as well gotta love the opportunity for more margin expansion every kind of partner wants to put more gross profit on their deals is there a certification involved I have to ask is there like do you get do people get certified or is it just you get trained is it self-paced training is it in person how are you guys doing the whole training certification thing because is that is that a requirement yeah absolutely so we do offer a certification program and um it's been very popular this includes a a seller's portion and an operator portion and and so um this is at no cost to our partners and um we operate both virtually it's it's law it's virtually but live it's not self-paced and we also have in person um you know sessions as well and we also can customize these to any partners that have a large group of people and we can just we can do one in person or virtual just specifically for that partner well any kind of incentive opportunities and marketing opportunities everyone loves to get the uh get the deals just kind of rolling in leads from what we can see if our early reporting this looks like a hot product price wise service level wise what incentive do you guys thinking about and and Joint marketing you mentioned co-sell earlier in pipeline so I was kind of kind of honing in on that piece sure and yes and then to follow along with our partner certification program we do incentivize our partners there if they have a certain number certified their discount increases so that's part of it we have our deal registration program that increases discount as well um and then we do have some um some partner incentives that are wrapped around meeting setting and um moving moving opportunities along to uh proof of value gotta love the education driving value I have to ask you so you've been around the industry you've seen the channel relationships out there you're seeing companies old school new school you know uh Horizon 3.ai is kind of like that new school very cloud specific a lot of Leverage with we mentioned AWS and all the clouds um why is the company so hot right now why did you join them and what's why are people attracted to this company what's the what's the attraction what's the vibe what do you what do you see and what what do you use what did you see in in this company well this is just you know like I said it's very disruptive um it's really in high demand right now and um and and just because because it's new to Market and uh a newer technology so we are we can collaborate with a manual pen tester um we can you know we can allow our customers to run their pen test um with with no specialty teams and um and and then so we and like you know like I said we can allow our partners can actually build businesses profitable businesses so we can they can use our product to increase their services revenue and um and build their business model you know around around our services what's interesting about the pen test thing is that it's very expensive and time consuming the people who do them are very talented people that could be working on really bigger things in the in absolutely customers so bringing this into the channel allows them if you look at the price Delta between a pen test and then what you guys are offering I mean that's a huge margin Gap between street price of say today's pen test and what you guys offer when you show people that they follow do they say too good to be true I mean what are some of the things that people say when you kind of show them that are they like scratch their head like come on what's the what's the catch here right so the cost savings is a huge is huge for us um and then also you know like I said working as a force multiplier with a pen testing company that offers the services and so they can they can do their their annual manual pen tests that may be required around compliance regulations and then we can we can act as the continuous verification of their security um um you know that that they can run um weekly and so it's just um you know it's just an addition to to what they're offering already and an expansion so Jennifer thanks for coming on thecube really appreciate you uh coming on sharing the insights on the channel uh what's next what can we expect from the channel group what are you thinking what's going on right so we're really looking to expand our our Channel um footprint and um very strategically uh we've got um we've got some big plans um for for Horizon 3.ai awesome well thanks for coming on really appreciate it you're watching thecube the leader in high tech Enterprise coverage [Music] [Music] hello and welcome to the Cube's special presentation with Horizon 3.ai with Raina Richter vice president of emea Europe Middle East and Africa and Asia Pacific APAC for Horizon 3 today welcome to this special Cube presentation thanks for joining us thank you for the invitation so Horizon 3 a guy driving Global expansion big international news with a partner first approach you guys are expanding internationally let's get into it you guys are driving this new expanse partner program to new heights tell us about it what are you seeing in the momentum why the expansion what's all the news about well I would say uh yeah in in international we have I would say a similar similar situation like in the US um there is a global shortage of well-educated penetration testers on the one hand side on the other side um we have a raising demand of uh network and infrastructure security and with our approach of an uh autonomous penetration testing I I believe we are totally on top of the game um especially as we have also now uh starting with an international instance that means for example if a customer in Europe is using uh our service node zero he will be connected to a node zero instance which is located inside the European Union and therefore he has doesn't have to worry about the conflict between the European the gdpr regulations versus the US Cloud act and I would say there we have a total good package for our partners that they can provide differentiators to their customers you know we've had great conversations here on thecube with the CEO and the founder of the company around the leverage of the cloud and how successful that's been for the company and honestly I can just Connect the Dots here but I'd like you to weigh in more on how that translates into the go to market here because you got great Cloud scale with with the security product you guys are having success with great leverage there I've seen a lot of success there what's the momentum on the channel partner program internationally why is it so important to you is it just the regional segmentation is it the economics why the momentum well there are it's there are multiple issues first of all there is a raising demand in penetration testing um and don't forget that uh in international we have a much higher level in number a number or percentage in SMB and mid-market customers so these customers typically most of them even didn't have a pen test done once a year so for them pen testing was just too expensive now with our offering together with our partners we can provide different uh ways how customers could get an autonomous pen testing done more than once a year with even lower costs than they had with with a traditional manual paint test so and that is because we have our uh Consulting plus package which is for typically pain testers they can go out and can do a much faster much quicker and their pain test at many customers once in after each other so they can do more pain tests on a lower more attractive price on the other side there are others what even the same ones who are providing um node zero as an mssp service so they can go after s p customers saying okay well you only have a couple of hundred uh IP addresses no worries we have the perfect package for you and then you have let's say the mid Market let's say the thousands and more employees then they might even have an annual subscription very traditional but for all of them it's all the same the customer or the service provider doesn't need a piece of Hardware they only need to install a small piece of a Docker container and that's it and that makes it so so smooth to go in and say okay Mr customer we just put in this this virtual attacker into your network and that's it and and all the rest is done and within within three clicks they are they can act like a pen tester with 20 years of experience and that's going to be very Channel friendly and partner friendly I can almost imagine so I have to ask you and thank you for calling the break calling out that breakdown and and segmentation that was good that was very helpful for me to understand but I want to follow up if you don't mind um what type of partners are you seeing the most traction with and why well I would say at the beginning typically you have the the innovators the early adapters typically Boutique size of Partners they start because they they are always looking for Innovation and those are the ones you they start in the beginning so we have a wide range of Partners having mostly even um managed by the owner of the company so uh they immediately understand okay there is the value and they can change their offering they're changing their offering in terms of penetration testing because they can do more pen tests and they can then add other ones or we have those ones who offer 10 tests services but they did not have their own pen testers so they had to go out on the open market and Source paint testing experts um to get the pen test at a particular customer done and now with node zero they're totally independent they can't go out and say okay Mr customer here's the here's the service that's it we turn it on and within an hour you're up and running totally yeah and those pen tests are usually expensive and hard to do now it's right in line with the sales delivery pretty interesting for a partner absolutely but on the other hand side we are not killing the pain testers business we do something we're providing with no tiers I would call something like the foundation work the foundational work of having an an ongoing penetration testing of the infrastructure the operating system and the pen testers by themselves they can concentrate in the future on things like application pen testing for example so those Services which we we're not touching so we're not killing the paint tester Market we're just taking away the ongoing um let's say foundation work call it that way yeah yeah that was one of my questions I was going to ask is there's a lot of interest in this autonomous pen testing one because it's expensive to do because those skills are required are in need and they're expensive so you kind of cover the entry level and the blockers that are in there I've seen people say to me this pen test becomes a blocker for getting things done so there's been a lot of interest in the autonomous pen testing and for organizations to have that posture and it's an overseas issue too because now you have that that ongoing thing so can you explain that particular benefit for an organization to have that continuously verifying an organization's posture yep certainly so I would say um typically you are you you have to do your patches you have to bring in new versions of operating systems of different Services of uh um operating systems of some components and and they are always bringing new vulnerabilities the difference here is that with node zero we are telling the customer or the partner package we're telling them which are the executable vulnerabilities because previously they might have had um a vulnerability scanner so this vulnerability scanner brought up hundreds or even thousands of cves but didn't say anything about which of them are vulnerable really executable and then you need an expert digging in one cve after the other finding out is it is it really executable yes or no and that is where you need highly paid experts which we have a shortage so with notes here now we can say okay we tell you exactly which ones are the ones you should work on because those are the ones which are executable we rank them accordingly to the risk level how easily they can be used and by a sudden and then the good thing is convert it or indifference to the traditional penetration test they don't have to wait for a year for the next pain test to find out if the fixing was effective they weren't just the next scan and say Yes closed vulnerability is gone the time is really valuable and if you're doing any devops Cloud native you're always pushing new things so pen test ongoing pen testing is actually a benefit just in general as a kind of hygiene so really really interesting solution really bring that global scale is going to be a new new coverage area for us for sure I have to ask you if you don't mind answering what particular region are you focused on or plan to Target for this next phase of growth well at this moment we are concentrating on the countries inside the European Union Plus the United Kingdom um but we are and they are of course logically I'm based into Frankfurt area that means we cover more or less the countries just around so it's like the total dark region Germany Switzerland Austria plus the Netherlands but we also already have Partners in the nordics like in Finland or in Sweden um so it's it's it it's rapidly we have Partners already in the UK and it's rapidly growing so I'm for example we are now starting with some activities in Singapore um um and also in the in the Middle East area um very important we uh depending on let's say the the way how to do business currently we try to concentrate on those countries where we can have um let's say um at least English as an accepted business language great is there any particular region you're having the most success with right now is it sounds like European Union's um kind of first wave what's them yes that's the first definitely that's the first wave and now we're also getting the uh the European instance up and running it's clearly our commitment also to the market saying okay we know there are certain dedicated uh requirements and we take care of this and and we're just launching it we're building up this one uh the instance um in the AWS uh service center here in Frankfurt also with some dedicated Hardware internet in a data center in Frankfurt where we have with the date six by the way uh the highest internet interconnection bandwidth on the planet so we have very short latency to wherever you are on on the globe that's a great that's a great call outfit benefit too I was going to ask that what are some of the benefits your partners are seeing in emea and Asia Pacific well I would say um the the benefits is for them it's clearly they can they can uh talk with customers and can offer customers penetration testing which they before and even didn't think about because it penetrates penetration testing in a traditional way was simply too expensive for them too complex the preparation time was too long um they didn't have even have the capacity uh to um to support a pain an external pain tester now with this service you can go in and say even if they Mr customer we can do a test with you in a couple of minutes within we have installed the docker container within 10 minutes we have the pen test started that's it and then we just wait and and I would say that is we'll we are we are seeing so many aha moments then now because on the partner side when they see node zero the first time working it's like this wow that is great and then they work out to customers and and show it to their typically at the beginning mostly the friendly customers like wow that's great I need that and and I would say um the feedback from the partners is that is a service where I do not have to evangelize the customer everybody understands penetration testing I don't have to say describe what it is they understand the customer understanding immediately yes penetration testing good about that I know I should do it but uh too complex too expensive now with the name is for example as an mssp service provided from one of our partners but it's getting easy yeah it's great and it's great great benefit there I mean I gotta say I'm a huge fan of what you guys are doing I like this continuous automation that's a major benefit to anyone doing devops or any kind of modern application development this is just a godsend for them this is really good and like you said the pen testers that are doing it they were kind of coming down from their expertise to kind of do things that should have been automated they get to focus on the bigger ticket items that's a really big point so we free them we free the pain testers for the higher level elements of the penetration testing segment and that is typically the application testing which is currently far away from being automated yeah and that's where the most critical workloads are and I think this is the nice balance congratulations on the international expansion of the program and thanks for coming on this special presentation really I really appreciate it thank you you're welcome okay this is thecube special presentation you know check out pen test automation International expansion Horizon 3 dot AI uh really Innovative solution in our next segment Chris Hill sector head for strategic accounts will discuss the power of Horizon 3.ai and Splunk in action you're watching the cube the leader in high tech Enterprise coverage foreign [Music] [Music] welcome back everyone to the cube and Horizon 3.ai special presentation I'm John Furrier host of thecube we're with Chris Hill sector head for strategic accounts and federal at Horizon 3.ai a great Innovative company Chris great to see you thanks for coming on thecube yeah like I said uh you know great to meet you John long time listener first time caller so excited to be here with you guys yeah we were talking before camera you had Splunk back in 2013 and I think 2012 was our first splunk.com and boy man you know talk about being in the right place at the right time now we're at another inflection point and Splunk continues to be relevant um and continuing to have that data driving Security in that interplay and your CEO former CTO of his plug as well at Horizon who's been on before really Innovative product you guys have but you know yeah don't wait for a breach to find out if you're logging the right data this is the topic of this thread Splunk is very much part of this new international expansion announcement uh with you guys tell us what are some of the challenges that you see where this is relevant for the Splunk and Horizon AI as you guys expand uh node zero out internationally yeah well so across so you know my role uh within Splunk it was uh working with our most strategic accounts and so I looked back to 2013 and I think about the sales process like working with with our small customers you know it was um it was still very siled back then like I was selling to an I.T team that was either using this for it operations um we generally would always even say yeah although we do security we weren't really designed for it we're a log management tool and we I'm sure you remember back then John we were like sort of stepping into the security space and and the public sector domain that I was in you know security was 70 of what we did when I look back to sort of uh the transformation that I was witnessing in that digital transformation um you know when I look at like 2019 to today you look at how uh the IT team and the security teams are being have been forced to break down those barriers that they used to sort of be silent away would not commute communicate one you know the security guys would be like oh this is my box I.T you're not allowed in today you can't get away with that and I think that the value that we bring to you know and of course Splunk has been a huge leader in that space and continues to do Innovation across the board but I think what we've we're seeing in the space and I was talking with Patrick Coughlin the SVP of uh security markets about this is that you know what we've been able to do with Splunk is build a purpose-built solution that allows Splunk to eat more data so Splunk itself is ulk know it's an ingest engine right the great reason people bought it was you could build these really fast dashboards and grab intelligence out of it but without data it doesn't do anything right so how do you drive and how do you bring more data in and most importantly from a customer perspective how do you bring the right data in and so if you think about what node zero and what we're doing in a horizon 3 is that sure we do pen testing but because we're an autonomous pen testing tool we do it continuously so this whole thought I'd be like oh crud like my customers oh yeah we got a pen test coming up it's gonna be six weeks the week oh yeah you know and everyone's gonna sit on their hands call me back in two months Chris we'll talk to you then right not not a real efficient way to test your environment and shoot we saw that with Uber this week right um you know and that's a case where we could have helped oh just right we could explain the Uber thing because it was a contractor just give a quick highlight of what happened so you can connect the doctor yeah no problem so um it was uh I got I think it was yeah one of those uh you know games where they would try and test an environment um and with the uh pen tester did was he kept on calling them MFA guys being like I need to reset my password we need to set my right password and eventually the um the customer service guy said okay I'm resetting it once he had reset and bypassed the multi-factor authentication he then was able to get in and get access to the building area that he was in or I think not the domain but he was able to gain access to a partial part of that Network he then paralleled over to what I would assume is like a VA VMware or some virtual machine that had notes that had all of the credentials for logging into various domains and So within minutes they had access and that's the sort of stuff that we do you know a lot of these tools like um you know you think about the cacophony of tools that are out there in a GTA architect architecture right I'm gonna get like a z-scale or I'm going to have uh octum and I have a Splunk I've been into the solar system I mean I don't mean to name names we have crowdstriker or Sentinel one in there it's just it's a cacophony of things that don't work together they weren't designed work together and so we have seen so many times in our business through our customer support and just working with customers when we do their pen tests that there will be 5 000 servers out there three are misconfigured those three misconfigurations will create the open door because remember the hacker only needs to be right once the defender needs to be right all the time and that's the challenge and so that's what I'm really passionate about what we're doing uh here at Horizon three I see this my digital transformation migration and security going on which uh we're at the tip of the spear it's why I joined sey Hall coming on this journey uh and just super excited about where the path's going and super excited about the relationship with Splunk I get into more details on some of the specifics of that but um you know well you're nailing I mean we've been doing a lot of things on super cloud and this next gen environment we're calling it next gen you're really seeing devops obviously devsecops has already won the it role has moved to the developer shift left is an indicator of that it's one of the many examples higher velocity code software supply chain you hear these things that means that it is now in the developer hands it is replaced by the new Ops data Ops teams and security where there's a lot of horizontal thinking to your point about access there's no more perimeter huge 100 right is really right on things one time you know to get in there once you're in then you can hang out move around move laterally big problem okay so we get that now the challenges for these teams as they are transitioning organizationally how do they figure out what to do okay this is the next step they already have Splunk so now they're kind of in transition while protecting for a hundred percent ratio of success so how would you look at that and describe the challenge is what do they do what is it what are the teams facing with their data and what's next what are they what are they what action do they take so let's use some vernacular that folks will know so if I think about devsecops right we both know what that means that I'm going to build security into the app it normally talks about sec devops right how am I building security around the perimeter of what's going inside my ecosystem and what are they doing and so if you think about what we're able to do with somebody like Splunk is we can pen test the entire environment from Soup To Nuts right so I'm going to test the end points through to its I'm going to look for misconfigurations I'm going to I'm going to look for um uh credential exposed credentials you know I'm going to look for anything I can in the environment again I'm going to do it at light speed and and what what we're doing for that SEC devops space is to you know did you detect that we were in your environment so did we alert Splunk or the Sim that there's someone in the environment laterally moving around did they more importantly did they log us into their environment and when do they detect that log to trigger that log did they alert on us and then finally most importantly for every CSO out there is going to be did they stop us and so that's how we we do this and I think you when speaking with um stay Hall before you know we've come up with this um boils but we call it fine fix verifying so what we do is we go in is we act as the attacker right we act in a production environment so we're not going to be we're a passive attacker but we will go in on credentialed on agents but we have to assume to have an assumed breach model which means we're going to put a Docker container in your environment and then we're going to fingerprint the environment so we're going to go out and do an asset survey now that's something that's not something that Splunk does super well you know so can Splunk see all the assets do the same assets marry up we're going to log all that data and think and then put load that into this long Sim or the smoke logging tools just to have it in Enterprise right that's an immediate future ad that they've got um and then we've got the fix so once we've completed our pen test um we are then going to generate a report and we can talk about these in a little bit later but the reports will show an executive summary the assets that we found which would be your asset Discovery aspect of that a fix report and the fixed report I think is probably the most important one it will go down and identify what we did how we did it and then how to fix that and then from that the pen tester or the organization should fix those then they go back and run another test and then they validate like a change detection environment to see hey did those fixes taste play take place and you know snehaw when he was the CTO of jsoc he shared with me a number of times about it's like man there would be 15 more items on next week's punch sheet that we didn't know about and it's and it has to do with how we you know how they were uh prioritizing the cves and whatnot because they would take all CBDs it was critical or non-critical and it's like we are able to create context in that environment that feeds better information into Splunk and whatnot that brings that brings up the efficiency for Splunk specifically the teams out there by the way the burnout thing is real I mean this whole I just finished my list and I got 15 more or whatever the list just can keeps growing how did node zero specifically help Splunk teams be more efficient like that's the question I want to get at because this seems like a very scale way for Splunk customers and teams service teams to be more so the question is how does node zero help make Splunk specifically their service teams be more efficient so so today in our early interactions we're building customers we've seen are five things um and I'll start with sort of identifying the blind spots right so kind of what I just talked about with you did we detect did we log did we alert did they stop node zero right and so I would I put that you know a more Layman's third grade term and if I was going to beat a fifth grader at this game would be we can be the sparring partner for a Splunk Enterprise customer a Splunk Essentials customer someone using Splunk soar or even just an Enterprise Splunk customer that may be a small shop with three people and just wants to know where am I exposed so by creating and generating these reports and then having um the API that actually generates the dashboard they can take all of these events that we've logged and log them in and then where that then comes in is number two is how do we prioritize those logs right so how do we create visibility to logs that that um are have critical impacts and again as I mentioned earlier not all cves are high impact regard and also not all or low right so if you daisy chain a bunch of low cves together boom I've got a mission critical AP uh CPE that needs to be fixed now such as a credential moving to an NT box that's got a text file with a bunch of passwords on it that would be very bad um and then third would be uh verifying that you have all of the hosts so one of the things that splunk's not particularly great at and they'll literate themselves they don't do asset Discovery so dude what assets do we see and what are they logging from that um and then for from um for every event that they are able to identify one of the cool things that we can do is actually create this low code no code environment so they could let you know Splunk customers can use Splunk sword to actually triage events and prioritize that event so where they're being routed within it to optimize the Sox team time to Market or time to triage any given event obviously reducing MTR and then finally I think one of the neatest things that we'll be seeing us develop is um our ability to build glass cables so behind me you'll see one of our triage events and how we build uh a Lockheed Martin kill chain on that with a glass table which is very familiar to the community we're going to have the ability and not too distant future to allow people to search observe on those iocs and if people aren't familiar with it ioc it's an instant of a compromise so that's a vector that we want to drill into and of course who's better at Drilling in the data and smoke yeah this is a critter this is an awesome Synergy there I mean I can see a Splunk customer going man this just gives me so much more capability action actionability and also real understanding and I think this is what I want to dig into if you don't mind understanding that critical impact okay is kind of where I see this coming got the data data ingest now data's data but the question is what not to log you know where are things misconfigured these are critical questions so can you talk about what it means to understand critical impact yeah so I think you know going back to the things that I just spoke about a lot of those cves where you'll see um uh low low low and then you daisy chain together and they're suddenly like oh this is high now but then your other impact of like if you're if you're a Splunk customer you know and I had it I had several of them I had one customer that you know terabytes of McAfee data being brought in and it was like all right there's a lot of other data that you probably also want to bring but they could only afford wanted to do certain data sets because that's and they didn't know how to prioritize or filter those data sets and so we provide that opportunity to say hey these are the critical ones to bring in but there's also the ones that you don't necessarily need to bring in because low cve in this case really does mean low cve like an ILO server would be one that um that's the print server uh where the uh your admin credentials are on on like a printer and so there will be credentials on that that's something that a hacker might go in to look at so although the cve on it is low is if you daisy chain with somebody that's able to get into that you might say Ah that's high and we would then potentially rank it giving our AI logic to say that's a moderate so put it on the scale and we prioritize those versus uh of all of these scanners just going to give you a bunch of CDs and good luck and translating that if I if I can and tell me if I'm wrong that kind of speaks to that whole lateral movement that's it challenge right print serve a great example looks stupid low end who's going to want to deal with the print server oh but it's connected into a critical system there's a path is that kind of what you're getting at yeah I use Daisy Chain I think that's from the community they came from uh but it's just a lateral movement it's exactly what they're doing in those low level low critical lateral movements is where the hackers are getting in right so that's the beauty thing about the uh the Uber example is that who would have thought you know I've got my monthly Factor authentication going in a human made a mistake we can't we can't not expect humans to make mistakes we're fallible right the reality is is once they were in the environment they could have protected themselves by running enough pen tests to know that they had certain uh exposed credentials that would have stopped the breach and they did not had not done that in their environment and I'm not poking yeah but it's an interesting Trend though I mean it's obvious if sometimes those low end items are also not protected well so it's easy to get at from a hacker standpoint but also the people in charge of them can be fished easily or spearfished because they're not paying attention because they don't have to no one ever told them hey be careful yeah for the community that I came from John that's exactly how they they would uh meet you at a uh an International Event um introduce themselves as a graduate student these are National actor States uh would you mind reviewing my thesis on such and such and I was at Adobe at the time that I was working on this instead of having to get the PDF they opened the PDF and whoever that customer was launches and I don't know if you remember back in like 2008 time frame there was a lot of issues around IP being by a nation state being stolen from the United States and that's exactly how they did it and John that's or LinkedIn hey I want to get a joke we want to hire you double the salary oh I'm gonna click on that for sure you know yeah right exactly yeah the one thing I would say to you is like uh when we look at like sort of you know because I think we did 10 000 pen tests last year is it's probably over that now you know we have these sort of top 10 ways that we think and find people coming into the environment the funniest thing is that only one of them is a cve related vulnerability like uh you know you guys know what they are right so it's it but it's it's like two percent of the attacks are occurring through the cves but yeah there's all that attention spent to that and very little attention spent to this pen testing side which is sort of this continuous threat you know monitoring space and and this vulnerability space where I think we play a such an important role and I'm so excited to be a part of the tip of the spear on this one yeah I'm old enough to know the movie sneakers which I loved as a you know watching that movie you know professional hackers are testing testing always testing the environment I love this I got to ask you as we kind of wrap up here Chris if you don't mind the the benefits to Professional Services from this Alliance big news Splunk and you guys work well together we see that clearly what are what other benefits do Professional Services teams see from the Splunk and Horizon 3.ai Alliance so if you're I think for from our our from both of our uh Partners uh as we bring these guys together and many of them already are the same partner right uh is that uh first off the licensing model is probably one of the key areas that we really excel at so if you're an end user you can buy uh for the Enterprise by the number of IP addresses you're using um but uh if you're a partner working with this there's solution ways that you can go in and we'll license as to msps and what that business model on msps looks like but the unique thing that we do here is this C plus license and so the Consulting plus license allows like a uh somebody a small to mid-sized to some very large uh you know Fortune 100 uh consulting firms use this uh by buying into a license called um Consulting plus where they can have unlimited uh access to as many IPS as they want but you can only run one test at a time and as you can imagine when we're going and hacking passwords and um checking hashes and decrypting hashes that can take a while so but for the right customer it's it's a perfect tool and so I I'm so excited about our ability to go to market with uh our partners so that we understand ourselves understand how not to just sell to or not tell just to sell through but we know how to sell with them as a good vendor partner I think that that's one thing that we've done a really good job building bring it into the market yeah I think also the Splunk has had great success how they've enabled uh partners and Professional Services absolutely you know the services that layer on top of Splunk are multi-fold tons of great benefits so you guys Vector right into that ride that way with friction and and the cool thing is that in you know in one of our reports which could be totally customized uh with someone else's logo we're going to generate you know so I I used to work in another organization it wasn't Splunk but we we did uh you know pen testing as for for customers and my pen testers would come on site they'd do the engagement and they would leave and then another release someone would be oh shoot we got another sector that was breached and they'd call you back you know four weeks later and so by August our entire pen testings teams would be sold out and it would be like well even in March maybe and they're like no no I gotta breach now and and and then when they do go in they go through do the pen test and they hand over a PDF and they pack on the back and say there's where your problems are you need to fix it and the reality is that what we're going to generate completely autonomously with no human interaction is we're going to go and find all the permutations of anything we found and the fix for those permutations and then once you've fixed everything you just go back and run another pen test it's you know for what people pay for one pen test they can have a tool that does that every every Pat patch on Tuesday and that's on Wednesday you know triage throughout the week green yellow red I wanted to see the colors show me green green is good right not red and one CIO doesn't want who doesn't want that dashboard right it's it's exactly it and we can help bring I think that you know I'm really excited about helping drive this with the Splunk team because they get that they understand that it's the green yellow red dashboard and and how do we help them find more green uh so that the other guys are in red yeah and get in the data and do the right thing and be efficient with how you use the data know what to look at so many things to pay attention to you know the combination of both and then go to market strategy real brilliant congratulations Chris thanks for coming on and sharing um this news with the detail around the Splunk in action around the alliance thanks for sharing John my pleasure thanks look forward to seeing you soon all right great we'll follow up and do another segment on devops and I.T and security teams as the new new Ops but and super cloud a bunch of other stuff so thanks for coming on and our next segment the CEO of horizon 3.aa will break down all the new news for us here on thecube you're watching thecube the leader in high tech Enterprise coverage [Music] yeah the partner program for us has been fantastic you know I think prior to that you know as most organizations most uh uh most Farmers most mssps might not necessarily have a a bench at all for penetration testing uh maybe they subcontract this work out or maybe they do it themselves but trying to staff that kind of position can be incredibly difficult for us this was a differentiator a a new a new partner a new partnership that allowed us to uh not only perform services for our customers but be able to provide a product by which that they can do it themselves so we work with our customers in a variety of ways some of them want more routine testing and perform this themselves but we're also a certified service provider of horizon 3 being able to perform uh penetration tests uh help review the the data provide color provide analysis for our customers in a broader sense right not necessarily the the black and white elements of you know what was uh what's critical what's high what's medium what's low what you need to fix but are there systemic issues this has allowed us to onboard new customers this has allowed us to migrate some penetration testing services to us from from competitors in the marketplace But ultimately this is occurring because the the product and the outcome are special they're unique and they're effective our customers like what they're seeing they like the routineness of it many of them you know again like doing this themselves you know being able to kind of pen test themselves parts of their networks um and the the new use cases right I'm a large organization I have eight to ten Acquisitions per year wouldn't it be great to have a tool to be able to perform a penetration test both internal and external of that acquisition before we integrate the two companies and maybe bringing on some risk it's a very effective partnership uh one that really is uh kind of taken our our Engineers our account Executives by storm um you know this this is a a partnership that's been very valuable to us [Music] a key part of the value and business model at Horizon 3 is enabling Partners to leverage node zero to make more revenue for themselves our goal is that for sixty percent of our Revenue this year will be originated by partners and that 95 of our Revenue next year will be originated by partners and so a key to that strategy is making us an integral part of your business models as a partner a key quote from one of our partners is that we enable every one of their business units to generate Revenue so let's talk about that in a little bit more detail first is that if you have a pen test Consulting business take Deloitte as an example what was six weeks of human labor at Deloitte per pen test has been cut down to four days of Labor using node zero to conduct reconnaissance find all the juicy interesting areas of the of the Enterprise that are exploitable and being able to go assess the entire organization and then all of those details get served up to the human to be able to look at understand and determine where to probe deeper so what you see in that pen test Consulting business is that node zero becomes a force multiplier where those Consulting teams were able to cover way more accounts and way more IPS within those accounts with the same or fewer consultants and so that directly leads to profit margin expansion for the Penn testing business itself because node 0 is a force multiplier the second business model here is if you're an mssp as an mssp you're already making money providing defensive cyber security operations for a large volume of customers and so what they do is they'll license node zero and use us as an upsell to their mssb business to start to deliver either continuous red teaming continuous verification or purple teaming as a service and so in that particular business model they've got an additional line of Revenue where they can increase the spend of their existing customers by bolting on node 0 as a purple team as a service offering the third business model or customer type is if you're an I.T services provider so as an I.T services provider you make money installing and configuring security products like Splunk or crowdstrike or hemio you also make money reselling those products and you also make money generating follow-on services to continue to harden your customer environments and so for them what what those it service providers will do is use us to verify that they've installed Splunk correctly improved to their customer that Splunk was installed correctly or crowdstrike was installed correctly using our results and then use our results to drive follow-on services and revenue and then finally we've got the value-added reseller which is just a straight up reseller because of how fast our sales Cycles are these vars are able to typically go from cold email to deal close in six to eight weeks at Horizon 3 at least a single sales engineer is able to run 30 to 50 pocs concurrently because our pocs are very lightweight and don't require any on-prem customization or heavy pre-sales post sales activity so as a result we're able to have a few amount of sellers driving a lot of Revenue and volume for us well the same thing applies to bars there isn't a lot of effort to sell the product or prove its value so vars are able to sell a lot more Horizon 3 node zero product without having to build up a huge specialist sales organization so what I'm going to do is talk through uh scenario three here as an I.T service provider and just how powerful node zero can be in driving additional Revenue so in here think of for every one dollar of node zero license purchased by the IT service provider to do their business it'll generate ten dollars of additional revenue for that partner so in this example kidney group uses node 0 to verify that they have installed and deployed Splunk correctly so Kitty group is a Splunk partner they they sell it services to install configure deploy and maintain Splunk and as they deploy Splunk they're going to use node 0 to attack the environment and make sure that the right logs and alerts and monitoring are being handled within the Splunk deployment so it's a way of doing QA or verifying that Splunk has been configured correctly and that's going to be internally used by kidney group to prove the quality of their services that they've just delivered then what they're going to do is they're going to show and leave behind that node zero Report with their client and that creates a resell opportunity for for kidney group to resell node 0 to their client because their client is seeing the reports and the results and saying wow this is pretty amazing and those reports can be co-branded where it's a pen testing report branded with kidney group but it says powered by Horizon three under it from there kidney group is able to take the fixed actions report that's automatically generated with every pen test through node zero and they're able to use that as the starting point for a statement of work to sell follow-on services to fix all of the problems that node zero identified fixing l11r misconfigurations fixing or patching VMware or updating credentials policies and so on so what happens is node 0 has found a bunch of problems the client often lacks the capacity to fix and so kidney group can use that lack of capacity by the client as a follow-on sales opportunity for follow-on services and finally based on the findings from node zero kidney group can look at that report and say to the customer you know customer if you bought crowdstrike you'd be able to uh prevent node Zero from attacking and succeeding in the way that it did for if you bought humano or if you bought Palo Alto networks or if you bought uh some privileged access management solution because of what node 0 was able to do with credential harvesting and attacks and so as a result kidney group is able to resell other security products within their portfolio crowdstrike Falcon humano Polito networks demisto Phantom and so on based on the gaps that were identified by node zero and that pen test and what that creates is another feedback loop where kidney group will then go use node 0 to verify that crowdstrike product has actually been installed and configured correctly and then this becomes the cycle of using node 0 to verify a deployment using that verification to drive a bunch of follow-on services and resell opportunities which then further drives more usage of the product now the way that we licensed is that it's a usage-based license licensing model so that the partner will grow their node zero Consulting plus license as they grow their business so for example if you're a kidney group then week one you've got you're going to use node zero to verify your Splunk install in week two if you have a pen testing business you're going to go off and use node zero to be a force multiplier for your pen testing uh client opportunity and then if you have an mssp business then in week three you're going to use node zero to go execute a purple team mssp offering for your clients so not necessarily a kidney group but if you're a Deloitte or ATT these larger companies and you've got multiple lines of business if you're Optive for instance you all you have to do is buy one Consulting plus license and you're going to be able to run as many pen tests as you want sequentially so now you can buy a single license and use that one license to meet your week one client commitments and then meet your week two and then meet your week three and as you grow your business you start to run multiple pen tests concurrently so in week one you've got to do a Splunk verify uh verify Splunk install and you've got to run a pen test and you've got to do a purple team opportunity you just simply expand the number of Consulting plus licenses from one license to three licenses and so now as you systematically grow your business you're able to grow your node zero capacity with you giving you predictable cogs predictable margins and once again 10x additional Revenue opportunity for that investment in the node zero Consulting plus license my name is Saint I'm the co-founder and CEO here at Horizon 3. I'm going to talk to you today about why it's important to look at your Enterprise Through The Eyes of an attacker the challenge I had when I was a CIO in banking the CTO at Splunk and serving within the Department of Defense is that I had no idea I was Secure until the bad guys had showed up am I logging the right data am I fixing the right vulnerabilities are my security tools that I've paid millions of dollars for actually working together to defend me and the answer is I don't know does my team actually know how to respond to a breach in the middle of an incident I don't know I've got to wait for the bad guys to show up and so the challenge I had was how do we proactively verify our security posture I tried a variety of techniques the first was the use of vulnerability scanners and the challenge with vulnerability scanners is being vulnerable doesn't mean you're exploitable I might have a hundred thousand findings from my scanner of which maybe five or ten can actually be exploited in my environment the other big problem with scanners is that they can't chain weaknesses together from machine to machine so if you've got a thousand machines in your environment or more what a vulnerability scanner will do is tell you you have a problem on machine one and separately a problem on machine two but what they can tell you is that an attacker could use a load from machine one plus a low from machine two to equal to critical in your environment and what attackers do in their tactics is they chain together misconfigurations dangerous product defaults harvested credentials and exploitable vulnerabilities into attack paths across different machines so to address the attack pads across different machines I tried layering in consulting-based pen testing and the issue is when you've got thousands of hosts or hundreds of thousands of hosts in your environment human-based pen testing simply doesn't scale to test an infrastructure of that size moreover when they actually do execute a pen test and you get the report oftentimes you lack the expertise within your team to quickly retest to verify that you've actually fixed the problem and so what happens is you end up with these pen test reports that are incomplete snapshots and quickly going stale and then to mitigate that problem I tried using breach and attack simulation tools and the struggle with these tools is one I had to install credentialed agents everywhere two I had to write my own custom attack scripts that I didn't have much talent for but also I had to maintain as my environment changed and then three these types of tools were not safe to run against production systems which was the the majority of my attack surface so that's why we went off to start Horizon 3. so Tony and I met when we were in Special Operations together and the challenge we wanted to solve was how do we do infrastructure security testing at scale by giving the the power of a 20-year pen testing veteran into the hands of an I.T admin a network engineer in just three clicks and the whole idea is we enable these fixers The Blue Team to be able to run node Zero Hour pen testing product to quickly find problems in their environment that blue team will then then go off and fix the issues that were found and then they can quickly rerun the attack to verify that they fixed the problem and the whole idea is delivering this without requiring custom scripts be developed without requiring credential agents be installed and without requiring the use of external third-party consulting services or Professional Services self-service pen testing to quickly Drive find fix verify there are three primary use cases that our customers use us for the first is the sock manager that uses us to verify that their security tools are actually effective to verify that they're logging the right data in Splunk or in their Sim to verify that their managed security services provider is able to quickly detect and respond to an attack and hold them accountable for their slas or that the sock understands how to quickly detect and respond and measuring and verifying that or that the variety of tools that you have in your stack most organizations have 130 plus cyber security tools none of which are designed to work together are actually working together the second primary use case is proactively hardening and verifying your systems this is when the I that it admin that network engineer they're able to run self-service pen tests to verify that their Cisco environment is installed in hardened and configured correctly or that their credential policies are set up right or that their vcenter or web sphere or kubernetes environments are actually designed to be secure and what this allows the it admins and network Engineers to do is shift from running one or two pen tests a year to 30 40 or more pen tests a month and you can actually wire those pen tests into your devops process or into your detection engineering and the change management processes to automatically trigger pen tests every time there's a change in your environment the third primary use case is for those organizations lucky enough to have their own internal red team they'll use node zero to do reconnaissance and exploitation at scale and then use the output as a starting point for the humans to step in and focus on the really hard juicy stuff that gets them on stage at Defcon and so these are the three primary use cases and what we'll do is zoom into the find fix verify Loop because what I've found in my experience is find fix verify is the future operating model for cyber security organizations and what I mean here is in the find using continuous pen testing what you want to enable is on-demand self-service pen tests you want those pen tests to find attack pads at scale spanning your on-prem infrastructure your Cloud infrastructure and your perimeter because attackers don't only state in one place they will find ways to chain together a perimeter breach a credential from your on-prem to gain access to your cloud or some other permutation and then the third part in continuous pen testing is attackers don't focus on critical vulnerabilities anymore they know we've built vulnerability Management Programs to reduce those vulnerabilities so attackers have adapted and what they do is chain together misconfigurations in your infrastructure and software and applications with dangerous product defaults with exploitable vulnerabilities and through the collection of credentials through a mix of techniques at scale once you've found those problems the next question is what do you do about it well you want to be able to prioritize fixing problems that are actually exploitable in your environment that truly matter meaning they're going to lead to domain compromise or domain user compromise or access your sensitive data the second thing you want to fix is making sure you understand what risk your crown jewels data is exposed to where is your crown jewels data is in the cloud is it on-prem has it been copied to a share drive that you weren't aware of if a domain user was compromised could they access that crown jewels data you want to be able to use the attacker's perspective to secure the critical data you have in your infrastructure and then finally as you fix these problems you want to quickly remediate and retest that you've actually fixed the issue and this fine fix verify cycle becomes that accelerator that drives purple team culture the third part here is verify and what you want to be able to do in the verify step is verify that your security tools and processes in people can effectively detect and respond to a breach you want to be able to integrate that into your detection engineering processes so that you know you're catching the right security rules or that you've deployed the right configurations you also want to make sure that your environment is adhering to the best practices around systems hardening in cyber resilience and finally you want to be able to prove your security posture over a time to your board to your leadership into your regulators so what I'll do now is zoom into each of these three steps so when we zoom in to find here's the first example using node 0 and autonomous pen testing and what an attacker will do is find a way to break through the perimeter in this example it's very easy to misconfigure kubernetes to allow an attacker to gain remote code execution into your on-prem kubernetes environment and break through the perimeter and from there what the attacker is going to do is conduct Network reconnaissance and then find ways to gain code execution on other machines in the environment and as they get code execution they start to dump credentials collect a bunch of ntlm hashes crack those hashes using open source and dark web available data as part of those attacks and then reuse those credentials to log in and laterally maneuver throughout the environment and then as they loudly maneuver they can reuse those credentials and use credential spraying techniques and so on to compromise your business email to log in as admin into your cloud and this is a very common attack and rarely is a CV actually needed to execute this attack often it's just a misconfiguration in kubernetes with a bad credential policy or password policy combined with bad practices of credential reuse across the organization here's another example of an internal pen test and this is from an actual customer they had 5 000 hosts within their environment they had EDR and uba tools installed and they initiated in an internal pen test on a single machine from that single initial access point node zero enumerated the network conducted reconnaissance and found five thousand hosts were accessible what node 0 will do under the covers is organize all of that reconnaissance data into a knowledge graph that we call the Cyber terrain map and that cyber Terrain map becomes the key data structure that we use to efficiently maneuver and attack and compromise your environment so what node zero will do is they'll try to find ways to get code execution reuse credentials and so on in this customer example they had Fortinet installed as their EDR but node 0 was still able to get code execution on a Windows machine from there it was able to successfully dump credentials including sensitive credentials from the lsas process on the Windows box and then reuse those credentials to log in as domain admin in the network and once an attacker becomes domain admin they have the keys to the kingdom they can do anything they want so what happened here well it turns out Fortinet was misconfigured on three out of 5000 machines bad automation the customer had no idea this had happened they would have had to wait for an attacker to show up to realize that it was misconfigured the second thing is well why didn't Fortinet stop the credential pivot in the lateral movement and it turned out the customer didn't buy the right modules or turn on the right services within that particular product and we see this not only with Ford in it but we see this with Trend Micro and all the other defensive tools where it's very easy to miss a checkbox in the configuration that will do things like prevent credential dumping the next story I'll tell you is attackers don't have to hack in they log in so another infrastructure pen test a typical technique attackers will take is man in the middle uh attacks that will collect hashes so in this case what an attacker will do is leverage a tool or technique called responder to collect ntlm hashes that are being passed around the network and there's a variety of reasons why these hashes are passed around and it's a pretty common misconfiguration but as an attacker collects those hashes then they start to apply techniques to crack those hashes so they'll pass the hash and from there they will use open source intelligence common password structures and patterns and other types of techniques to try to crack those hashes into clear text passwords so here node 0 automatically collected hashes it automatically passed the hashes to crack those credentials and then from there it starts to take the domain user user ID passwords that it's collected and tries to access different services and systems in your Enterprise in this case node 0 is able to successfully gain access to the Office 365 email environment because three employees didn't have MFA configured so now what happens is node 0 has a placement and access in the business email system which sets up the conditions for fraud lateral phishing and other techniques but what's especially insightful here is that 80 of the hashes that were collected in this pen test were cracked in 15 minutes or less 80 percent 26 of the user accounts had a password that followed a pretty obvious pattern first initial last initial and four random digits the other thing that was interesting is 10 percent of service accounts had their user ID the same as their password so VMware admin VMware admin web sphere admin web Square admin so on and so forth and so attackers don't have to hack in they just log in with credentials that they've collected the next story here is becoming WS AWS admin so in this example once again internal pen test node zero gets initial access it discovers 2 000 hosts are network reachable from that environment if fingerprints and organizes all of that data into a cyber Terrain map from there it it fingerprints that hpilo the integrated lights out service was running on a subset of hosts hpilo is a service that is often not instrumented or observed by security teams nor is it easy to patch as a result attackers know this and immediately go after those types of services so in this case that ILO service was exploitable and were able to get code execution on it ILO stores all the user IDs and passwords in clear text in a particular set of processes so once we gain code execution we were able to dump all of the credentials and then from there laterally maneuver to log in to the windows box next door as admin and then on that admin box we're able to gain access to the share drives and we found a credentials file saved on a share Drive from there it turned out that credentials file was the AWS admin credentials file giving us full admin authority to their AWS accounts not a single security alert was triggered in this attack because the customer wasn't observing the ILO service and every step thereafter was a valid login in the environment and so what do you do step one patch the server step two delete the credentials file from the share drive and then step three is get better instrumentation on privileged access users and login the final story I'll tell is a typical pattern that we see across the board with that combines the various techniques I've described together where an attacker is going to go off and use open source intelligence to find all of the employees that work at your company from there they're going to look up those employees on dark web breach databases and other forms of information and then use that as a starting point to password spray to compromise a domain user all it takes is one employee to reuse a breached password for their Corporate email or all it takes is a single employee to have a weak password that's easily guessable all it takes is one and once the attacker is able to gain domain user access in most shops domain user is also the local admin on their laptop and once your local admin you can dump Sam and get local admin until M hashes you can use that to reuse credentials again local admin on neighboring machines and attackers will start to rinse and repeat then eventually they're able to get to a point where they can dump lsas or by unhooking the anti-virus defeating the EDR or finding a misconfigured EDR as we've talked about earlier to compromise the domain and what's consistent is that the fundamentals are broken at these shops they have poor password policies they don't have least access privilege implemented active directory groups are too permissive where domain admin or domain user is also the local admin uh AV or EDR Solutions are misconfigured or easily unhooked and so on and what we found in 10 000 pen tests is that user Behavior analytics tools never caught us in that lateral movement in part because those tools require pristine logging data in order to work and also it becomes very difficult to find that Baseline of normal usage versus abnormal usage of credential login another interesting Insight is there were several Marquee brand name mssps that were defending our customers environment and for them it took seven hours to detect and respond to the pen test seven hours the pen test was over in less than two hours and so what you had was an egregious violation of the service level agreements that that mssp had in place and the customer was able to use us to get service credit and drive accountability of their sock and of their provider the third interesting thing is in one case it took us seven minutes to become domain admin in a bank that bank had every Gucci security tool you could buy yet in 7 minutes and 19 seconds node zero started as an unauthenticated member of the network and was able to escalate privileges through chaining and misconfigurations in lateral movement and so on to become domain admin if it's seven minutes today we should assume it'll be less than a minute a year or two from now making it very difficult for humans to be able to detect and respond to that type of Blitzkrieg attack so that's in the find it's not just about finding problems though the bulk of the effort should be what to do about it the fix and the verify so as you find those problems back to kubernetes as an example we will show you the path here is the kill chain we took to compromise that environment we'll show you the impact here is the impact or here's the the proof of exploitation that we were able to use to be able to compromise it and there's the actual command that we executed so you could copy and paste that command and compromise that cubelet yourself if you want and then the impact is we got code execution and we'll actually show you here is the impact this is a critical here's why it enabled perimeter breach affected applications will tell you the specific IPS where you've got the problem how it maps to the miter attack framework and then we'll tell you exactly how to fix it we'll also show you what this problem enabled so you can accurately prioritize why this is important or why it's not important the next part is accurate prioritization the hardest part of my job as a CIO was deciding what not to fix so if you take SMB signing not required as an example by default that CVSs score is a one out of 10. but this misconfiguration is not a cve it's a misconfig enable an attacker to gain access to 19 credentials including one domain admin two local admins and access to a ton of data because of that context this is really a 10 out of 10. you better fix this as soon as possible however of the seven occurrences that we found it's only a critical in three out of the seven and these are the three specific machines and we'll tell you the exact way to fix it and you better fix these as soon as possible for these four machines over here these didn't allow us to do anything of consequence so that because the hardest part is deciding what not to fix you can justifiably choose not to fix these four issues right now and just add them to your backlog and surge your team to fix these three as quickly as possible and then once you fix these three you don't have to re-run the entire pen test you can select these three and then one click verify and run a very narrowly scoped pen test that is only testing this specific issue and what that creates is a much faster cycle of finding and fixing problems the other part of fixing is verifying that you don't have sensitive data at risk so once we become a domain user we're able to use those domain user credentials and try to gain access to databases file shares S3 buckets git repos and so on and help you understand what sensitive data you have at risk so in this example a green checkbox means we logged in as a valid domain user we're able to get read write access on the database this is how many records we could have accessed and we don't actually look at the values in the database but we'll show you the schema so you can quickly characterize that pii data was at risk here and we'll do that for your file shares and other sources of data so now you can accurately articulate the data you have at risk and prioritize cleaning that data up especially data that will lead to a fine or a big news issue so that's the find that's the fix now we're going to talk about the verify the key part in verify is embracing and integrating with detection engineering practices so when you think about your layers of security tools you've got lots of tools in place on average 130 tools at any given customer but these tools were not designed to work together so when you run a pen test what you want to do is say did you detect us did you log us did you alert on us did you stop us and from there what you want to see is okay what are the techniques that are commonly used to defeat an environment to actually compromise if you look at the top 10 techniques we use and there's far more than just these 10 but these are the most often executed nine out of ten have nothing to do with cves it has to do with misconfigurations dangerous product defaults bad credential policies and it's how we chain those together to become a domain admin or compromise a host so what what customers will do is every single attacker command we executed is provided to you as an attackivity log so you can actually see every single attacker command we ran the time stamp it was executed the hosts it executed on and how it Maps the minor attack tactics so our customers will have are these attacker logs on one screen and then they'll go look into Splunk or exabeam or Sentinel one or crowdstrike and say did you detect us did you log us did you alert on us or not and to make that even easier if you take this example hey Splunk what logs did you see at this time on the VMware host because that's when node 0 is able to dump credentials and that allows you to identify and fix your logging blind spots to make that easier we've got app integration so this is an actual Splunk app in the Splunk App Store and what you can come is inside the Splunk console itself you can fire up the Horizon 3 node 0 app all of the pen test results are here so that you can see all of the results in one place and you don't have to jump out of the tool and what you'll show you as I skip forward is hey there's a pen test here are the critical issues that we've identified for that weaker default issue here are the exact commands we executed and then we will automatically query into Splunk all all terms on between these times on that endpoint that relate to this attack so you can now quickly within the Splunk environment itself figure out that you're missing logs or that you're appropriately catching this issue and that becomes incredibly important in that detection engineering cycle that I mentioned earlier so how do our customers end up using us they shift from running one pen test a year to 30 40 pen tests a month oftentimes wiring us into their deployment automation to automatically run pen tests the other part that they'll do is as they run more pen tests they find more issues but eventually they hit this inflection point where they're able to rapidly clean up their environment and that inflection point is because the red and the blue teams start working together in a purple team culture and now they're working together to proactively harden their environment the other thing our customers will do is run us from different perspectives they'll first start running an RFC 1918 scope to see once the attacker gained initial access in a part of the network that had wide access what could they do and then from there they'll run us within a specific Network segment okay from within that segment could the attacker break out and gain access to another segment then they'll run us from their work from home environment could they Traverse the VPN and do something damaging and once they're in could they Traverse the VPN and get into my cloud then they'll break in from the outside all of these perspectives are available to you in Horizon 3 and node zero as a single SKU and you can run as many pen tests as you want if you run a phishing campaign and find that an intern in the finance department had the worst phishing behavior you can then inject their credentials and actually show the end-to-end story of how an attacker fished gained credentials of an intern and use that to gain access to sensitive financial data so what our customers end up doing is running multiple attacks from multiple perspectives and looking at those results over time I'll leave you two things one is what is the AI in Horizon 3 AI those knowledge graphs are the heart and soul of everything that we do and we use machine learning reinforcement techniques reinforcement learning techniques Markov decision models and so on to be able to efficiently maneuver and analyze the paths in those really large graphs we also use context-based scoring to prioritize weaknesses and we're also able to drive collective intelligence across all of the operations so the more pen tests we run the smarter we get and all of that is based on our knowledge graph analytics infrastructure that we have finally I'll leave you with this was my decision criteria when I was a buyer for my security testing strategy what I cared about was coverage I wanted to be able to assess my on-prem cloud perimeter and work from home and be safe to run in production I want to be able to do that as often as I wanted I want to be able to run pen tests in hours or days not weeks or months so I could accelerate that fine fix verify loop I wanted my it admins and network Engineers with limited offensive experience to be able to run a pen test in a few clicks through a self-service experience and not have to install agent and not have to write custom scripts and finally I didn't want to get nickeled and dimed on having to buy different types of attack modules or different types of attacks I wanted a single annual subscription that allowed me to run any type of attack as often as I wanted so I could look at my Trends in directions over time so I hope you found this talk valuable uh we're easy to find and I look forward to seeing seeing you use a product and letting our results do the talking when you look at uh you know kind of the way no our pen testing algorithms work is we dynamically select uh how to compromise an environment based on what we've discovered and the goal is to become a domain admin compromise a host compromise domain users find ways to encrypt data steal sensitive data and so on but when you look at the the top 10 techniques that we ended up uh using to compromise environments the first nine have nothing to do with cves and that's the reality cves are yes a vector but less than two percent of cves are actually used in a compromise oftentimes it's some sort of credential collection credential cracking uh credential pivoting and using that to become an admin and then uh compromising environments from that point on so I'll leave this up for you to kind of read through and you'll have the slides available for you but I found it very insightful that organizations and ourselves when I was a GE included invested heavily in just standard vulnerability Management Programs when I was at DOD that's all disa cared about asking us about was our our kind of our cve posture but the attackers have adapted to not rely on cves to get in because they know that organizations are actively looking at and patching those cves and instead they're chaining together credentials from one place with misconfigurations and dangerous product defaults in another to take over an environment a concrete example is by default vcenter backups are not encrypted and so as if an attacker finds vcenter what they'll do is find the backup location and there are specific V sender MTD files where the admin credentials are parsippled in the binaries so you can actually as an attacker find the right MTD file parse out the binary and now you've got the admin credentials for the vcenter environment and now start to log in as admin there's a bad habit by signal officers and Signal practitioners in the in the Army and elsewhere where the the VM notes section of a virtual image has the password for the VM well those VM notes are not stored encrypted and attackers know this and they're able to go off and find the VMS that are unencrypted find the note section and pull out the passwords for those images and then reuse those credentials across the board so I'll pause here and uh you know Patrick love you get some some commentary on on these techniques and other things that you've seen and what we'll do in the last say 10 to 15 minutes is uh is rolled through a little bit more on what do you do about it yeah yeah no I love it I think um I think this is pretty exhaustive what I like about what you've done here is uh you know we've seen we've seen double-digit increases in the number of organizations that are reporting actual breaches year over year for the last um for the last three years and it's often we kind of in the Zeitgeist we pegged that on ransomware which of course is like incredibly important and very top of mind um but what I like about what you have here is you know we're reminding the audience that the the attack surface area the vectors the matter um you know has to be more comprehensive than just thinking about ransomware scenarios yeah right on um so let's build on this when you think about your defense in depth you've got multiple security controls that you've purchased and integrated and you've got that redundancy if a control fails but the reality is that these security tools aren't designed to work together so when you run a pen test what you want to ask yourself is did you detect node zero did you log node zero did you alert on node zero and did you stop node zero and when you think about how to do that every single attacker command executed by node zero is available in an attacker log so you can now see you know at the bottom here vcenter um exploit at that time on that IP how it aligns to minor attack what you want to be able to do is go figure out did your security tools catch this or not and that becomes very important in using the attacker's perspective to improve your defensive security controls and so the way we've tried to make this easier back to like my my my the you know I bleed Green in many ways still from my smoke background is you want to be able to and what our customers do is hey we'll look at the attacker logs on one screen and they'll look at what did Splunk see or Miss in another screen and then they'll use that to figure out what their logging blind spots are and what that where that becomes really interesting is we've actually built out an integration into Splunk where there's a Splunk app you can download off of Splunk base and you'll get all of the pen test results right there in the Splunk console and from that Splunk console you're gonna be able to see these are all the pen tests that were run these are the issues that were found um so you can look at that particular pen test here are all of the weaknesses that were identified for that particular pen test and how they categorize out for each of those weaknesses you can click on any one of them that are critical in this case and then we'll tell you for that weakness and this is where where the the punch line comes in so I'll pause the video here for that weakness these are the commands that were executed on these endpoints at this time and then we'll actually query Splunk for that um for that IP address or containing that IP and these are the source types that surface any sort of activity so what we try to do is help you as quickly and efficiently as possible identify the logging blind spots in your Splunk environment based on the attacker's perspective so as this video kind of plays through you can see it Patrick I'd love to get your thoughts um just seeing so many Splunk deployments and the effectiveness of those deployments and and how this is going to help really Elevate the effectiveness of all of your Splunk customers yeah I'm super excited about this I mean I think this these kinds of purpose-built integration snail really move the needle for our customers I mean at the end of the day when I think about the power of Splunk I think about a product I was first introduced to 12 years ago that was an on-prem piece of software you know and at the time it sold on sort of Perpetual and term licenses but one made it special was that it could it could it could eat data at a speed that nothing else that I'd have ever seen you can ingest massively scalable amounts of data uh did cool things like schema on read which facilitated that there was this language called SPL that you could nerd out about uh and you went to a conference once a year and you talked about all the cool things you were splunking right but now as we think about the next phase of our growth um we live in a heterogeneous environment where our customers have so many different tools and data sources that are ever expanding and as you look at the as you look at the role of the ciso it's mind-blowing to me the amount of sources Services apps that are coming into the ciso span of let's just call it a span of influence in the last three years uh you know we're seeing things like infrastructure service level visibility application performance monitoring stuff that just never made sense for the security team to have visibility into you um at least not at the size and scale which we're demanding today um and and that's different and this isn't this is why it's so important that we have these joint purpose-built Integrations that um really provide more prescription to our customers about how do they walk on that Journey towards maturity what does zero to one look like what does one to two look like whereas you know 10 years ago customers were happy with platforms today they want integration they want Solutions and they want to drive outcomes and I think this is a great example of how together we are stepping to the evolving nature of the market and also the ever-evolving nature of the threat landscape and what I would say is the maturing needs of the customer in that environment yeah for sure I think especially if if we all anticipate budget pressure over the next 18 months due to the economy and elsewhere while the security budgets are not going to ever I don't think they're going to get cut they're not going to grow as fast and there's a lot more pressure on organizations to extract more value from their existing Investments as well as extracting more value and more impact from their existing teams and so security Effectiveness Fierce prioritization and automation I think become the three key themes of security uh over the next 18 months so I'll do very quickly is run through a few other use cases um every host that we identified in the pen test were able to score and say this host allowed us to do something significant therefore it's it's really critical you should be increasing your logging here hey these hosts down here we couldn't really do anything as an attacker so if you do have to make trade-offs you can make some trade-offs of your logging resolution at the lower end in order to increase logging resolution on the upper end so you've got that level of of um justification for where to increase or or adjust your logging resolution another example is every host we've discovered as an attacker we Expose and you can export and we want to make sure is every host we found as an attacker is being ingested from a Splunk standpoint a big issue I had as a CIO and user of Splunk and other tools is I had no idea if there were Rogue Raspberry Pi's on the network or if a new box was installed and whether Splunk was installed on it or not so now you can quickly start to correlate what hosts did we see and how does that reconcile with what you're logging from uh finally or second to last use case here on the Splunk integration side is for every single problem we've found we give multiple options for how to fix it this becomes a great way to prioritize what fixed actions to automate in your soar platform and what we want to get to eventually is being able to automatically trigger soar actions to fix well-known problems like automatically invalidating passwords for for poor poor passwords in our credentials amongst a whole bunch of other things we could go off and do and then finally if there is a well-known kill chain or attack path one of the things I really wish I could have done when I was a Splunk customer was take this type of kill chain that actually shows a path to domain admin that I'm sincerely worried about and use it as a glass table over which I could start to layer possible indicators of compromise and now you've got a great starting point for glass tables and iocs for actual kill chains that we know are exploitable in your environment and that becomes some super cool Integrations that we've got on the roadmap between us and the Splunk security side of the house so what I'll leave with actually Patrick before I do that you know um love to get your comments and then I'll I'll kind of leave with one last slide on this wartime security mindset uh pending you know assuming there's no other questions no I love it I mean I think this kind of um it's kind of glass table's approach to how do you how do you sort of visualize these workflows and then use things like sore and orchestration and automation to operationalize them is exactly where we see all of our customers going and getting away from I think an over engineered approach to soar with where it has to be super technical heavy with you know python programmers and getting more to this visual view of workflow creation um that really demystifies the power of Automation and also democratizes it so you don't have to have these programming languages in your resume in order to start really moving the needle on workflow creation policy enforcement and ultimately driving automation coverage across more and more of the workflows that your team is seeing yeah I think that between us being able to visualize the actual kill chain or attack path with you know think of a of uh the soar Market I think going towards this no code low code um you know configurable sore versus coded sore that's going to really be a game changer in improve or giving security teams a force multiplier so what I'll leave you with is this peacetime mindset of security no longer is sustainable we really have to get out of checking the box and then waiting for the bad guys to show up to verify that security tools are are working or not and the reason why we've got to really do that quickly is there are over a thousand companies that withdrew from the Russian economy over the past uh nine months due to the Ukrainian War there you should expect every one of them to be punished by the Russians for leaving and punished from a cyber standpoint and this is no longer about financial extortion that is ransomware this is about punishing and destroying companies and you can punish any one of these companies by going after them directly or by going after their suppliers and their Distributors so suddenly your attack surface is no more no longer just your own Enterprise it's how you bring your goods to Market and it's how you get your goods created because while I may not be able to disrupt your ability to harvest fruit if I can get those trucks stuck at the border I can increase spoilage and have the same effect and what we should expect to see is this idea of cyber-enabled economic Warfare where if we issue a sanction like Banning the Russians from traveling there is a cyber-enabled counter punch which is corrupt and destroy the American Airlines database that is below the threshold of War that's not going to trigger the 82nd Airborne to be mobilized but it's going to achieve the right effect ban the sale of luxury goods disrupt the supply chain and create shortages banned Russian oil and gas attack refineries to call a 10x spike in gas prices three days before the election this is the future and therefore I think what we have to do is shift towards a wartime mindset which is don't trust your security posture verify it see yourself Through The Eyes of the attacker build that incident response muscle memory and drive better collaboration between the red and the blue teams your suppliers and Distributors and your information uh sharing organization they have in place and what's really valuable for me as a Splunk customer was when a router crashes at that moment you don't know if it's due to an I.T Administration problem or an attacker and what you want to have are different people asking different questions of the same data and you want to have that integrated triage process of an I.T lens to that problem a security lens to that problem and then from there figuring out is is this an IT workflow to execute or a security incident to execute and you want to have all of that as an integrated team integrated process integrated technology stack and this is something that I very care I cared very deeply about as both a Splunk customer and a Splunk CTO that I see time and time again across the board so Patrick I'll leave you with the last word the final three minutes here and I don't see any open questions so please take us home oh man see how you think we spent hours and hours prepping for this together that that last uh uh 40 seconds of your talk track is probably one of the things I'm most passionate about in this industry right now uh and I think nist has done some really interesting work here around building cyber resilient organizations that have that has really I think helped help the industry see that um incidents can come from adverse conditions you know stress is uh uh performance taxations in the infrastructure service or app layer and they can come from malicious compromises uh Insider threats external threat actors and the more that we look at this from the perspective of of a broader cyber resilience Mission uh in a wartime mindset uh I I think we're going to be much better off and and will you talk about with operationally minded ice hacks information sharing intelligence sharing becomes so important in these wartime uh um situations and you know we know not all ice acts are created equal but we're also seeing a lot of um more ad hoc information sharing groups popping up so look I think I think you framed it really really well I love the concept of wartime mindset and um I I like the idea of applying a cyber resilience lens like if you have one more layer on top of that bottom right cake you know I think the it lens and the security lens they roll up to this concept of cyber resilience and I think this has done some great work there for us yeah you're you're spot on and that that is app and that's gonna I think be the the next um terrain that that uh that you're gonna see vendors try to get after but that I think Splunk is best position to win okay that's a wrap for this special Cube presentation you heard all about the global expansion of horizon 3.ai's partner program for their Partners have a unique opportunity to take advantage of their node zero product uh International go to Market expansion North America channel Partnerships and just overall relationships with companies like Splunk to make things more comprehensive in this disruptive cyber security world we live in and hope you enjoyed this program all the videos are available on thecube.net as well as check out Horizon 3 dot AI for their pen test Automation and ultimately their defense system that they use for testing always the environment that you're in great Innovative product and I hope you enjoyed the program again I'm John Furrier host of the cube thanks for watching
SUMMARY :
that's the sort of stuff that we do you
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Patrick Coughlin | PERSON | 0.99+ |
Jennifer Lee | PERSON | 0.99+ |
Chris | PERSON | 0.99+ |
Tony | PERSON | 0.99+ |
2013 | DATE | 0.99+ |
Raina Richter | PERSON | 0.99+ |
Singapore | LOCATION | 0.99+ |
Europe | LOCATION | 0.99+ |
Patrick | PERSON | 0.99+ |
Frankfurt | LOCATION | 0.99+ |
John | PERSON | 0.99+ |
20-year | QUANTITY | 0.99+ |
hundreds | QUANTITY | 0.99+ |
AWS | ORGANIZATION | 0.99+ |
20 years | QUANTITY | 0.99+ |
seven minutes | QUANTITY | 0.99+ |
95 | QUANTITY | 0.99+ |
Ford | ORGANIZATION | 0.99+ |
2.7 billion | QUANTITY | 0.99+ |
March | DATE | 0.99+ |
Finland | LOCATION | 0.99+ |
seven hours | QUANTITY | 0.99+ |
sixty percent | QUANTITY | 0.99+ |
John Furrier | PERSON | 0.99+ |
Sweden | LOCATION | 0.99+ |
John Furrier | PERSON | 0.99+ |
six weeks | QUANTITY | 0.99+ |
seven hours | QUANTITY | 0.99+ |
19 credentials | QUANTITY | 0.99+ |
ten dollars | QUANTITY | 0.99+ |
Jennifer | PERSON | 0.99+ |
5 000 hosts | QUANTITY | 0.99+ |
Horizon 3 | TITLE | 0.99+ |
Wednesday | DATE | 0.99+ |
30 | QUANTITY | 0.99+ |
eight | QUANTITY | 0.99+ |
Asia Pacific | LOCATION | 0.99+ |
American Airlines | ORGANIZATION | 0.99+ |
Deloitte | ORGANIZATION | 0.99+ |
three licenses | QUANTITY | 0.99+ |
two companies | QUANTITY | 0.99+ |
2019 | DATE | 0.99+ |
European Union | ORGANIZATION | 0.99+ |
six | QUANTITY | 0.99+ |
seven occurrences | QUANTITY | 0.99+ |
70 | QUANTITY | 0.99+ |
three people | QUANTITY | 0.99+ |
Horizon 3.ai | TITLE | 0.99+ |
ATT | ORGANIZATION | 0.99+ |
Net Zero | ORGANIZATION | 0.99+ |
Splunk | ORGANIZATION | 0.99+ |
Uber | ORGANIZATION | 0.99+ |
five | QUANTITY | 0.99+ |
less than two percent | QUANTITY | 0.99+ |
less than two hours | QUANTITY | 0.99+ |
2012 | DATE | 0.99+ |
UK | LOCATION | 0.99+ |
Adobe | ORGANIZATION | 0.99+ |
four issues | QUANTITY | 0.99+ |
Department of Defense | ORGANIZATION | 0.99+ |
next year | DATE | 0.99+ |
three steps | QUANTITY | 0.99+ |
node 0 | TITLE | 0.99+ |
15 minutes | QUANTITY | 0.99+ |
hundred percent | QUANTITY | 0.99+ |
node zero | TITLE | 0.99+ |
10x | QUANTITY | 0.99+ |
last year | DATE | 0.99+ |
7 minutes | QUANTITY | 0.99+ |
one license | QUANTITY | 0.99+ |
second thing | QUANTITY | 0.99+ |
thousands of hosts | QUANTITY | 0.99+ |
five thousand hosts | QUANTITY | 0.99+ |
next week | DATE | 0.99+ |
Rainer Richter, Horizon3.ai | Horizon3.ai Partner Program Expands Internationally
(light music) >> Hello, and welcome to theCUBE's special presentation with Horizon3.ai with Rainer Richter, Vice President of EMEA, Europe, Middle East and Africa, and Asia Pacific, APAC Horizon3.ai. Welcome to this special CUBE presentation. Thanks for joining us. >> Thank you for the invitation. >> So Horizon3.ai, driving global expansion, big international news with a partner-first approach. You guys are expanding internationally. Let's get into it. You guys are driving this new expanse partner program to new heights. Tell us about it. What are you seeing in the momentum? Why the expansion? What's all the news about? >> Well, I would say in international, we have, I would say a similar situation like in the US. There is a global shortage of well-educated penetration testers on the one hand side. On the other side, we have a raising demand of network and infrastructure security. And with our approach of an autonomous penetration testing, I believe we are totally on top of the game, especially as we have also now starting with an international instance. That means for example, if a customer in Europe is using our service, NodeZero, he will be connected to a NodeZero instance, which is located inside the European Union. And therefore, he doesn't have to worry about the conflict between the European GDPR regulations versus the US CLOUD Act. And I would say there, we have a total good package for our partners that they can provide differentiators to their customers. >> You know, we've had great conversations here on theCUBE with the CEO and the founder of the company around the leverage of the cloud and how successful that's been for the company. And obviously, I can just connect the dots here, but I'd like you to weigh in more on how that translates into the go-to-market here because you got great cloud scale with the security product you guys are having success with. Great leverage there, I'm seeing a lot of success there. What's the momentum on the channel partner program internationally? Why is it so important to you? Is it just the regional segmentation? Is it the economics? Why the momentum? >> Well, there are multiple issues. First of all, there is a raising demand in penetration testing. And don't forget that in international, we have a much higher level number or percentage in SMB and mid-market customers. So these customers, typically, most of them even didn't have a pen test done once a year. So for them, pen testing was just too expensive. Now with our offering together with our partners, we can provide different ways how customers could get an autonomous pen testing done more than once a year with even lower costs than they had with a traditional manual pen test, and that is because we have our Consulting PLUS package, which is for typically pen testers. They can go out and can do a much faster, much quicker pen test at many customers after each other. So they can do more pen test on a lower, more attractive price. On the other side, there are others or even the same one who are providing NodeZero as an MSSP service. So they can go after SMP customers saying, "Okay, you only have a couple of hundred IP addresses. No worries, we have the perfect package for you." And then you have, let's say the mid-market. Let's say the thousand and more employees, then they might even have an annual subscription. Very traditional, but for all of them, it's all the same. The customer or the service provider doesn't need a piece of hardware. They only need to install a small piece of a Docker container and that's it. And that makes it so smooth to go in and say, "Okay, Mr. Customer, we just put in this virtual attacker into your network, and that's it and all the rest is done." And within three clicks, they can act like a pen tester with 20 years of experience. >> And that's going to be very channel-friendly and partner-friendly, I can almost imagine. So I have to ask you, and thank you for calling out that breakdown and segmentation. That was good, that was very helpful for me to understand, but I want to follow up, if you don't mind. What type of partners are you seeing the most traction with and why? >> Well, I would say at the beginning, typically, you have the innovators, the early adapters, typically boutique-size of partners. They start because they are always looking for innovation. Those are the ones, they start in the beginning. So we have a wide range of partners having mostly even managed by the owner of the company. So they immediately understand, okay, there is the value, and they can change their offering. They're changing their offering in terms of penetration testing because they can do more pen tests and they can then add others ones. Or we have those ones who offered pen test services, but they did not have their own pen testers. So they had to go out on the open market and source pen testing experts to get the pen test at a particular customer done. And now with NodeZero, they're totally independent. They can go out and say, "Okay, Mr. Customer, here's the service. That's it, we turn it on. And within an hour, you are up and running totally." >> Yeah, and those pen tests are usually expensive and hard to do. Now it's right in line with the sales delivery. Pretty interesting for a partner. >> Absolutely, but on the other hand side, we are not killing the pen tester's business. We are providing with NodeZero, I would call something like the foundational work. The foundational work of having an ongoing penetration testing of the infrastructure, the operating system. And the pen testers by themselves, they can concentrate in the future on things like application pen testing, for example. So those services, which we are not touching. So we are not killing the pen tester market. We are just taking away the ongoing, let's say foundation work, call it that way. >> Yeah, yeah. That was one of my questions. I was going to ask is there's a lot of interest in this autonomous pen testing. One because it's expensive to do because those skills are required are in need and they're expensive. (chuckles) So you kind of cover the entry-level and the blockers that are in there. I've seen people say to me, "This pen test becomes a blocker for getting things done." So there's been a lot of interest in the autonomous pen testing and for organizations to have that posture. And it's an overseas issue too because now you have that ongoing thing. So can you explain that particular benefit for an organization to have that continuously verifying an organization's posture? >> Certainly. So I would say typically, you have to do your patches. You have to bring in new versions of operating systems, of different services, of operating systems of some components, and they are always bringing new vulnerabilities. The difference here is that with NodeZero, we are telling the customer or the partner the package. We're telling them which are the executable vulnerabilities because previously, they might have had a vulnerability scanner. So this vulnerability scanner brought up hundreds or even thousands of CVEs, but didn't say anything about which of them are vulnerable, really executable. And then you need an expert digging in one CVE after the other, finding out is it really executable, yes or no? And that is where you need highly-paid experts, which where we have a shortage. So with NodeZero now, we can say, "Okay, we tell you exactly which ones are the ones you should work on because those are the ones which are executable. We rank them accordingly to risk level, how easily they can be used." And then the good thing is converted or in difference to the traditional penetration test, they don't have to wait for a year for the next pen test to find out if the fixing was effective. They run just the next scan and say, "Yes, closed. Vulnerability is gone." >> The time is really valuable. And if you're doing any DevOps, cloud-native, you're always pushing new things. So pen test, ongoing pen testing is actually a benefit just in general as a kind of hygiene. So really, really interesting solution. Really bringing that global scale is going to be a new coverage area for us, for sure. I have to ask you, if you don't mind answering, what particular region are you focused on or plan to target for this next phase of growth? >> Well, at this moment, we are concentrating on the countries inside the European Union plus United Kingdom. And of course, logically, I'm based in the Frankfurt area. That means we cover more or less the countries just around. So it's like the so-called DACH region, Germany, Switzerland, Austria, plus the Netherlands. But we also already have partners in the Nordic, like in Finland and Sweden. So we have partners already in the UK and it's rapidly growing. So for example, we are now starting with some activities in Singapore and also in the Middle East area. Very important, depending on let's say, the way how to do business. Currently, we try to concentrate on those countries where we can have, let's say at least English as an accepted business language. >> Great, is there any particular region you're having the most success with right now? Sounds like European Union's kind of first wave. What's the most- >> Yes, that's the first. Definitely, that's the first wave. And now with also getting the European INSTANCE up and running, it's clearly our commitment also to the market saying, "Okay, we know there are certain dedicated requirements and we take care of this." And we are just launching, we are building up this one, the instance in the AWS service center here in Frankfurt. Also, with some dedicated hardware, internet, and a data center in Frankfurt, where we have with the DE-CIX, by the way, the highest internet interconnection bandwidth on the planet. So we have very short latency to wherever you are on the globe. >> That's a great call out benefit too. I was going to ask that. What are some of the benefits your partners are seeing in EMEA and Asia Pacific? >> Well, I would say, the benefits for them, it's clearly they can talk with customers and can offer customers penetration testing, which they before even didn't think about because penetration testing in a traditional way was simply too expensive for them, too complex, the preparation time was too long, they didn't have even have the capacity to support an external pen tester. Now with this service, you can go in and even say, "Mr. Customer, we can do a test with you in a couple of minutes. We have installed a Docker container. Within 10 minutes, we have the pen test started. That's it and then we just wait." And I would say we are seeing so many aha moments then. On the partner side, when they see NodeZero the first time working, it's like they say, "Wow, that is great." And then they walk out to customers and show it to their typically at the beginning, mostly the friendly customers like, "Wow, that's great, I need that." And I would say the feedback from the partners is that is a service where I do not have to evangelize the customer. Everybody understands penetration testing, I don't have to describe what it is. The customer understanding immediately, "Yes. Penetration testing, heard about that. I know I should do it, but too complex, too expensive." Now for example, as an MSSP service provided from one of our partners, it's getting easy. >> Yeah, and it's great benefit there. I mean, I got to say I'm a huge fan of what you guys are doing. I like this continuous automation. That's a major benefit to anyone doing DevOps or any kind of modern application development. This is just a godsend for them, this is really good. And like you said, the pen testers that are doing it, they were kind of coming down from their expertise to kind of do things that should have been automated. They get to focus on the bigger ticket items. That's a really big point. >> Exactly. So we free them, we free the pen testers for the higher level elements of the penetration testing segment, and that is typically the application testing, which is currently far away from being automated. >> Yeah, and that's where the most critical workloads are, and I think this is the nice balance. Congratulations on the international expansion of the program, and thanks for coming on this special presentation. I really appreciate it. Thank you very much. >> You're welcome. >> Okay, this is theCUBE special presentation, you know, checking on pen test automation, international expansion, Horizon3.ai. A really innovative solution. In our next segment, Chris Hill, Sector Head for Strategic Accounts, will discuss the power of Horizon3.ai and Splunk in action. You're watching theCUBE, the leader in high tech enterprise coverage. (steady music)
SUMMARY :
Welcome to this special CUBE presentation. Why the expansion? On the other side, on the channel partner and that's it and all the rest is done." seeing the most traction with Those are the ones, they and hard to do. And the pen testers by themselves, and the blockers that are in there. in one CVE after the other, I have to ask you, if and also in the Middle East area. What's the most- Definitely, that's the first wave. What are some of the benefits "Mr. Customer, we can do a test with you the bigger ticket items. of the penetration testing segment, of the program, the leader in high tech
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Europe | LOCATION | 0.99+ |
Chris Hill | PERSON | 0.99+ |
Finland | LOCATION | 0.99+ |
Sweden | LOCATION | 0.99+ |
Singapore | LOCATION | 0.99+ |
AWS | ORGANIZATION | 0.99+ |
UK | LOCATION | 0.99+ |
Frankfurt | LOCATION | 0.99+ |
hundreds | QUANTITY | 0.99+ |
20 years | QUANTITY | 0.99+ |
APAC | ORGANIZATION | 0.99+ |
Rainer Richter | PERSON | 0.99+ |
Asia Pacific | LOCATION | 0.99+ |
Netherlands | LOCATION | 0.99+ |
Nordic | LOCATION | 0.99+ |
US CLOUD Act | TITLE | 0.99+ |
Middle East | LOCATION | 0.99+ |
EMEA | LOCATION | 0.99+ |
Switzerland | LOCATION | 0.99+ |
US | LOCATION | 0.99+ |
Austria | LOCATION | 0.99+ |
thousands | QUANTITY | 0.99+ |
European Union | ORGANIZATION | 0.99+ |
United Kingdom | LOCATION | 0.99+ |
three clicks | QUANTITY | 0.99+ |
once a year | QUANTITY | 0.99+ |
Germany | LOCATION | 0.99+ |
first | QUANTITY | 0.99+ |
more than once a year | QUANTITY | 0.98+ |
10 minutes | QUANTITY | 0.98+ |
NodeZero | ORGANIZATION | 0.98+ |
CUBE | ORGANIZATION | 0.97+ |
English | OTHER | 0.97+ |
Horizon3.ai | TITLE | 0.96+ |
First | QUANTITY | 0.96+ |
first time | QUANTITY | 0.95+ |
One | QUANTITY | 0.95+ |
European Union | LOCATION | 0.94+ |
CVEs | QUANTITY | 0.94+ |
EMEA | ORGANIZATION | 0.93+ |
DACH region | LOCATION | 0.93+ |
a year | QUANTITY | 0.92+ |
one | QUANTITY | 0.92+ |
Vice President | PERSON | 0.9+ |
first wave | EVENT | 0.89+ |
an hour | QUANTITY | 0.85+ |
DE-CIX | OTHER | 0.83+ |
one of my questions | QUANTITY | 0.82+ |
European | OTHER | 0.82+ |
first approach | QUANTITY | 0.82+ |
NodeZero | COMMERCIAL_ITEM | 0.79+ |
theCUBE | ORGANIZATION | 0.79+ |
hundred IP addresses | QUANTITY | 0.73+ |
thousand and more employees | QUANTITY | 0.7+ |
Union | LOCATION | 0.69+ |
Asia | ORGANIZATION | 0.67+ |
GDPR | TITLE | 0.63+ |
Horizon3.ai | ORGANIZATION | 0.58+ |
SMP | ORGANIZATION | 0.55+ |
NodeZero | TITLE | 0.55+ |
couple | QUANTITY | 0.53+ |
Middle | LOCATION | 0.52+ |
East | ORGANIZATION | 0.52+ |
Pacific | LOCATION | 0.51+ |
European | ORGANIZATION | 0.51+ |
Africa | LOCATION | 0.45+ |
minutes | QUANTITY | 0.38+ |
Partner Program | OTHER | 0.32+ |
Stephan Goldberg, Claroty | CrowdStrike Fal.Con 2022
(intro music) >> Hi everybody. Dave Vellante, back with Day Two coverage, we're live at the ARIA Hotel in Las Vegas for fal.con '22. Several thousand people here today. The keynote was, it was a little light. I think people were out late last night, but the keynote was outstanding and it's still going on. We had to break early because we have to strike early today, but we're really excited to have Stephan Goldberg here, Vice President of Technology Alliances at Claroty. And we're going to talk about an extremely important topic, which is the internet of things, the edge, we talk about it a lot. We haven't covered securing the edge here at theCUBE this week. And so Stephan really excited to have you on. >> Thank you for having me. >> You're very welcome. Tell us more about Claroty, C-L-A-R-O-T-Y, a very interesting spelling, but what's it all about? >> Claroty is cybersecurity company that specializes in cyber physical systems, also known as operational technology systems and the extended internet of things. The difference between the traditional IoT and what what everyone calls an IoT in the cyber physical system is that an IoT device has anything connected on the network that traditionally cannot carry an agent, a security camera, a card reader. A cyber physical system is a system that has influence and operates in the physical world but is controlled from the cyberspace. An example would be a controller, a turbine, a robotic arm, or an MRI machine. >> Yeah, so those are really high-end systems, run, are looked after by engineers, not necessarily consumers. So what's what's happening in that world? I mean, we've talked a lot on theCUBE about the schism between OT and IT, they haven't really talked a lot, but in the last several years, they've started to talk more. You look at the ecosystem of IoT providers. I mean, it's companies like Hitachi and PTC and Siemens. I mean, it's the different names than we're used to in IT. What are the big trends that you're seeing the macro? >> So, first of all, traditionally, most manufacturers and environments that were heavy on operations, operational technology, they had the networks air-gapped, completely separated. You had your IT network for business administration, you had the OT network to actually build stuff. Today with emerging technologies and even modern switching architecture everything is being converged. You have the same physical infrastructure in terms of networking, that carries both networks. Sometimes a human error, sometimes a business logic that needs to interconnect these networks to transmit data from the OT side of the house, to the IT side of the house, exposes the OT environment to cyber threats. >> Was that air-gap by design or was it just that there wasn't connectivity? >> It was air-gap by design, due to security and operational reasons, and also ownership in these organizations. The IT-managed space was completely separate from the OT-managed space. So whoever built a network for the controllers to build a car, for example, was an automation engineer and the vendors, that have built these networks, were automation vendors, unlike the traditional Ciscos of the world, that we're specializing in IT. Today we're seeing the IT vendors on the OT side, and the OT vendors, they're worried about the IT side. >> But I mean, tradition, I mean, engineers are control freaks. No offense, but, I'm glad they are, I'm thankful for that. So there must have been some initial reticence to them connecting up these air-gap systems. They went wanted to make sure that they were secure, that they did it right, and presumably that's where you guys come in. What are the exposures and risks of these, of this critical infrastructure that we should be aware of? >> So you're completely right. And from an operational perspective let let's call it change control is very rigorous. So they did not want to go on the internet and just, we're seeing it with adoption of cloud technologies, for example. Cloud as in industry four ago, five ago, cloud as in cyber security. We all heard Amol's keynote from this morning talking about critical infrastructures and we'll touch upon our partnership in a second, but CrowdStrike, CrowdStrike being considered and deployed within these environments is a new thing. It's a new thing because the OT operation managers and the chief information security officers, they understand that air-gap is no longer a valid strategy. From a business perspective, these networks are already connected. We're seeing the trends of cyber attacks, IT cyber attacks, like not Patreon, I'm not talking about the Stoxnet, the targeted OT. I'm talking about WannaCry, EternalBlue, IT vulnerabilities that did not target OT, but due to the outdated and the specification of OT posture on the networks, they hit healthcare, they hit OT much harder than they did IT. >> Was Log4J, did that sleep into OT, or any IT that. >> So, absolutely. >> So Log4J right, which was so pervasive, like so many of these malwares. >> All these vulnerabilities that, it's a windows vulnerability, it has nothing to do with OT. But then when you stop and you say, hold on, my human machine interface workstation, although it has some proprietary software by Rockwell or Siemens running on it, what is the underlying operating system? Oh, hold on, it's Windows. We haven't updated that for like eight years. We were focused on updating the software but not the underlying operating system. The vulnerabilities exist to a greater extent on the OT side of the house because of the same characteristic of operational technology environments. >> So the brute force air-gap approach was no longer viable because the business imperative came in and said, no, we have to connect these systems to digitally transform, or advance our business, there's opportunities to monetize, whatever it was. The business laid that out as an imperative. So now OT engineers have to rethink how they secure it. So what are the steps that they're taking and how does Claroty help? Is there a sort of a playbook, a sequential playbook? >> Absolutely, so before we discussed the maturity curve of adopting an CPS security, or OT security technology, let's touch upon the characteristic of the space and what it led vendors like Claroty to build. So you have the rigorous chain control. You have the security in mind, operations, lowered the risk state of mind. That led vendors, likes of Claroty, to build a solution. And I'm talking about seven, eight years ago, to be passive, mostly passive or passive only to inspect network and to analyze network and focus on detection rather than taking action like response or preventative maintenance. >> Um-hmm. >> It made vendors to build on-prem solutions because of the cloud-averse state of mind of this industry. And because OT is very specific, it led vendors to focus only on OT devices, overlooking what we discussed as IoT, Unfortunately, besides HMI and PLC, the controller in the plant, you also have the security camera. So when you install an OT security solution I'm talking about the traditional ones, they traditionally overlook the security camera or anything that is not considered traditional OT. These three observations, although they were necessary in the beginning, you understand the shortcomings of it today. >> Um-hmm. >> So cloud-averse led to on-prem which leads to war security. It's like comparing CrowdStrike and one of its traditional competitors in the antivirus space. What CrowdStrike innovated is the SaaS first, cloud-native solution that is continuously being updated and provide the best in cloud security, right? And that is very much like what Claroty's building. We decided to go SaaS first and cloud-native solution. >> So, because of cloud-aversion, the industry shows somewhat outdated deployment models, on-prem, which limited scale and created greater diversity, more stovepipes, all the problems that we always talk about. Okay, and so is the answer to that, just becoming more cloud, having more of an affinity to cloud? That was a starting point, right. >> This is exactly it. Air-gap is perceived as secured, but you don't get updates and you don't really know what's going on in your network. If you have a Claroty or a crosswork installer, you have much higher probability detecting fast and responding fast. If you don't have it, you are just blind. You will be bridged, that's the. >> I was going to say, plus, air-gap, it's true, but people can get through air-gaps, too. I mean, it's harder, but Stoxnet. Yeah, look at Stoxnet right, oh, it's mopping the floor, boom, or however it happened, but so yeah. >> Correct. >> So, but the point being, you know, assume that breach, even though I know CrowdStrike thinks that the unstoppable breach is a myth, but you know, you talk to people like Kevin Mandia, it's like, we assume you're going to get breached, right? Let's make that assumption. Yeah, okay, and so that means you've got to have visibility into the network. So what are those steps that you would, what's that maturity model that you referenced before? >> So on top of these underlying principles, which is cloud-native, comprehensive, not OT only, but XIoT, and then bring that the verticalization and OT specificity. On top of that, you're exactly right. There is a maturity curve. You cannot boil the ocean, deploy protections, and change the environment within one day. It starts with discovering everything that is connected to your network. Everything from the traditional workstations to the cameras, and of course ending up with the cyber physical systems on the network. That discovery cannot be only a high level profile, it needs to be in depth to the level you need to know application versions of these devices. If you cannot tell the application version you cannot correlate it to a vulnerability, right? Just knowing that's an HMI or that's a PLC by Siemens is insufficient. You need to know the app version, then you can correlate to vulnerability, then you can correlate to risk. This is the next step, risk assessment. You need to put up a score basically, on each one of these devices. A vulnerability score, risk score, in order to prioritize action. >> Um-hmm. >> These two steps are discovery and thinking about the environment. The next two steps are taking action. After we have the prioritized devices discovered on your network, our approach is that you need to ladle in and deploy protections from a preventative perspective. Claroty delivers recommended policies in the form of access control lists or rules. >> Right. >> That can leverage existing infrastructure without touching a device without patching it, just to protect it. The next step would be detection and response. Once you have these policies deployed you also can leverage them to spot policy deviations. >> And that's where CrowdStrike comes in. So talk about how you guys partner with CrowdStrike, what that integration looks like and what the differentiation is. >> So actually the integration with CrowdStrike crosses the the entire customer journey. It starts with visibility. CrowdStrike and us exchange data on the asset level. With the announcement during FalCon, with Falcon Discover for IoT, we are really, really proud working on that with CrowdStrike. Traditionally CrowdStrike discovered and provided data about the IT assets. And we did the same thing with CPS and OT. Today with Falcon Discover for IoT, and us expanding to the XIoT space, both of us look at all devices but we can discover different things. When you merge these data sets you have an unparalleled visibility into any environment, and specifically OT. The integrations continue, and maybe the second spotlight I'll put, but without diminishing the other ones, is detection and response. It's the XDR Alliance. Claroty is very proud to be one of the first partners, XDR Alliance partners, for CrowdStrike, fitting in to the XDR, to CrowdStrike's XDR, the data that is needed to mitigate and respond and get more context about breaches in these OT environments, but also take action. Also trigger action, via Claroty and leverage Claroty's network-centric capabilities to respond. >> We hear a lot. We heard a lot in today's keynote note about the data, the importance of data, of the graph database. How unique is this Stephan, in the industry, in your view? >> The uniqueness of what exactly? >> Of this joint solution, if you will, this capability. >> I told my counterparts from CrowdStrike yesterday, the go-to market ones and the product management ones. If we are successful with Falcon Discover for IoT, and that product matures, as we plan for it to mature, it will change the industry, the OT security industry, for all of us. Not only for Claroty, for all players in this space. And this is why it's so important for us to stay coordinated and support this amazing company to enter this space and provide better security to organizations that really support our lives. >> We got to leave it there, but this is such an important topic. We're seeing in the war in Ukraine, there's a cyber component in the future of war. >> Yes. >> Today. And what do they do? They go after critical infrastructure. So protecting that critical infrastructure is so important, especially for a country like the United States, which has so much critical infrastructure and a lot to lose. So Stephan, thanks so much. >> Thank you. >> For the work that you're doing. It was great to have you on theCUBE. >> Thank you. >> All right, keep it right there. Dave Vellante for theCUBE. We'll be right back from fal.con '22. We're live from the ARIA in Las Vegas. (techno music)
SUMMARY :
but the keynote was outstanding but what's it all about? and the extended internet of things. in the last several years, You have the same physical infrastructure and the OT vendors, they're What are the exposures and risks of these, and the chief information Was Log4J, did that sleep So Log4J right, which was so pervasive, because of the same characteristic So the brute force air-gap characteristic of the space in the beginning, you and provide the best in Okay, and so is the answer to that, and you don't really know oh, it's mopping the floor, So, but the point being, you know, and change the environment within one day. in the form of access just to protect it. and what the differentiation is. and provided data about the IT assets. in the industry, in your view? if you will, this capability. the OT security industry, for all of us. in the future of war. like the United States, For the work that you're doing. We're live from the ARIA in Las Vegas.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Hitachi | ORGANIZATION | 0.99+ |
Siemens | ORGANIZATION | 0.99+ |
Stephan | PERSON | 0.99+ |
Dave Vellante | PERSON | 0.99+ |
Stephan Goldberg | PERSON | 0.99+ |
PTC | ORGANIZATION | 0.99+ |
Kevin Mandia | PERSON | 0.99+ |
Rockwell | ORGANIZATION | 0.99+ |
Claroty | ORGANIZATION | 0.99+ |
eight years | QUANTITY | 0.99+ |
five ago | DATE | 0.99+ |
yesterday | DATE | 0.99+ |
Las Vegas | LOCATION | 0.99+ |
two steps | QUANTITY | 0.99+ |
today | DATE | 0.99+ |
Amol | ORGANIZATION | 0.99+ |
Today | DATE | 0.99+ |
Patreon | ORGANIZATION | 0.99+ |
CrowdStrike | ORGANIZATION | 0.98+ |
one day | QUANTITY | 0.98+ |
Ukraine | LOCATION | 0.98+ |
this week | DATE | 0.98+ |
Falcon Discover | ORGANIZATION | 0.98+ |
both | QUANTITY | 0.98+ |
four ago | DATE | 0.98+ |
Stoxnet | ORGANIZATION | 0.98+ |
three observations | QUANTITY | 0.97+ |
CrowdStrike | EVENT | 0.97+ |
first partners | QUANTITY | 0.97+ |
this morning | DATE | 0.97+ |
Ciscos | ORGANIZATION | 0.97+ |
XDR | TITLE | 0.97+ |
ARIA | ORGANIZATION | 0.97+ |
FalCon | EVENT | 0.97+ |
second spotlight | QUANTITY | 0.96+ |
Day Two | QUANTITY | 0.96+ |
both networks | QUANTITY | 0.96+ |
one | QUANTITY | 0.96+ |
XDR Alliance | ORGANIZATION | 0.96+ |
Windows | TITLE | 0.96+ |
fal.con '22 | EVENT | 0.95+ |
United States | LOCATION | 0.95+ |
CPS | ORGANIZATION | 0.95+ |
late last night | DATE | 0.93+ |
Vice President | PERSON | 0.93+ |
CrowdStrike | TITLE | 0.91+ |
each one | QUANTITY | 0.91+ |
EternalBlue | ORGANIZATION | 0.87+ |
eight years ago | DATE | 0.87+ |
Claroty | PERSON | 0.84+ |
ARIA Hotel | LOCATION | 0.81+ |
SaaS | TITLE | 0.8+ |
first | QUANTITY | 0.79+ |
thousand people | QUANTITY | 0.73+ |
last several years | DATE | 0.71+ |
seven, | DATE | 0.7+ |
Fal.Con 2022 | EVENT | 0.7+ |
Adam Meyers, CrowdStrike | CrowdStrike Fal.Con 2022
>> We're back at the ARIA Las Vegas. We're covering CrowdStrike's Fal.Con 22. First one since 2019. Dave Vellante and Dave Nicholson on theCUBE. Adam Meyers is here, he is the Senior Vice President of Intelligence at CrowdStrike. Adam, thanks for coming to theCUBE. >> Thanks for having me. >> Interesting times, isn't it? You're very welcome. Senior Vice President of Intelligence, tell us what your role is. >> So I run all of our intelligence offerings. All of our analysts, we have a couple hundred analysts that work at CrowdStrike tracking threat actors. There's 185 threat actors that we track today. We're constantly adding more of them and it requires us to really have that visibility and understand how they operate so that we can inform our other products: our XDR, our Cloud Workload Protections and really integrate all of this around the threat actor. >> So it's that threat hunting capability that CrowdStrike has. That's what you're sort of... >> Well, so think of it this way. When we launched the company 11 years ago yesterday, what we wanted to do was to tell customers, to tell people that, well, you don't have a malware problem, you have an adversary problem. There are humans that are out there conducting these attacks, and if you know who they are what they're up to, how they operate then you're better positioned to defend against them. And so that's really at the core, what CrowdStrike started with and all of our products are powered by intelligence. All of our services are our OverWatch and our Falcon complete, all powered by intelligence because we want to know who the threat actors are and what they're doing so we can stop them. >> So for instance like you can stop known malware. A lot of companies can stop known malware, but you also can stop unknown malware. And I infer that the intelligence is part of that equation, is that right? >> Absolutely. That that's the outcome. That's the output of the intelligence but I could also tell you who these threat actors are, where they're operating out of, show you pictures of some of them, that's the threat intel. We are tracking down to the individual persona in many cases, these various threats whether they be Chinese nation state, Russian threat actors, Iran, North Korea, we track as I said, quite a few of these threats. And over time, we develop a really robust deep knowledge about who they are and how they operate. >> Okay. And we're going to get into some of that, the big four and cyber. But before we do, I want to ask you about the eCrime index stats, the ECX you guys call it a little side joke for all your nerds out there. Maybe you could explain that Adam >> Assembly humor. >> Yeah right, right. So, but, what is that index? You guys, how often do you publish it? What are you learning from that? >> Yeah, so it was modeled off of the Dow Jones industrial average. So if you look at the Dow Jones it's a composite index that was started in the late 1800s. And they took a couple of different companies that were the industrial component of the economy back then, right. Textiles and railroads and coal and steel and things like that. And they use that to approximate the overall health of the economy. So if you take these different stocks together, swizzle 'em together, and figure out some sort of number you could say, look, it's up. The economy's doing good. It's down, not doing so good. So after World War II, everybody was exuberant and positive about the end of the war. The DGI goes up, the oil crisis in the seventies goes down, COVID hits goes up, sorry, goes down. And then everybody realizes that they can use Amazon still and they can still get the things they need goes back up with the eCrime index. We took that approach to say what is the health of the underground economy? When you read about any of these ransomware attacks or data extortion attacks there are criminal groups that are working together in order to get things spammed out or to buy credentials and things like that. And so what the eCrime index does is it takes 24 different observables, right? The price of a ransom, the number of ransom attacks, the fluctuation in cryptocurrency, how much stolen material is being sold for on the underground. And we're constantly computing this number to understand is the eCrime ecosystem healthy? Is it thriving or is it under pressure? And that lets us understand what's going on in the world and kind of contextualize it. Give an example, Microsoft on patch Tuesday releases 56 vulnerabilities. 11 of them are critical. Well guess what? After hack Tuesday. So after patch Tuesday is hack Wednesday. And so all of those 11 vulnerabilities are exploitable. And now you have threat actors that have a whole new array of weapons that they can deploy and bring to bear against their victims after that patch Tuesday. So that's hack Wednesday. Conversely we'll get something like the colonial pipeline. Colonial pipeline attack May of 21, I think it was, comes out and all of the various underground forums where these ransomware operators are doing their business. They freak out because they don't want law enforcement. President Biden is talking about them and he's putting pressure on them. They don't want this ransomware component of what they're doing to bring law enforcement, bring heat on them. So they deplatform them. They kick 'em off. And when they do that, the ransomware stops being as much of a factor at that point in time. And the eCrime index goes down. So we can look at holidays, and right around Thanksgiving, which is coming up pretty soon, it's going to go up because there's so much online commerce with cyber Monday and such, right? You're going to see this increase in online activity; eCrime actors want to take advantage of that. When Christmas comes, they take vacation too; they're going to spend time with their families, so it goes back down and it stays down till around the end of the Russian Orthodox Christmas, which you can probably extrapolate why that is. And then it goes back up. So as it's fluctuating, it gives us the ability to really just start tracking what that economy looks like. >> Realtime indicator of that crypto. >> I mean, you talked about, talked about hack Wednesday, and before that you mentioned, you know, the big four, and I think you said 185 threat actors that you're tracking, is 180, is number 185 on that list? Somebody living in their basement in their mom's basement or are the resources necessary to get on that list? Such that it's like, no, no, no, no. this is very, very organized, large groups of people. Hollywood would have you believe that it's guy with a laptop, hack Wednesday, (Dave Nicholson mimics keyboard clacking noises) and everything done. >> Right. >> Are there individuals who are doing things like that or are these typically very well organized? >> That's a great question. And I think it's an important one to ask and it's both it tends to be more, the bigger groups. There are some one-off ones where it's one or two people. Sometimes they get big. Sometimes they get small. One of the big challenges. Have you heard of ransomware as a service? >> Of course. Oh my God. Any knucklehead can be a ransomwarist. >> Exactly. So we don't track those knuckleheads as much unless they get onto our radar somehow, they're conducting a lot of operations against our customers or something like that. But what we do track is that ransomware as a service platform because the affiliates, the people that are using it they come, they go and, you know, it could be they're only there for a period of time. Sometimes they move between different ransomware services, right? They'll use the one that's most useful for them that that week or that month, they're getting the best rate because it's rev sharing. They get a percentage that platform gets percentage of the ransom. So, you know, they negotiate a better deal. They might move to a different ransomware platform. So that's really hard to track. And it's also, you know, I think more important for us to understand the platform and the technology that is being used than the individual that's doing it. >> Yeah. Makes sense. Alright, let's talk about the big four. China, Iran, North Korea, and Russia. Tell us about, you know, how you monitor these folks. Are there different signatures for each? Can you actually tell, you know based on the hack who's behind it? >> So yeah, it starts off, you know motivation is a huge factor. China conducts espionage, they do it for diplomatic purposes. They do it for military and political purposes. And they do it for economic espionage. All of these things map to known policies that they put out, the Five Year Plan, the Made in China 2025, the Belt and Road Initiative, it's all part of their efforts to become a regional and ultimately a global hegemon. >> They're not stealing nickels and dimes. >> No they're stealing intellectual property. They're stealing trade secrets. They're stealing negotiation points. When there's, you know a high speed rail or something like that. And they use a set of tools and they have a set of behaviors and they have a set of infrastructure and a set of targets that as we look at all of these things together we can derive who they are by motivation and the longer we observe them, the more data we get, the more we can get that attribution. I could tell you that there's X number of Chinese threat groups that we track under Panda, right? And they're associated with the Ministry of State Security. There's a whole other set. That's too associated with the People's Liberation Army Strategic Support Force. So, I mean, these are big operations. They're intelligence agencies that are operating out of China. Iran has a different set of targets. They have a different set of motives. They go after North American and Israeli businesses right now that's kind of their main operation. And they're doing something called hack and lock and leak. With a lock and leak, what they're doing is they're deploying ransomware. They don't care about getting a ransom payment. They're just doing it to disrupt the target. And then they're leaking information that they steal during that operation that brings embarrassment. It brings compliance, regulatory, legal impact for that particular entity. So it's disruptive >> The chaos creators that's.. >> Well, you know I think they're trying to create a they're trying to really impact the legitimacy of some of these targets and the trust that their customers and their partners and people have in them. And that is psychological warfare in a certain way. And it, you know is really part of their broader initiative. Look at some of the other things that they've done they've hacked into like the missile defense system in Israel, and they've turned on the sirens, right? Those are all things that they're doing for a specific purpose, and that's not China, right? Like as you start to look at this stuff, you can start to really understand what they're up to. Russia very much been busy targeting NATO and NATO countries and Ukraine. Obviously the conflict that started in February has been a huge focus for these threat actors. And then as we look at North Korea, totally different. They're doing, there was a major crypto attack today. They're going after these crypto platforms, they're going after DeFi platforms. They're going after all of this stuff that most people don't even understand and they're stealing the crypto currency and they're using it for revenue generation. These nuclear weapons don't pay for themselves, their research and development don't pay for themselves. And so they're using that cyber operation to either steal money or steal intelligence. >> They need the cash. Yeah. >> Yeah. And they also do economic targeting because Kim Jong Un had said back in 2016 that they need to improve the lives of North Koreans. They have this national economic development strategy. And that means that they need, you know, I think only 30% of North Korea has access to reliable power. So having access to clean energy sources and renewable energy sources, that's important to keep the people happy and stop them from rising up against the regime. So that's the type of economic espionage that they're conducting. >> Well, those are the big four. If there were big five or six, I would presume US and some Western European countries would be on there. Do you track, I mean, where United States obviously has you know, people that are capable of this we're out doing our thing, and- >> So I think- >> That defense or offense, where do we sit in this matrix? >> Well, I think the big five would probably include eCrime. We also track India, Pakistan. We track actors out of Columbia, out of Turkey, out of Syria. So there's a whole, you know this problem is getting worse over time. It's proliferating. And I think COVID was also, you know a driver there because so many of these countries couldn't move human assets around because everything was getting locked down. As machine learning and artificial intelligence and all of this makes its way into the cameras at border and transfer points, it's hard to get a human asset through there. And so cyber is a very attractive, cheap and deniable form of espionage and gives them operational capabilities, not, you know and to your question about US and other kind of five I friendly type countries we have not seen them targeting our customers. So we focus on the threats that target our customers. >> Right. >> And so, you know, if we were to find them at a customer environment sure. But you know, when you look at some of the public reporting that's out there, the malware that's associated with them is focused on, you know, real bad people, and it's, it's physically like crypted to their hard drive. So unless you have sensor on, you know, an Iranian or some other laptop that might be target or something like that. >> Well, like Stuxnet did. >> Yeah. >> Right so. >> You won't see it. Right. See, so yeah. >> Well Symantec saw it but way back when right? Back in the day. >> Well, I mean, if you want to go down that route I think it actually came from a company in the region that was doing the IR and they were working with Symantec. >> Oh, okay. So, okay. So it was a local >> Yeah. I think Crisis, I think was the company that first identified it. And then they worked with Symantec. >> It Was, they found it, I guess, a logic controller. I forget what it was. >> It was a long time ago, so I might not have that completely right. >> But it was a seminal moment in the industry. >> Oh. And it was a seminal moment for Iran because you know, that I think caused them to get into cyber operations. Right. When they realized that something like that could happen that bolstered, you know there was a lot of underground hacking forums in Iran. And, you know, after Stuxnet, we started seeing that those hackers were dropping their hacker names and they were starting businesses. They were starting to try to go after government contracts. And they were starting to build training offensive programs, things like that because, you know they realized that this is an opportunity there. >> Yeah. We were talking earlier about this with Shawn and, you know, in the nuclear war, you know the Cold War days, you had the mutually assured destruction. It's not as black and white in the cyber world. Right. Cause as, as Robert Gates told me, you know a few years ago, we have a lot more to lose. So we have to be somewhat, as the United States, careful as to how much of an offensive posture we take. >> Well here's a secret. So I have a background on political science. So mutually assured destruction, I think is a deterrent strategy where you have two kind of two, two entities that like they will destroy each other if they so they're disinclined to go down that route. >> Right. >> With cyber I really don't like that mutually assured destruction >> That doesn't fit right. >> I think it's deterrents by denial. Right? So raising the cost, if they were to conduct a cyber operation, raising that cost that they don't want to do it, they don't want to incur the impact of that. Right. And think about this in terms of a lot of people are asking about would China invade Taiwan. And so as you look at the cost that that would have on the Chinese military, the POA, the POA Navy et cetera, you know, that's that deterrents by denial, trying to, trying to make the costs so high that they don't want to do it. And I think that's a better fit for cyber to try to figure out how can we raise the cost to the adversary if they operate against our customers against our enterprises and that they'll go someplace else and do something else. >> Well, that's a retaliatory strike, isn't it? I mean, is that what you're saying? >> No, definitely not. >> It's more of reducing their return on investment essentially. >> Yeah. >> And incenting them- disincening them to do X and sending them off somewhere else. >> Right. And threat actors, whether they be criminals or nation states, you know, Bruce Lee had this great quote that was "be like water", right? Like take the path of least resistance, like water will. Threat actors do that too. So, I mean, unless you're super high value target that they absolutely have to get into by any means necessary, then if you become too hard of a target, they're going to move on to somebody that's a little easier. >> Makes sense. Awesome. Really appreciate your, I could, we'd love to have you back. >> Anytime. >> Go deeper. Adam Myers. We're here at Fal.Con 22, Dave Vellante, Dave Nicholson. We'll be right back right after this short break. (bouncy music plays)
SUMMARY :
he is the Senior Vice Senior Vice President of Intelligence, so that we can inform our other products: So it's that threat hunting capability And so that's really at the core, And I infer that the intelligence that's the threat intel. the ECX you guys call it What are you learning from that? and positive about the end of the war. and before that you mentioned, you know, One of the big challenges. And it's also, you know, Tell us about, you know, So yeah, it starts off, you know and the longer we observe And it, you know is really part They need the cash. And that means that they need, you know, people that are capable of this And I think COVID was also, you know And so, you know, See, so yeah. Back in the day. in the region that was doing the IR So it was a local And then they worked with Symantec. It Was, they found it, I so I might not have that completely right. moment in the industry. like that because, you know in the nuclear war, you know strategy where you have two kind of two, So raising the cost, if they were to It's more of reducing their return and sending them off somewhere else. that they absolutely have to get into to have you back. after this short break.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Dave Vellante | PERSON | 0.99+ |
Symantec | ORGANIZATION | 0.99+ |
Dave Nicholson | PERSON | 0.99+ |
Dave Nicholson | PERSON | 0.99+ |
Adam Myers | PERSON | 0.99+ |
Bruce Lee | PERSON | 0.99+ |
Adam Meyers | PERSON | 0.99+ |
Adam | PERSON | 0.99+ |
February | DATE | 0.99+ |
2016 | DATE | 0.99+ |
NATO | ORGANIZATION | 0.99+ |
Turkey | LOCATION | 0.99+ |
Amazon | ORGANIZATION | 0.99+ |
Iran | LOCATION | 0.99+ |
Robert Gates | PERSON | 0.99+ |
two | QUANTITY | 0.99+ |
Syria | LOCATION | 0.99+ |
one | QUANTITY | 0.99+ |
11 vulnerabilities | QUANTITY | 0.99+ |
Ministry of State Security | ORGANIZATION | 0.99+ |
World War II | EVENT | 0.99+ |
Shawn | PERSON | 0.99+ |
CrowdStrike | ORGANIZATION | 0.99+ |
Kim Jong Un | PERSON | 0.99+ |
Wednesday | DATE | 0.99+ |
Columbia | LOCATION | 0.99+ |
Israel | LOCATION | 0.99+ |
56 vulnerabilities | QUANTITY | 0.99+ |
Cold War | EVENT | 0.99+ |
May of 21 | DATE | 0.99+ |
Christmas | EVENT | 0.99+ |
six | QUANTITY | 0.99+ |
24 different observables | QUANTITY | 0.99+ |
late 1800s | DATE | 0.99+ |
China | ORGANIZATION | 0.99+ |
2019 | DATE | 0.99+ |
People's Liberation Army Strategic Support Force | ORGANIZATION | 0.99+ |
first | QUANTITY | 0.98+ |
both | QUANTITY | 0.98+ |
185 threat actors | QUANTITY | 0.98+ |
President | PERSON | 0.98+ |
two people | QUANTITY | 0.98+ |
China | LOCATION | 0.98+ |
Microsoft | ORGANIZATION | 0.98+ |
Russia | ORGANIZATION | 0.98+ |
two entities | QUANTITY | 0.98+ |
Thanksgiving | EVENT | 0.98+ |
Tuesday | DATE | 0.98+ |
North Korea | ORGANIZATION | 0.98+ |
Hollywood | ORGANIZATION | 0.98+ |
today | DATE | 0.97+ |
Dow Jones | OTHER | 0.97+ |
Chinese | OTHER | 0.97+ |
11 of them | QUANTITY | 0.97+ |
each | QUANTITY | 0.97+ |
One | QUANTITY | 0.97+ |
Iran | ORGANIZATION | 0.96+ |
First one | QUANTITY | 0.96+ |
30% | QUANTITY | 0.96+ |
POA Navy | ORGANIZATION | 0.96+ |
Stuxnet | PERSON | 0.95+ |
Israeli | OTHER | 0.94+ |
Las Vegas | LOCATION | 0.94+ |
180 | QUANTITY | 0.94+ |
Russian | OTHER | 0.94+ |
US | LOCATION | 0.94+ |
Fal.Con 22 | EVENT | 0.91+ |
five | QUANTITY | 0.9+ |
ARIA | ORGANIZATION | 0.89+ |
United States | LOCATION | 0.89+ |
Crisis | ORGANIZATION | 0.88+ |
North Koreans | PERSON | 0.87+ |
eCrime | ORGANIZATION | 0.85+ |
11 years ago yesterday | DATE | 0.84+ |
few years ago | DATE | 0.84+ |
Antonio Neri, HPE | HPE Discover 2022
>>The cube presents HPE discover 2022 brought to you by HPE. >>Hey everyone. Welcome back to the Cube's continuing coverage of HPE. Discover 22 live from Las Vegas, the Venetian expo center at Lisa Martin and Dave Velante have a very special guest. Next one of our esteemed alumni here on the cube, Antonio Neri, the president and CEO of HPE, Antonio. Thank you so much for joining us this morning. >>Well, thanks for free with us today. >>Great to be back here after three years away. Yeah. Sit on stage yesterday in front of a massive sea of people. The energy here is electric. Yeah. Must have felt great yesterday, but you, you stood on stage three years ago and said buy 20, 22. And here it is. Yeah. We're gonna deliver our entire portfolio as a service. What was it like to be on stage and say we've done that. Here's where we are. We are a new company. >>Well, first of all, as always, I love the cube to cover HP discover, as you said, has been many, many years, and I hope you saw a different company yesterday. I'm really proud of what happened yesterday, because it was a pivotable moment in our journey. If I reflect back in my four years as a CEO, we said the enterprise of the future will be edge centric, cloud enable and data driven in 2018. And I pledged to invest 4 billion over four years. And you see the momentum we have at the edge with our business. And then in 19, to your point, Lisa, we said, by the end of 2022, we will offer everything as a service. When you look at the floor behind us, everything is a as a service experience from the moment you log through IHP GreenLake platform to all the cloud services we offer. So for me, it is a proud moment because our team worked really hard to deliver on that province on the face of a lot of challenges, >>Tremendous challenges, the last couple years that nobody could have predicted or even forecast, how can we tolerate this? Talk to me about your customer conversations and how they have changed and evolved as every company today has to be a data company. >>Well, even this morning, up to this interview, I already met four customers in, in less than an hour and a half. And I will say all of them, first of all, really appreciated bringing HP discover back. And what they really appreciated was the fact that they had the opportunity to meet and greet and talk to people. The energy that comes from that engagement is second to none. And I think says something right about the moment we are at this time, where the return to work and everything else. I think this is a wake up call in many ways, but customers are telling us is that they want to engage with a partner that has a vision that can take them to their journey, whatever that journey is. And we know digital transformation is core to everything, but ultimately they are now more focused on delivering outcomes for the organization they're running in it. And that's why HP GreenLake is incredible well positioned to do so, you >>Know, just picking up on that. I, I, I counted Antonio. I think I've been to 14 HP and HPE discovers when you include Europe. Yeah. I mean, Frankford, London, Barcelona Madrid, of course, you know the us, and I've never seen why I've tweeted this out. I've never seen this type of energy. Right. People are excited to get back. That's part of it. The other big part of it is course the focus. Yeah. So that focus on as a service was a burn, the boat moment for HPV. >>I don't think it was a burn the boat moment. It was a moment that we have to decide how we think about the future and how we become even more relevant for customers. And we are very important to all the customers they buy from us. Right. But I think about the next 3, 5, 10 years, how we position the company, enter the future to be relevant to whatever they need to do. >>Well, what I mean by that is you're not turning back. No, the bridge is gone. You go, you're going forward. And so my question is, did the pandemic accelerate that move or did it, did it hinder it? And, and, and how so >>Actually it was an, a moment for us to think about how we go further and faster to what we call this journey to one, one platform, one experience. And, and we felt as a team, as an organization, this was a unique moment in time to go further, faster. So to us, it was a catalyst to accelerate that transformation. >>Yeah. Now I, I want to ask you a question in your keynote. I love this, cuz you say I'm often asked by customers, what workload should we move to the public cloud and what should stay on prem? I'm like, yeah, I get that question all the time. And I was waiting for the answer. You said, that's the wrong question. And I was like, wait, but that's the question everybody's asking. So it was really interesting that you said that. And I wonder if you could, you could comment. And I think you said basically the world's hybrid is your challenge with, with the customers in this initiative to actually get people to stop asking that question. Right. And not think about that. >>No, I think the challenge we all collectively have is that how we think about data and how we drive what I call a data first modernization, you know, strategy for our customers in an age to cloud architecture, which basically says you are living a hybrid world is not a question which workloads are put in the public cloud, which workloads are put OnPrem. You know, the, all the issues around data gravity and whatnot is a question of how I bring the cloud experience to all your workloads of data, wherever they live. And that's where, you know, the opportunity really exists. And as customers understand more and more about the new environments, how they work, how they enable these new experiences is all driven by that data. And that data has enormous value. So it's not about which cloud use is about how you bring the cloud experience to your data in workloads. >>When you're talking to CIOs, especially transformational CIOs, what's the value pro to those CIOs that wanna transform and need to transform with the power of HPE. >>More and more of them are becoming conscious about the fact that they need to go faster in everything they do. We have done some interesting analysis with the brands that have done a better job or have become way more proficient on extracting insight from the data. They are actually the brands that winning the marketplace, not just with customers driving the preference, but also in the market capitalization because they become where more sophisticated in driving better efficiency, which is a necessity today. Second is the fact that also they need to improve their security aspect of it, but they are creating new experiences and new revenue streams. And those transformational CIOs are transforming their business in the way they run it into more an innovation engine. And so that's why, you know, we love working with them because they are advanced and the push has to think differently in the way we think about the innovation. How >>Do you help customers go from data, rich insight, port to data, rich insight, rich actions, new revenue, streams, new services. >>Well, first of all, you have to deploy the right architecture, which starts with a network, obviously because digital transformation requires an on-ramp and the connectivity is the first step. Second is to make sure you have a true end to end visibility of that data. And that's why we announced yesterday with the data fabric, right? A, a revolutionary way to think about that age to cloud architecture from a data driven perspective. And then the third piece of this is, is the aspect of how we bring that intelligence to that data. And that's where, you know, we are enabling all these amazing services with AI machine learning with, with, you know, HP GreenLake, which is ultimately the way we are gonna enable them. >>What's your favorite announcement from this week? >>I think HP GreenLake, you know, I think I >>Mentioned a lot of GreenLake, >>36 times HP GreenLake. And to me, you know, as I think about what comes next, right, is about how we innovate now on the platform at the pace that customers are demanding. And so for me, there is a lot of things there, but obviously the private cloud enterprise edition was a big moment for us because that's the way we bring the cloud operating experience on-prem and at the edge, but also all the hybrid capabilities that Brian showed during the demo is something that I think customers now say, wow, I didn't know. We can do that. >>And thinking about your business, you know, despite some macro headwinds and, and like you, you reaffirmed your guidance on the, on the last earnings call. Does GreenLake give you better visibility or is it harder to predict? >>No, I think the more we get engaged with customers in running their workloads and data, the more visibility we get, you know, I said, you know, customers voted with the workloads and data. And in, in that context, you know, we already have 65,000 customers more than 120,000 users. And the one interesting stat, which I hope it didn't go lost during that transition was the, the fact that we now have under the GreenLake management over an next bite of data. And so to me, right, that's a unique, a unique opportunity for us to learn and improve the whole cycle. >>So obviously a big pillar of your strategy is the data. And I wanted, if you could talk more about that because I, I would observe, you know, we, the cube started in sort of as big data, you know, started to take off and you saw that had ecosystem and, and that ecosystem has dispersed now. Yeah. So gone into the cloud, it's got snowflakes pulling and some in Mongo. Now you have the opportunity with this ecosystem yeah. To have a data ecosystem. How do you look at the ecosystem and the value that your partners can build on top of GreenLake and specifically monetize? Well, >>If you walk through the floor, one of the things we changed this time is that the partners are actually in the flow of all our solutions, not sitting on a corner of the show floor, right? And, and, and that's because what we have done in the last three years has been together with our partners, but we conceive HP GreenLake with the partners in mind, at the core of everything we do in the platform. And that's why on Monday we announced the new partner one ready vantage program that actually opens the platform through our APIs for allowing them to add their own value on the platform, whether in their own services to the marketplace or the other way around they to use our capabilities in their own solutions. Because some of these cloud operating capabilities are hard to develop, whether it is, you know, metering and billing and all the other services, sometimes you don't don't have to build yourself. So that's why, what we love about our strategies, the partners can decide where to participate in this broad ecosystem and then grow with us and we can grow through them as well. >>So GreenLake as a service, the focus is, is very clear. Hybrid is very clear. What's less clear to me is, is that I'll and I'll ask you to comment, is this, we go a term called super cloud and super cloud is different than multi-cloud multi-cloud oh, I run in AWS or, and, or I run in Azure. I run in, in, in GCP, Supercloud builds a layer above that hides the underlying complexity of the primitives and the APIs, and then builds new value on top of that, out to the edge as well. You guys talk about the edge all the time. You have Aruba a as an asset, you got space space born. You're doing some pretty edge. Like, well, >>We have it here. Yeah. Yeah. We are connected to the ISS. So if you were to that show floor, you can actually see what's being processed today. >>I mean, that's, you don't get more edge than that. So my question is, is, is that part of the vision to actually build that I call super cloud layer? Or is it more to be focused on hybrid and connecting on-prem to the cloud? >>No, I, I don't like to call it super cloud because that means, unless you are a superpower, you can't do what you need to do. I, I think I call it a super straight okay. Right. That we are enabling to our H to cloud architecture. So the customers can build their own experiences and consume the services that they need to compete and win in today's market. So our H to cloud approach is to create that substrate with connectivity, obviously the cloud and the data capability that you need to operate in today's >>Environment. Okay. So they're fair enough. I would say that your customers are gonna build then the super cloud on top of that software. >>Well, actually we want to give it to them. They don't have to build anything. They just need to run the business. Well, they don't have the time to really build stuff. They just need to innovate that's our, our value proposition. So they don't have to waste cycles in doing so if it comes ready to go, why you want to build it? >>Well, when I say build it, I'm talking about building their business on top of it things you're not gonna, I agree with that, bringing their tools, financial services companies with their data, their tools, their ecosystem, connecting OnPrem to the clouds. Yeah. That above that substrate that's their as a digital. >>Yeah. And that's why I said yesterday with our approach, we're actually enabling customers to power the next generation business models that they need. We enable the substrate, they can innovate on the platform, these next gen business models, >>Tap your engineering mind. And I'd like you to talk about how architectures are changing you along with many, many other CEOs signed a letter to, to the us government, you know, urging them to, to, to pass the chips act. As I posted on LinkedIn, there were, there were a few notables missing apple wasn't on there, meta wasn't on there, Tesla wasn't on there. I'd like to see them step up and sign that. Yeah. And so why did you, you know, sign that? Why did you post that? And, and, and why is that important? >>Well, first of all, it's important to customers because obviously they need to get access to technologies in a more ubiquitous way. And second it's important for the United States. We live in a, in a global economy that today is going to a refactoring of sorts where supply chain disruption has caused a lot of consternation and disruption across many industries. And I think, you know, as we think about the next generation supply chains, which are built for resiliency and obviously inclusion, we need to make sure that the United States address this problem. Because once you fall behind, it takes a long time to catch up. Even if we sign the chips act, it's gonna take many years for us, but we need to start now. Otherwise we never get what we need to >>Get. I, I agree. We're late. I think pat Gelsinger has done a very good job laying out the mission, you know, to bring, I mean, to me, it's modest, bring 20% of the manufacturing back to the us by the end of the decade. I mean that that's not gonna be easy, but even so that's, >>That's, we need stuff somewhere. Absolutely. You know, we are great partners with Intel. I really support the vision that path has laid out. And its not just about Intel again, it's about our customers in the United States, >>HP and HPE now cuz H HP labs is part of, of HPE. I believe that's correct state. Well, >>We refocus HP labs as a part of our high performance. Yeah. And AI business. Yes. >>But H HP and, and now HPE possess custom Silicon expertise. We may, we always >>Had. >>Yeah, exactly. And, and you know, with the fabulous world, do you see, I mean, you probably do in some custom Silicon today that I don't really, you know, have visibility on, but do you see getting more into that? Is there a need for >>That? Yeah. Well we already design more than 60 different silicons that are included in our solution. More and more of that. Silicon is actually in support of our other service experience. That's truly programmable for this new way to deploy a cloud or a data fabric or a network in fabric of sorts. When you look our, our age portfolio as a part of green lake through our Aruba set of offerings, we actually have a lot of the Silicon building. Our switching portfolio that's program. Normally give us the ability to drive intelligent routing in the network at the application layer. But also as you know, many years ago, we introduced our own ILO, the lights out technology, the BMC type of support that allows us to provide security to the root of our systems. But now more implement a cloud operating security environment if you will, but there is many more in the analog space for AI at scale. And even the latest introduction with frontier. When you look at frontier that wonderful high performance exit scale system, the, the magic of that is in the Silicon we developed, which is the interconnect fabric. Plus the smart mix at massive massive scale for parallel computing. And then ultimately it's the software environment that we put on top of it. So we can process billion, billion, square transactions per second. >>And when you think about a lot of the AI today is modeling, that's done in the cloud. When you think about the edge actual real time in, you're not gonna send all that back to the cloud. When you have to make a left turn or a right turn, >>Stop sign. I think, you know, people need to realize that 70% of the data today is outside the public cloud and 50% is at the edge. And when you think about the real time use cases, actually 30% of that data will need to be processed real time. So which means you need to establish inference the rate at the edge and at the same time run, you know, the analytics at the edge, whether it's machine learnings or some sort of simulation they need to do at the edge. And so that's why, you know, we can provide inference. We can provide machine learning at the edge on top of the connectivity and the edge compute or cloud computing at the edge. But also we can provide on the other side, AI at scale for massive amount of data analytics. And >>Will that be part of the GreenLake? >>We already offered that experience. We already offered that as a HPC, as a service is one of the key services we provide at scale. And then you also have machine learning operations as a service. So we have both and with the data fabric, now we're gonna take it to one step forward so we can connect the data. And I think one of the most exciting services, I actually, I'm a true believer. That is the capability we develop through HP labs. Since you asked for that early on, which is called the swarm learning technology. Of >>Course. Yeah. I've talked to Dr. GU about there you >>Go. >>So, so he >>Will do a better job than me explaining, >>Hey, I don't know. You're pretty, pretty good at it, but he's awesome. I mean, I have to admit on your keynote, you specifically took the time to mention your support for women's rights. Yes. Will HPE pay for women to leave the state to have a medical procedure? >>Yeah. So what happened last week was a sad moment in a history. I believe we, as a company felt compelled to stand up and take a position on the rights of women to choose. And as a part of that, we already offer as a part of our benefits, the ability to travel and pay all the medical expenses related to their choice. >>Yeah. Well thank you for doing that. I appreciate it. As a, as a father of two daughters who have less rights than, than my wife did when she was their age, I applaud you for your bravery and standing up and, and thank you for doing that. How excited are you for Janet Jackson? >>I think is gonna be a phenomenal rap of the HP discover, I think is gonna be a great moment for people to celebrate the coming together. One of the feedback I got from the meetings early on from customers is that put aside the vision, the strategy, the solutions that they actually can experience themselves is the fact that the, the, the one thing that really appreciated it is that they can be together. They can talk to people, they can learn with each other from each other. That energy is obviously very palpable when you go through it. And I think, you know, the celebration tonight and I want to thank the sponsor for allowing us to do so, is, is the fact that, you know, it's gonna be a moment of reuniting ourselves and look at the Fu at the future with optimism, but have some fun. >>Well, that's great, Antonio, as I said, I've been to a lot of HP and HPE discovers. You've brought a new focus clearly to the company, outstanding job of, of getting people aligned. I mean, it's not easy. It's 60,000, you know, professionals a around the globe and the energy is like I've never seen before. So congratulations. Thank you so much for coming back in the queue. >>Thank you, Dave. And as always, we appreciate you covering the, the event. You, you share the news with all the audiences around the globe here and, and that's, that means us means a lot to us. Thank you. Thank you. >>And thank you for watching. This is Dave Velante for Lisa Martin and John furrier. We'll be right back with our next guest. Live from HPE. Discover 2022 in Las Vegas.
SUMMARY :
Thank you so much for joining us this morning. Great to be back here after three years away. Well, first of all, as always, I love the cube to cover HP discover, as you said, Talk to me about your customer conversations and how they have changed and right about the moment we are at this time, where the return to work and I think I've been to 14 HP and HPE discovers the company, enter the future to be relevant to whatever they need to do. And so my question is, did the pandemic accelerate that move So to us, it was a catalyst to accelerate And I think you about how you bring the cloud experience to your data in workloads. those CIOs that wanna transform and need to transform with the power of HPE. And so that's why, you know, we love working with them because they are advanced and the push Do you help customers go from data, rich insight, port to data, And that's where, you know, we are enabling all these amazing services And to me, you know, you reaffirmed your guidance on the, on the last earnings call. the more visibility we get, you know, I said, you know, customers voted with the workloads and data. sort of as big data, you know, started to take off and you saw that had ecosystem and, are hard to develop, whether it is, you know, metering and billing and all the other What's less clear to me is, is that I'll and I'll ask you to comment, is this, we go a term called super So if you were to that show floor, you can actually see I mean, that's, you don't get more edge than that. obviously the cloud and the data capability that you need to operate in today's I would say that your customers are gonna build then the super cloud on top of that software. ready to go, why you want to build it? their ecosystem, connecting OnPrem to the clouds. We enable the And I'd like you to talk about how architectures are changing you along And I think, you know, as we think about the next generation supply chains, you know, to bring, I mean, to me, it's modest, bring 20% of the manufacturing back to the us by the end I really support the vision that path has laid out. I believe that's correct state. And AI business. We may, we always And, and you know, with the fabulous world, do you see, I mean, the magic of that is in the Silicon we developed, which is the interconnect fabric. And when you think about a lot of the AI today is modeling, And so that's why, you know, we can provide inference. And then you also have machine learning operations as a I mean, I have to admit on your keynote, the ability to travel and pay all the medical expenses related to their choice. have less rights than, than my wife did when she was their age, I applaud you for your And I think, you know, It's 60,000, you know, you share the news with all the audiences around the globe here and, And thank you for watching.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Janet Jackson | PERSON | 0.99+ |
2018 | DATE | 0.99+ |
Dave Velante | PERSON | 0.99+ |
Dave | PERSON | 0.99+ |
Brian | PERSON | 0.99+ |
20% | QUANTITY | 0.99+ |
HPE | ORGANIZATION | 0.99+ |
Las Vegas | LOCATION | 0.99+ |
4 billion | QUANTITY | 0.99+ |
Antonio Neri | PERSON | 0.99+ |
Tesla | ORGANIZATION | 0.99+ |
Lisa | PERSON | 0.99+ |
HP | ORGANIZATION | 0.99+ |
Lisa Martin | PERSON | 0.99+ |
Antonio | PERSON | 0.99+ |
30% | QUANTITY | 0.99+ |
yesterday | DATE | 0.99+ |
70% | QUANTITY | 0.99+ |
Monday | DATE | 0.99+ |
50% | QUANTITY | 0.99+ |
United States | LOCATION | 0.99+ |
Second | QUANTITY | 0.99+ |
60,000 | QUANTITY | 0.99+ |
last week | DATE | 0.99+ |
apple | ORGANIZATION | 0.99+ |
two daughters | QUANTITY | 0.99+ |
more than 60 different silicons | QUANTITY | 0.99+ |
GreenLake | ORGANIZATION | 0.99+ |
today | DATE | 0.99+ |
third piece | QUANTITY | 0.99+ |
more than 120,000 users | QUANTITY | 0.99+ |
four customers | QUANTITY | 0.99+ |
H HP | ORGANIZATION | 0.99+ |
first step | QUANTITY | 0.99+ |
three years ago | DATE | 0.99+ |
both | QUANTITY | 0.99+ |
AWS | ORGANIZATION | 0.98+ |
ORGANIZATION | 0.98+ | |
less than an hour and a half | QUANTITY | 0.98+ |
John furrier | PERSON | 0.98+ |
one | QUANTITY | 0.98+ |
end of 2022 | DATE | 0.98+ |
Intel | ORGANIZATION | 0.98+ |
one platform | QUANTITY | 0.98+ |
BMC | ORGANIZATION | 0.98+ |
chips act | TITLE | 0.98+ |
four years | QUANTITY | 0.98+ |
tonight | DATE | 0.97+ |
this week | DATE | 0.97+ |
this morning | DATE | 0.97+ |
one experience | QUANTITY | 0.97+ |
GU | PERSON | 0.97+ |
20 | QUANTITY | 0.96+ |
Frankford | ORGANIZATION | 0.96+ |
second | QUANTITY | 0.96+ |
36 times | QUANTITY | 0.96+ |
Ryan Fournier, Dell Technologies & Muneyb Minhazuddin, VMWare | Dell Technologies World 2022
>> the CUBE presents Dell Technologies World brought to you by Dell. >> Hey everyone, welcome back to the CUBE'S coverage day one, Dell Technologies World 2022 live from The Venetian in Las Vegas. Lisa Martin, with Dave Vellante. We've been here the last couple of hours. You can hear probably the buzz behind me. Lots of folks here, we're think around seven to eight thousand folks in this solution expo, the vibe is awesome. We've got two guests helping to round out our day one coverage. Ryan Fournier joins us, senior director of product management Edge Solutions at Dell Technologies. And MuneyB Minttazuddin vice president of Edge Computing at VMware. Guys, welcome to the program. >> Oh, glad to be here. >> Yeah. >> Isn't it great to be here in person? >> Oh man, yes. >> The vibe, the vibe of day one is awesome. >> Yes. >> Oh yeah. >> I think it's fantastic. >> Like people give energy off to each other, right? >> Absolutely. So lots of some good news coming out today so far on day one. Let's talk about, Ryan let's start with you. With Edge, it's not new. We've been talking about it for a while, but what are some of the things that are new? What are some of the key trends that you are seeing that are driving changes at the Edge? >> Great, good question. We've been talking to a lot of customers. Okay, a lot of the customers you know, the different verticals really find that is a common theme happening around a massive digital transformation and really based on the pandemic, okay. Which caused some acceleration in some, but also not, but many are kind of laggers left behind. And one primary reason is the culture of the OT, IT, you know, lack of barriers or something like that. The OT is obviously the business outcomes, okay. Focused where the IT is more enabling the function and it'll take retail. For example, that's accelerated a significant usage of an in-store frictionless experience, okay. As well as supply chain automation, warehousing logistics, connected inventory, a lot of the new use cases in this new normal post that pandemic. It's really that new retail operating landscape. >> Consumers we are so demanding, we want the same experience that we have online and we want that in the store and that's really driving a lot of this out of consumer demand. >> Oh yeah, no. I think, you know, retail you know, the way you shop for milk and bread change during the pandemic, right? There was pre-pandemic. The online shopping in the United States was only 5%, but during the pandemic and afterwards that's going to caught up to 25, 30%. That's huge. How do you bring new processes in? How do you create omnichannel consumer experiences where online well as physical are blended together? Becomes a massive challenge for the retailers. So yes, Edge has been there for a long time. Innovation hasn't happened, but a simple credit card swipe When you used to pre-pandemic, just to go do your checkout now has become into a curbside pickup. Integration with like, it's just simple payment card processing is not complicated like, you know, crazy. So people are forced to go in a way and that's happening in manufacturing because they're supply chain issues, could be not. So a lot of that has accelerated this investment and what's kind of driving Edge Computing is if everything ran out of the cloud, then you almost need infinite bandwidth. So suddenly people are realizing that everything runs out of cloud. I can't process my video analytics in a store. That's a lot of video, right? >> So we often ask ourselves, okay, who's going to win the edge? You know, we have that conversation. The cloud guys? VMware? You know, Dell? How are they going to go at it? And so to your point, you're not going to do a round trip to the cloud too expensive, too slow. Now cloud guys will try to bring their cloud basically on prem or out to the edge. You're kind of bringing it from the data center. So how do you see that evolution? >> No, great question. As the edge market happens, right? So there's market data now which says enterprise edge workloads in the next five years are going to be the fastest growing workloads. But then you have different communities coming to solve that problem. Like you just said, John is, you know, hyperscalers are going, Hey, all of the new workloads were built on us, let's bring them to the edge. Data center workloads move to the edge. >> Now important community here are, you know, Telcos and Service Providers because they have assets that are highly distributed at the edge. However, they're networking assets like cell towers and stuff like that. There's opportunity to convert them into computer and storage assets. So you can provide edge computing POPs. So you're seeing a convergence of lot of industry segments, traditional IT, hyperscalers, telcos, and then OT like Ryan pointed out is naturally transforming itself. There's almost this confluence of this pot where all these different technologies need to come together. From VMware and Dell perspective, our mission is a multi-cloud edge. We want to be able to support multi-cloud services because you've heard this multiple times, is at the edge consumers and customers will require services from all the hyperscalers. They don't want buy a one hyperscaler suit to suit solution. They want to mix and match. So not bound. We want be multi-cloud south bound to support IT and OT environments. So that becomes our value proposition in the middle. >> Yep. >> So Ryan, you were talking about that IT, OT schism. And we talk about that a lot. I wonder if you could help us parse that a little bit, because you were using, for instance retail, as an example. Sometimes I think about in the industrial. >> And I think the OT people are kind of like having an engineering mindset. Don't touch my stuff. Kind of like the IT guys too, but different, you know. So there's so much opportunity at the edge. I wonder how you guys think about that? How you segment it? How you prioritize it? Obviously retail telco are big enough. >> Yep. >> That you can get your hands around them, but then there's to your point about all this data that's going to going to compute. It's going to come in pockets. And I wonder how you guys think about that schism and the other opportunity. >> Yeah, out there. It's also a great question, you know, in manufacturing. There's the true OT persona. >> Yeah. >> Okay, and that really is focused on the business outcomes. Things like predictive maintenance use cases, operational equipment effectiveness, like that's really around bottleneck analysis, and the process that go through that. If the plant goes down, they're fine, okay. They can still work on their own systems, but they're not needing that high availability solution. But they're also the decision makers and where to buy the Edge Computing, okay. So we need to talk more to the OT persona from a Dell perspective, okay. And to add on to Ryan, right. So industrial is an interesting challenge, right? So one of the things we did, and this is VMware and Dell working together at vMware it was virtual. We announced something called edge compute stack. And for the first time in 23 years of vMware history, we made the hypervisor layer real-time. >> Yep. >> What that means is in order to capture some of these OT workloads, you need to get in and operate it between the industrial PC and the program of logical controllers at a sub millisecond performance level, because now you're controlling robotic arms that you cannot miss a beat. So we actually created this real time functionality. With that functionality in the last six months, we've been able to virtualize PLCs, IPCs. So what I'm getting at is we're opening up an entire wide space of operational technology workloads, which we was not accessible to our market for the last 20 plus years. >> Now we're talking. >> Yeah. And that allows us that control plane infrastructure to edge compute. There's purpose built for edge allows us to pivot and do other solutions like analytics with the adoption of AI Analytics with our recent announcement of Deep North, okay. That provides that in store video analytics functionality. And then we also partner with PTC based on a manufacturing solution, working with that same edge compute stack. Think of that as that control plane, where again, like I said, you can pivot off a different solutions. Okay, so we leverage PTCs thing works. >> So, okay, great. So I wanted to go to that. So real-time's really interesting. >> 'Cause most of much of AI today is modeling done in the cloud. >> Yes. >> The real opportunity is real time inferencing at the edge. >> You got it. >> Okay, now this is why this gets so interesting. And I wonder if Project Monterey fits into this at all. because I feel like so why did Intel win? Intel won, it crushed all the Unix systems out there because it had PC volumes. And the edge volume's going to dwarf anything we've ever seen before. >> Yeah. >> So I feel like there's this new cocktail, you guys describe this convergence and this mixture and it's unknown. What's going to happen? That's why Project Monterey is so interesting. >> Of course. >> Yeah. >> Right? Because you're bringing together kind of hedging a lot of bets and serving a lot of different use cases. Maybe you could talk about where that might fit here. >> Oh absolutely. So the edge compute stack is made up of vSphere, Tanzu, which is vSphere's you know, VM container and Tanzu's our container technology and vSphere contains Monterey in it, right. And we've added vSAN a for storage at the edge. And connectivity is SD-WAN because a lot of the times it's far location. So you're not having a large footprint, you have one or two hoses, it's more wide area, narrow area. So the edge compute stack supports real-time, non-real-time time workloads. VMs and containers, CPU GPU, right. >> NPU, accelerators, >> NPU, DPU all of them, right. Because what you're dealing with here is that inferencing real time, because to Ryan's point, when you're doing predictive maintenance, you got to pick these signals up in like milliseconds. >> Yes. >> So we've gone our stack down to microseconds and we pick up and inform because if I can save this predictive maintenance in two seconds, I save millions of dollars in you know, wastage of product, right? >> And you may not even persist that data, right? You might just let it go, I mean, how much data does Tesla save? Right? I mean. >> You're absolutely right. A lot of the times, all you're doing is this volume of data coming at you. You're matching it to an inferencing pattern. If it doesn't match, you just drop, right. It's not persistent, but the moment you hit a trigger, immediately everything lights go off, you're login, you're applying outcome. So like super interesting at the edge. >> And the compute is going to go through the roof. So yeah, my premise is that, you know, general purpose x86 running SAP is not going to be the architecture for the edge. >> You're absolutely right. >> Going to be low cost, low power, super performance. 'Cause when you combine the CPU, GPU, NPU, you're going to blow away the performance that we've ever seen on the curves. >> There's also a new application pattern. I've called out something called edge-native applications. We went through this client-server architecture era. We built all this, you know, a very clear in architecture. We went through cloud native where everything was hyperscaled in the cloud. Both of the times we optimize our own compute. >> Yeah. >> At the edge, we got to optimize our owns data because it's not ephemeral compute that you have in hyperscale compute space, you have ephemeral data you got to deal with. So a new nature of application workloads are emerging. We call it edge-native apps. >> Yep. >> And those have very different characteristics, you know, to client server apps or you know, cloud native apps, which is amazing. It's driven by data analysts like developers, not like dot net Java developers. It's actually data analysts who are trying to mine this with fast patents and come out with outcomes, right? >> Yeah, I love that edge-native apps Lisa, that's a new term for me. >> Right, just trademark it on me. I made made it up. (panel laughing) >> Can you guys talk about a joint customer that you've really helped to dramatically transform in the last six months? >> You want to shout or I can go-- >> I think my industry is fine. >> Yeah, yeah. So, you know, at VMworld we talked about Oshkosh, which is again, like in the manufacturing space, we have retailers and manufacturers and we also brought in, you know, Proctor and Gamble and et cetera, et cetera, right? So the customers look at us jointly because you know edge doesn't happen in its own silo. It's a continuum from the data center to the cloud, to the edge, right. There's the continuum exists. So if only edge was in its own silo, you would do things. But the key thing about all of this, there's no right place, it's about that workload placement. Where do I place the workload for the most optimal business outcome? Now for real-time applications, it's at the edge. For non-real-time stuff it could be in the data center, it could be in a cloud. It doesn't really matter, where VMware and Dell strengths comes in with Oshkosh or all of those folks. We have the end-to-end. From you want place it in the data center, You want to place it in your charge to public cloud, You want to derive some of these applications. You want to place it at the far edge, which is a customer prem or a near edge, which is a telco. We've done joint announcements with telcos, like South Dakota Telecom, where we've taken their cell towers and converted them into compute and storage. So they can actually store it at the near edge, right. So this is 5G solutions. I also own the 5G part of the vMware business, but doesn't matter. Compute network storage, we got to find the right mix for placing the workload at the right place. >> You call that the near edge. I think of it as the far edge, but that's what you mean, right? >> Yeah, yeah. >> Way out there in the (mumbles), okay. >> It's all about just optimizing operations, reducing cost, increasing profitability for the customer. >> So you said edge, not its own silo. And I agree. >> it's not a silo. Is mobile a valid sort of example or a little test case because when we developed mobile apps, it drove a lot of things in the data center and in the cloud. Is that a way to think of about it as opposed to like PCs work under their own silo? Yeah, we connect to the internet, but is mobile a reasonable proxy or no? >> Mobile is an interesting proxy. When you think about the application again, you know, you got a platform by the way, you'll get excited by this. We've got mobile developers, mobile device manufacturers. You can count them in your fingers. They want to now have these devices sitting in factory floors because now these devices are so smart. They have sensors, temperature controls. They can act like these multisensory device at the edge, but the app landscape is quite interesting. I think John, where you were going was they have a very thin shim app layer that can be pushed from anywhere. The, the notion of these edge-native applications could be virtual machines, could be containers, could be, you know, this new thing called Web Assembly Wasm, which is a new type of technology, very thin shim layer which is mobile like app layer. But you know, all of these are combination of how these applications may get expressed. The target platforms could be anywhere from mobile devices to IOT gateways, to IOT devices, to servers, to, you know, massive data centers. So what's amazing is this thing can just go everywhere. And our goal is consistent infrastructure, consistent operations across the board. That's where VMware and Dell win together. >> Yeah. >> Yeah, excellent. And I was just talking to a customer today, a major airline manufacturer, okay. About their airport and the future with the mobile device just being frictionless, okay, no one wants to touch anything anymore. You can use your mobile device to do your check-in and you've got to you avoid kiosks, okay. So they're trying to figure out how to get rid of the kiosk. Now you need a kiosk for like checking baggage, okay. You can't get in the way of that, but at least that frictionless experience, for that airport in the future, but it brings in some other issues. >> It does, but I like the sound of that. Last question guys, where can customers go to learn more information about the joint solutions? >> So you can go to like our public websites obviously search on edge. And if you hear at the show, there's a lot of hands on labs, okay. There's a booth over there. A lot of Edge Solutions that we offer. >> Yeah, no, this is I guess as Ryan pointed our websites have these. We've had a lot of partnership in announcements together because you know, one of the things as we've expressed, manufacturing, retail, you know, when you get in the use cases, they involve ISPs, right? So they you know, they bring the value of you know, not just having a horizontal AI platform. We like opinionated models of fraud detection. So we're actually working with ecosystem of partners to make this real. >> So we may even hear more. >> The rich vertical solution, I call it the ISVs. They enrich our vertical solutions. >> Right. >> Oh, WeMo is going to be revolutionary. >> All right, can't wait. Guys thank you so much for joining David and me today and talking about what Dell and vMware are doing together and helping retailers manufacturers really convert the edge to incredible success. We appreciate your time. >> Thank you very much. Thanks Lisa, thanks John for having us. >> For Dave Vellante, I'm Lisa Martin. You're watching the CUBE. We are wrapping up day one of our coverage of Dell Technologies World 2022. We'll be back tomorrow, John Farrer and Dave Nicholson will join us. We'll see you then. (soft music)
SUMMARY :
brought to you by Dell. You can hear probably the buzz behind me. of day one is awesome. that are driving changes at the Edge? Okay, a lot of the customers you know, a lot of this out of consumer demand. So a lot of that has So how do you see that evolution? Hey, all of the new that are highly distributed at the edge. So Ryan, you were talking Kind of like the IT guys And I wonder how you guys you know, in manufacturing. So one of the things we did, and the program of logical controllers you can pivot off a different solutions. So real-time's really interesting. is modeling done in the cloud. The real opportunity is real And the edge volume's going to dwarf you guys describe this Maybe you could talk about because a lot of the you got to pick these signals And you may not even So like super interesting at the edge. And the compute is going 'Cause when you combine the CPU, GPU, NPU, Both of the times we At the edge, we got characteristics, you know, Yeah, I love that edge-native apps I made made it up. So the customers look at us jointly You call that the near edge. increasing profitability for the customer. So you said edge, not its own silo. and in the cloud. I think John, where you were going for that airport in the future, It does, but I like the sound of that. So you can go to So they you know, they bring the value solution, I call it the ISVs. really convert the edge Thank you very much. We'll see you then.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
David | PERSON | 0.99+ |
Ryan | PERSON | 0.99+ |
Dave Vellante | PERSON | 0.99+ |
Lisa Martin | PERSON | 0.99+ |
Ryan Fournier | PERSON | 0.99+ |
John | PERSON | 0.99+ |
Lisa | PERSON | 0.99+ |
Dell | ORGANIZATION | 0.99+ |
Dave Nicholson | PERSON | 0.99+ |
John Farrer | PERSON | 0.99+ |
one | QUANTITY | 0.99+ |
Tesla | ORGANIZATION | 0.99+ |
two seconds | QUANTITY | 0.99+ |
23 years | QUANTITY | 0.99+ |
Dell Technologies | ORGANIZATION | 0.99+ |
United States | LOCATION | 0.99+ |
MuneyB Minttazuddin | PERSON | 0.99+ |
Muneyb Minhazuddin | PERSON | 0.99+ |
two guests | QUANTITY | 0.99+ |
VMworld | ORGANIZATION | 0.99+ |
tomorrow | DATE | 0.99+ |
today | DATE | 0.99+ |
VMware | ORGANIZATION | 0.99+ |
Oshkosh | ORGANIZATION | 0.99+ |
South Dakota Telecom | ORGANIZATION | 0.99+ |
Telcos | ORGANIZATION | 0.99+ |
vMware | ORGANIZATION | 0.99+ |
two hoses | QUANTITY | 0.99+ |
millions of dollars | QUANTITY | 0.99+ |
Proctor and Gamble | ORGANIZATION | 0.99+ |
Both | QUANTITY | 0.98+ |
VMWare | ORGANIZATION | 0.98+ |
Deep North | ORGANIZATION | 0.98+ |
first time | QUANTITY | 0.98+ |
eight thousand folks | QUANTITY | 0.97+ |
Tanzu | ORGANIZATION | 0.97+ |
day one | QUANTITY | 0.97+ |
Las Vegas | LOCATION | 0.96+ |
telco | ORGANIZATION | 0.96+ |
Intel | ORGANIZATION | 0.96+ |
dot net | ORGANIZATION | 0.95+ |
Dell Technologies World | EVENT | 0.95+ |
pandemic | EVENT | 0.95+ |
up to 25, 30% | QUANTITY | 0.95+ |
Edge | ORGANIZATION | 0.94+ |
last six months | DATE | 0.91+ |
Monterey | ORGANIZATION | 0.9+ |
last 20 plus years | DATE | 0.9+ |
Technologies World 2022 | EVENT | 0.88+ |
Java | TITLE | 0.87+ |
Edge Solutions | ORGANIZATION | 0.85+ |
Edge Computing | ORGANIZATION | 0.84+ |
vSphere | ORGANIZATION | 0.84+ |
Edge Solutions | ORGANIZATION | 0.83+ |
Aditya Nagarajan & Krishna Mohan, TCS AWS Business Unit | AWS re:Invent 2021
>> You're watching theCUBE. Welcome to our continuous coverage of AWS re-Invent 2021. I'm Dave Nicholson. We've got an amazing event that's been going on for the last four days with two live sets, two studios, more than 100 guests, and two very distinguished gentlemen here on the set with us live in Las Vegas. I'd like to welcome Krishna Mohan, Vice President and Global Head of TCS's AWS Business Unit. Welcome Krishna. >> Thank you Dave. >> Dave: And also with us Aditya Jagapal Nagarajan. >> Thank you. >> Dave: I hope I did your name justice. >> Perfect. >> Right, I tried. And Aditya is Head of Strategy and Business Operations for the TCS AWS Business Unit. Krishna, starting with you, tell us about TCS and AWS over the last year. What's been going on. >> Yeah. >> Thank you Dave for having me here. It's great to be in person actually, back in re-Invent, back in person, 25,000 people, but still we have pretty good measures, health measures that way. So I'm very happy to be here. TCS AWS business unit was formed three quarters back and we actually had always AWS partnership, but we actually felt that it's important to kind of have a separate business unit, which is the full stack, multi dimensional unit providing cloud migration modernization across applications, data, and infrastructure, and also main focus on industry solutions. So it has been a great three quarters, and our partnership only enhanced significantly, predominantly what we're actually seeing in the last one year. The cloud overall transformation, I think it kind of taken a different shape. It used to be cloud migration, modernization, cloud native development, but from there it has moved to enterprise transformation, that's happening on cloud, and specifically AWS majority of the time. So with that, we actually see a lot of customers. Broadly you can categorize them into three, cloud for IT, cloud for business, and cloud for innovation. And we're definitely seeing maximum traction there with our customers across the three categories. So I'm super excited to be here at the re-Invent, you know, a couple of our customers were in the keynote, Abort and Adam and Doug. In the Western Union was the keynote, Shelly covered at Western union transformation in the partner keynote with Doug, and very happy to see Linda Cower, the transformation in the United Headlines with Adam. So it's really great to see how we are helping the customers on the transformation. That's definitely, you know, the way that we see. And we have made significant progress on the overall in the last three quarters. And these kinds of wins and business transformation that has actually happened is what resulted in TCS getting the Raising Star GSA award for us. So I'm pretty happy to actually carry this little thing here. >> Is that what this is? >> Absolutely. So it means a lot because our customer in our kind of reinforcing the value, the TCS, along with AWS is bringing to the customer. >> So I wasn't going to say anything. I just assumed that you were a 2001 Space Odyssey fan and you just brought, you know, a version of the monolith with you. I wasn't sure. Congratulations. >> Thank you. That's a quite an achievement especially in the relatively short period of time. And especially with the constraints that have been placed upon all of us. Did they give you like a schwag bag with a bunch of, with, you know, like they do at the academy awards? Are you familiar with that. >> We had a great fun event on Monday afternoon. >> Fantastic. >> Yeah. >> Aditya, talk about, you're a consultancy, your organization is a consultancy. Talk about how you engage with the customers that you are helping to bridge the divide between what their business requirements are, and the technology that AWS is delivering. Because I think we all agree that everything we're seeing here from AWS is wonderful, but without an organization like yours, actual end users, actual customers, have a hard time driving benefits. So, how do you approach that? >> Gladly thank you, Dave, and thank you for theCUBE for having us here. And just borrowing from what Krishna talked about, the three layers of value creation, the cloud for IT, cloud for business and cloud for innovation. We see the journeys clients take, to start with how they look at IT modernization, and go all the way to business transformation, and look at ecosystem transformation as well. For example, we just heard about Western Union and we just came off of one with SWBC where they have completely modernized the payment systems on AWS and TCS has been the partner for transforming that for them. And that not only just means the technology layers, but also re imagining business processes in the cloud. Moving on from the financial side, if you look at the digital farming, for example, we have been working with some of the leading, the transmitter players in the healthcare industry and in the manufacturing space to look at helping farmers with AI. Right? And helping them look at how they can ensure better analytics and drone capabilities for digital farming. Drug trial development and acceleration for time to market has been a front and center for all of us in the last two years where I've been helping pharmacy organizations get better and will bring up drug trials and reach the end customers better with cloud. So there's various examples here. >> I want to poke on that a little bit. >> Aditya: Yeah. So when TCS is engaging a customer, say in farming versus pharma, how much of your interaction with them is specialized by industry vertical or specific area expertise versus the generic workings that are going to be supporting that effort in the background? What does that look like? Are you going in first with a pharma discussion, first with the farm discussion, as opposed to an overall discussion? >> It's a great point you mentioned Dave because that's the sort of essence of TCS. Because the way we look at it, we actually appeal to the industry specific. So our domain and contextual knowledge is very important to appeal to the customers and to the various stakeholders, no longer are the days where you talk about technology as a means to an end. We talk about how end customers can benefit in that context of what they're going through in that industry. And how can then technology be part of that strategy, right? So, hence, as you rightly said, domain and context first, followed by technology powering the outcome. >> Even though farm and pharma sound a lot alike. >> Right, I showed you the very difference. >> And they may share some things in common. Yes, very, very different. Krishna, talk about your go to market motion. How are clients aware of TCS? Do you have teams that engage clients directly and then bring AWS into the conversation? Or are you being brought in by AWS? Is it a combination? What does that look like? >> So, very good relevant question. So our GTM strategies is TCS has been in the, you know, serving the enterprise customers and IT transformation for 52 years now. So we have a huge base. But specifically from an AWS BU perspective, we are focusing on selective verticals, banking financial services and insurance is large, life sciences, health care, and travel, transportation and hospitality. So these are the verticals that we're actually focusing on, and given our presence in the enterprise sector, we already have a direct sales teams who are engaging with the customers directly on enterprise transformation and business transformation. And once we have that conversation, we actually take all these solutions that we have built on AWS and along with AWS. There are few customers in the last three quarters, after farming the AWS business unit, one thing that we did is with AWS we're proactively going and identifying the logos and the customers. And with the focus not on technology, with the focus on how to solve their problems on the business side and how to create new business models. So it's kind of both. We bring in, AWS brings in logos as well, so Greenfield accounts, and as well as our contextual knowledge of the industry is how the GTM is working out, and working out pretty good. >> You mentioned, you've been at this for 52 years. >> Aditya: Yeah. >> You must've been very young when you started doing this. Talk about the internal dynamics. So think of TCS, the larger organization. You represent the AWS business unit. TCS has been doing this for a long time, predating what we think now of as cloud. I'm sure that you have long existing relationships with customers, where you've been doing things for them that aren't cloudy, and those things keep the lights on at TCS, right? Important sources of revenue. Yet you're going in and you're consulting and saying, hey, you know, it might be better for you, Mr. Customer, to work with AWS and TCS, as opposed to maybe being at a data center that TCS manages, I mean, how do you manage that internal dynamic? You've got to have people at TCS who are saying, stay away, that's my revenue, don't move my cheese. What does that look like? >> Very valid question Dave. So the way that TCS is actually looking at is, twin engine strategy. There's a cost and optimization strategy, which we have. We sell the customers and operations, running the BAU if you will, business as usual, then you have something called growth and transformation. So as a strategy that we are very clear that the path of business transformation is growth and transformation channel. So we as a company are very comfortable cannibalizing our C and O in a business because we want to be relevant to the market, relevant to the customer, and relevant to the partner ecosystem. So the only way you are relevant is actually to challenge yourself, cannibalize your own business, and for the long, you know, strategy of looking at how to grow. And that's how our twin engine strategy is working. And there are a lot of customers where we have developer with contextual knowledge serving 20 years, 25 years of the customers. We know how they work, what their business is actually, you know, what's going to be the future of the business. So we are in a better position to actually transform them. And as a company, we already took cannibalize our revenue. >> So Adi, give us an example of working with a customer and give us an idea of what that customer's perspective is in terms of their place on the spectrum of, I don't want to move anything if I don't have to versus, hey, you guys can't move fast enough to deliver what I want. Where are you seeing that spectrum of customer requirements at this point? Do you feel like you're having to lead people to water still? Where are we with that? >> Well, if you asked me this question a couple of years ago, it would be about, hey, look, here's a beautiful water and the lake looks good, why don't we spend by the side and see what it tastes like? Now the question is, how much water to drink? Right? So the point being that customers have fast realized that cloud is not just an IT decision, it's a business transformation decision. So if I may just call it back what Krishna talked about, the dual engine strategy. A clear Testament to that is some of our relationships, most of our relationships are the matter has been over two decades with our clients. And that's a perfect indication of being constantly relevant for them because as their models change, as their markets change, customer expectations change, we need to constantly innovate ourselves. >> You're innovating your business just like that. >> Absolutely. >> Correct. >> So you know, as we say, you're in the boat with them and you're going through the same changes. >> And so coming back to the question which you asked, the point was we give them a point of what experience they can have with cloud by each stakeholder. The CIO wants to look at how we can look at better sustainability of their operations, keep the lights on as you said, enhance stability with more automatable capabilities, looking at DevOps, the business is completely looking at how can cloud fundamentally change my business model. And you have both these stakeholders coexisting with the same outcome towards enterprise transformation. And that's the experience which we work with them to shape. To say what the starting point is? Where would they like to go? And how can we go to them in the journey? What's interesting here is, nobody has all the answers. Neither is AWS nor customer the TCS, but we are here to create a culture of discovering the right goal and the right answers. It's very important. That's the approach to getting it working. >> Krishna and our last minute together. You've just received the Rising Star Award, 2022 is rapidly approaching, this doesn't put any pressure on you at all for 2022 because people are going to ask, what are those rising stars do again in 2022? What's on the horizon, what are the two of you excited about for next year? >> I think we are super excited with how AWS, you know, definitely in Adam's keynote, if I had to take a couple of points that I'm taking away is in addition to enhancing their core cloud capabilities, but if there's pivoted on industry solutions, you know, the fin space that they have announced, and the industrial solutions that they have announced. So that is where it very clearly aligns to our strategy of TCS, helping customers look for change their business models, implement new business models, create ecosystem play. And that's basically where we are really super excited. And another point which I took from Adam is the, they're focused on Edge with IOT and private 5G. And that's very, very important especially when you look at it both IT, as well as the IOT transformation. So we are super excited with the potential, all the new bells and whistles AWS is rolled out in last four days, And looking forward for few more of this. >> Congratulations again. It's a fantastic acknowledgement of what you've been able to do over the last, just three quarters as you mentioned, closing out 2021 in a very, very good way. Looking forward to 2022. Thank you gentlemen for joining us today here on theCUBE, and thank all of you for joining us, for continuing continuous Cube coverage of AWS re-Invent 2021. We are the leader in hybrid technology event coverage. I'm Dave Nicholson stay tuned for more from theCUBE.
SUMMARY :
on the set with us live in Las Vegas. Dave: And also with us for the TCS AWS Business Unit. in the partner keynote with Doug, the TCS, along with AWS is and you just brought, you know, especially in the relatively event on Monday afternoon. and the technology that AWS is delivering. and in the manufacturing space in the background? Because the way we look at it, the very difference. Or are you being brought in by AWS? and identifying the logos been at this for 52 years. You represent the AWS business unit. and for the long, you know, on the spectrum of, So the point being that business just like that. So you know, as we say, keep the lights on as you said, What's on the horizon, and the industrial solutions We are the leader in hybrid
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Krishna | PERSON | 0.99+ |
Dave Nicholson | PERSON | 0.99+ |
Dave | PERSON | 0.99+ |
AWS | ORGANIZATION | 0.99+ |
Doug | PERSON | 0.99+ |
Aditya | PERSON | 0.99+ |
Linda Cower | PERSON | 0.99+ |
25 years | QUANTITY | 0.99+ |
20 years | QUANTITY | 0.99+ |
two studios | QUANTITY | 0.99+ |
Aditya Nagarajan | PERSON | 0.99+ |
52 years | QUANTITY | 0.99+ |
Las Vegas | LOCATION | 0.99+ |
Krishna Mohan | PERSON | 0.99+ |
Monday afternoon | DATE | 0.99+ |
Shelly | PERSON | 0.99+ |
Aditya Jagapal Nagarajan | PERSON | 0.99+ |
TCS | ORGANIZATION | 0.99+ |
SWBC | ORGANIZATION | 0.99+ |
two | QUANTITY | 0.99+ |
next year | DATE | 0.99+ |
Space Odyssey | TITLE | 0.99+ |
Adam | PERSON | 0.99+ |
2022 | DATE | 0.99+ |
two live sets | QUANTITY | 0.99+ |
more than 100 guests | QUANTITY | 0.99+ |
2021 | DATE | 0.99+ |
both | QUANTITY | 0.99+ |
25,000 people | QUANTITY | 0.99+ |
2001 | DATE | 0.99+ |
Rising Star Award | TITLE | 0.98+ |
first | QUANTITY | 0.98+ |
three categories | QUANTITY | 0.97+ |
three | QUANTITY | 0.97+ |
each stakeholder | QUANTITY | 0.97+ |
two very distinguished gentlemen | QUANTITY | 0.97+ |
Raising Star GSA | TITLE | 0.96+ |
today | DATE | 0.96+ |
Greenfield | ORGANIZATION | 0.95+ |
last one year | DATE | 0.94+ |
last year | DATE | 0.94+ |
Milissa Pavlik, PavCon | AWS Summit DC 2021
>>Welcome back to the cubes coverage here in Washington D. C. For a W. S. Public sector summit. I'm john fraser host of the queues and in person event but of course we have remote guests. It's a hybrid event as well. Amazon is streaming amazon web services, streaming all the teams, some of the key notes of course all the cube interviews are free and streaming out there as well on the all the cube channels and all the social coordinates. Our next guest is Melissa Pavlik President and Ceo POV con joining me here to talk about predictive maintenance, bringing that to life for the U. S. Air Force melissa. Thanks for coming in remotely on our virtual cube here at the physical event. >>Excellent, thank you. Good morning >>Show. People have been been um face to face for the first time since 2019. A lot of people remote calling in checking things out kind of an interesting time, right? We're living in so uh what's your, what's your take on all this? >>Sure. I mean it's a new way of doing business, right? Um I will say, I guess for us as a company we always have been remote so it's not too much of a change but it is definitely challenging, especially trying to engage with such a large user community such as the United States Air Force who isn't always used to working as remotely. So it's definitely a unique challenge for sure. >>Well let's get into, I love this topic. You had a real success story. There is a case study with the U. S. Air Force, what's the relationship take us through what you guys are doing together? >>Sure. Absolutely. So we started working with the Air Force now about five years ago on this subject and predictive maintenance. Sometimes you might hear me catch myself and say CBM plus condition based maintenance. They're synonymous. They mean the exact same thing basically. But about five years ago the Air Force was contemplating how do we get into a space of getting ahead of unscheduled maintenance events? Um if the military they're big push always his readiness how do we improve readiness? So to do that it was a big ask of do we have the data to get ahead of failures? So we started on this journey about five years ago as I said and frankly we started under the radar we weren't sure if it was going to work. So we started with two platforms. And of course when I think a lot of people here predictive maintenance, they immediately think of sensor data and sensors are wonderful data but unfortunately especially in an entity such as the Air Force not all assets are censored. So it also opened up a whole other avenue of how do we use the data that they have today to be able to generate and get ahead of failures. So it did start a really great partnership working not only with the individual, I'll say Air Force entities that Air Force Lifecycle Management Center but we also worked across all the major commands, the individual units, supply control, logistics and everyone else. So it's been a really great team effort to bring together all of those but typically would be rather segregated operations together. >>Yeah, they're getting a lot of props lately on a lot of their projects across the board and this one particular, how did you guys specifically help them modernize and with their and get this particular maintenance thing off the ground? >>Absolutely. I think quite simply it was what really we put their existing data to work. We really wanted to get in there and think about they already had a ton of data. There wasn't a need to generate more. We're talking about petabytes of information. So how do we use that and put it into a focus of getting ahead of failure? We said we established basically three key performance parameters right from the beginning it was, we knew we wanted to increase availability which was going to directly improve readiness. We needed to make sure we were reducing mission aborts and we wanted to get ahead of any kind of maintenance costs. So for us it was really how do we leverage and embrace machine learning and ai paired with just big data analytics and how do we take frankly what is more of a World War Two era architecture and turn it into something that is in the information age. So our modernization really started with how do we take their existing data and turn it into something that is useful and then simultaneously how do we educate the workforce and helping them understand what truly machine learning and AI offer because I think sometimes there's everyone has their own opinions of what that means, but when you put it into action and you need to make sure that it's something that they can take action on, right, it's not just pushing a dot moving numbers around, it's really thinking about and considering how their operations are done and then infusing that with the data on the back end, >>it's awesome. You know the old workflows in the cloud, this is legit, I mean physical assets, all kinds of things and his legacy is also but you want the modernization, I was gonna ask you about the machine learning and ai component, you brought that up. What specifically are you leveraging their from the ai side of the machine learning side? >>Absolutely for us, most and foremost we're talking about responsible a i in this case because unfortunately a lot of the data in the Air Force is human entry, so it's manual, which basically means it's open and rife for a lot of error into that data. So we're really focused heavily on the data integrity, we're really focused on utilizing different types of machine learning because I think on the surface the general opinion is there's a lot of data here. So it would open itself naturally into a lot of potential machine learning techniques, but the reality situation is this data is not human understandable unless you are a prior maintainer, frankly, it's a lot of codes, there's not a whole lot of common taxonomy. So what we've done is we've looked at those supervised and unsupervised models, we've taken a whole different approach to infusing it with truly, what I would say arguably is the most important key element, domain expertise. You know, someone who actually understands what this data means. So that way we can in in End up with actionable output something that the air force can actually put into use, see the results coming out of it. And thus far it's been great. Air mobility command has come back and said we've been able to reduce their my caps, which are parts waiting for maintenance by 18%. That's huge in this space. >>Yeah, it's interesting about unsupervised and supervised machine learning. That's a big distinct because you mentioned there's a lot of human error going on. That's a big part. Can you explain a little bit more because that was that to solve the human error part or was it the mix and match because the different data sets, but why the why both machine learning modes. >>So really it was to address both items frankly. When we started down this path, we weren't sure we were going to find right, We went in with some hypotheses and some of those ended up being true and others were not. So it was a way for us to quickly adjust as we needed to again put the data into actionable use and make sure we were responsibly doing that. So for us a lot of it, because it's human understanding and human error that goes into this natural language processing is a really big area in this space. So for us, adjusting between and trying different techniques is really where we were able to discover and find out what was going to be the most effective and useful in this particular space as well as cost effective. Because for us there's also this resistance, you have to have resist the urge to want to monitor everything. In this case we're talking about really focusing on those top drivers and depending on the type of data that we had, depending on the users that we knew were going to get involved with it as well as I would say, the historical information, it really would help us dictate on supervised versus supervised and going the unsupervised route. In some cases there's just still not ready for that because the data is just so manual. Once we get to a point where there is more automation and more automated data collection, unsupervised will definitely no doubt become more valuable right now though, in order to get those actionable. That supervised modeling was really what we found to be the most valuable >>and that makes total sense. You've got a lot of head room to grow into with Unsupervised, which is actually harder as you as you know, everyone, everyone everyone knows that. But I mean that's really the reality. Congratulations. I gotta ask you on the AWS side what part do they play in all this? Obviously the cloud um their relationship with the Air Force as well, what's their what's their role in this particular maintenance solution? >>Sure, absolutely. And I'll just say, I mean we're really proud to be a partner network with them and so when we started this there was no cloud, so today a lot of opportunity or things we hear about in the Air Force where like cloud one platform one, those weren't in existence, you know, five years ago or so. So for us when we started down this path and we had to identify very quickly a format and a host location that would allow us not only handle large amounts of data but do all of the deep analysis we needed to AWS GovCloud is where that came in. Plus it also is awesome that they were already approved at I. L. Five to be able to host that we in collaboration with them host a nist 801 +71 environment. And so it's really allowed us to to grow and deliver this this impact out over 6000 users today on the Air Force side. So for us with a W. S. Has been a great partnership. They obviously have some really great native services that are inside their cloud as well as the pairing and easy collaboration among not only licensed products but also all that free and open source that's out there because again, arguably that's the best community to pull from because they're constantly evolving and working in the space. But a W has been a really great partner for us and of course we have some of our very favorite services I'm happy to talk about, but they've been really great to work with >>what's the top services. >>So for us, a lot of top services are like ec two's work spaces, of course S three and Glacier um are right up there, but you really enjoy working across glue Athena were really big on, we find a commercial service we're looking for that's not yet available in Govcloud. And we pull in our AWS partners and ask, hey, you know when it's going to get into the gulf cloud space and they move pretty quickly to get those in there. So recent months are definitely a theme in blue. Well, >>congratulations, great solution, I love this application because it highlights the power of the cloud, What's the future in store for the U. S. Air Force when it comes to predictive maintenance. >>Sure. I mean, I think at this point they are just going to continue adding additional top driver analyses you through our work for the past couple years. We've identified a lot of operational and functional opportunities for them. So there's gonna be some definitely foundational changing coming along, some enabling new technologies to get that data integrity more automated as well so that there isn't such a heavy lift on the downstream, we're talking about data cleansing, but I think as far as predictive maintenance goes, we're definitely going to see more and more improvements across the readiness level, getting rid of and eliminating that unscheduled event that drives a lot of the readiness concerns that are out there. And we're also hoping to see a lot more improvement and I'd say enhancement across the supply chain because we know that's also an area that really they could get ahead on your part of our other work as we developed a five year long range supply forecast and it's really been opening some eyes to see how they can better plan, not only on the maintenance side but also supporting maintenance from a logistics and supply, >>great stuff melissa. Great to have you on President Ceo Path Con, you're also the business owner. Um how's things going with the business? The pandemic looks like I'm gonna come out of it stronger. Got the tailwind with cloud technology. The modernization boom is here in, in Govcloud, 10 years celebrating Govcloud birthday here at this event. How's business house? How are you doing >>good. Everything has actually been, we were, I guess fortunate, as I mentioned the very beginning, we were remote companies. So fortunately for us the pandemic did not have that much of an operational hiccup and being that a lot of our clients are in the federal space, we were able to continue working and amazingly we actually grew during the pandemic. We added quite a bit of a personnel to the team and so we're looking forward to doing some more predictive maintenance across, not only explaining the Air Force but the other services as well. >>You know, the people who were Agile had some cloud action going on, we're productive and they came out stronger melissa. Great to have you on the cube. Thank you for coming in remotely and joining our face to face event from the interwebs. Thank you so much for coming on cuba >>All right, thank you, john have a great rest of your day. >>Okay. I'm john for here at the cube with a W. S. Public sector summit in person and remote bringing guest on. We've got the new capability of bringing remotes in. We do in person. I'll see you face to face hear the cube and it's like to be here at the public sector summit. Thanks for watching. Mhm. Mhm >>robert, Herjavec
SUMMARY :
I'm john fraser host of the queues and in person event but of course we have remote guests. Excellent, thank you. A lot of people remote calling in checking things out kind of an interesting time, we always have been remote so it's not too much of a change but it is definitely There is a case study with the U. So to do that it was a big ask of do we have the data So for us it was really how do we leverage and embrace I was gonna ask you about the machine learning and ai component, you brought that up. So that way we can in in to solve the human error part or was it the mix and match because the different data sets, depending on the users that we knew were going to get involved with it as well as I You've got a lot of head room to grow into with Unsupervised, So for us with a W. S. Has been a great partnership. And we pull in our AWS partners and ask, hey, you know when it's going to get into the gulf cloud What's the future in store for the U. S. Air Force when it comes to predictive maintenance. enhancement across the supply chain because we know that's also an area that really Got the tailwind with cloud technology. that a lot of our clients are in the federal space, we were able to continue working and amazingly we actually Great to have you on the cube. We've got the new capability of bringing remotes in.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
AWS | ORGANIZATION | 0.99+ |
Washington D. C. | LOCATION | 0.99+ |
john | PERSON | 0.99+ |
U. S. Air Force | ORGANIZATION | 0.99+ |
Air Force Lifecycle Management Center | ORGANIZATION | 0.99+ |
robert | PERSON | 0.99+ |
U. S. Air Force | ORGANIZATION | 0.99+ |
Air Force | ORGANIZATION | 0.99+ |
five year | QUANTITY | 0.99+ |
18% | QUANTITY | 0.99+ |
United States Air Force | ORGANIZATION | 0.99+ |
Amazon | ORGANIZATION | 0.99+ |
cuba | LOCATION | 0.99+ |
10 years | QUANTITY | 0.99+ |
World War Two | EVENT | 0.99+ |
two platforms | QUANTITY | 0.99+ |
Melissa Pavlik | PERSON | 0.99+ |
amazon | ORGANIZATION | 0.99+ |
today | DATE | 0.99+ |
five years ago | DATE | 0.99+ |
both | QUANTITY | 0.98+ |
both items | QUANTITY | 0.98+ |
Govcloud | ORGANIZATION | 0.98+ |
john fraser | PERSON | 0.98+ |
over 6000 users | QUANTITY | 0.98+ |
first time | QUANTITY | 0.97+ |
2019 | DATE | 0.97+ |
Herjavec Milissa Pavlik | PERSON | 0.97+ |
about five years ago | DATE | 0.96+ |
pandemic | EVENT | 0.95+ |
W. S. Public sector | EVENT | 0.91+ |
ec two | ORGANIZATION | 0.9+ |
S three | ORGANIZATION | 0.89+ |
GovCloud | TITLE | 0.88+ |
President | PERSON | 0.87+ |
I. L. Five | LOCATION | 0.83+ |
three key | QUANTITY | 0.8+ |
Glacier | ORGANIZATION | 0.79+ |
801 +71 | OTHER | 0.75+ |
past couple years | DATE | 0.73+ |
petabytes | QUANTITY | 0.69+ |
AWS Summit DC 2021 | EVENT | 0.67+ |
melissa | LOCATION | 0.65+ |
Ceo POV con | ORGANIZATION | 0.62+ |
W. S. | ORGANIZATION | 0.62+ |
Ceo Path Con | EVENT | 0.61+ |
melissa | PERSON | 0.59+ |
Agile | ORGANIZATION | 0.55+ |
one platform | QUANTITY | 0.53+ |
cloud | ORGANIZATION | 0.53+ |
one | QUANTITY | 0.52+ |
PavCon | EVENT | 0.52+ |
Air | ORGANIZATION | 0.5+ |
Athena | ORGANIZATION | 0.43+ |
Sandy Carter, AWS & Jennifer Blumenthal, OneRecord | AWS Summit DC 2021
>>no real filter and that kind of stuff. But you're also an entrepreneur, right? And you know the business, you've been in software, you detect business. I'm instructing you get a lot of pictures, this entertainment business on our show, we're a bubble. We don't do a lot of tech deals that were talking because it's boring tv tech people love tech consumers love the benefit of text. No consumer opens up their iphone and says, oh my gosh, I love the technology behind my, what's it been like being on the shark tank? You know, filming is fun and hang out just fun and it's fun to be a celebrity at first your head gets really big and you get a really good tables at restaurants and who says texas has got a little possessed more skin in the game today in charge of his destiny. Great robert Herjavec. No, these two stars cube alumni >>welcome back to the cubes coverage of A W. S. Public sector seven. I'm john for your host of the cube got a great segment here on healthcare startup accelerators of course. Sandy carter is co hosting media. This one Vice President Aws. She's awesome on the cuBA and jennifer Blumenthal co founder and C of one record entrepreneur, very successful. Thanks for coming on jennifer. Thank good to see you. Sandy thanks for joining me again. You >>are most welcome, >>jennifer. Before we get into the whole accelerated dynamic, just take a minute to explain what you guys do. One record. >>Sure. So one record is a digital health company that enables users to access aggregate and share their healthcare information. So what that means is we help you as a person get your data and then we also help companies who would like to have workflows were consumers in the loop to get their data. So whether they're sharing it with a provider, researcher payer. >>So, Sandy, we've talked about this amazon web services, healthcare accelerator cohort batches. What do you call cohort batches? Cohorts explain what's going on with the healthcare accelerator? >>Yeah. So, um, we decided that we would launch and partner an accelerator program and accelerator program just provides to a start up a little bit extra technical help. A little bit extra subject matter expertise and introductions to funders. And so we decided we were going to start one for health care. It's one of the biggest disruptive industries in public sector. Um, and so we weren't sure how it's gonna go. We partnered with Kids X. Kids X is part of the Los Angeles system for medical. And so we put out a call for startups and we had 427 startups, we were told on average and accelerating it's 50-100. So we were blown away 31 different countries. So it was really amazing. And then what we've been doing is down selecting and selecting that Top 10 for our first cohort. So we're going from 427 down to 10. And so obviously we looked at the founders themselves to see the quality of the leadership of the company, um the strength of their technology and the fit of the technology into the broader overall healthcare and healthcare ecosystem. And so we were thrilled that jennifer and one record was one of the top 10 start ups in this space that we chose to be in the, in the cohort. And so now we're going to take it to the six weeks intensive where we'll do training, helping them with AWS, provide them A W. S. Credits and then Kid X will also provide some of the health care uh subject matter >>expertise as well. Can I get some of those credits over here to maybe? >>Yes, you can actually, you can talk to me don you can't >>Talk to me, Jennifer, I gotta ask you. So you're an entrepreneur. So doing start doing cos it's like a roller coaster. So now to make the top 10 but also be in the area of his accelerator, it's a partnership, right? You're making a bet. What's your take on all this? >>Well, we've always been partners with a W. S. We started building on AWS in the very beginning. So when I was setting up the company a huge decision early on with infrastructure and when I saw the launch of the accelerator, I had to apply because we're at the point in the company that we're growing and part of growing is growing with the VW. So I was really excited to take advantage of that opportunity and now in the accelerator, it's more of thinking about things that we weren't thinking about the services that we can leverage to fill in the gaps within our platform so we can meet our customers where they are >>using award winning MSP cloud status city, your partners, great relationship with the ecosystem. So congratulations Sandi. What's the disruption for the healthcare? Because right now education and health care, the two top areas we're seeing and we're reporting on where cloud scale developed two point or whatever buzzword digital transformation you want to use is impacting heavily healthcare industry. There's some new realities. What's your, what's your vision, what's your view? >>Hey john before she does that, I have to give a plug to Claudius city because they just made premier partner as well, which is a huge deal. Uh and they're also serving public sector. So I just wanted to make sure that you knew that too. So you can congratulate. Go ahead, jennifer >>Well, so if I zoom in, I think about a P. I. S. Every day, that's what I think about and I think about microservices. So for me and for one record, what we think about is legislation. So 21st century Cures act says that you as a consumer have to be able to access your healthcare data from both your providers and from your players and not just your providers, but also the underlying technology vendors and H. I. E. S. H. I am and it's probably gonna extend to really anyone who plays within the healthcare ecosystem. So you're just going to see this explosion of A. P. I. S. And we're just your one of that. I mean for the payers that we went into effect on july 1st. So I mean when you think about the decentralization of healthcare where healthcare is being delivered plus an api economy, you're just going to have a whole new model developing and then throwing price transparency and you've got a whole new cake. >>I'm smiling because I love the peacocks. In fact, last night I shouldn't have tweeted this but there's a little tweet flames going on around A. P. Is being brittle and all this stuff and I said, hey developer experience about building great software apps are there for you. It's not a glue layer by itself. You got to build software around the so kind of a little preaching to the younger generation. But this health care thing is huge because think about like old school health care, it was anti ap I was also siloed. So what's your take on has the culture is changing health care because the user experience, I want my records, I want my privacy, I want to maintain everything confidential but access. That's hard. >>I think well health care to be used to just be paper was forget about a. P. I. Is it was just paper records. I think uh to me you think about uh patient journey, like a patient journey starts with booking an appointment and then everything after that is essentially an api call. So that's how I think about it is to all these micro transactions that are happening all the time and you want your data to go to your health care provider so they can give you the proper care, you want your data to go to your pair so they can pay for your care and then those two stakeholders want your data so that they can provide the right services at the right time to the right channel. And that is just a series of api calls that literally sits on a platform. >>What's interesting, I'd love to get your take on the where you think the progress bar is in the industry because Fintech has shown the way you got defy now behind a decentralized finance, health care seems to be moving on in a very accelerated rate towards that kind of concept of cloud, scale, decentralization, privacy. >>Yeah, I mean, that's a big question, what's interesting to me around that is how healthcare stakeholders are thinking about where they're providing care. So as they're buying up practices primary care specialty care and they're moving more and more outside of the brick and mortar of the health care system or partnering with your startups. That's really where I think you're going to see a larger ecosystem development, you could just look at CVS and walmart or the dollar store if they're going to be moving into health care, what does that look like? And then if you're seeking care in those settings, but then you're going to Mayo clinic or Kaiser permanente, there's so many new relationships that are part of your hair circle >>delivery is just what does that even mean now, delivery of health >>care. It's wherever you it's like the app economy you want to ride right now, you want a doctor right now, that's where we're heading its ease of use. >>This is this exciting startups, changing the game. Yes, I love it. I mean, this is what it's all about this health >>Care, this is what it's all about. And if you look at the funding right now from VCS, we're seeing so much funding pour into health care, we were just looking at some numbers and in the second quarter alone, the funding went up almost 700%. And the amount of funding that is pouring into companies like jennifer's company to really transform healthcare, 30% of it is going into telehealth. So when you talked about, you know, kind of ai at the edge, getting the right doctor the right expert at the right time, we're seeing that as a big trend in healthcare to >>well jennifer, I think the funding dynamics aside the opportunity for market total addressable market is massive when the application is being decomposed, you got front end, whether it's telemedicine, you got the different building blocks of healthcare being radically reconfigured. It's a re factoring of healthcare. Yeah, >>I think if you just think about where we're sitting today, you had to use an app to prove proof of vaccination. So this is not just national, this is a global thing to have that covid wallet. We at one record have a covid wallet. But just a couple years from now, I need more than just by covid vaccination. I need all my vaccinations. I need all my lab results. I need all my beds. It's opening the door for a new consumer behavior pattern, which is the first step to adoption for any technology. >>So somebody else covid wallet. So I need >>that was California. Did the, did a version of we just have a pen and it's pretty cool. Very handy. I should save it to my drive. But my phone, but I don't jennifer, what's the coolest thing you're working on right now because you're in the middle of all the action. >>I get very excited about the payer app is that we're working on. So I think by the end of the month we will be connected to almost to all the blues in the United States. So I'm very excited when a user comes into the one record and they're able to get their clinical data from the provider organization and then their clinical financial and formulary data from their payers because then you're getting a complete view, You're getting the records for someone who gave you care and you're getting the records from someone who paid for your care. And that's an interesting thing that's really moving towards a complete picture. So from a personal perspective that gets exciting. And then from a professional perspective, it's really working with our partners as they're using our API s to build out workflows and their applications. >>It's an api economy. I'd like to ask you to on the impact side to the patient. I hear a lot of people complaining that hey, I want to bring my records to the doctor and I want to have my own control of my own stuff. A lot of times, some doctors don't even know other historical data points about a patient that could open up a diagnosis and, or care >>or they can't even refer you to a doctor. Most doctors really only refer within a network of people that they know having a provider directory that allows doctors refer, having the data from different doctors outside of their, you know, I didn't really allows people to start thinking beyond just their little box. >>Cool. Well, great to have you on and congratulations on being in the top 10 saying this is a wonderful example of how the ecosystem where you got cloud city, your MSP. You mentioned the shout out to them jerry Miller and his team by working together the cloud gives you advantages. So I have to ask, we look at amazon cloud as an entrepreneur. It's kind of a loaded question, but I'm going to ask it. I love it. >>You always do it >>when you look at amazon, what do you see as opportunities as an entrepreneur? Because I'll see the easy ones. They have computing everything else. But like what's the, what does cloud do for you as an entrepreneur? What does it, what does it make you do? >>Yeah. So for been working with jerry since the beginning for me when I think about it, it's really the growth of our company. So when we start building, we really just thinking about it from a monolithic build and we move to microservices and amazon has been there every step of the way to support us as that. And now, you know, the things that I'm interested in are specifically health lake and anything that's NLP related that we could plug into our solution for when we get data from different sources that are coming in really unstructured formats and making it structured so that it's searchable for people and amazon does that for us with their services that we can add into the applications. >>Yeah, we announced that data health like and july it has a whole set of templates for analytics, focused on health care as well as hip hop compliance out of the box as well. >>The I think I think that's what's important is people used to think application first. Now it's creating essentially a data lake, then analytics and then what applications you build on top of that. And that's how our partners think about it and that's how we try and service them using amazon as our problem. So >>you're honing in on the value of the data and how that conflicts and then work within the whatever application requests might come >>in. Yes, >>it's interesting. You know, we had an event last month and jerry Chen from Greylock partners came on and gave a talk called castles in the cloud. He's gonna be cute before. He's a, he's a veces, they talk about moats and competitive manage so having a moat, The old school perimeter moz how cloud destroyed that. He's like, no, now the castles are in the cloud, he pointed snowflake basically data warehouse in the cloud red shifts there too. But they can be successful. And that's how the cloud, you could actually build value, sustainable value in the cloud. If you think that way of re factoring not just hosting a huge, huge, huge thing. >>I think the only thing he, this was customer service because health care is still very personal. So it's always about how you interact with the end user and how you can help me get to where they need to be going >>and what do you see that going? Because that's, that's a good point. >>I think that is a huge opportunity for any new company that wants to enter healthcare, customer service as a service in health care for all the different places that health care is going to be delivered. Maybe there's a company that I don't know about, but when they come out, I'd like to meet them. >>Yeah, I mean, I can't think of one cover that can think of right now. This is what I would say is great customer service for health care. >>And if there is one out there contacted me because I want to talk to you about AWS. >>Yeah. And you need the app from one record that make it all >>happen. That's where Omni channel customer service across all health care entities. Yeah, that's >>a great billion dollar idea for someone listening to our show right now. >>Right, alright. So saying they had to give you the opportunity to talk more because this is a great example of how the world's very agile. What's the next step for the AWS Healthcare accelerator? Are there more accelerators? Do you do it by vertical? >>What happens next? So, with the healthcare accelerator, this was our first go at the accelerator. So, this is our first set of cohorts, Of course, all 427 companies are going to get some help from a W. S. as well. We also you'll love this john We also did a space accelerator. Make sure you ask Clint about that. So we have startups that are synthesizing oxygen on mars to sending an outpost box to the moon. I mean, it's crazy what these startups are doing. Um, and then the third accelerator we started was around clean energy. So sustainability, we sold that one out to, we had folks from 66 different countries participate in that one. So these have been really successful for us. So it reinvent. When we talk again, we'll be announcing a couple of others. So right now we've got healthcare, space, clean energy and we'll be announcing a couple other accelerators moving forward. >>You know, it's interesting, jennifer the pandemic has changed even our ability to get stories. Just more stories out there now. So you're seeing kind of remote hybrid connections, ap ideas, whether it's software or remote interviews or remote connections. There's more stories being told out there with digital transformation. I mean there wasn't that many before pandemic has changed the landscape because let's face it, people were hiding some really bad projects behind metrics. But when you pull the pandemic back and you go, hey, everyone's kind of emperors got no clothes on. Those are bad projects. Those are good projects that cloud investment worked or I didn't have a cloud investment. They were pretty much screwed at that point. So this is now a new reality of like value, you can't show me value. >>It's crazy to me when I meet people who tell me like we want to move to the cloud of like, why are you not on the cloud? Like this really just blows my life. Like I don't understand why you have on prem or while you did start on the cloud, this is more for larger organizations, but younger organizations, you know, the first thing you have to do, it's set up that environment. >>Yeah. And then now with the migration plans and seeing here, uh whereas education or health care or other verticals, you've got, now you've got containers to give you that compatibility and then you've got kubernetes and you've got microservices, you've got land. Uh I mean, come on, that's the perfect storm innovation. There's no excuses in my opinion. So, you know, if you're out there and you're not leveraging it, then you're probably gonna be out of business. That's my philosophy. Thank you for coming up. Okay. Sandy, thank you. Thank you, john Okay. Any of his coverage here, summit here in D. C. I'm john ferrier. Thanks for watching. Mm >>mm mm mhm. I have been in the software and technology industry for over 12 years now, so I've had >>the opportunity
SUMMARY :
And you know the business, you've been in software, She's awesome on the cuBA and jennifer Blumenthal co Before we get into the whole accelerated dynamic, just take a minute to explain what you guys do. So what that means is we help you as a person What do you call cohort batches? one of the top 10 start ups in this space that we chose to be in Can I get some of those credits over here to maybe? So now to make the top 10 but also be in the area of his accelerator, So when I was setting up the company a huge decision early on with infrastructure and Because right now education and health care, the two top areas we're seeing So I just wanted to make sure that you knew that too. So 21st century Cures act says that you as a consumer So what's your take on has the culture is changing all the time and you want your data to go to your health care provider so they can give you the proper care, Fintech has shown the way you got defy now behind a decentralized finance, and more outside of the brick and mortar of the health care system or partnering with your startups. It's wherever you it's like the app economy you want to ride right now, you want a doctor right now, I mean, this is what it's all about this health So when you talked about, addressable market is massive when the application is being decomposed, you got front end, I think if you just think about where we're sitting today, you had to use an app to prove proof of vaccination. So I need I should save it to my drive. You're getting the records for someone who gave you care and you're getting the records from someone who I'd like to ask you to on the impact side to the patient. a provider directory that allows doctors refer, having the data from different doctors outside of their, of how the ecosystem where you got cloud city, your MSP. when you look at amazon, what do you see as opportunities as an entrepreneur? And now, you know, the things that I'm interested in are specifically health lake Yeah, we announced that data health like and july it has a whole set of templates for analytics, a data lake, then analytics and then what applications you build on top of that. And that's how the cloud, So it's always about how you interact with the end user and how you can help me get to where they need to be going and what do you see that going? customer service as a service in health care for all the different places that health care is going to be delivered. Yeah, I mean, I can't think of one cover that can think of right now. That's where Omni channel customer service across all health care entities. So saying they had to give you the opportunity to talk more because this is a great example of how the world's So we have startups that are synthesizing oxygen on mars to But when you pull the pandemic back and you go, hey, everyone's kind of emperors got no clothes why are you not on the cloud? So, you know, if you're out there and you're not leveraging it, then you're probably gonna be out of business. have been in the software and technology industry for over 12 years now, so I've had
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Nicola | PERSON | 0.99+ |
Michael | PERSON | 0.99+ |
David | PERSON | 0.99+ |
Josh | PERSON | 0.99+ |
Microsoft | ORGANIZATION | 0.99+ |
Dave | PERSON | 0.99+ |
Jeremy Burton | PERSON | 0.99+ |
Paul Gillon | PERSON | 0.99+ |
GM | ORGANIZATION | 0.99+ |
Bob Stefanski | PERSON | 0.99+ |
Lisa Martin | PERSON | 0.99+ |
Dave McDonnell | PERSON | 0.99+ |
amazon | ORGANIZATION | 0.99+ |
John | PERSON | 0.99+ |
James Kobielus | PERSON | 0.99+ |
Keith | PERSON | 0.99+ |
Paul O'Farrell | PERSON | 0.99+ |
IBM | ORGANIZATION | 0.99+ |
Keith Townsend | PERSON | 0.99+ |
BMW | ORGANIZATION | 0.99+ |
Ford | ORGANIZATION | 0.99+ |
David Siegel | PERSON | 0.99+ |
Cisco | ORGANIZATION | 0.99+ |
Sandy | PERSON | 0.99+ |
Nicola Acutt | PERSON | 0.99+ |
Paul | PERSON | 0.99+ |
David Lantz | PERSON | 0.99+ |
Stu Miniman | PERSON | 0.99+ |
three | QUANTITY | 0.99+ |
Lisa | PERSON | 0.99+ |
Lithuania | LOCATION | 0.99+ |
Michigan | LOCATION | 0.99+ |
AWS | ORGANIZATION | 0.99+ |
General Motors | ORGANIZATION | 0.99+ |
Apple | ORGANIZATION | 0.99+ |
America | LOCATION | 0.99+ |
Charlie | PERSON | 0.99+ |
Europe | LOCATION | 0.99+ |
Pat Gelsing | PERSON | 0.99+ |
ORGANIZATION | 0.99+ | |
Bobby | PERSON | 0.99+ |
London | LOCATION | 0.99+ |
Palo Alto | LOCATION | 0.99+ |
Dante | PERSON | 0.99+ |
Switzerland | LOCATION | 0.99+ |
six-week | QUANTITY | 0.99+ |
VMware | ORGANIZATION | 0.99+ |
Seattle | LOCATION | 0.99+ |
Bob | PERSON | 0.99+ |
Amazon Web Services | ORGANIZATION | 0.99+ |
100 | QUANTITY | 0.99+ |
Michael Dell | PERSON | 0.99+ |
John Walls | PERSON | 0.99+ |
Amazon | ORGANIZATION | 0.99+ |
John Furrier | PERSON | 0.99+ |
California | LOCATION | 0.99+ |
Sandy Carter | PERSON | 0.99+ |
General Keith Alexander, IronNet Cybersecurity & Gil Quiniones, NY Power Authority | AWS PS Awards
(bright music) >> Hello and welcome to today's session of the 2021 AWS Global Public Sector Partner Awards for the award for Best Partner Transformation, Best Cybersecurity Solution. I'm now honored to welcome our next guests, General Keith Alexander, Founder, and Co-CEO of IronNet Cybersecurity, as well as Gil Quiniones, President and CEO of the New York Power Authority. Welcome to the program gentlemen, delighted to have you here. >> Good to be here. >> Terrific. Well, General Alexander, I'd like to start with you. Tell us about the collective defense program or platform and why is it winning awards? >> Well, great question and it's great to have Gil here because it actually started with the energy sector. And the issue that we had is how do we protect the grid? The energy sector CEOs came together with me and several others and said, how do we protect this grid together? Because we can't defend it each by ourselves. We've got to defend it together. And so the strategy that IronNet is using is to go beyond what the conventional way of sharing information known as signature-based solutions to behavioral-based so that we can see the events that are happening, the unknown unknowns, share those among companies and among both small and large in a way that helps us defend because we can anonymize that data. We can also share it with the government. The government can see a tax on our country. That's the future, we believe, of cybersecurity and that collective defense is critical for our energy sector and for all the companies within it. >> Terrific. Well, Gil, I'd like to shift to you. As the CEO of the largest state public power utility in the United States, why do you think it's so important now to have a collective defense approach for utility companies? >> Well, the utility sector lied with the financial sector as number one targets by our adversaries and you can't really solve cybersecurity in silos. We, NYPA, my company, New York Power Authority alone cannot be the only one and other companies doing this in silos. So what's really going to be able to be effective if all of the utilities and even other sectors, financial sectors, telecom sectors cooperate in this collective defense situation. And as we transform the grid, the grid is getting transformed and decentralized. We'll have more electric cars, smart appliances. The grid is going to be more distributed with solar and batteries charging stations. So the threat surface and the threat points will be expanding significantly and it is critical that we address that issue collectively. >> Terrific. Well, General Alexander, with collective defense, what industries and business models are you now disrupting? >> Well, we're doing the energy sector, obviously. Now the defense industrial base, the healthcare sector, as well as international partners along the way. And we have a group of what we call technical and other companies that we also deal with and a series of partner companies, because no company alone can solve this problem, no cybersecurity company alone. So partners like Amazon and others partner with us to help bring this vision to life. >> Terrific. Well, staying with you, what role does data and cloud scale now play in solving these security threats that face the businesses, but also nations? >> That's a great question. Because without the cloud, bringing collective security together is very difficult. But with the cloud, we can move all this information into the cloud. We can correlate and show attacks that are going on against different companies. They can see that company A, B, C or D, it's anonymized, is being hit with the same thing. And the government, we can share that with the government. They can see a tax on critical infrastructure, energy, finance, healthcare, the defense industrial base or the government. In doing that, what we quickly see is a radar picture for cyber. That's what we're trying to build. That's where everybody's coming together. Imagine a future where attacks are coming against our country can be seen at network speed and the same for our allies and sharing that between our nation and our allies begins to broaden that picture, broaden our defensive base and provide insights for companies like NYPA and others. >> Terrific. Well, now Gil, I'd like to move it back to you. If you could describe the utility landscape and the unique threats that both large ones and small ones are facing in terms of cybersecurity and the risks, the populous that live there. >> Well, the power grid is an amazing machine, but it is controlled electronically and more and more digitally. So as I mentioned before, as we transform this grid to be a cleaner grid, to be more of an integrated energy network with solar panels and electric vehicle charging stations and wind farms, the threat is going to be multiple from a cyber perspective. Now we have many smaller utilities. There are towns and cities and villages that own their poles and wires. They're called municipal utilities, rural cooperative systems, and they are not as sophisticated and well-resourced as a company like the New York Power Authority or our investor on utilities across the nation. But as the saying goes, we're only as strong as our weakest link. And so we need- >> Terrific. >> we need to address the issues of our smaller utilities as well. >> Yeah, terrific. Do you see a potential for more collaboration between the larger utilities and the smaller ones? What do you see as the next phase of defense? >> Well, in fact, General Alexander's company, IronNet and NYPA are working together to help bring in the 51 smaller utilities here in New York in their collective defense tool, the IronDefense or the IronDome as we call it here in New York. We had a meeting the other day, where even thinking about bringing in critical state agencies and authorities. The Metropolitan Transportation Authority, Port Authority of New York and New Jersey, and other relevant critical infrastructure state agencies to be in this cloud and to be in this radar of cybersecurity. And the beauty of what IronNet is bringing to this arrangement is they're trying to develop a product that can be scalable and affordable by those smaller utilities. I think that's important because if we can achieve that, then we can replicate this across the country where you have a lot of smaller utilities and rural cooperative systems. >> Yeah. Terrific. Well, Gil, staying with you. I'd love to learn more about what was the solution that worked so well for you? >> In cybersecurity, you need public-private partnerships. So we have private companies like IronNet that we're partnering with and others, but also partnering with state and federal government because they have a lot of resources. So the key to all of this is bringing all of that information together and being able to react, the General mentioned, network speed, we call it machine speed, has to be quick and we need to protect and or isolate and be able to recover it and be resilient. So that's the beauty of this solution that we're currently developing here in New York. >> Terrific. Well, thank you for those points. Shifting back to General Alexander. With your depth of experience in the defense sector, in your view, how can we stay in front of the attacks, mitigate them, and then respond to them before any damage is done? >> So having run our nations, the offense. I know that the offense has the upper hand almost entirely because every company and every agency defends itself as an isolated entity. Think about 50 mid-sized companies, each with 10 people, they're all defending themselves and they depend on that defense individually and they're being attacked individually. Now take those 50 companies and their 10 people each and put them together and collect the defense where they share information, they share knowledge. This is the way to get out in front of the offense, the attackers that you just asked about. And when people start working together, that knowledge sharing and crowdsourcing is a solution for the future because it allows us to work together where now you have a unified approach between the public and private sectors that can share information and defend each of the sectors together. That is the future of cybersecurity. What makes it possible is the cloud, by being able to share this information into the cloud and move it around the cloud. So what Amazon has done with AWS has exactly that. It gives us the platform that allows us to now share that information and to go at network speed and share it with the government in an anonymized way. I believe that will change radically how we think about cybersecurity. >> Yeah. Terrific. Well, you mention data sharing, but how is it now a common tactic to get the best out of the data? And now, how is it sharing data among companies accelerated or changed over the past year? And what does it look like going forward when we think about moving out of the pandemic? >> So first, this issue of sharing data, there's two types of data. One about the known threats. So sharing that everybody knows because they use a signature-based system and a set of rules. That shared and that's the common approach to it. We need to go beyond that and share the unknown. And the way to share the unknown is with behavioral analytics. Detect behaviors out there that are anonymous or anomalous, are suspicious and are malicious and share those and get an understanding for what's going on in company A and see if there's correlations in B, C and D that give you insights to suspicious activity. Like solar winds, recognizes solar winds at 18,000 companies, each defending themselves. None of them were able to recognize that. Using our tools, we did recognize it in three of our companies. So what you can begin to see is a platform that can now expand and work at network speed to defend against these types of attacks. But you have to be able to see that information, the unknown unknowns, and quickly bring people together to understand what that means. Is this bad? Is this suspicious? What do I need to know about this? And if I can share that information anonymized with the government, they can reach in and say, this is bad. You need to do something about it. And we'll take the responsibility from here to block that from hitting our nation or hitting our allies. I think that's the key part about cybersecurity for the future. >> Terrific. General Alexander, ransomware of course, is the hottest topic at the moment. What do you see as the solution to that growing threat? >> So I think, a couple things on ransomware. First, doing what we're talking about here to detect the phishing and the other ways they get in is an advanced way. So protect yourself like that. But I think we have to go beyond, we have to attribute who's doing it, where they're doing it from and hold them accountable. So helping provide that information to our government as it's going on and going after these guys, making them pay a price is part of the future. It's too easy today. Look at what happened with the DarkSide and others. They hit Colonial Pipeline and they said, oh, we're not going to do that anymore. Then they hit a company in Japan and prior to that, they hit a company in Norway. So they're attacking and they pretty much operate at will. Now, let's indict some of them, hold them accountable, get other governments to come in on this. That's the way we stop it. And that requires us to work together, both the public and private sector. It means having these advanced tools, but also that public and private partnership. And I think we have to change the rhetoric. The first approach everybody takes is, Colonial, why did you let this happen? They're a victim. If they were hit with missiles, we wouldn't be asking that, but these were nation state like actors going after them. So now our government and the private sector have to work together and we need to change that to say, they're victim, and we're going to go after the guys that did this as a nation and with our allies. I think that's the way to solve it. >> Yeah. Well, terrific. Thank you so much for those insights. Gil, I'd also like to ask you some key questions and of course, certainly people today have a lot of concerns about security, but also about data sharing. How are you addressing those concerns? >> Well, data governance is critical for a utility like the New York Power Authority. A few years ago, we declared that we aspire to be the first end-to-end digital utility. And so by definition, protecting the data of our system, our industrial controls, and the data of our customers are paramount to us. So data governance, considering data or treating data as an asset, like a physical asset is very, very important. So we in our cybersecurity, plans that is a top priority for us. >> Yeah. And Gil thinking about industry 4.0, how has the surface area changed with Cloud and IoT? >> Well, it's grown significantly. At the power authority, we're installing sensors and smart meters at our power plants, at our substations and transmission lines, so that we can monitor them real time, all the time, know their health, know their status. Our customers we're monitoring about 15 to 20,000 state and local government buildings across our states. So just imagine the amount of data that we're streaming real time, all the time into our integrated smart operations center. So it's increasing and it will only increase with 5G, with quantum computing. This is just going to increase and we need to be prepared and integrate cyber into every part of what we do from beginning to end of our processes. >> Yeah. And to both of you actually, as we see industry 4.0 develop even further, are you more concerned about malign actors developing more sophistication? What steps can we take to really be ahead of them? Let's start with General Alexander. >> So, I think the key differentiator and what the energy sector is doing, the approach to cybersecurity is led by CEOs. So you bring CEOs like Gil Quiniones in, you've got other CEOs that are actually bringing together forums to talk about cybersecurity. It is CEO led. That the first part. And then the second part is how do we train and work together, that collective defense. How do we actually do this? I think that's another one that NYPA is leading with West Point in the Army Cyber Institute. How can we start to bring this training session together and train to defend ourselves? This is an area where we can uplift our people that are working in this process, our cyber analysts if you will at the security operations center level. By training them, giving them hard tests and continuing to go. That approach will uplift our cybersecurity and our cyber defense to the point where we can now stop these types of attacks. So I think CEO led, bring in companies that give us the good and bad about our products. We'd like to hear the good, we need to hear the bad, and we needed to improve that, and then how do we train and work together. I think that's part of that solution to the future. >> And Gil, what are your thoughts as we embrace industry 4.0? Are you worried that this malign actors are going to build up their own sophistication and strategy in terms of data breaches and cyber attacks against our utility systems? What can we do to really step up our game? >> Well, as the General said, the good thing with the energy sector is that on the foundational level, we're the only sector with mandatory regulatory requirements that we need to meet. So we are regulated by the Federal Energy Regulatory Commission and the North American Electric Reliability Corporation to meet certain standards in cyber and critical infrastructure. But as the General said, the good thing with the utility is by design, just like storms, we're used to working with each other. So this is just an extension of that storm restoration and other areas where we work all the time together. So we are naturally working together when it comes to to cyber. We work very closely with our federal government partners, Department of Homeland Security, Department of Energy and the National Labs. The National Labs have a lot of expertise. And with the private sector, like great companies like IronNet, NYPA, we stood up an excellence, center of excellence with private partners like IronNet and Siemens and others to start really advancing the art of the possible and the technology innovation in this area. And as the governor mentioned, we partnered with West Point because just like any sporting or just any sport, actual exercises of the red team, green team, and doing that constantly, tabletop exercises, and having others try and breach your walls. Those are good exercises to really be ready against the adversaries. >> Yeah. Terrific. Thank you so much for those insights. General Alexander, now I'd like to ask you this question. Can you share the innovation strategy as the world moves out of the pandemic? Are we seeing new threats, new realities? >> Well, I think, it's not just coming out of the pandemic, but the pandemic actually brought a lot of people into video teleconferences like we are right here. So more people are working from home. You add in the 5G that Gil talked about that gives you a huge attack surface. You're thinking now about instead of a hundred devices per square kilometer up to a million devices. And so you're increasing the attack surface. Everything is changing. So as we come out of the pandemic, people are going to work more from home. You're going to have this attack surface that's going on, it's growing, it's changing, it's challenging. We have to be really good about now, how we trained together, how we think about this new area and we have to continue to innovate, not only what are the cyber tools that we need for the IT side, the internet and the OT side, operational technology. So those kinds of issues are facing all of us and it's a constantly changing environment. So that's where that education, that training, that communication, working between companies, the customers, the NYPA's and the IronNet's and others and then working with the government to make sure that we're all in sync. It's going to grow and is growing at an increased rate exponentially. >> Terrific. Thank you for that. Now, Gil, same question for you. As a result of this pandemic, do you see any kind of new realities emerging? What is your position? >> Well, as the General said, most likely, many companies will be having this hybrid setup. And for company's life like mine, I'm thinking about, okay, how many employees do I have that can access our industrial controls in our power plants, in our substations, and transmission system remotely? And what will that mean from a risk perspective, but even on the IT side, our business information technology. You mentioned about the Colonial Pipeline type situation. How do we now really make sure that our cyber hygiene of our employees is always up-to-date and that we're always vigilant from potential entry whether it's through phishing or other techniques that our adversaries are using. Those are the kinds of things that keep myself like a CEO of a utility up at night. >> Yeah. Well, shifting gears a bit, this question for General Alexander. How come supply chain is such an issue? >> Well, the supply chain, of course, for a company like NYPA, you have hundreds or thousands of companies that you work with. Each of them have different ways of communicating with your company. And in those communications, you now get threats. If they get infected and they reach out to you, they're normally considered okay to talk to, but at the same time that threat could come in. So you have both suppliers that help you do your job. And smaller companies that Gil has, he's got the 47 munis and four co-ops out there, 51, that he's got to deal with and then all the state agencies. So his ecosystem has all these different companies that are part of his larger network. And when you think about that larger network, the issue becomes, how am I going to defend that? And I think, as Gil mentioned earlier, if we put them all together and we operate and train together and we defend together, then we know that we're doing the best we can, especially for those smaller companies, the munis and co-ops that don't have the people and a security ops centers and other things to defend them. But working together, we can help defend them collectively. >> Terrific. And I'd also like to ask you a bit more on IronDefense. You spoke about its behavioral capabilities, it's behavioral detection techniques, excuse me. How is it really different from the rest of the competitive landscape? What sets it apart from traditional cybersecurity tools? >> So traditional cybersecurity tools use what we call a signature-based system. Think of that as a barcode for the threat. It's a specific barcode. We use that barcode to identify the threat at the firewall or at the endpoint. Those are known threats. We can stop those and we do a really good job. We share those indicators of compromise in those barcodes, in the rules that we have, Suricata rules and others, those go out. The issue becomes, what about the things we don't know about? And to detect those, you need behavioral analytics. Behavioral analytics are a little bit noisier. So you want to collect all the data and anomalies with behavioral analytics using an expert system to sort them out and then use collected defense to share knowledge and actually look across those. And the great thing about behavioral analytics is you can detect all of the anomalies. You can share very quickly and you can operate at network speed. So that's going to be the future where you start to share that, and that becomes the engine if you will for the future radar picture for cybersecurity. You add in, as we have already machine learning and AI, artificial intelligence, people talk about that, but in this case, it's a clustering algorithms about all those events and the ways of looking at it that allow you to up that speed, up your confidence in and whether it's malicious, suspicious or benign and share that. I think that is part of that future that we're talking about. You've got to have that and the government can come in and say, you missed something. Here's something you should be concerned about. And up the call from suspicious to malicious that gives everybody in the nation and our allies insights, okay, that's bad. Let's defend against it. >> Yeah. Terrific. Well, how does the type of technology address the President's May 2021 executive order on cybersecurity as you mentioned the government? >> So there's two parts of that. And I think one of the things that I liked about the executive order is it talked about, in the first page, the public-private partnership. That's the key. We got to partner together. And the other thing it went into that was really key is how do we now bring in the IT infrastructure, what our company does with the OT companies like Dragos, how do we work together for the collective defense for the energy sector and other key parts. So I think it is hit two key parts. It also goes on about what you do about the supply chain for software were all needed, but that's a little bit outside what we're talking about here today. The real key is how we work together between the public and private sector. And I think it did a good job in that area. >> Terrific. Well, thank you so much for your insights and to you as well, Gil, really lovely to have you both on this program. That was General Keith Alexander, Founder and Co-CEO of IronNet Cybersecurity, as well as Gil Quiniones, the President and CEO of the New York Power Authority. That's all for this session of the 2021 AWS Global Public Sector Partner Awards. I'm your host for theCUBE, Natalie Erlich. Stay with us for more coverage. (bright music)
SUMMARY :
President and CEO of the I'd like to start with you. And the issue that we had is in the United States, why do and it is critical that we and business models and other companies that we also deal with that face the businesses, And the government, we can and the risks, the the threat is going to be we need to address the issues and the smaller ones? and to be in this radar of cybersecurity. I'd love to learn more So the key to all of this is bringing in the defense sector, and defend each of the sectors together. the best out of the data? and share the unknown. is the hottest topic at the moment. and the private sector and of course, certainly and the data of our customers how has the surface area and we need to be prepared What steps can we take to the approach to are going to build up and the North American Electric like to ask you this question. and the OT side, operational technology. do you see any kind of Well, as the General said, most likely, this question for General Alexander. doing the best we can, like to ask you a bit more and that becomes the engine if you will Well, how does the type And the other thing it went and to you as well, Gil, really lovely
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
IronNet | ORGANIZATION | 0.99+ |
Siemens | ORGANIZATION | 0.99+ |
Natalie Erlich | PERSON | 0.99+ |
Federal Energy Regulatory Commission | ORGANIZATION | 0.99+ |
Amazon | ORGANIZATION | 0.99+ |
Gil Quiniones | PERSON | 0.99+ |
North American Electric Reliability Corporation | ORGANIZATION | 0.99+ |
New York Power Authority | ORGANIZATION | 0.99+ |
Japan | LOCATION | 0.99+ |
New York Power Authority | ORGANIZATION | 0.99+ |
two parts | QUANTITY | 0.99+ |
New York | LOCATION | 0.99+ |
NYPA | ORGANIZATION | 0.99+ |
Department of Homeland Security | ORGANIZATION | 0.99+ |
West Point | ORGANIZATION | 0.99+ |
Gil | PERSON | 0.99+ |
hundreds | QUANTITY | 0.99+ |
AWS | ORGANIZATION | 0.99+ |
first page | QUANTITY | 0.99+ |
Metropolitan Transportation Authority | ORGANIZATION | 0.99+ |
Department of Energy | ORGANIZATION | 0.99+ |
Norway | LOCATION | 0.99+ |
18,000 companies | QUANTITY | 0.99+ |
IronNet Cybersecurity | ORGANIZATION | 0.99+ |
two key parts | QUANTITY | 0.99+ |
United States | LOCATION | 0.99+ |
IronDefense | ORGANIZATION | 0.99+ |
50 companies | QUANTITY | 0.99+ |
National Labs | ORGANIZATION | 0.99+ |
Dragos | ORGANIZATION | 0.99+ |
Alexander | PERSON | 0.99+ |
First | QUANTITY | 0.99+ |
one | QUANTITY | 0.99+ |
IronDome | ORGANIZATION | 0.99+ |
10 people | QUANTITY | 0.99+ |
first part | QUANTITY | 0.99+ |
NY Power Authority | ORGANIZATION | 0.99+ |
both | QUANTITY | 0.99+ |
second part | QUANTITY | 0.99+ |
today | DATE | 0.99+ |
each | QUANTITY | 0.99+ |
51 smaller utilities | QUANTITY | 0.99+ |
first | QUANTITY | 0.99+ |
May 2021 | DATE | 0.99+ |
2021 AWS Global Public Sector Partner Awards | EVENT | 0.98+ |
Army Cyber Institute | ORGANIZATION | 0.98+ |
Each | QUANTITY | 0.98+ |
pandemic | EVENT | 0.98+ |
two types | QUANTITY | 0.98+ |
One | QUANTITY | 0.98+ |
General | PERSON | 0.97+ |
Keith Alexander | PERSON | 0.97+ |
50 mid-sized companies | QUANTITY | 0.97+ |
Chris Sachse, ThinkStack, and Michael Matthews, Mutual Credit Union | AWS PS Partner Awards 2021
>>Mhm >>Hello and welcome to today's session of the 2021 AWS Global Public Sector Partner Awards And I'm delighted to introduce our next guests. They are chris Saks Ceo of think stack and Michael Matthews President Ceo at mutual Credit Union. I'm your host for the cube Natalie. Ehrlich of course. And we're going to highlight the most impactful nonprofit partner award. Thank you gentlemen for joining the program. >>Thank you so much for having us. >>Terrific. Well delighted for you to be here. And Michael, I'd love to start with you. How did you figure out that cloud technology was critical to the future of mutual credit union? >>It's kind of by chance, Natalie, we're sitting down, we're looking at uh, racks of equipment in our I. T. Room and trying to keep everything up to date, um software updated, become a full time job and all of my staff and sat around and it come to a point where we were spending more time keeping upgrades, keeping servers upgraded. And we asked we reached out the things that they were a network provider at the time and we said, hey, whatever, what are our options? And they came back with several options and one of them was a W. S. And we explored it and uh we've not looked back. >>Terrific. Well, can you explain in further detail how you identified some of the gaps and what stood out to you about think stack, how this uh collaboration happened specifically? >>Well, some of the major gaps that you have is, you know, we're in Vicksburg Mississippi and I would say it's probably not the I. T mecca of the United States and staffing. What was a huge requirement for us if you're gonna make a move such as this, you've got to have the staffing and then along with the staffing is okay if you go out and we hire all these individuals to help help with this journey, are they going to become bored and you know, if we uh personally, if if I asked think stack, they would say, oh yes, don't do that hire us, but that's their job there, there there are parker vendor and so we went out, we asked other vendors that we use and what are the chances of us doing this and it was slim to none. And this type of technology you want, somebody who you can call and and all honesty, I want to be able to call chris and say chris, I'm having a problem versus, you know, one of my team called me and say we're having a problem, I'd rather call it and I love the vendor relationship. It has worked out well. Our major gaps in staffing though, Natalie >>what about staffing? >>That was our major gap. >>Oh God, it got it. Well, chris let's move on to you now. I'd love it if you could explain, you know, in some detail for our audience about the methodology of your company and also how you help your clients visualize their transformation processes. >>Yeah, for sure. Thanks Natalie. So we work with credit unions around the country and many of them are facing similar challenges to Michael at mutual. And in addition to staffing, they're often challenged with just the uncertain future of technology and that can include things like hurricanes, wildfires, various different disasters, pandemics and having to work remotely. But it also includes all of the opportunities that exist in transformative technologies for credit union. They need to keep pace with organizations like Robin Hood and stash and some of these other organizations that are providing cutting edge mobile apps and technology to their customers. And so how do you as an organization generally, that's a small nonprofit organization. How do you build the technology that will allow you to have a foundation to respond and react to whatever the world happens to throw actually, be that an opportunity to take advantage of for growth or some kind of risk from a cyber attack to a natural disaster. So what we try to do with our clients is take a very human centered approach first. And the idea behind that is to not walk in the door and talk about all the wonderful benefits of AWS or any other particular technology, but rather look at What do you expect. So if you take Michael, for example, you know, sitting down with him and trying to look out 10 years, what do you expect the industry to look like? What do you expect your organization to look like in? What goals do you have as a credit? You need to take advantage of those opportunities and to mitigate those risks. Once you identify those business needs, we can start looking at the humans that are involved in that experience. And so that would obviously be the employees and partners and vendors that support and make up the team at the credit union. And then obviously it's their current members and then any other members that they want to attract. And so you have to look at both sides of this. How how do you work securely efficiently? Um, as an employee on the flip side, how do you serve your members as well as you can serve them with cutting edge technology with technology that's always up and available. And then obviously with, with utmost security. So as we identify and build that picture, uh, we we generally do that with stick figures Natalie so we try to go in and and you know take um different personas and we use journey mapping and we use strategic foresight and various other exercise that help us uh literally paint a picture. Um and then from there we kind of back into that and say okay in order for you to accomplish these things into Have the organization that you want to have the next 10 years, what is your technology foundation and footprint need to look like to support that. And that's where we start to then back into that design which typically would include some type of public cloud services like AWS among other technologies from a cyber security perspective to build out that foundation and then allow them To respond and react to whatever the world throws at him over the next 10 years. >>Terrific. Well Michael would love to get your insight. How did you experience that human centered design focus, that think stack uh you know, is known for >>I think that's what says things take apart. You know, we there's numerous vendors you can go direct, there's there's plenty of software, there's plenty of technology out there you can buy. And as a credit union we can go out, we can just about get anything we wanted. But when we have a problem that we're trying to solve, it's not about that, it's about sitting down with chris his team and saying chris this this is a problem. We recently had one in password management, but we just this is a problem we're having. How do we solve this problem? And so the focus is not about trying to sell you another software. The focus is about solving the problem and having your staff and your team work more efficiently and effectively at their task. At the end of the day, you know, we're not arty people were in the financial service business. We rely on the solutions that we have to to help us do our jobs better and serve our members more effectively. >>Yeah, well, chris uh, you know, from your perspective, obviously human centered designed a really big component of your business, but what other key feature set your business apart from the competitive landscape? >>So I think the human centered design bleeds into another area that we really pride ourselves on, which is which is education and what I will call plain talk. So again, as Michael said, these organizations are our financial services, they're not technology experts, so you need to be able to communicate to those teams, those boards of directors, executive teams in a way that they can understand, and it can be uh somewhat difficult to talk about complex technical problems, um but when you boil it down back to that experience level, or you boil it down to a picture, it becomes a little easier to talk about. And what we want to be able to do as a partner is make sure our clients have confidence in the services or the products that they're purchasing, that they understand. How is this investment going to impact our credit union? How is this going to impact our members? And is this the right investment? It investments are, are significant. So we need to make sure that both parties understand the expectations of that investment and why they're doing that. So we take a lot of pride in the education and then probably the biggest piece uh and you know, it's one of those things that can be unappreciated, but its cybersecurity building, our infrastructure's with the tools and the processes and and the techniques so that everyone stays secure. I can tell you that there is nothing that would derail a digital transformation of an organization faster than a breach. So it's very important for us to make sure that those organizations, that everything that we do as fun as it is to talk about transformational technology equally as important that everything stays secure as we do it. >>Yeah. Well, excellent point. Certainly cybersecurity going to be a top uh topic for 2021 and beyond. Now, Michael, I'd like to move to you um what were the expected and unexpected business outcomes as a result of this partnership? >>Well, now we we we expected to have issues in the transition, which we really didn't um, I'll be honest with you, we we expected to have failures of servers. We expected stuff not to work because we were told by some of our other vendors that this will not work in a W S. Um and we were very surprised that most everything worked on AWS and it worked even better. Um some of the unexpected. So one of the main drivers of us moving to AWS was, I told you we had were limited on Rackspace I T room is when we want to implement a new service today, everything requires its own server. So everything needs an independent service, virtual server or physical server. We did not know how fast that could be done. So we would send a ticket in uh and we would say, hey, we need a new server here. The specs we're putting on this vendor, this is our time frame and we will get an email back the next morning. The servers ready to go where before? We weren't we didn't have that. That that was not an option. The main delay for new projects was to build up time and we weren't expecting that speech. No longer was that we all we expected that hey, we're not in a rush, but it'll be at least three months. And so now the team has to be ready to go as soon as you send the request in that we need this server is done uh and its speed up, speed up our time from uh, the idea our concept to going live with projects and we weren't that was something we had to get adjusted to. >>Yeah. And following up on that. What were some of the rational as well as the emotional impacts as a result of this collaboration? >>All right too. Two things and I don't know if they meet their, meet your that answer your question directly. But so one item we had in in a call, it's been several weeks back is when is the last time that anyone had to call it? Said, hey, I'm not working. My my can't access the server or I can complete dysfunction. And it's not been that way. We we've seen significantly improved up time, not only externally for our members who are logging in to do home banking or any other, any other feature, but internally for our staff we saw and I think it's just the entire transformation just made our company more resilient. What that was. I was as the metric we were seeing fewer instances of downtime. If we have downtown now, it's a power. We had an ice storm here in Mississippi, which is rare. Uh and we were down for a day. Um and if you lose internet today at any business you're down um The emotional side of I tell you, and it's been several years back on July four, we had a major major failure and our entire network was down and we this is prior to us moving to AWS and I'll just tell you I go home at night, this is the peace of mind that you can't put a dollar value on. I go home at night. And the last thing I'm worried about is my I. T. Network. I'm not worried about up time, I'm not worried about members, you know, going on facebook or any other social media and saying hey we can't we can't access your site what's going on and we don't have that anymore. And you know, I'm sure we could have had it any other way. But I leave that to the process of us moving from an in house holding everything on premise to moving to AWS, not only did it want to improve the results of those servers were able to back up to do different things, but it is to improve the overall working, working the functionality of our network. And I like I said I you can't put a dollar on this peace of mind and that is something I don't think there's any metric out there. You can measure, you can't measure that, but you know me and my team, we see it all the time. So >>Yeah, I agree, a peace of mind is certainly a priceless now Chris Let's move to you if you could outline to our audience some of the solutions that you provide, some of your other clients as well. Just give us a fuller picture of the services that you provide. Let's perhaps talk about, you know, 24/7 socks um services as well as data loss prevention or anything else that you think would be of interest to our audience? >>Yeah, for sure. So so obviously we I like to think of us like we design so we come in and we like to help you design and and figure out what your network needs to look like. That's not only your server and production network but also routing, switching. So Land Win S T Win various other networking projects equally. It's important that you can access the cloud as it is to move to the cloud, help with with productivity suite collaboration tools. Um and then finally, cyber security is a big part of that as well. So we try to come in and and look at all those things on the cybersecurity side. Very similar concept of what we do on the, on the cloud side, which is well design the tools and the infrastructure on the perimeter of the network, the configuration of any cloud environments, um such that they're secure and appropriate for your organization. Uh look at active directory or whatever organizational user management system you have to be using, implement those tools. Um and then as you mentioned, Natalie, we have a 24 x seven socks um with analysts watching that um that are all things that employees watching that board responding and reacting um using our our sin platform. And then we also have a 24 by seven uh network operations center or knocked. Um that is managing both the on site uh tools and network as well as any cloud uh networks that that they may have, keeping them up to date, doing all the routine maintenance, I will say from a cyber security perspective while it's not called the sock, the knock is just as important for cybersecurity as is the knock because we see that many cybersecurity attacks are often just taking advantage of systems that are not kept up to date. So the knock and that preventative maintenance is so important. So we do that for a lot of our clients. Some people pick and choose certain features. Some people use all of our services. >>Yeah. Terrific. Is that what you mean by security that's made to order? >>Yeah, exactly. Um you know, I think that's true of all technology. Um the biggest thing that we can do his look at the systems that you have during that design phase, we not only look at what technology should be should you be using, but also we take an assessment of your current team, What talent does your team have and where can we fill gaps if you have people that are doing security really well or you're doing preventative maintenance or some of these features? Uh Certainly you should keep that in house and we'll try to build services around those individuals that you have so that you're utilizing your talent to the best of your abilities and we're really fitting in um where you need us. >>Yeah. Terrific. Well, um you know, Michael, I'd like to shift to you now. What do you think will be the broader impact, you know, for the credit union industry? If others are not, you know, adopting the same kind of technologies um you know, to secure their cloud strategies. Mhm. >>I think whether credit unions want to or not, they're moving to the cloud. Um Most of our newest vendors are all cloud based. Um And so yes, he's either do it now or do it later. Which one do you want to be? And I do think that you're going to see more and more larger credit unions begin to move and it's scalable. It's more up time. It's easier to back up. A lot of people are hesitant. They don't want to take their information and move it out of town. They try to find a local data center are somewhere secure. And, and we looked at is what's the difference? You know, we, we we don't have latency issues with internet and fiber today. And so what is the difference of movement out of town and move to AWS by moving out of town? I still on the servers. I still leased the space. I still have to go over there. We have to have somebody there at all the time. And I'll be honest with you, I look at AWS as a trusted partner versus trying someone and then, and then it's not working locally and there's a lot of data centers you can, you can move to um I think I think it's going to come to the industry one way or the other. >>Yeah. Well, Terrific. Do you have any insight or you know, perhaps advice for another credit union who will, you know, like to take the next step? But, you know, as you mentioned, maybe a bit hesitant, >>I think doing your homework on it and looking at it as a, as a viable option is the first step. I know when I took it to my board and I talked about this um with chris and several people have so we we we talk about these things like the cloud, like it's this magical space and and our data is out there in Netherland and who knows where our data is. But when you break it down, you say, I have a East Coast data center and I have a West Coast data center. These are physical spaces where my dad is higher is held. Um I think it makes people think about a little differently. And and so when when you're if you're thinking about moving, if your if your in house today and you're thinking about how I'm gonna start outsourcing evaluate the cost, what are your ongoing cost, You know, who's gonna service you, Who's going to provide that service? And we've looked at other vendors over the years and I'll tell you, chris and his team have something unique that I found. Um I found very desirable in our situation is at our size and we're just under $300 million credit union. I don't think we have major projects that are too complicated to chris we're still, we're one of his better customers. I assume, chris me tell you something different in a minute, but we're not just a number, so I wouldn't go into a cube. You know, everybody knows each other. We're both small enough companies to where they're getting a lot bigger than we are now, but they're both small of companies where we're still, we we mean something to them, they care about moving to start versus just checking the box off. And so that's that's been our journey so far. Mhm. >>Yeah. Well, um, so, chris, uh, you know, first I want to know if Michael is one of your better customers, but uh, you know, really what I would I would really like to know is um, you know, what is your like, big sales pitch to? You know, as I mentioned to Michael, just some of those companies that are a little bit hesitant, a little bit on the edge. >>Michael is our best client of course because he's here doing this interview with us. No, um, you know, that that's something for us that are those, those human connections are, are, are so important and we do get very invested with any of the clients that we work with. But, um, in, in terms of the industry, I think Michael started to say at the beginning, which is, you're already there. We hear a lot of times from folks that they, I can't move to the cloud that the examiners or that the regulations do not allow them to be there. And that's, that's not true. Um, so what we're trying to do in partnership with KWS is educate the marketplaces as well as we can. Um, one of the biggest things that the cloud offers is this idea of flexibility and nimbleness and you know, unfortunately, I think Covid taught us that lesson, but there's, there's other lessons out there. I don't want to harp on Covid, I feel like that's all we talk about. Um, but if you look at any opportunity, whether it's a I machine learning, um, you know, Blockchain, pick the next technology, right? The reality is, none of us can really tell you where you're going to be in two years, maybe one year, three years, right? Like can you truly sit down after the past three years and tell me that you with no uncertainty, can tell me where your organization is going to be. And the reality is if you build your own data center right now, you have to make that guess Because you have to build something and designed for something and if you're making that investment, then you're doing that for the next probably 5-7 years. Whereas if you move to amazon you have the flexibility, whether that's scaling your organization up quickly, whether that's moving to the cloud, whether that's leveraging one of these technologies I just mentioned or in some cases even scaling back because things have hit a recession, we don't know what the future holds. But if you're in an environment like AWS, then you have the scalability and the flexibility to be able to move and pivot with that. And if you build your own and you happen to pick the wrong future, then then you could be in a bind and you've created your own limitations because you've decided to build for yourself. And I think that's the biggest thing is you can't build for yourself. You have to be flexible in this environment. That is that is the key. And the organizations that are flexible are the ones that are going to survive and thrive through all this uncertainty. Yeah. >>Well, really excellent point there. I totally agree with you. Wonderful to have you on our program. That was chris Saks Ceo of think stack as well as Michael Matthews, the president and Ceo at Mutual Credit Union. Thank you gentlemen for joining the show. Thanks so much. And that's all for this session of the AWS Global Public Sector Partner Awards. I'm your host Natalie or like thanks for >>watching. Mm.
SUMMARY :
Thank you gentlemen for joining the program. Well delighted for you to be here. And we asked we reached out the things that they were a network provider at the time and we said, hey, whatever, and what stood out to you about think stack, how this uh collaboration happened specifically? Well, some of the major gaps that you have is, you know, we're in Vicksburg Mississippi and I would say it's you know, in some detail for our audience about the methodology of your company and also how you picture, uh, we we generally do that with stick figures Natalie so we try to go in and and you centered design focus, that think stack uh you know, And so the focus is not about trying to sell you another so you need to be able to communicate to those teams, those boards of directors, Now, Michael, I'd like to move to you um what were the expected And so now the team has to be ready to go as a result of this collaboration? And I like I said I you can't put a dollar on this peace of mind and that is something you could outline to our audience some of the solutions that you provide, some of your other clients as so we come in and we like to help you design and and figure out what your network Is that what you mean by security that's made to order? Um the biggest thing that we can do his look at the systems that you have during Well, um you know, Michael, I'd like to shift to you now. lot of data centers you can, you can move to um I think I think it's going to come to the industry who will, you know, like to take the next step? But when you break it down, you know, what is your like, big sales pitch to? And the reality is if you build your own data center right now, Wonderful to have you on our program.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Michael | PERSON | 0.99+ |
Michael Matthews | PERSON | 0.99+ |
Natalie | PERSON | 0.99+ |
AWS | ORGANIZATION | 0.99+ |
Mississippi | LOCATION | 0.99+ |
KWS | ORGANIZATION | 0.99+ |
chris | PERSON | 0.99+ |
amazon | ORGANIZATION | 0.99+ |
Chris | PERSON | 0.99+ |
one year | QUANTITY | 0.99+ |
2021 | DATE | 0.99+ |
July four | DATE | 0.99+ |
three years | QUANTITY | 0.99+ |
Chris Sachse | PERSON | 0.99+ |
Ceo | PERSON | 0.99+ |
10 years | QUANTITY | 0.99+ |
24 | QUANTITY | 0.99+ |
two years | QUANTITY | 0.99+ |
United States | LOCATION | 0.99+ |
today | DATE | 0.99+ |
one | QUANTITY | 0.99+ |
both | QUANTITY | 0.99+ |
both sides | QUANTITY | 0.99+ |
I. T. Network | ORGANIZATION | 0.98+ |
chris Saks Ceo | PERSON | 0.98+ |
next morning | DATE | 0.98+ |
East Coast | LOCATION | 0.98+ |
Netherland | LOCATION | 0.97+ |
Mutual Credit Union | ORGANIZATION | 0.97+ |
President | PERSON | 0.97+ |
Two things | QUANTITY | 0.97+ |
both parties | QUANTITY | 0.97+ |
West Coast | LOCATION | 0.96+ |
2021 AWS Global Public Sector Partner Awards | EVENT | 0.96+ |
Robin Hood | PERSON | 0.96+ |
under $300 million | QUANTITY | 0.96+ |
first | QUANTITY | 0.95+ |
first step | QUANTITY | 0.94+ |
Covid | PERSON | 0.94+ |
AWS Global Public Sector Partner Awards | EVENT | 0.94+ |
Vicksburg Mississippi | LOCATION | 0.93+ |
seven | QUANTITY | 0.93+ |
Ehrlich | PERSON | 0.91+ |
AWS | EVENT | 0.91+ |
ThinkStack | PERSON | 0.9+ |
5-7 years | QUANTITY | 0.9+ |
one item | QUANTITY | 0.89+ |
ORGANIZATION | 0.88+ |
Sunil James, HPE | HPE Discover 2021
>>Welcome back to HPD discovered 2021. My name is Dave Volonte and you're watching the cubes virtual coverage of discover we're going to dig into the most pressing topic not only for I. T. But entire organizations and that's cyber security with me. Miss O'Neil James, senior Director of security engineering at Hewlett Packard Enterprise. So Neil welcome to the cube. Come on in. >>Dave, thank you for having me. I appreciate it. >>Hey, you talked about Project Aurora today. Tell us about project Aurora. What is that? >>So I'm glad you asked. Project Aurora is a new framework that we're working on that attempts to provide the underpinnings for Zero Trust architectures inside of everything that we build at. Hp. Zero Trust is a way of providing a mechanism for enterprises to allow for everything in their enterprise. Whether it's a server, a human or anything in between to be verified and attested to before they're allowed to access or transact in certain ways. That's what we announced today. >>Well, so in response to a spate of damaging cyber attacks last month, President biden issued an executive order designed to improve the United States security posture and in that order essentially issued a zero trust mandate. You know, it's interesting. Zero Trust has gone from a buzzword to a critical part of a security strategy. So in thinking about a zero trust architecture, how do you think about that and how does project Aurora fit in? >>Yeah, Zero Trust architecture as a concept has has been around for quite some time now and over the last few years you've seen many a company attempting to provide technologies that they purport to be. Zero trust. Zero Trust is a framework. It's not one technology, it's not one tool, it's not one product. It is an entire framework of thinking and applying cyber security principles uh to everything that we just talked about beforehand. Project Aurora, as I said before hand, is designed to provide a way for our ourselves and our customers to be able to measure a test and verify every single piece of technology that we sell to them, whether it's a server or everything else in between. Now, we've got a long way to go before we're able to cover everything that HP sells. But for us these capabilities are the root of Zero Trust architectures, you need to be able to at any given moments notice, verify measure and a test and this is what we're doing with Project Aurora. >>So you founded a company called citadel and sold out to HPD last year. And my understanding is you were really the driving force behind the secure production identity framework, but you said zero Trust is really a framework, uh that's an open source project. Maybe you can explain what that is. I mean people talk about the nist framework for cybersecurity. How does that relate? What why is this important and how does Aurora fit into it? >>Yeah, so it's a good question. The next framework is a broader framework for cybersecurity that couples and covers many aspects of thinking about the security posture of an enterprise, whether it's network security, host based intrusion detection capabilities in response things of that sort Spiffy. What you're referring to secure production identity framework for everyone is an open source framework and technology base that we did work on when I was the ceo of Seattle. That was designed to provide a platform agnostic way to assign identity to anything that runs in a network. And so think about yourself or myself, we are uh, we have identities in our back pocket driver's license, passports, things of that sort. They provide a unique assertion of who we are and what we're allowed to do that does not exist in the world of software. And what spiffy does is it provides that mechanism so that you can actually use frameworks like project Aurora that can verify the underpinning infrastructure on top of which software workloads run to be able to verify the spiffy identities even better than before >>is the intensive product ties this capability within this framework. How do you approach this from HP standpoint >>suspicion inspire will and always will be. As far as I'm concerned, remain an open source project held by the cloud Native Computing Foundation. It's for the world. And we want that to be the case because we think that more of our enterprise customers are not living in the world of one vendor or two vendors. They have multiple vendors. And so we need to give them the tools and the flexibility to be able to allow for open source capabilities like Spiffy inspire to provide a way for them to assign these identities and assign policies and control regardless of the infrastructure choices they make today or tomorrow. H P E recognizes that this is a key differentiating capability for our customers. And our goal is to be able to look at our offerings that power the next generation of workloads, kubernetes instances, containers, serverless and anything that comes after that. And our responsibility to say, how can we actually take what we have and be able to provide those kinds of assertions, those underpinnings for zero trust that are going to be necessary to distribute those identities to others workloads and to do so in a scalable, effective and automated manner, which is one of the most important things that project Wara does. >>So a lot of companies senior will set up a security division, uh and and so, but is the IS HPV strategy to essentially uh embed security across its entire portfolio? How do you, how should we think about HP strategy in cyber? >>Yeah, so it's a it's a great question. Hp has a long history, uh security and other domains, networking and servers and storage and beyond. Uh the way we think about what we're building with project or this is plumbing, this is plumbing that must be and everything we built, customers don't buy one product from us and they think it's one custom, one company and something else from us and they think it's another company, they're buying HPV products. And our goal with Project Aurora is to ensure that this plumbing is widely and uniformly distributed and made available. So whether you're buying in Aruba device, a primary storage device or per alliance server. Project Aurora's capabilities are going to provide a consistent way to do the things that I've mentioned beforehand To allow for those zero trust architectures to become real. >>So it's I alluded to President biden's executive order previously, I mean you're a security practitioner or an expert in this area. It just seems as though, and I'd love to get your comments on this. I mean the adversaries are well funded. You know, they're either organized crime, their nation states, uh they're they're extracting a lot of very valuable information, they're monetizing that you've seen things like ransomware as a service now, so any any knucklehead can, can be in the ransomware business. Um it's just this endless escalation game. Um how do you see the industry approaching this? What needs to happen? So obviously I like what you're saying about the plumbing, you're not trying to attack this with a bunch of point tools, which is part of the problem. How do you see the industry coming together to solve this problem? >>Yeah, it's uh if you operate in the world of security, you have to operate from the standpoint of humility. And the reason why you have to operate from a standpoint of humility is because the attack landscape is constantly changing the things and tools and investments and techniques that you thought were going to thwart an attacker. Today, there quickly outdated within a week, a month, a quarter or whatever it might be. And so you have to be able to consistently and continuously evolve and adapt towards what customers are facing on any given moments notice I think to be able to as an industry tackle these issues more and more. So you need to be able to have all of us start to abide, not abide, but start to adopt these open source patterns. We recognize that every company hB included is here to serve customers and to make money for its shareholders as well. But in order for us to do that, we have to also recognize that they've got other technologies in their infrastructure as well. And so it's our belief, it's my belief that allowing for us to support open standards with spiffy inspire and perhaps with some of the aspects of what we're doing with project Aurora, I think allows for other people to be able to kind of deliver the same underpinning capabilities, the plumbing if you will, regardless of whether it's an HP product or somebody else along those lines as well. We need more of that generally across our industry and I think we're far from it. >>I mean this sounds like a war. I mean, it's it's more than a battle. It's a war that actually is never gonna end. Uh, and I don't think there is an end in sight. And you hear, see, so let's talk about the shortage of talent. Uh, they're getting inundated with point products and tools and then that just creates more technical debt. It's been interesting to watch interesting. Maybe it's not the right word, but the pivot 20 trust, endpoint security, cloud security and the exposure that we've now seen as a result of the pandemic was sort of rushed. And then of course, we've seen, you know, the the adversaries really take advantage of that. So, I mean, what you're describing is this ongoing, never ending battle, >>isn't it? Yeah, yeah, no, it's it's it's going to be ongoing. And by the way, Zero Trust is not the end state, right. I mean, there was things that we called the final nail in the coffin Five years ago, 10 years ago and yet the Attackers persevered. And that's because there's a lot of innovation out there. There's a lot of uh, infrastructure moving to dynamic architecture is like cloud and others that are going to be poorly configured and are going to not have necessarily the best and brightest providing security around that. So we have to remain vigilant. We have to work as hard as we can to help customers deploy Zero Trust architecture, but we have to be thinking about what's next. We have to be watching, studying and evolving to be able to prepare ourselves to be able to go after whatever the next capabilities are. >>What I like about what you're saying is, you're right. You have to have humility. I don't want to say. I mean it's it's hard because I do feel like a lot of times the vendor community says, okay, we have the answer to your point. You know, okay. We have a zero trust solution or we have a security solution and there is no silver bullet in this game. And I think what I'm hearing from you is look, we're providing infrastructure, Plumbing is the substrate, but it's an open system. It's got to evolve. We've anything you didn't say, but I love your thoughts on this is we got to collaborate with who some of you might think is your competitor because they're still, they're the good guys. >>Yeah. I mean our our customers are customers don't care that we're competitors with anybody. They care that we're helping them solve their problems for their business. So our responsibility is to figure out what we need to do to work together to provide the basic capabilities that allow for our customers to to remain in business. Right. If cybersecurity issues plague any of our customers, that doesn't affect just HP. That affects all of the companies that are serving that customer itself. So I think we have a shared responsibility to be able to protect our customers >>and you've been in cyber for much, if not most of your career. Right, correct. Let's go. So I got to ask you, did you have a superhero when you were a kid? Did you have sort of uh, you know, save the world thing going? >>Did I have to say, you know, I I didn't have to save the world thing going. But I had um I had, I had two parents that cared for for the world in many, many ways. They were both in the world of health care and so every day I saw them taking care of other people. And I think that probably rubbed off in some of the decisions that I made too >>Well. It's awesome. You can do a great work, really appreciate you coming on the cube and and thank you so much for your insights. >>I appreciate that. Thanks >>All right. Thank you for being with us for our ongoing coverage. HPD discovered 21. This is Dave Volonte. You're watching the cube. The leader in digital tech coverage will be right back. Mhm.
SUMMARY :
Welcome back to HPD discovered 2021. Dave, thank you for having me. Hey, you talked about Project Aurora today. in between to be verified and attested to before they're allowed to access or transact Well, so in response to a spate of damaging cyber attacks last month, President biden issued an are the root of Zero Trust architectures, you need to be able to at any given moments notice, So you founded a company called citadel and sold out to HPD last year. to be able to verify the spiffy identities even better than before How do you approach this from HP standpoint And our responsibility to say, how can we actually take what we have and be able to Uh the way we think about what we're building So it's I alluded to President biden's executive order previously, And the reason why you have to operate from a standpoint of humility is because And then of course, we've seen, you know, the the adversaries really take advantage of that. studying and evolving to be able to prepare ourselves to be able to go after whatever the next capabilities And I think what I'm hearing from you is look, So our responsibility is to figure out what we need So I got to ask you, did you have a superhero when you were a kid? Did I have to say, you know, I I didn't have to save the world thing going. You can do a great work, really appreciate you coming on the cube and and thank you so much for your insights. I appreciate that. Thank you for being with us for our ongoing coverage.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Dave Volonte | PERSON | 0.99+ |
HPD | ORGANIZATION | 0.99+ |
two parents | QUANTITY | 0.99+ |
Sunil James | PERSON | 0.99+ |
two vendors | QUANTITY | 0.99+ |
Dave | PERSON | 0.99+ |
Neil | PERSON | 0.99+ |
last year | DATE | 0.99+ |
last month | DATE | 0.99+ |
Seattle | LOCATION | 0.99+ |
Today | DATE | 0.99+ |
one | QUANTITY | 0.99+ |
tomorrow | DATE | 0.99+ |
HP | ORGANIZATION | 0.99+ |
both | QUANTITY | 0.99+ |
H P E | ORGANIZATION | 0.99+ |
Hewlett Packard Enterprise | ORGANIZATION | 0.99+ |
Five years ago | DATE | 0.99+ |
President | PERSON | 0.99+ |
one company | QUANTITY | 0.99+ |
10 years ago | DATE | 0.99+ |
one product | QUANTITY | 0.98+ |
2021 | DATE | 0.98+ |
a week | QUANTITY | 0.98+ |
a month | QUANTITY | 0.97+ |
one vendor | QUANTITY | 0.97+ |
Project Aurora | TITLE | 0.97+ |
Aruba | LOCATION | 0.97+ |
Aurora | TITLE | 0.97+ |
today | DATE | 0.97+ |
zero trust | QUANTITY | 0.97+ |
HPE | ORGANIZATION | 0.97+ |
one custom | QUANTITY | 0.95+ |
citadel | ORGANIZATION | 0.94+ |
a quarter | QUANTITY | 0.93+ |
Native Computing Foundation | ORGANIZATION | 0.93+ |
pandemic | EVENT | 0.93+ |
O'Neil James | PERSON | 0.92+ |
biden | PERSON | 0.87+ |
United States | LOCATION | 0.86+ |
21 | OTHER | 0.86+ |
one tool | QUANTITY | 0.86+ |
20 | QUANTITY | 0.85+ |
spiffy | ORGANIZATION | 0.85+ |
Project Aurora | ORGANIZATION | 0.83+ |
Wara | ORGANIZATION | 0.8+ |
Zero Trust | TITLE | 0.76+ |
IS | ORGANIZATION | 0.73+ |
Spiffy | ORGANIZATION | 0.72+ |
one technology | QUANTITY | 0.7+ |
project Aurora | TITLE | 0.7+ |
Trust | TITLE | 0.69+ |
single piece | QUANTITY | 0.67+ |
Hp | ORGANIZATION | 0.64+ |
Zero Trust | ORGANIZATION | 0.6+ |
years | DATE | 0.6+ |
trust | TITLE | 0.56+ |
zero | TITLE | 0.56+ |
HPV | OTHER | 0.55+ |
Zero Trust | OTHER | 0.54+ |
Aurora | ORGANIZATION | 0.49+ |
Zero | OTHER | 0.47+ |
HPV | ORGANIZATION | 0.45+ |
Trust | ORGANIZATION | 0.43+ |
Zero | ORGANIZATION | 0.35+ |
Sunil James, Sr Director, HPE [ZOOM]
(bright music) >> Welcome back to HPE Discover 2021. My name is Dave Vellante and you're watching theCUBE's virtual coverage of Discover. We're going to dig into the most pressing topic, not only for IT, but entire organizations. And that's cyber security. With me is Sunil James, senior director of security engineering at Hewlett Packard Enterprise. Sunil, welcome to theCUBE. Come on in. >> Dave, thank you for having me. I appreciate it. >> Hey, you talked about project Aurora today. Tell us about project Aurora, what is that? >> So I'm glad you asked. Project Aurora is a new framework that we're working on that attempts to provide the underpinnings for Zero Trust architectures inside of everything that we build at HPE. Zero Trust is a way of providing a mechanism for enterprises to allow for everything in their enterprise, whether it's a server, a human, or anything in between, to be verified and attested to before they're allowed to access or transact in certain ways. That's what we announced today. >> Well, so in response to a spate of damaging cyber attacks last month, President Biden issued an executive order designed to improve the United States' security posture. And in that order, he essentially issued a Zero Trust mandate. You know, it's interesting, Sunil. Zero Trust has gone from a buzzword to a critical part of a security strategy. So in thinking about a Zero Trust architecture, how do you think about that, and how does project Aurora fit in? >> Yeah, so Zero Trust architecture, as a concept, has been around for quite some time now. And over the last few years, we've seen many a company attempting to provide technologies that they purport to be Zero Trust. Zero Trust is a framework. It's not one technology, it's not one tool, it's not one product. It is an entire framework of thinking and applying cybersecurity principles to everything that we just talked about beforehand. Project Aurora, as I said beforehand, is designed to provide a way for ourselves and our customers to be able to measure, attest, and verify every single piece of technology that we sell to them. Whether it's a server or everything else in between. Now, we've got a long way to go before we're able to cover everything that HPE sells. But for us, these capabilities are the root of Zero Trust architectures. You need to be able to, at any given moment's notice, verify, measure, and attest, and this is what we're doing with project Aurora. >> So you founded a company called Scytale and sold that to HPE last year. And my understanding is you were really the driving force behind the secure production identity framework, but you said Zero Trust is really a framework. That's an open source project. Maybe you can explain what that is. I mean, people talk about the NIST Framework for cybersecurity. How does that relate? Why is this important and how does Aurora fit into it? >> Yeah, so that's a good question. The NIST Framework is a broader framework for cybersecurity that couples and covers many aspects of thinking about the security posture of an enterprise, whether it's network security, host based intrusion detection capabilities, incident response, things of that sort. SPIFFE, which you're referring to, Secure Production Identity Framework For Everyone, is an open source framework and technology base that we did work on when I was the CEO of Scytale, that was designed to provide a platform agnostic way to assign identity to anything that runs in a network. And so think about yourself or myself. We have identities in our back pocket, driver's license, passports, things of that sort. They provide a unique assertion of who we are, and what we're allowed to do. That does not exist in the world of software. And what SPIFFE does is it provides that mechanism so that you can actually use frameworks like project Aurora that can verify the underpinning infrastructure on top of which software workloads run to be able to verify those SPIFFE identities even better than before. >> Is the intent to productize this capability, you know, within this framework? How do you approach this from HPE's standpoint? >> So SPIFFE and SPIRE will and always will be, as far as I'm concerned, remain an open source project held by the Cloud Native Computing Foundation. It's for the world, all right. And we want that to be the case because we think that more of our Enterprise customers are not living in the world of one vendor or two vendors. They have multiple vendors. And so we need to give them the tools and the flexibility to be able to allow for open source capabilities like SPIFFE and SPIRE to provide a way for them to assign these identities and assign policies and control, regardless of the infrastructure choices they make today or tomorrow. HPE recognizes that this is a key differentiating capability for our customers. And our goal is to be able to look at our offerings that power the next generation of workloads. Kubernetes instances, containers, serverless, and anything that comes after that. And our responsibility is to say, "How can we actually take what we have and be able to provide those kinds of assertions, those underpinnings for Zero Trust that are going to be necessary to distribute those identities to those workloads, and to do so in a scalable, effective, and automated manner?" Which is one of the most important things that project Aurora does. >> So a lot of companies, Sunil, will set up a security division. But is the HPE strategy to essentially embed security across its entire portfolio? How should we think about HPE strategy in cyber? >> Yeah, so it's a great question. HPE has a long history in security and other domains, networking, and servers, and storage, and beyond. The way we think about what we're building with project Aurora, this is plumbing. This is plumbing that must be in everything we build. Customers don't buy one product from us and they think it's one company, and something else from us, and they think it's another company. They're buying HPE products. And our goal with project Aurora is to ensure that this plumbing is widely and uniformly distributed and made available. So whether you're buying an Aruba device, a Primera storage device, or a ProLiant server, project Aurora's capabilities are going to provide a consistent way to do the things that I've mentioned beforehand to allow for those Zero Trust architectures to become real. >> So, as I alluded to President Biden's executive order previously. I mean, you're a security practitioner, you're an expert in this area. It just seems as though, and I'd love to get your comments on this. I mean, the adversaries are well-funded, you know, they're either organized crime, they're nation states. They're extracting a lot of very valuable information, they're monetizing that. You've seen things like ransomware as a service now. So any knucklehead can be in the ransomware business. So it's just this endless escalation game. How do you see the industry approaching this? What needs to happen? So obviously I like what you're saying about the plumbing. You're not trying to attack this with a bunch of point tools, which is part of the problem. How do you see the industry coming together to solve this problem? >> Yeah. If you operate in the world of security, you have to operate from the standpoint of humility. And the reason why you have to operate from a standpoint of humility is because the attack landscape is constantly changing. The things, and tools, and investments, and techniques that you thought were going to thwart an attacker today, they're quickly outdated within a week, a month, a quarter, whatever it might be. And so you have to be able to consistently and continuously evolve and adapt towards what customers are facing on any given moment's notice. I think to be able to, as an industry, tackle these issues more and moreso, you need to be able to have all of us start to abide, not abide, but start to adopt these open-source patterns. We recognize that every company, HPE included, is here to serve customers and to make money for its shareholders as well. But in order for us to do that, we have to also recognize that they've got other technologies in their infrastructure as well. And so it's our belief, it's my belief, that allowing for us to support open standards with SPIFFE and SPIRE, and perhaps with some of the aspects of what we're doing with project Aurora, I think allows for other people to be able to kind of deliver the same underpinning capabilities, the plumbing, if you will, regardless of whether it's an HPE product or something else along those lines as well. We need more of that generally across our industry, and I think we're far from it. >> I mean, this sounds like a war. I mean, it's more than a battle, it's a war that actually is never going to end. And I don't think there is an end in sight. And you hear CESOs talk about the shortage of talent, they're getting inundated with point products and tools, and then that just creates more technical debt. It's been interesting to watch. Interesting maybe is not the right word. But the pivot to Zero Trust, endpoint security, cloud security, and the exposure that we've now seen as a result of the pandemic was sort of rushed. And then of course, we've seen, you know, the adversaries really take advantage of that. So, I mean what you're describing is this ongoing never-ending battle, isn't it? >> Yeah, yeah, no, it's going to be ongoing. And by the way, Zero Trust is not the end state, right? I mean, there was things that we called the final nail in the coffin five years ago, 10 years ago, and yet the attackers persevered. And that's because there's a lot of innovation out there. There's a lot of infrastructure moving to dynamic architectures like cloud and others that are going to be poorly configured, and are going to not have necessarily the best and brightest providing security around them. So we have to remain vigilant. We have to work as hard as we can to help customers deploy Zero Trust architectures. But we have to be thinking about what's next. We have to be watching, studying, and evolving to be able to prepare ourselves, to be able to go after whatever the next capabilities are. >> What I like about what you're saying is, you're right. You have to have humility. I don't want to say, I mean, it's hard because I do feel like a lot of times the vendor community says, "Okay, we have the answer," to your point. "Okay, we have a Zero Trust solution." Or, "We have a solution." And there is no silver bullet in this game. And I think what I'm hearing from you is, look we're providing infrastructure, plumbing, the substrate, but it's an open system. It's got to evolve. And the thing you didn't say, but I'd love your thoughts on this is we've got to collaborate with somebody you might think is your competitor. 'Cause they're the good guys. >> Yeah. Our customers don't care that we're competitors with anybody. They care that we're helping them solve their problems for their business. So our responsibility is to figure out what we need to do to work together to provide the basic capabilities that allow for our customers to remain in business, right? If cybersecurity issues plague any of our customers that doesn't affect just HPE, that affects all of the companies that are serving that customer. And so, I think we have a shared responsibility to be able to protect our customers. >> And you've been in cyber for much, if not most of your career, right? >> Correct. >> So I got to ask you, did you have a superhero when you were a kid? Did you have a sort of a, you know, save the world thing going? >> Did I have a, you know, I didn't have a save the world thing going, but I had, I had two parents that cared for the world in many, many ways. They were both in the world of healthcare. And so everyday I saw them taking care of other people. And I think that probably rubbed off in some of the decisions that I make too. >> Well it's awesome. You're doing great work, really appreciate you coming on theCUBE, and thank you so much for your insights. >> I appreciate that, thanks. >> And thank you for being with us for our ongoing coverage of HPE Discover 21. This is Dave Vellante. You're watching theCUBE. The leader in digital tech coverage. We'll be right back. (bright music)
SUMMARY :
Welcome back to HPE Discover 2021. Dave, thank you for having me. Hey, you talked about that attempts to provide the underpinnings Well, so in response to a spate and our customers to be able and sold that to HPE last year. to be able to verify And our goal is to be able But is the HPE strategy to essentially Aurora is to ensure and I'd love to get your comments on this. I think to be able to, as an industry, But the pivot to Zero that are going to be poorly configured, And the thing you didn't say, to be able to protect our customers. I didn't have a save the and thank you so much for your insights. And thank you for being with us
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Dave Vellante | PERSON | 0.99+ |
Sunil James | PERSON | 0.99+ |
Dave | PERSON | 0.99+ |
two vendors | QUANTITY | 0.99+ |
Scytale | ORGANIZATION | 0.99+ |
two parents | QUANTITY | 0.99+ |
last year | DATE | 0.99+ |
Cloud Native Computing Foundation | ORGANIZATION | 0.99+ |
President | PERSON | 0.99+ |
last month | DATE | 0.99+ |
Zero Trust | ORGANIZATION | 0.99+ |
tomorrow | DATE | 0.99+ |
HPE | ORGANIZATION | 0.99+ |
Hewlett Packard Enterprise | ORGANIZATION | 0.99+ |
one vendor | QUANTITY | 0.99+ |
five years ago | DATE | 0.99+ |
both | QUANTITY | 0.99+ |
10 years ago | DATE | 0.99+ |
Zero Trust | ORGANIZATION | 0.98+ |
one | QUANTITY | 0.98+ |
Sunil | ORGANIZATION | 0.98+ |
one company | QUANTITY | 0.98+ |
Sunil | PERSON | 0.98+ |
a month | QUANTITY | 0.98+ |
one product | QUANTITY | 0.98+ |
today | DATE | 0.98+ |
a week | QUANTITY | 0.98+ |
SPIFFE | TITLE | 0.97+ |
SPIRE | TITLE | 0.96+ |
one tool | QUANTITY | 0.96+ |
a quarter | QUANTITY | 0.95+ |
pandemic | EVENT | 0.95+ |
Biden | PERSON | 0.94+ |
Aurora | TITLE | 0.93+ |
NIST Framework | TITLE | 0.93+ |
Aurora | ORGANIZATION | 0.88+ |
theCUBE | ORGANIZATION | 0.87+ |
project | ORGANIZATION | 0.87+ |
Zero Trust | TITLE | 0.87+ |
SPIRE | ORGANIZATION | 0.81+ |
United | ORGANIZATION | 0.8+ |
Aruba | LOCATION | 0.77+ |
Project Aurora | TITLE | 0.74+ |
SPIFFE | ORGANIZATION | 0.73+ |
project Aurora | ORGANIZATION | 0.73+ |
Primera | ORGANIZATION | 0.69+ |
single piece | QUANTITY | 0.69+ |
Discover | TITLE | 0.68+ |
Discover 21 | TITLE | 0.68+ |
States' | LOCATION | 0.67+ |
Framework | TITLE | 0.65+ |
CESOs | ORGANIZATION | 0.63+ |
project | TITLE | 0.58+ |
Michael Dell, Dell Technologies | Dell Technologies World 2021
(upbeat music) >> In 1946, the acerbic manager of the Dodgers, Leo the Lip Durocher famously said of baseball, great Mel Ott who was player manager of the Giants at the time. You know what happens to nice guys. They finished in last place. The phrase nice guys finish last was born. It became popular outside of baseball. Well joining me today is someone who was a consummate gentlemen and a nice guy who proves that idiom absolutely isn't true at all. He's also written a new book "Play nice and Win" Michael Dell chairman and CEO of Dell technologies, welcome back to the CUBE. >> Thank you very much, Dave, always great to be with you. Wonderful to be on the CUBE and thanks for your great coverage of Dell technologies world. >> Yeah. We're very excited to be covering the virtual version this year, next year we're back face to face I'm Sure. And we're going to talk about your book but I want to start by asking you to comment on the past 12 months, how are you going to remember 2020? >> I'm going to remember it by the resiliency of the world and our team, the adaptability the acceleration of digital transformation which is pretty amazing around the world. The vital role that technology played in addressing some of the biggest challenges, whether it was the creation of vaccines or, you know, decoding the virus itself or just addressing all the challenges that the world had. You know, I think it's a game changer in terms of disease identification and how we prevent these kinds of things going forward. You know, there's still a long way to go in terms of how do we get 7.5 billion people vaccinated and safe. I also think it exposed, you know some of the fault lines in our society. And that's a great learning for all of us in terms of access to healthcare and education and, you know, the digital resources that power the world. And so, yeah, those are some of the things that really stand out for me. >> Well, I mean, I think leaders like yourself and position of influence, absolutely passionate about some of those changes that we see coming in society. So hopefully we'll have time to talk about that but I wanted to get into the business. I think a lot of people, myself included felt that 2020 was going to be a down year for big tech companies like yours and that relied heavily on selling products that data centers and central offices but the remote work trend and the laptop, boom offset, some of those on-prem softness and headwinds combined with VMware the financial performance of Dell technologies was actually quite amazing. Why were you able to do so well last year? >> Well, first of all, you're right. We did, we had record pretty much everything record revenues, record operating income, record cashflow and be also paid down a record amount of debt. And so I think the strength and resiliency of our supply chain, as well as the broad diversified nature of what we provide our customers continue to serve us very well as they moved to this sort of do anything from anywhere in the world. And it continues the first part of this year, business is very strong >> You know, a few weeks ago, of course you officially announced the spinoff of Dell technologies. Wasn't a huge surprise but the 81% equity ownership of VMware are you worried about untethering VMware from Dell or maybe you can share more on what this means for the future of, your two companies and your customers. >> Right? So, I think this will drive additional growth opportunities for both Dell Tech and VMware, while it unlocks a lot of value for our stakeholders. What we've done is to formalize the commercial relationship into a series of agreements and those are unique and differentiated and they provide lots of flexibility and we've driven a tremendous amount of innovation together and that's going to continue and it will, one of the things we said back in 2015 you'll remember is our commitment to keep the VMware ecosystem open and independent and working across the whole industry. We've done that. You'll continue to see us innovate together with Edge solutions, certainly all the great work we've done with VxRail SD LAN, you know Tanzu creates this platform to modernize applications and VMware Cloud and Dell technologies are the easy path to a multi-cloud architecture. And, that continues to work super well and is not going to be slowed down at all. So... and of course, I'll continue to be a chairman of both companies and we're not selling VMware we're distributing our ownership to our shareholders. >> Well, of course, Dell is the largest sort channel if you will, for VMware. So that's ... you guys got a tight relationship but I want to ask you about digital transformation and everybody talked about it pre COVID but nobody really knew exactly what it was but COVID sort of brought that into focus very quickly. If you weren't a digital business, you were out of business. So going forward, how do you see that whole digital transformation playing out? >> You know I think the plot of any company is to figure out how it can use its data and turn that into insights and outcomes and better results and ultimately competitive advantage faster. And as you said, you know, if it's not able to do that, it's probably going to go out of business. And that agenda just got massively accelerated because it was kind of digital was sort of the only thing that worked during this, this past period. So every organization has figured out that technology is not the IT department, it's actually the fulcrum of progress in the entire company. And so we're seeing sort of across the board a dramatic acceleration in the investment in digital technologies, you know, Edge is growing very fast. I think 5G just accelerates this and, you know you're seeing it in all the demand trends. It's quite positive and, you know, I think you'll see even a more rapid separation from those companies that are able to take advantage of this and quickly adjust their businesses their organizations, and those that are >> You better hop on board or get left behind, you know, the Edge. You mentioned the Edge it's a little bit like digital transformation, you know kind of pre COVID and even post COVID. It means a lot of things to a lot of different people but the telecoms transformation and 5G they have there certainly real. How do you see the Edge? >> You know, the Edges is ... think of it as actually the real world, right? It's, not a data center sitting in the center of the universe somewhere. And look today, you know only 10% of data is processed outside of the data center, but, you know, it's estimated by 2025 you got 75% of enterprise data will be processed outside of a traditional data center or a Cloud. And so as everything becomes intelligent connected 5G accelerates that it's going to be a huge acceleration of this whole process of digital transformation. And you know, again, think about this. I mean, the cost of making something intelligent used to be really expensive. Now it's asymptotically approaching zero. And of course all those things are connected. They're talking to each other and exactly what does this mean for every industry. Nobody's really quite sure and not everything is going to work, but, you know we're seeing it in manufacturing, in retail, in healthcare and the growth on the Edge is really accelerating in a meaningful way. And it's not so much about, you know people talking people with machines, we know how to do that. Now it's about the thing right And, you know you've got like 200 billion arm processors, you know out there in the last couple of years, all those things talking to the other things, generating data it happens in the real world. That's what the Edge is. >> Yeah as you know, we're a big fans of the arm model. And I think it just presents huge opportunities for companies like Dell. I want to ask you about Cloud. And I have to say, I think, you know companies like Dell have been maybe a little bit defensive over the last several years when it comes to Cloud but I think you starting to see the Cloud as a gift with all that CAPEX that's being built out by these hyperscalers. You know, thank you. It seems to me, you can build on top of that. How are you thinking about the Cloud as an opportunity for you and your customers especially as the definition of Cloud evolves? >> Well, first, you know, what we see is and the Edge is kind of the third place or the third premise, right? You got Clouds in the public form, you've got the Colo which is really growing fast and, you know the private hybrid Clouds, and now you've got the Edge. And so you've got infrastructure all over the place with Edge being the fastest growing. You know, one of the big things we see is that customers want a consistent way to operate and execute across that whole platform. And, you know, one of the other things that we've been focused on at Dell technologies is how can we move our business to more of a service and subscription on demand and provide customers that flexibility to to pay as they consume. And so, to some extent this is an evolution of, you know, products to services to managed services, to everything as a service. And so, you know, looking at our balance sheet you'll see over $40 billion in remaining performance obligations as we moved the business to that kind of model and it's been growing double digits for several quarters in a row. And so, you know, we're embracing Cloud and on-demand, and as a service, and obviously here at Dell technologies world we're talking a lot about Apex and our continuing initiatives to move our whole business in that direction. >> Yeah. Apex is a real accelerator for that model. I want to switch topics a little bit. I got a long list of things I want to talk about ESG, sustainability, inclusion, you know, is another topic that, that I'm interested in. I want it. And I said before, people like yourself in a position of influence to influence public policy and obviously the employees and your ecosystem why is it not just the right thing to do? Why is... why are those things good business, Michael? >> Well, it's good business because people want to be part of something that is important and purposeful. You know, it's not just make a profit and earn a living right? You know, people want to be inspired and feel that they're part of something special. And look, I think if you look at the positive changes that have occurred in the world certainly you could turn on the news and see the horrible things that happened in the last 24 hours or something like that. But if you step back and think about the amazing progress that's happened in the last several decades, you know a lot of it's been driven by technology and by businesses that have stepped up and made a difference and made commitments. And, you know, we're one of those companies that has made a series of commitments you know, 10 years ago, we set out with our 2020 goals. We accomplished significant majority of those retired those. Now we set out our progress made real 2030 goals all around the ESD themes. And it's not only the right thing to do but it is good for business. It inspires our team members, our customers and I think initiatives like progress made real at Dell and thousands of other companies. Ultimately, those are the things that are going to drive progress forward. I believe, you know, more so than government edicts or regulation, those can play a role. But I think, companies voluntarily driving things like the circular economy and how we include everyone in our business and provide opportunities for everyone to succeed no matter where they come from. I think those are the things that are really going to drive the world forward. >> Well, I want to ask you about public policy because as you say, it's not just the government, but of course sometimes the government can get in the way. You're seeing a lot of vitriol around Val break up big tech but the same time, you're seeing the US government and the EU very willing to help out with the semiconductor competitiveness in the like I know you were tapped with the new administration President Biden, tapping, you know, the best minds in tech and you were asked to part sort of participate give feedback. What can you tell us about, you know your advice to the US government? >> Well, you know, lots of great discussion with the new administration and it's a delight to see that they're focused on semiconductors and sort of the industries of the future. This is a big deal. I mean, you know, we've got some big global competitors out there other nations that are with a deterministic strategy very focused on the industries of the future. But US, you know if you think about the atomic age and, you know the Apollo missions that created the whole semiconductor industry ARPANET and ultimately the Internet and that kind of stopped right there, you know, there wasn't as much government investment in some of those big R and D initiatives that really drove an enormous creation of industries and success for the United States and its citizens. And so I think focusing on semiconductors and how you build the infrastructure of the future really important for the United States to continue to be a leader in that you know, we were, you know, producing a one point about 37% of the world's semiconductors. It's now down to 12% and dropping and really important that more investments are made in that area. It's a combination of capital, talent, you know education knowledge, and also, you know, the policies that promote the development of these kinds of businesses. >> Yah well, Pat's got a very big challenge ahead of them. And so that's why but we've said Intel's too strategic to fail in our view but I wanted to plug your book a little bit. My former boss, you and I have talked about this. He was also a gentleman who proved Leo Durocher wrong. He was very nice guy, but also a winner, Play Nice But Win, why did you decide to write another book? >> Well, you know, Dave, a lot has happened in the last 20 years and especially the last nine or so years since we went private and, you know merged with EMC and VMware and went public again. And, you know, I'd say we... first of all, you know when I wrote the first book in 1998 I wasn't comfortable disclosing a lot. And, and I wasn't vulnerable enough and didn't feel, you know, able to do that. Now I do, you know, I'm older, you know hopefully a little wiser. And so I think everybody's going to like hearing some of the fun stories about not only my childhood but you know, the dorm room and beyond, and leading up to, you know the pivotal changes that have occurred the last decade my alligator wrestling with Carl Icahn and other, you know there's lots of fun stories in there. I got arrested one time. It was only for speeding tickets, don't worry but you know, lots of fun. I'm really looking forward to the book coming out and being able to talk about it. >> I can't wait. You know, I've said many times anybody who could beat the great icon is interesting to me. I wanted to ask you, I mentioned my old boss, Pat McGovern. I used to say to them all the time, "Pat how come you don't buy more companies?" And he'd say," Dave, you know the vast majority of acquisitions and mergers they failed to meet their objectives." Did you ever imagine, I mean... I did the EMC acquisition. Did... how could it not have exceeded your expectations? I wonder if you could give us your final thoughts on that. >> You know, and I talk about this a lot in the book. I mean, these are kind of the ultimate considered decisions. And in the case of the EMC combination it was something that we had thought about going back to 2008, 2009. And then, you know, started thinking about it in 2014 worked on it for a full year before it got announced in 2015 and finally closed in 2016. But yeah, I mean, you know, we thought it would be great. It turned out to be even better than We thought the revenue synergies were far greater. The teams were quite energized. Customers liked what we were providing and you know it's ... and, of course the markets were supportive Right? You know, we were paying close attention to interest rates and how we could structure the merger in a attractive way. And, you know, thank goodness, lots of hard work lots of determination, you know, it's worked out quite well. >> Yeah, great commitment from the Dell team as well. Congratulations on that. Go ahead, please. >> And any adventure continues right? It's...( both chuckles) >> I can't wait to see the next chapter and I can't wait to get the book, but congratulations on that, all your tremendous success you're you are a winner and a gentleman and a friend of the CUBE, Michael Dell. Thanks so much. >> Thank you so much Dave. >> And thank you for watching. And this is the CUBE continuous coverage of Dell tech world 2021, the virtual edition. Keep it right there, right back. (upbeat music)
SUMMARY :
manager of the Dodgers, Thank you very much, Dave, on the past 12 months, of the world and our team, and the laptop, boom offset, do anything from anywhere in the world. ago, of course you officially So... and of course, I'll continue to be but I want to ask you about the plot of any company is to figure out you know, the Edge. And it's not so much about, you know It seems to me, you can and the Edge is kind of the third place and obviously the employees And it's not only the right thing to do and the EU very willing to help out and how you build the Play Nice But Win, why did you and leading up to, you know And he'd say," Dave, you know And in the case of the EMC combination from the Dell team as well. And any adventure continues right? of the CUBE, Michael Dell. And thank you for watching.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
2016 | DATE | 0.99+ |
Dell | ORGANIZATION | 0.99+ |
2015 | DATE | 0.99+ |
Michael Dell | PERSON | 0.99+ |
Dave | PERSON | 0.99+ |
2014 | DATE | 0.99+ |
Michael | PERSON | 0.99+ |
VMware | ORGANIZATION | 0.99+ |
Mel Ott | PERSON | 0.99+ |
1998 | DATE | 0.99+ |
2009 | DATE | 0.99+ |
Pat McGovern | PERSON | 0.99+ |
Carl Icahn | PERSON | 0.99+ |
2008 | DATE | 0.99+ |
75% | QUANTITY | 0.99+ |
EMC | ORGANIZATION | 0.99+ |
1946 | DATE | 0.99+ |
EU | ORGANIZATION | 0.99+ |
two companies | QUANTITY | 0.99+ |
next year | DATE | 0.99+ |
2025 | DATE | 0.99+ |
last year | DATE | 0.99+ |
thousands | QUANTITY | 0.99+ |
81% | QUANTITY | 0.99+ |
Giants | ORGANIZATION | 0.99+ |
over $40 billion | QUANTITY | 0.99+ |
Dell Technologies | ORGANIZATION | 0.99+ |
2030 | DATE | 0.99+ |
first book | QUANTITY | 0.99+ |
2020 | DATE | 0.99+ |
Apex | ORGANIZATION | 0.99+ |
10 years ago | DATE | 0.99+ |
Leo Durocher | PERSON | 0.99+ |
Play Nice But Win | TITLE | 0.99+ |
both companies | QUANTITY | 0.98+ |
Leo the Lip Durocher | PERSON | 0.98+ |
today | DATE | 0.98+ |
President | PERSON | 0.98+ |
both | QUANTITY | 0.98+ |
this year | DATE | 0.98+ |
7.5 billion people | QUANTITY | 0.98+ |
12% | QUANTITY | 0.98+ |
one point | QUANTITY | 0.98+ |
Pat | PERSON | 0.97+ |
first | QUANTITY | 0.97+ |
Play nice and Win | TITLE | 0.97+ |
third premise | QUANTITY | 0.97+ |
CUBE | ORGANIZATION | 0.97+ |
one time | QUANTITY | 0.97+ |
Dodgers | ORGANIZATION | 0.97+ |
Dell Tech | ORGANIZATION | 0.96+ |
one | QUANTITY | 0.96+ |
United States | LOCATION | 0.96+ |
Tanzu | ORGANIZATION | 0.96+ |
third place | QUANTITY | 0.96+ |
US government | ORGANIZATION | 0.95+ |
Edge | ORGANIZATION | 0.94+ |
zero | QUANTITY | 0.94+ |
United States | LOCATION | 0.93+ |
last decade | DATE | 0.92+ |
about 37% | QUANTITY | 0.92+ |
few weeks ago | DATE | 0.91+ |
US | LOCATION | 0.91+ |
Breaking Analysis: Why Apple Could be the Key to Intel's Future
>> From theCUBE studios in Palo Alto, in Boston bringing you data-driven insights from theCUBE and ETR. This is Breaking Analysis with Dave Vellante >> The latest Arm Neoverse announcement further cements our opinion that it's architecture business model and ecosystem execution are defining a new era of computing and leaving Intel in it's dust. We believe the company and its partners have at least a two year lead on Intel and are currently in a far better position to capitalize on a major waves that are driving the technology industry and its innovation. To compete our view is that Intel needs a new strategy. Now, Pat Gelsinger is bringing that but they also need financial support from the US and the EU governments. Pat Gelsinger was just noted as asking or requesting from the EU government $9 billion, sorry, 8 billion euros in financial support. And very importantly, Intel needs a volume for its new Foundry business. And that is where Apple could be a key. Hello, everyone. And welcome to this week's weekly bond Cube insights powered by ETR. In this breaking analysis will explain why Apple could be the key to saving Intel and America's semiconductor industry leadership. We'll also further explore our scenario of the evolution of computing and what will happen to Intel if it can't catch up. Here's a hint it's not pretty. Let's start by looking at some of the key assumptions that we've made that are informing our scenarios. We've pointed out many times that we believe Arm wafer volumes are approaching 10 times those of x86 wafers. This means that manufacturers of Arm chips have a significant cost advantage over Intel. We've covered that extensively, but we repeat it because when we see news reports and analysis and print it's not a factor that anybody's highlighting. And this is probably the most important issue that Intel faces. And it's why we feel that Apple could be Intel's savior. We'll come back to that. We've projected that the chip shortage will last no less than three years, perhaps even longer. As we reported in a recent breaking analysis. Well, Moore's law is waning. The result of Moore's law, I.e the doubling of processor performance every 18 to 24 months is actually accelerating. We've observed and continue to project a quadrupling of performance every two years, breaking historical norms. Arm is attacking the enterprise and the data center. We see hyperscalers as the tip of their entry spear. AWS's graviton chip is the best example. Amazon and other cloud vendors that have engineering and software capabilities are making Arm-based chips capable of running general purpose applications. This is a huge threat to x86. And if Intel doesn't quickly we believe Arm will gain a 50% share of an enterprise semiconductor spend by 2030. We see the definition of Cloud expanding. Cloud is no longer a remote set of services, in the cloud, rather it's expanding to the edge where the edge could be a data center, a data closet, or a true edge device or system. And Arm is by far in our view in the best position to support the new workloads and computing models that are emerging as a result. Finally geopolitical forces are at play here. We believe the U S government will do, or at least should do everything possible to ensure that Intel and the U S chip industry regain its leadership position in the semiconductor business. If they don't the U S and Intel could fade to irrelevance. Let's look at this last point and make some comments on that. Here's a map of the South China sea in a way off in the Pacific we've superimposed a little pie chart. And we asked ourselves if you had a hundred points of strategic value to allocate, how much would you put in the semiconductor manufacturing bucket and how much would go to design? And our conclusion was 50, 50. Now it used to be because of Intel's dominance with x86 and its volume that the United States was number one in both strategic areas. But today that orange slice of the pie is dominated by TSMC. Thanks to Arm volumes. Now we've reported extensively on this and we don't want to dwell on it for too long but on all accounts cost, technology, volume. TSMC is the clear leader here. China's president Xi has a stated goal of unifying Taiwan by China's Centennial in 2049, will this tiny Island nation which dominates a critical part of the strategic semiconductor pie, go the way of Hong Kong and be subsumed into China. Well, military experts say it was very hard for China to take Taiwan by force, without heavy losses and some serious international repercussions. The US's military presence in the Philippines and Okinawa and Guam combined with support from Japan and South Korea would make it even more difficult. And certainly the Taiwanese people you would think would prefer their independence. But Taiwanese leadership, it ebbs and flows between those hardliners who really want to separate and want independence and those that are more sympathetic to China. Could China for example, use cyber warfare to over time control the narrative in Taiwan. Remember if you control the narrative you can control the meme. If you can crawl the meme you control the idea. If you control the idea, you control the belief system. And if you control the belief system you control the population without firing a shot. So is it possible that over the next 25 years China could weaponize propaganda and social media to reach its objectives with Taiwan? Maybe it's a long shot but if you're a senior strategist in the U S government would you want to leave that to chance? We don't think so. Let's park that for now and double click on one of our key findings. And that is the pace of semiconductor performance gains. As we first reported a few weeks ago. Well, Moore's law is moderating the outlook for cheap dense and efficient processing power has never been better. This slideshows two simple log lines. One is the traditional Moore's law curve. That's the one at the bottom. And the other is the current pace of system performance improvement that we're seeing measured in trillions of operations per second. Now, if you calculate the historical annual rate of processor performance improvement that we saw with x86, the math comes out to around 40% improvement per year. Now that rate is slowing. It's now down to around 30% annually. So we're not quite doubling every 24 months anymore with x86 and that's why people say Moore's law is dead. But if you look at the (indistinct) effects of packaging CPU's, GPU's, NPUs accelerators, DSPs and all the alternative processing power you can find in SOC system on chip and eventually system on package it's growing at more than a hundred percent per annum. And this means that the processing power is now quadrupling every 24 months. That's impressive. And the reason we're here is Arm. Arm has redefined the core process of model for a new era of computing. Arm made an announcement last week which really recycle some old content from last September, but it also put forth new proof points on adoption and performance. Arm laid out three components and its announcement. The first was Neoverse version one which is all about extending vector performance. This is critical for high performance computing HPC which at one point you thought that was a niche but it is the AI platform. AI workloads are not a niche. Second Arm announced the Neoverse and two platform based on the recently introduced Arm V9. We talked about that a lot in one of our earlier Breaking Analysis. This is going to performance boost of around 40%. Now the third was, it was called CMN-700 Arm maybe needs to work on some of its names, but Arm said this is the industry's most advanced mesh interconnect. This is the glue for the V1 and the N2 platforms. The importance is it allows for more efficient use and sharing of memory resources across components of the system package. We talked about this extensively in previous episodes the importance of that capability. Now let's share with you this wheel diagram underscores the completeness of the Arm platform. Arms approach is to enable flexibility across an open ecosystem, allowing for value add at many levels. Arm has built the architecture in design and allows an open ecosystem to provide the value added software. Now, very importantly, Arm has created the standards and specifications by which they can with certainty, certify that the Foundry can make the chips to a high quality standard, and importantly that all the applications are going to run properly. In other words, if you design an application, it will work across the ecosystem and maintain backwards compatibility with previous generations, like Intel has done for years but Arm as we'll see next is positioning not only for existing workloads but also the emerging high growth applications. To (indistinct) here's the Arm total available market as we see it, we think the end market spending value of just the chips going into these areas is $600 billion today. And it's going to grow to 1 trillion by 2030. In other words, we're allocating the value of the end market spend in these sectors to the marked up value of the Silicon as a percentage of the total spend. It's enormous. So the big areas are Hyperscale Clouds which we think is around 20% of this TAM and the HPC and AI workloads, which account for about 35% and the Edge will ultimately be the largest of all probably capturing 45%. And these are rough estimates and they'll ebb and flow and there's obviously some overlap but the bottom line is the market is huge and growing very rapidly. And you see that little red highlighted area that's enterprise IT. Traditional IT and that's the x86 market in context. So it's relatively small. What's happening is we're seeing a number of traditional IT vendors, packaging x86 boxes throwing them over the fence and saying, we're going after the Edge. And what they're doing is saying, okay the edge is this aggregation point for all these end point devices. We think the real opportunity at the Edge is for AI inferencing. That, that is where most of the activity and most of the spending is going to be. And we think Arm is going to dominate that market. And this brings up another challenge for Intel. So we've made the point a zillion times that PC volumes peaked in 2011. And we saw that as problematic for Intel for the cost reasons that we've beat into your head. And lo and behold PC volumes, they actually grew last year thanks to COVID and we'll continue to grow it seems for a year or so. Here's some ETR data that underscores that fact. This chart shows the net score. Remember that's spending momentum it's the breakdown for Dell's laptop business. The green means spending is accelerating and the red is decelerating. And the blue line is net score that spending momentum. And the trend is up and to the right now, as we've said this is great news for Dell and HP and Lenovo and Apple for its laptops, all the laptops sellers but it's not necessarily great news for Intel. Why? I mean, it's okay. But what it does is it shifts Intel's product mix toward lower margin, PC chips and it squeezes Intel's gross margins. So the CFO has to explain that margin contraction to wall street. Imagine that the business that got Intel to its monopoly status is growing faster than the high margin server business. And that's pulling margins down. So as we said, Intel is fighting a war on multiple fronts. It's battling AMD in the core x86 business both PCs and servers. It's watching Arm mop up in mobile. It's trying to figure out how to reinvent itself and change its culture to allow more flexibility into its designs. And it's spinning up a Foundry business to compete with TSMC. So it's got to fund all this while at the same time propping up at stock with buybacks Intel last summer announced that it was accelerating it's $10 billion stock buyback program, $10 billion. Buy stock back, or build a Foundry which do you think is more important for the future of Intel and the us semiconductor industry? So Intel, it's got to protect its past while building his future and placating wall street all at the same time. And here's where it gets even more dicey. Intel's got to protect its high-end x86 business. It is the cash cow and funds their operation. Who's Intel's biggest customer Dell, HP, Facebook, Google Amazon? Well, let's just say Amazon is a big customer. Can we agree on that? And we know AWS is biggest revenue generator is EC2. And EC2 was powered by microprocessors made from Intel and others. We found this slide in the Arm Neoverse deck and it caught our attention. The data comes from a data platform called lifter insights. The charts show, the rapid growth of AWS is graviton chips which are they're custom designed chips based on Arm of course. The blue is that graviton and the black vendor A presumably is Intel and the gray is assumed to be AMD. The eye popper is the 2020 pie chart. The instant deployments, nearly 50% are graviton. So if you're Pat Gelsinger, you better be all over AWS. You don't want to lose this customer and you're going to do everything in your power to keep them. But the trend is not your friend in this account. Now the story gets even gnarlier and here's the killer chart. It shows the ISV ecosystem platforms that run on graviton too, because AWS has such good engineering and controls its own stack. It can build Arm-based chips that run software designed to run on general purpose x86 systems. Yes, it's true. The ISV, they got to do some work, but large ISV they have a huge incentives because they want to ride the AWS wave. Certainly the user doesn't know or care but AWS cares because it's driving costs and energy consumption down and performance up. Lower cost, higher performance. Sounds like something Amazon wants to consistently deliver, right? And the ISV portfolio that runs on our base graviton and it's just going to continue to grow. And by the way, it's not just Amazon. It's Alibaba, it's Oracle, it's Marvell. It's 10 cents. The list keeps growing Arm, trotted out a number of names. And I would expect over time it's going to be Facebook and Google and Microsoft. If they're not, are you there? Now the last piece of the Arm architecture story that we want to share is the progress that they're making and compare that to x86. This chart shows how Arm is innovating and let's start with the first line under platform capabilities. Number of cores supported per die or, or system. Now die is what ends up as a chip on a small piece of Silicon. Think of the die as circuit diagram of the chip if you will, and these circuits they're fabricated on wafers using photo lithography. The wafers then cut up into many pieces each one, having a chip. Each of these pieces is the chip. And two chips make up a system. The key here is that Arm is quadrupling the number of cores instead of increasing thread counts. It's giving you cores. Cores are better than threads because threads are shared and cores are independent and much easier to virtualize. This is particularly important in situations where you want to be as efficient as possible sharing massive resources like the Cloud. Now, as you can see in the right hand side of the chart under the orange Arm is dramatically increasing the amount of capabilities compared to previous generations. And one of the other highlights to us is that last line that CCIX and CXL support again Arm maybe needs to name these better. These refer to Arms and memory sharing capabilities within and between processors. This allows CPU's GPU's NPS, et cetera to share resources very often efficiently especially compared to the way x86 works where everything is currently controlled by the x86 processor. CCIX and CXL support on the other hand will allow designers to program the system and share memory wherever they want within the system directly and not have to go through the overhead of a central processor, which owns the memory. So for example, if there's a CPU, GPU, NPU the CPU can say to the GPU, give me your results at a specified location and signal me when you're done. So when the GPU is finished calculating and sending the results, the GPU just signals the operation is complete. Versus having to ping the CPU constantly, which is overhead intensive. Now composability in that chart means the system it's a fixed. Rather you can programmatically change the characteristics of the system on the fly. For example, if the NPU is idle you can allocate more resources to other parts of the system. Now, Intel is doing this too in the future but we think Arm is way ahead. At least by two years this is also huge for Nvidia, which today relies on x86. A major problem for Nvidia has been coherent memory management because the utilization of its GPU is appallingly low and it can't be easily optimized. Last week, Nvidia announced it's intent to provide an AI capability for the data center without x86 I.e using Arm-based processors. So Nvidia another big Intel customer is also moving to Arm. And if it's successful acquiring Arm which is still a long shot this trend is only going to accelerate. But the bottom line is if Intel can't move fast enough to stem the momentum of Arm we believe Arm will capture 50% of the enterprise semiconductor spending by 2030. So how does Intel continue to lead? Well, it's not going to be easy. Remember we said, Intel, can't go it alone. And we posited that the company would have to initiate a joint venture structure. We propose a triumvirate of Intel, IBM with its power of 10 and memory aggregation and memory architecture And Samsung with its volume manufacturing expertise on the premise that it coveted in on US soil presence. Now upon further review we're not sure the Samsung is willing to give up and contribute its IP to this venture. It's put a lot of money and a lot of emphasis on infrastructure in South Korea. And furthermore, we're not convinced that Arvind Krishna who we believe ultimately made the call to Jettisons. Jettison IBM's micro electronics business wants to put his efforts back into manufacturing semi-conductors. So we have this conundrum. Intel is fighting AMD, which is already at seven nanometer. Intel has a fall behind in process manufacturing which is strategically important to the United States it's military and the nation's competitiveness. Intel's behind the curve on cost and architecture and is losing key customers in the most important market segments. And it's way behind on volume. The critical piece of the pie that nobody ever talks about. Intel must become more price and performance competitive with x86 and bring in new composable designs that maintain x86 competitive. And give the ability to allow customers and designers to add and customize GPU's, NPUs, accelerators et cetera. All while launching a successful Foundry business. So we think there's another possibility to this thought exercise. Apple is currently reliant on TSMC and is pushing them hard toward five nanometer, in fact sucking up a lot of that volume and TSMC is maybe not servicing some other customers as well as it's servicing Apple because it's a bit destructive, it is distracted and you have this chip shortage. So Apple because of its size gets the lion's share of the attention but Apple needs a trusted onshore supplier. Sure TSMC is adding manufacturing capacity in the US and Arizona. But back to our precarious scenario in the South China sea. Will the U S government and Apple sit back and hope for the best or will they hope for the best and plan for the worst? Let's face it. If China gains control of TSMC, it could block access to the latest and greatest process technology. Apple just announced that it's investing billions of dollars in semiconductor technology across the US. The US government is pressuring big tech. What about an Apple Intel joint venture? Apple brings the volume, it's Cloud, it's Cloud, sorry. It's money it's design leadership, all that to the table. And they could partner with Intel. It gives Intel the Foundry business and a guaranteed volume stream. And maybe the U S government gives Apple a little bit of breathing room and the whole big up big breakup, big tech narrative. And even though it's not necessarily specifically targeting Apple but maybe the US government needs to think twice before it attacks big tech and thinks about the long-term strategic ramifications. Wouldn't that be ironic? Apple dumps Intel in favor of Arm for the M1 and then incubates, and essentially saves Intel with a pipeline of Foundry business. Now back to IBM in this scenario, we've put a question mark on the slide because maybe IBM just gets in the way and why not? A nice clean partnership between Intel and Apple? Who knows? Maybe Gelsinger can even negotiate this without giving up any equity to Apple, but Apple could be a key ingredient to a cocktail of a new strategy under Pat Gelsinger leadership. Gobs of cash from the US and EU governments and volume from Apple. Wow, still a long shot, but one worth pursuing because as we've written, Intel is too strategic to fail. Okay, well, what do you think? You can DM me @dvellante or email me at david.vellante@siliconangle.com or comment on my LinkedIn post. Remember, these episodes are all available as podcasts so please subscribe wherever you listen. I publish weekly on wikibon.com and siliconangle.com. And don't forget to check out etr.plus for all the survey analysis. And I want to thank my colleague, David Floyer for his collaboration on this and other related episodes. This is Dave Vellante for theCUBE insights powered by ETR. Thanks for watching, be well, and we'll see you next time. (upbeat music)
SUMMARY :
This is Breaking Analysis and most of the spending is going to be.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
David Floyer | PERSON | 0.99+ |
Dave Vellante | PERSON | 0.99+ |
HP | ORGANIZATION | 0.99+ |
Apple | ORGANIZATION | 0.99+ |
Microsoft | ORGANIZATION | 0.99+ |
Samsung | ORGANIZATION | 0.99+ |
Dell | ORGANIZATION | 0.99+ |
Amazon | ORGANIZATION | 0.99+ |
TSMC | ORGANIZATION | 0.99+ |
IBM | ORGANIZATION | 0.99+ |
2011 | DATE | 0.99+ |
Lenovo | ORGANIZATION | 0.99+ |
ORGANIZATION | 0.99+ | |
Pat Gelsinger | PERSON | 0.99+ |
$10 billion | QUANTITY | 0.99+ |
Nvidia | ORGANIZATION | 0.99+ |
Palo Alto | LOCATION | 0.99+ |
ORGANIZATION | 0.99+ | |
50% | QUANTITY | 0.99+ |
Alibaba | ORGANIZATION | 0.99+ |
$600 | QUANTITY | 0.99+ |
AWS | ORGANIZATION | 0.99+ |
45% | QUANTITY | 0.99+ |
two chips | QUANTITY | 0.99+ |
10 times | QUANTITY | 0.99+ |
10 cents | QUANTITY | 0.99+ |
South Korea | LOCATION | 0.99+ |
US | LOCATION | 0.99+ |
Last week | DATE | 0.99+ |
Oracle | ORGANIZATION | 0.99+ |
Arizona | LOCATION | 0.99+ |
U S | ORGANIZATION | 0.99+ |
Boston | LOCATION | 0.99+ |
david.vellante@siliconangle.com | OTHER | 0.99+ |
1 trillion | QUANTITY | 0.99+ |
2030 | DATE | 0.99+ |
Marvell | ORGANIZATION | 0.99+ |
China | ORGANIZATION | 0.99+ |
Arvind Krishna | PERSON | 0.99+ |
two years | QUANTITY | 0.99+ |
Moore | PERSON | 0.99+ |
$9 billion | QUANTITY | 0.99+ |
10 | QUANTITY | 0.99+ |
EU | ORGANIZATION | 0.99+ |
last year | DATE | 0.99+ |
last week | DATE | 0.99+ |
twice | QUANTITY | 0.99+ |
first line | QUANTITY | 0.99+ |
Okinawa | LOCATION | 0.99+ |
last September | DATE | 0.99+ |
Hong Kong | LOCATION | 0.99+ |
IBM4 Wayne Balta & Kareem Yusuf VTT
>>From around the globe, it's the Cube with digital coverage of IBM think 2021 brought to you by IBM. Welcome back to the cubes coverage of IBM Think 2021 virtual, I'm john for your host of the cube. We had a great line up here talking sustainability, kary musa ph d general manager of AI applications and block chains going great to see you and wayne, both the vice president of corporate environmental affairs and chief sustainability officer, among other things involved in the products around that. Wait and korean, great to see you. Thanks for coming on. >>Thank you for having us. >>Well, I'll start with you what's driving? IBMS investment in sustainability as a corporate initiative. We know IBM has been active, we've covered this many times, but there's more drivers now as IBM has more of a larger global scope and continues to do that with hybrid cloud, it's much more of a global landscape. What's driving today's investments in sustainability, >>You know, jOHn what drives IBM in this area has always been a longstanding, mature and deep seated belief in corporate responsibility. That's the bedrock foundation. So, you know, IBM 110 year old company, we've always strived to be socially responsible, But what's not as well known is that for the last 50 years, IBM has truly regarded environmental sustainability is a strategic imperative. Okay, It's strategic because hey, environmental problems require a strategic fix. It's a long term imperative because you have to be persistent with environmental problems, you don't necessarily solve them overnight. And it's imperative because business cannot succeed in a world of environmental degradation that really is the main tenant of sustainable development. You can't have successful economies with environmental degradation, you can't solving environmental problems without successful economies. So, and IBM's case as a long standing company, We were advantaged because 50 years ago our ceo at the time, Tom Watson put in place the company's first policy for environmental a stewardship and we've been at it ever since. And he did that in 1971 and that was just six months after the U. S. E. P. A. Was created. It was a year before the Stockholm Conference on the Environment. So we've been added for that long. Um in essence, really it's about recognizing that good environmental management makes good business sense, It's about corporate responsibility and today it's the E of E. S. G. >>You know, wayne. That's a great call out, by the way, referencing thomas Watson, the IBM legend. Um people who don't may not know the history, he was really ahead of its time and that was a lot of the culture they still see around today. So great to see that focus and great, great call out there. But I will ask though, as you guys evolved in today's modern error, how has that evolved in today's focus? Because, you know, we see data centers, carbon footprint, global warming, you now have a I and analytics can measure everything. So I mean you can you can measure everything now. So as the world gets larger in the surface area of what is contributing to the sustainable equation is larger, what's the current IBM focus? >>So these days we continually look at all of the ways in which IBM s day to day business practices intersect with any matter of the environment, whether it's materials, waste water or energy and climate. And IBM actually has 21 voluntary goals that drive us towards leadership. But today john as you know, uh the headline is really climate change and so we're squarely focused like many others on that and that's an imperative. But let me say before I just before I briefly tell you our current goals, it's also important to have context as to where we have been because that helps people understand what we're doing today. And so again, climate change is a topic that the men and women of IBM have paid attention to for a long time. Yeah, I was think about it. It was back in 1992 that the U. S. C. P. A. Created something called Energy Star. People look at that and they said, well, what's that all about? Okay, that's all about climate change. Because the most environmentally friendly energy you can get is the energy that you don't really need to consume. IBM was one of eight companies that helped the U. S. C. P. A. Launched that program 1992. Today we're all disclosing C. 02 emissions. IBM began doing that in 1994. Okay. In 2007, 13 years ago, I'd be unpublished. Its position on climate change, calling for urgent action around the world. He supported the Paris Agreement 2015. We reiterated that support in 2017 for the us to remain a partner. 2019, we became a founding member of Climate Leadership Council which calls for a carbon tax and a carbon dividend. So that's all background context. Today, we're working on our third renewable electricity goal, our fifth greenhouse gas emissions reduction goal and we set a new goal to achieve net zero greenhouse gas emissions. Each of those three compels IBM to near term action. >>That's awesome wayne as corporate environmental affairs and chief sustainable, great vision and awesome work. Karim dr Karim use if I wanna we leave you in here, you're the general manager. You you got to make this work because of the corporate citizenship that IBM is displaying. Obviously world world class, we know that's been been well reported and known, but now it's a business model. People realize that it's good business to have sustainability, whether it's carbon neutral footprints and or intersecting and contributing for the world and their employees who want mission driven companies ai and Blockchain, that's your wheelhouse. This is like you're on the big wave, wow, this is happening, give us your view because you're commercializing this in real time. >>Yeah, look as you've already said and it's the way well articulated, this is a business imperative, right is key to all companies corporate strategies. So the first step when you think about operationalized in this is what we've been doing, is to really step back and kind of break this down into what we call five key needs or focus areas that we've understood that we work with our clients. Remember in this context, Wayne is indeed my clients as well. Right. And so when you think about it, the five needs, as we like to lay them out, we talk about the sustainability strategy first of all, how are you approaching it as you saw from Wayne, identifying your key goals and approaches right against that, you begin to get into various areas and dimensions. Climate risk management is becoming increasingly important, especially in asset heavy industries electrification, energy and emissions management, another key focus area where we can bring technology to bear resilient infrastructure and operations, sustainable supply chain, All of these kind of come together to really connect with our clients business operations and allows us to bring together the technologies and context of ai Blockchain and the key business operations. We can support to kind of begin to address specific news cases in the context of those >>needs. You know, I've covered it in the past and written about and also talked about on the cube about sustainability on the supply chain side with Blockchain, whether it's your tracking, you know, um you know, transport of goods with with Blockchain and making sure that that kind of leads your kind of philosophy works because there's waste involved is also disruption to business, a security issues, but when you really move into the Ai side, how does a company scale that Corinne, because now, you know, I have to one operationalize it and then scale it. Okay, so that's transformed, innovate and scale. How do I take take me through the examples of how that works >>well, I think really key to that, and this is really key to our ethos, it's enabling ai for business by integrating ai directly into business operations and decision making. So it's not really how can I put this? We try to make it so that the client isn't fixating on trying to deploy ai, they're just leveraging Ai. So as you say, let's take some practical examples. You talked about sustainable supply chains and you know, the key needs around transparency and provenance. Right. So we have helped clients like a tear with their seafood network or the shrimp sustainability network where there's a big focus on understanding where are things being sourced and how they're moving through the supply chain. We also have a responsible sourcing business network that's being used for cobalt in batteries as an example from mine to manufacturing and here our technologies are allowing us to essentially track, trace and prove the provenance Blockchain serves as kind of that key shared ledger to pull all this information together. But we're leveraging AI to begin to quickly assess based upon the data inputs, the actual state of inventory, how to connect dots across multiple suppliers and as you on board in an off board them off the network. So that's how we begin to put A I in action so that the client begins to fixate on the work and the decisions they need to make. Not the AI itself. Another quick example would be in the context of civil infrastructure. One of our clients son and Belt large, maximum client of ours he uses maximum too rarely focus on the maintaining sustainable maintenance of their bridges. Think about how much money is spent setting up to do bridge inspections right. When you think about how much they have to invest the stopping of the traffic that scaffolding. We have been leveraging AI to do things like visual inspection. Actually fly drones, take pictures, assess those images to identify cracks and use that to route and prioritized work. Similar examples are occurring in energy and utilities focused on vegetation management where we're leveraging AI to analyse satellite imagery, weather data and bringing it together so that work can be optimally prior authorized and deployed for our >>clients. It's interesting. One of the themes coming out of think that I'm observing is this notion of transformation is innovation and innovation is about scale. Right? So it's not just innovation for innovating sake. You can transform from whether it's bridge inspections to managing any other previous pre existing kind of legacy condition and bring that into a modern error and then scale it with data. This is a common theme. It applies to to your examples. Kareem, that's super valuable. Um how do you how do you tie that together with partnering? Because wayne you were talking about the corporate initiative, that's just IBM we learned certainly in cybersecurity and now these other areas like sustainability, it's a team sport, you have to work on a global footprint with other industries and other leaders. How was I being working across the industry to connect and work with other, either initiatives or companies or governments. >>Sure. And there have been john over the years and at present a number of diverse collaborations that we seek out and we participate in. But before I address that, I just want to amplify something Kareem said, because it's so important, as I look back at the environmental movement over the last 50 years, frankly, since the first earth day in 1970, I, you know, with the benefit of hindsight, I observed there have really been three different hair, it's in the very beginning, global societies had to enact laws to control pollution that was occurring. That was the late 60s 1970s, into the early 1980s and around the early 1980s through to the first part of this century, that era of let's get control of this sort of transformed, oh how can we prevent stuff from happening given the way we've always done business and that area ran for a while. But now thanks to technology and data and things like Blockchain and ai we all have the opportunity to move into this era of innovation which differs from control in which differs from traditional prevention. Innovation is about changing the way you get the same thing done. And the reason that's enabled is because of the tools that you just spoke about with Korean. So how do we socialize these opportunities? Well to your question, we interact with a variety of diverse teams, government, different business associations, Ngos and Academia. Some examples, there's an organization named the Center for Climate and Energy Solutions, which IBM is a founding member of its Business Leadership Council. Its predecessor was the Q Centre on global climate change. We've been involved with that since 1998. That is a cross section of people from all these different constituencies who are looking for solutions to climate. Many Fortune 102000s in there were part of the green grid. The green grid is an organization of companies involved with data centers and it's constantly looking at how do you measure energy efficiency and data centers and what are best practices to reduce consumption of energy at data centers where a member of the renewable energy buyers alliance? Many Fortune 100 200 Zarin that trying to apply scale to procure more renewable electricity to actually come to our facilities I mentioned earlier were part of the Climate Leadership Council calling for a carbon tax were part of the United Nations Environment Programs science Policy business form that gets us involved with many ministers of Environment from countries around the world. We recently joined the new MITt Climate and sustainability consortium. Mitt Premier Research University. Many key leaders are part of that. Looking at how academic research can supercharge this opportunity for innovation and then the last one, I'll just wrap up call for code. You may be familiar with IBM s involvement in call for code. Okay. The current challenge under call for code in 2021 calls for solutions targeted the climate change. So that's, that's a diverse set of different constituents, different types of people. But we try to get involved with all of them because we learn and hopefully we contribute something along the way as well. >>Awesome Wayne. Thank you very much Karim, the last 30 seconds we got here. How do companies partner with IBM if they want to connect in with the mission and the citizenship that you guys are doing? How do they bring that to their company real quick. Give us a quick overview. >>Well, you know, it's really quite simple. Many of these clients are already clients of ours were engaging with them in the marketplace today, right, trying to make sure we understand their needs, trying to ensure that we tune what we've got to offer, both in terms of product and consulting services with our GPS brethren, you know, to meet their needs, linking that in as well to IBM being and what we like to turn client zero. We're also applying these same technologies and capabilities to support IBM efforts. And so as they engage in all these associations, what IBM is doing that also provides a way to really get started. It's really fixate on those five imperatives or needs are laid out, picked kind of a starting point and tie it to something that matters. That changes how you're doing something today. That's really the key. As far as uh we're concerned, >>Karim, we thank you for your time on sustainability. Great initiative, Congratulations on the continued mission. Going back to the early days of IBM and the Watson generation continuing out in the modern era. Congratulations and thanks for sharing. >>Thank you john. >>Okay. It's the cubes coverage. I'm sean for your host. Thanks for watching. >>Mm. Mhm.
SUMMARY :
of IBM think 2021 brought to you by IBM. as IBM has more of a larger global scope and continues to do that with hybrid cloud, have to be persistent with environmental problems, you don't necessarily solve them overnight. So I mean you can you the most environmentally friendly energy you can get is the energy that you don't Karim dr Karim use if I wanna we leave you in here, So the first step when you think about that Corinne, because now, you know, I have to one operationalize it and then scale it. how to connect dots across multiple suppliers and as you on board in an off board One of the themes coming out of think that I'm observing is this notion of transformation Innovation is about changing the way you get if they want to connect in with the mission and the citizenship that you guys are doing? with our GPS brethren, you know, to meet their needs, linking that in as well to IBM Karim, we thank you for your time on sustainability. I'm sean for your host.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
IBM | ORGANIZATION | 0.99+ |
Center for Climate and Energy Solutions | ORGANIZATION | 0.99+ |
Kareem | PERSON | 0.99+ |
1971 | DATE | 0.99+ |
2007 | DATE | 0.99+ |
1994 | DATE | 0.99+ |
Karim | PERSON | 0.99+ |
1992 | DATE | 0.99+ |
2017 | DATE | 0.99+ |
Wayne | PERSON | 0.99+ |
Tom Watson | PERSON | 0.99+ |
thomas Watson | PERSON | 0.99+ |
2019 | DATE | 0.99+ |
2021 | DATE | 0.99+ |
Climate Leadership Council | ORGANIZATION | 0.99+ |
1998 | DATE | 0.99+ |
kary musa | PERSON | 0.99+ |
one | QUANTITY | 0.99+ |
john | PERSON | 0.99+ |
Kareem Yusuf | PERSON | 0.99+ |
Today | DATE | 0.99+ |
Business Leadership Council | ORGANIZATION | 0.99+ |
One | QUANTITY | 0.99+ |
50 years ago | DATE | 0.99+ |
wayne | PERSON | 0.99+ |
early 1980s | DATE | 0.99+ |
21 voluntary goals | QUANTITY | 0.99+ |
Each | QUANTITY | 0.99+ |
1970 | DATE | 0.99+ |
first step | QUANTITY | 0.99+ |
both | QUANTITY | 0.98+ |
three | QUANTITY | 0.98+ |
today | DATE | 0.98+ |
first policy | QUANTITY | 0.98+ |
Q Centre | ORGANIZATION | 0.98+ |
five key needs | QUANTITY | 0.98+ |
13 years ago | DATE | 0.98+ |
eight companies | QUANTITY | 0.98+ |
late 60s 1970s | DATE | 0.97+ |
Wayne Balta | PERSON | 0.97+ |
Stockholm Conference on the Environment | EVENT | 0.96+ |
five imperatives | QUANTITY | 0.96+ |
110 year old | QUANTITY | 0.94+ |
a year | DATE | 0.93+ |
think 2021 | COMMERCIAL_ITEM | 0.93+ |
Academia | ORGANIZATION | 0.92+ |
IBMS | ORGANIZATION | 0.92+ |
third renewable electricity | QUANTITY | 0.91+ |
Paris Agreement 2015 | TITLE | 0.91+ |
Mitt Premier Research University | ORGANIZATION | 0.91+ |
Ngos | ORGANIZATION | 0.9+ |
five needs | QUANTITY | 0.89+ |
six months | QUANTITY | 0.88+ |
Think 2021 | COMMERCIAL_ITEM | 0.86+ |
zero greenhouse | QUANTITY | 0.86+ |
C. 02 | OTHER | 0.84+ |
William Murphy, BigID | AWS Startup Showcase
(upbeat music) >> Well, good day and thank you for joining us as we continue our series here on theCUBE of the AWS Startup Showcase featuring today BigID. And with us is Will Murphy, who's the Vice President of the Business Development and Alliances at BigID. Will, good day to you, how are you doing today? >> Thanks John, I'm doing well. I'm glad to be here. >> Yeah, that's great. And theCUBE alum too, I might add so it's nice to have you back. Let's first off, let's share the BigID story. You've been around for just a handful of years. Accolades coming from every which direction so obviously what you're doing, you're doing very well. But for our viewers who might not be too familiar with BigID, just give us a 30,000 foot level of your core competence. >> Yeah absolutely. So actually we just had our five-year anniversary for BigID, which we're quite excited about. And that five year comes with some pretty big red marks. We've raised over $200 million for a unicorn now. But where that comes to and how that came about was that we're dealing with longstanding problems with modern data landscapes, security governance, privacy initiatives. And starting in 2016 with the authorship of GDPR, the European privacy law organizations had to treat data differently than they did before. They couldn't afford to just sit on all this data that was collected. For a couple reasons, right? One of them being that it's expensive. So you're constantly storing data whether that's on-prem or in the cloud as we're going to talk about. There's expense to that. You have to pay to secure the data and keep it from being leaked, You have to pay for access control, you have to pay for a lot of different things. And you're not getting any value out of that. And then there's the idea of the customer trust piece, which is like if anything happens to that data, your reputation as a company and the trust you have between your customers and your organization is broken. So BigID, what we did is we decided that there was a foundation that needed to be built. The foundation was data discovery. If an organization knows where its data is, whose data it is, where it is, and what it is and also who has access to it, they can start to make actionable decisions based on the data and based on this new data intelligence. So, we're trying to help organizations keep up with modern data initiatives. And we're empowering organizations to handle their data, sensitive, personal regulated. What's actually quite interesting is we allow organizations to define what's sensitive to them because like people, organizations are all different. And so what's sensitive to one organization might not be to another. It goes beyond the wall. And so we're giving organizations that new power and flexibility. >> And this is what I still find striking is that obviously with this exponential growth of data you got machine learning, just bringing billions of inputs. It seems like right now. Also you had this vast reservoir of data. Is that the companies in large part don't know a lot about the data that they're harvesting and where it is, and so it's not actionable. It's kind of dark data, right? Just out there residing. And so as I understand it, this is your focus basically is to tell people, hey here's your landscape, here's how you can better put it to action why it's valuable and we're going to help you protect it. And they're not aware of these things which I still find a little striking in this day and age >> And it goes even further. So you know, when you start to reveal the truth and what's going on with data, there's a couple things that some organizations do. And enter the human instincts. Some organizations want to bury their head in the sand like everything's fine. Which is as we know and we've seen the news frequently not a sustainable approach. There's the like let's be we're overwhelmed. Yeah. We don't even know where to start. Then there's the unnatural reaction, which is okay, we have to centralize and control everything. Which defeats the purpose of having shared drives and collaboration in geographically disparate workforces, which we've seen in particularly over the last year, how important that resiliency within organizations is to be able to work in different areas. And so it really restricts the value that organizations can get from their data, which is important. And it's important in a ton of ways. And for customers that have allowed their data to be stored and harvested by these organizations, like they're not getting value out of it neither. It's just risk. And we've got to move data from the liability side of the balance sheet to the assets side of the balance sheet. And that comes first and foremost with knowledge. >> So everybody's going cloud, right? Used to be, you know, everybody's on prem. And all of a sudden we build a bigger house. And so because you build a bigger house, you need better security, right? Your perimeter's got to grow. And that's where I assume AWS has come in with you. And this is a two year partnership that you've been engaged with in AWS. So maybe shine a little light on that. About the partnership that you've created with AWS and then how you then in turn transition that to leverage that for the benefit of your customer base. >> Yeah. So AWS has been a great partner. They are very forward-looking for an organization as large as they are. Very forward looking that they can't do everything that their customers need. And it's better for the ecosystem as a whole to enable small companies like us, and we were very small when we started our relationship with them, to join their partner organization. So we're an advanced partner now. We're part of ISV Accelerate. So it's a slightly more lead partner organization. And we're there because our customers are there. And AWS like us, we both have a customer obsessed culture. But organizations are embracing the cloud. And there's fear of the cloud, but there really shouldn't be in the way that we thought of it maybe five or 10 years ago. And that companies like AWS are spending a lot more money on security than most organizations can. So like they have huge security teams, they're building massive infrastructure. And then on top of that, companies themselves can can use products like big ID and other products to make themselves more secure from outside threats and from inside threats as well. So we are trying to with them approach modern data challenges well. So even within AWS, if you put all the information in like let's say S3 buckets, it doesn't really tell you anything. It's like, you know, I make this analogy sometimes. I live in Manhattan and if I were to collect all the keys of everybody that lived in a 10 block radius around me and put it into a dumpster and keep doing that, I would theoretically know where all the keys were. They're in the dumpster. Now, if somebody asked me, I'd like my keys back, I'd have a really hard time giving them that. Because I've got to sort through, you know, 10,000 people's keys. And I don't really know a lot about it. But those key say a lot, you know? It says like, are you in an old building? Are you in a new building? Do you have a bike? Do you have a car? Do you have a gym locker? There's all sorts of information. And I think that this analogy holds up for data but ifs of the way you store your data is important. But you can gain a lot of theoretically innocuous but valuable information from the data that's there, while not compromising the sensitive data. And as an AWS has been a fabulous partner in this. They've helped us build a AWS security, have integration out of the box. We now work with over 12 different AWS native applications from anything like S3, Redshift, Athena, Kinesis, as well as apps built on AWS, like Snowflake and Databricks that we connect to. And in AWS, the technical teams, department teams have been an enormous part of our success there. We're very proud to have joined the marketplace, to be where our customers want to buy enterprise software more and more. And that's another area that we're collaborating in joint accounts now to bring more value and simplicity to our joint customers. >> So what's your process in terms of your customer and evaluating their needs? 'Cause you just talked about it earlier that you had different approaches to security. Some people put their head in the sand, right? Some people admit that there's a problem. Some people fully are engaged. So I assume there's also a different level of sophistication in terms of what they already have in place and then what their needs are. So if you were to shine a little light on that, about assessing where they are in terms of their data landscape. And now AWS and its tools, which you just touched on. You know, the multiple tools you have in your service. Now, all that comes together to develop what would be I guess, a unique program for a company's specific needs. >> It is. We started talking to the largest enterprise accounts when we were founded and we still have a real proclivity and expertise in that area. So the issues with the large enterprise accounts and the uniqueness there is scale. They have a tremendous amount of data: HR data financial data, customer data, you name it. Right? Like, we could go dry mouth talking about how many insane data so many times with these large customers. For AWS, scale wasn't an issue. They can store it. They can analyze it. They can do tons with it. Where we were helping is that we could make that safer. So if you want to perform data analytics, you want to ensure that sensitive data is not being part of that. You want to make sure you're not violating local, national or industry specific regulations. Financial services is a great example. There's dozens of regulations at the federal level in United States. And each state has their own regulations. This becomes increasingly complex. So AWS handles this by allowing an amazing amount of customization for their customers. They have data centers in the right places. They have experts on vertical specific issues. BigID handles this similarly in some ways, but we handle it through extensibility. So one of our big things is we have to be able to connect to everywhere where our customers have data. So we want to build a foundation of like let's say first, let's understand the goals. Is the goal compliant with the law? Which it should be for everybody. That should just be like, we need to comply with the law. Like that's easy. Yeah. Then there's the next piece, like are we dealing with something legacy? Was there a breach? Do we need to understand what happened? Are we trying to be forward-looking and understanding? We want to make sure we can lock down our most sensitive data. Tier our storage, tier our security, tier are our analytics efforts which also is cost-effective. So you don't have to do everything everywhere. Or is the goal a little bit like we needed to get our return on investment faster. And we can't do that without de-risking some of that. So we've taken those lessons from the enterprise where it's exceedingly difficult to work because of the strict requirements because the customers expect more. And I think like AWS, we're bringing it down market. We have some new product coming out. It's exclusive for AWS now called SmallID, which is a cloud native. A smaller version, lighter weight version of our product for customers in the more commercial space. In the SMB space where they can start to build a foundation of understanding their data for protection and for security, for privacy. >> Will, and before I let you go here what I'd like to hear about is practical application. You know, somebody that you've, you know, that you were able to help and assist, you evaluated. 'Cause you've talked about the format here. You talked about your process and talked about some future, I guess, challenges, opportunities. But just to give our viewers an idea of maybe the kind of success you've already had. To give them a perspective on that. Just share a couple of stories, if you wouldn't mind. Whether there's some work that you guys did and rolled up your sleeves and created that additional value for your customers. >> Yeah, absolutely. So I'll give a couple examples. I'm going to keep everyone anonymized. As a privacy based company, in many ways, we try to respect-- >> Probably a good idea, right? (Will chuckles) >> But let's talk about different types of sensitive data. So we have customers that intellectual property is their biggest concern. So they do care about compliance. They want to comply with all the local and national laws where their company resides and all their offices are. But they were very concerned about sensitive data sprawl around intellectual property. They have a lot of patents. They have a lot of sensitive data that way. So one of the things we did is we were able to provide custom tags and classifications for their sensitive data based on intellectual property. And they could see across their cloud environment, across their on-premise environment, across shared drives et cetera, where sensitive data had sprawl. Where it had moved, who's having access to it. And they were able to start realigning their storage strategy and their content management strategy, data governance strategy, based on that. And start to move sensitive data back to certain locations, lock that down on a higher level. Could create more access control there, but also proliferate and share data that more teams needed access to. And so that's an example of a use case that I don't think we imagined necessarily in 2016 when we were focused on privacy but we've seen that the value can come from it. Yeah. >> So it's a good... Please, yeah, go ahead. >> No, I mean, the other (mumbles). So we've worked with some of the largest AWS customers in the world. Their concern is how do we even start to scan the Tedder terabytes and petabytes of data in any reasonable fashion without it being out of date. If we create this data map, if we create this data inventory, it's going to be out of date day one. As soon as we say, it's complete, we've already added more. >> John: Right. >> That's where our scalability fits in. We were able to do a full scan of their entire AWS environment in months. And then keep up with the new data that was going into their AWS environment. This is huge. This was groundbreaking for them. So our hyper scan capability that we brought out, that we rolled out to AWS first, was a game changer for them. To understand what data they had, where it is, who's it is et cetera, at a way that they never thought they could keep up with. You know, I brought back to the beginning of code when the British government was keeping track of all the COVID cases on spreadsheets and spreadsheets broke. It was also out of date. As soon as they entered something else it was already out of date. They couldn't keep up with it. Like there's better ways to do that. Luckily they think they've moved on from that manual system. But automation using the correct human inputs when necessary. Then let machine learning, let big data take care of things that it can. Don't waste human hours that are precious and expensive unnecessarily. And make better decisions based on that data. >> Yeah. You raised a great point too which I hadn't thought of about. The fact is, you do your snapshot today and you start evaluating all their needs for today. And by the time you're able to get that done their needs have now exponentially grown. It's like painting the golden gate bridge. Right? You get done and now you got to paint it again, except it got bigger. We added lanes, but anyway. Hey, Will. Thanks for the time. We certainly appreciate it. Thanks for joining us here on the startup showcase. And just remind me that if you ever asked for my keys keep them out of that dumpster. Okay? (Will chuckles) >> Thanks, John. Glad to be here. >> Pleasure. (soft music)
SUMMARY :
of the AWS Startup Showcase I'm glad to be here. so it's nice to have you back. and the trust you have Is that the companies And enter the human instincts. And all of a sudden we but ifs of the way you store that you had different So the issues with the of maybe the kind of I'm going to keep everyone anonymized. So one of the things we So it's a good... of the largest AWS customers in the world. of all the COVID cases And by the time you're (soft music)
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
AWS | ORGANIZATION | 0.99+ |
John | PERSON | 0.99+ |
Manhattan | LOCATION | 0.99+ |
2016 | DATE | 0.99+ |
Will Murphy | PERSON | 0.99+ |
two year | QUANTITY | 0.99+ |
United States | LOCATION | 0.99+ |
BigID | TITLE | 0.99+ |
Will | PERSON | 0.99+ |
William Murphy | PERSON | 0.99+ |
10 block | QUANTITY | 0.99+ |
five | DATE | 0.99+ |
over $200 million | QUANTITY | 0.99+ |
30,000 foot | QUANTITY | 0.99+ |
One | QUANTITY | 0.99+ |
10,000 people | QUANTITY | 0.99+ |
each state | QUANTITY | 0.99+ |
Redshift | TITLE | 0.98+ |
one | QUANTITY | 0.98+ |
GDPR | TITLE | 0.98+ |
Athena | TITLE | 0.98+ |
first | QUANTITY | 0.98+ |
five year | QUANTITY | 0.98+ |
S3 | TITLE | 0.98+ |
today | DATE | 0.98+ |
Snowflake | TITLE | 0.97+ |
10 years ago | DATE | 0.97+ |
last year | DATE | 0.97+ |
Kinesis | TITLE | 0.95+ |
both | QUANTITY | 0.93+ |
five-year anniversary | QUANTITY | 0.92+ |
one organization | QUANTITY | 0.91+ |
BigID | ORGANIZATION | 0.9+ |
dozens of regulations | QUANTITY | 0.89+ |
SmallID | TITLE | 0.89+ |
petabytes | QUANTITY | 0.84+ |
British government | ORGANIZATION | 0.81+ |
ISV | ORGANIZATION | 0.81+ |
over 12 different | QUANTITY | 0.77+ |
AWS Startup Showcase | EVENT | 0.77+ |
billions of inputs | QUANTITY | 0.77+ |
day one | QUANTITY | 0.75+ |
couple | QUANTITY | 0.71+ |
couple reasons | QUANTITY | 0.7+ |
handful of years | QUANTITY | 0.7+ |
tons | QUANTITY | 0.69+ |
couple things | QUANTITY | 0.67+ |
Vice President | PERSON | 0.65+ |
them | QUANTITY | 0.64+ |
European | OTHER | 0.61+ |
S3 | COMMERCIAL_ITEM | 0.58+ |
theCUBE | ORGANIZATION | 0.57+ |
Databricks | TITLE | 0.54+ |
terabytes | QUANTITY | 0.53+ |
Business Development | ORGANIZATION | 0.5+ |
Showcase | EVENT | 0.5+ |
COVID | OTHER | 0.45+ |
Accelerate | TITLE | 0.43+ |
Alliances | ORGANIZATION | 0.43+ |
BigID | EVENT | 0.42+ |
Tedder | COMMERCIAL_ITEM | 0.38+ |
Sandy Carter, AWS | CUBE Conversation, February 2021
(upbeat music) >> Hello and welcome to this Cube conversation. I'm John Furrier, your host of theCube here in Palo Alto, California. We're here in 2021 as we get through the pandemic and vaccine on the horizon all around the world. It's great to welcome Sandy Carter, Vice President of Partners and Programs with Amazon Web Services. Sandy, great to see you. I wanted to check in with you for a couple of reasons. One is just get a take on the landscape of the marketplace as well as you've got some always good programs going on. You're in the middle of all the action. Great to see you. >> Nice to see you too, John. Thanks for having me. >> So one of the things that's come out of this COVID and as we get ready to come out of the pandemic you starting to see some patterns emerging, and that is cloud and cloud-native technologies and SAS and the new platforming and refactoring using cloud has created an opportunity for companies. Your partner group within public sector and beyond is just completely exploding and value creation. Changing the world's society is now accelerated. We've covered that in the past, certainly in detail last year at re:Invent. Now more than ever it's more important. You're doing some pretty cutting things. What's your update here for us? >> Well, John, we're really excited because you know the heartbeat of countries of the United States globally are small and medium businesses. So today we're really excited to launch Think Big for Small Business. It's a program that helps accelerate public sector serving small and diverse partners. So you know that these small and medium businesses are just the engine for inclusive growth and strategy. We talked about some stats today, but according to the World Bank, smaller medium business accounts for 98% of all companies, they contribute a 50% of the GDP, two-thirds of the employment opportunities, and the fastest growing areas are in minority owned businesses, women, black owned, brown owned, veteran owned, aborigine, ethnic minorities who are just vital to the economic role. And so today this program enables us as AWS to support this partner group to overcome the challenges that they're seeing today in their business with some benefits specifically targeted for them from AWS. >> Can I ask you what was the driver behind this? Obviously, we're seeing the pandemic and you can't look at on the TV or in the news without seeing the impact that small businesses had. So I can almost imagine that might be some motivation, but what is some of the conversations that you're having? Why this program? Why think Big for Small Business pilot experience that you're launch? >> Well, it's really interesting. The COVID obviously plays a role here because COVID hit small and medium businesses harder, but we also, you know, part of Amazon is working backwards from the customers. So we collected feedback from small businesses on their experience in working with us. They all want to work with us. And essentially they told us that they need a little bit more help, a little bit more push around programmatic benefits. So we listened to them to see what was happening. In addition, AWS grew up with a startup community. That's how we grew up. And so we wanted to also reflect our heritage and our commitment to these partners who represent such a heartbeat of many different economies. That was really the main driver. And today we had, John, one of our follow the sun. So we're doing sessions in Latin America, Canada, the US, APJ, Europe. And if you had heard these partners today it was just such a great story of how we were able to help them and help them grow. >> One of the cultural changes that we've been reporting on SiliconANGLE, you're seeing it all over the world is the shift in who's adopting, who's starting businesses. And you're seeing, you mentioned minority owned businesses but it goes beyond that. Now you have complete diverse set entrepreneurial activity. And cloud has generated this democratization wave. You starting to see businesses highly accelerated. I mean, more than ever, I've never seen in the entrepreneurial equation the ability to start, get started and get to success, get to some measurable MVP, minimal viable product, and then ultimately to success faster than ever before. This has opened up the doors to anyone to be an entrepreneur. And so this brings up the conversation of equality in entrepreneurship. I know this is close to your heart. Share your thoughts on this big trend. >> Yeah, and that's why this program it's not just a great I think achievement for AWS, but it's very personal to the entire public sector team. If you look at entrepreneurs like, Lisa Burnett, she's the President and Managing Director of DLZP. They are a female owned minority owned business from Texas. And as you listen to her story about equity, she has this amazing business, migrating Oracle workloads over to AWS, but as she started growing she needed help understanding a little bit more about what AWS could bring to the table, how we could help her, what go to market strategies we could bring, and so that equalizer was this program. She was part of our pilot. We also had John Wieler on. He is the Vice President of Biz Dev from IMT out of Canada. And he is focused on government for Canada. And as a small business, he said today something that was so impactful, he goes, "Amazon never asked me if I'm a small business. They now treat me like I'm big. I feel like I'm one of the big guys and that enables me grow even bigger." And we also talked today to Juan Pablo De Rosa. He's the CEO of Technogi. And it's a small business in Mexico. And what do they do? They do migrations. They just migrate legacy workloads over. And again, back to that equality point you made, how cool was it that here's this company in Mexico, and they're doing all these migrations and we can help them even be more successful and to drive more jobs in the region. It's a very equalizing program and something that we're very proud of. >> You know what I love about your job and I love talking to you about this (Sandy laughs) because it's so much fun. You have a global perspective. It's not just United States. There's a global perspective. This event you're having this morning that you kicked off with is not just in the US, it's a follow the sun kind of a community. You got quite the global community developing there, Sandy. Can you share some insight behind the curtain, behind AWS, how this is developing? How you're handling it? What you're doing to nurture and grow that community that really wants to engage with you because you are making them feel big because (laughs) that's what cloud does. It makes them punch above their weight class and innovate. >> Yeah, that's very correct. >> This is the core thesis of Amazon. So you've got a community developing, how are you handling it? How are you building it? How are you nurturing it? What are your thoughts? >> You know what, John? You're so insightful because that's actually the goal of this program. We want to help these partners. We want to help them grow. But our ultimate goal is to build that small and medium business community that is based on AWS. In fact, at re:Invent this year, we were able to talk about MST which is based out of Malaysia, as well as cloud prime based out of Korea. And just by talking about it, those two CEOs reached out to each other from Korea and Malaysia and started talking. And then we today introduced folks from Mexico, and Canada, and the US, and Bulgaria. And so, we really pride ourselves on facilitating that community. Our dream here, our vision here is that we would build that small business community to be much more scalable but starting out by making those connections, having that mentoring that will be built in together, doing community meetings that advisory meetings together. We piloted this program in 2020. We already have 37 partners. And they told me as I met with them, they already feel like this small and medium business community or family. Family was the word they used, I think, moving forward. So you nailed it. That's the goal here is to create that community where people can share their thoughts and mentor each other. >> And it's on the ground floor too. It's just beginning. I think it's going to be so much larger. And to piggyback off that I want to also point out and highlight and get your reaction to is the success that you've been having and Amazon Web Services in general but mainly in the public sector side with the public private partnership. You're seeing this theme emerge really been a big way. I've been enclose to it and hosting and being interviewing a lot of folks at that, your customers whether it's cybersecurity in space, the Mars partnership that you guys just got on Mars with partnerships. So it's a global and interstellar soon to be huge everywhere. But this is a big discussion because as from cybersecurity, geopolitical to space, you have this partnership with public private because you can't do it alone. The public markets, the public sector cannot do it alone. And it pretty much everyone's agreeing to that. So this dynamic of public sector and partnering private public is a pretty big deal. Unpack that for us real quickly. >> Yeah, it really is a big deal. And in fact, we've worked with several companies. I'll just use one sector. Public Safety and Disaster Response. We just announced the competency at re:Invent for our tech partners. And what we found is that when communities are facing a disaster, it really is government or the public sector plus the private sector. We had many solutions where citizens are providing data that helps the government manage a disaster or manage or help in a public safety scenario to things like simple things you would think, but in one country they were looking at bicycle routes and discovered that certain bicycle routes there were more crashes. And so one of our partners decided to have the community provide the data. And so as they were collecting that data, putting in the data lake in AWS, the community or the private sector was providing the data that enabled the application, our Public Sector Partner application to identify places where bicycle accidents happen most often. And I love the story, John, because the CEO of the partner told me that they measured their results in terms of ELO, I'm sorry, ROL, Return on Lives not ROI, because they save so many lives just from that simple application. >> Yeah, and the data's all there. You just saw on the news, Tiger Woods got into a car accident and survived. And as it turns out to your point that's a curve in the road where a lot of accidents happen. And if that data was available that could have been telegraphed right into the car itself and slow down, kind of like almost a prevention. So he just an example of just all the innovation possibilities that are abound out there. >> And that's why we love our small businesses and startups too, John. They are driving that innovation. The startups are driving that innovation and we're able to then open access to that innovation to governments, agencies, healthcare providers, space. You mentioned Mars. One of our partners MAXR helped them with the robotics. So it's just a really cool experience where you can open up that innovation, help create new jobs through these small businesses and help them be successful. There's really nothing, nothing better. >> Can I ask you- >> Small, small is beautiful. >> Can I asked you a personal question on this been Mars thing? >> Yeah. >> What's it like at Amazon Web Services now because that was such a cool mission. I saw Teresa Carlson, had a post on the internet and LinkedIn as well as her blog post. You had posted a picture of me and you had thumbs were taking an old picture from in real life. Space is cool, Mars in particular, everyone's fixated on it. Pretty big accomplishment. What's it like at Amazon? People high five in each other pretty giddy, what's happening? >> Oh yeah. The thing about Amazon is people come here to change the world. That's what we want to do. We want to have an impact on history. We want to help make history. And we do it all on behalf of our customers. We're innovating on behalf of our customers. And so, I think we get excited when our customers are successful, when our partners are successful, which is why I'm so excited right now, John, because we did that session this morning, and as I listened to Juan Pablo Dela Rosa, and just all the partners, Lisa, John, and just to hear them say, "You helped us," that's what makes us giddy. And that's what makes us excited. So it could be something as big as Mars. We went to Mars but it's also doing something for small businesses as well. It runs the spectrum that really drives us and fuels that energy. And of course, we've got great leadership as you know, because you get to talk to Andy. Andy is such a great leader. He motivates and he inspires us as well to do more on behalf of our customer. >> Yeah, you guys are very customer focused and innovative which is really the kind of the secret sauce. I love the fact that small medium sized business can also be part of the solutions. And I truly believe that, and why I wanted us to promote and amplify what you're working on today is because the small medium size enterprise and business is the heart of the recovery on a global scale. So important and having the resources to do that, and doing it easily and consuming the cloud so that they can apply the value. It's going to change lives. I think the thing that people aren't really talking much about right now, is that the small medium size businesses will be the road to recovery. >> I agree with you. And I love this program because it does promote diversity, something that Amazon is very much focused on. It's global, so it has that global reach and it supports small business, and therefore the recovery that you talked about. So it is I think an amazing emphasis on all the things that really matter now. During COVID, John, we learned about what really matters, and this program focuses on those things and helping others. >> Well, great to see you. I know you're super busy. Thanks for coming on and sharing the update, and certainly talking about the small mid size business program. I'm sure you're busy getting ready to give the awards out to the winners this year. Looking forward to seeing that come up soon. >> Great. Thank you, John. And don't forget if you are a small and medium business partner 'cause this program is specifically for partners, check out Think Big for Small Business. >> Think Big for Small Business. Sandy Carter, here on theCube, sharing our insight, of course all the updates from the worldwide public sector partner program, doing great things. I'm John Furrier for theCube. Thanks for watching. (upbeat music)
SUMMARY :
One is just get a take on the Nice to see you too, John. and the new platforming and the fastest growing areas and you can't look at on the TV and our commitment to these partners the ability to start, and so that equalizer was this program. and I love talking to you about this This is the core thesis and Canada, and the US, and Bulgaria. And it's on the ground floor too. And I love the story, John, Yeah, and the data's all there. They are driving that innovation. a post on the internet and just all the partners, Lisa, John, is that the small medium size businesses And I love this program and sharing the update, And don't forget if you are a small of course all the updates
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Andy | PERSON | 0.99+ |
World Bank | ORGANIZATION | 0.99+ |
Lisa Burnett | PERSON | 0.99+ |
John | PERSON | 0.99+ |
AWS | ORGANIZATION | 0.99+ |
Amazon | ORGANIZATION | 0.99+ |
John Furrier | PERSON | 0.99+ |
Sandy Carter | PERSON | 0.99+ |
Mexico | LOCATION | 0.99+ |
Sandy Carter | PERSON | 0.99+ |
Juan Pablo De Rosa | PERSON | 0.99+ |
Canada | LOCATION | 0.99+ |
2020 | DATE | 0.99+ |
Texas | LOCATION | 0.99+ |
Europe | LOCATION | 0.99+ |
Malaysia | LOCATION | 0.99+ |
John Wieler | PERSON | 0.99+ |
Sandy | PERSON | 0.99+ |
Teresa Carlson | PERSON | 0.99+ |
50% | QUANTITY | 0.99+ |
Technogi | ORGANIZATION | 0.99+ |
Korea | LOCATION | 0.99+ |
US | LOCATION | 0.99+ |
98% | QUANTITY | 0.99+ |
Amazon Web Services | ORGANIZATION | 0.99+ |
37 partners | QUANTITY | 0.99+ |
Lisa | PERSON | 0.99+ |
February 2021 | DATE | 0.99+ |
today | DATE | 0.99+ |
2021 | DATE | 0.99+ |
Palo Alto, California | LOCATION | 0.99+ |
Juan Pablo Dela Rosa | PERSON | 0.99+ |
last year | DATE | 0.99+ |
United States | LOCATION | 0.99+ |
MAXR | ORGANIZATION | 0.99+ |
Bulgaria | LOCATION | 0.99+ |
pandemic | EVENT | 0.99+ |
Latin America | LOCATION | 0.99+ |
two-thirds | QUANTITY | 0.99+ |
Mars | LOCATION | 0.99+ |
one | QUANTITY | 0.99+ |
Tiger Woods | PERSON | 0.99+ |
one country | QUANTITY | 0.98+ |
Biz Dev | ORGANIZATION | 0.98+ |
APJ | LOCATION | 0.98+ |
One | QUANTITY | 0.98+ |
Mars | ORGANIZATION | 0.98+ |
DLZP | ORGANIZATION | 0.97+ |
Oracle | ORGANIZATION | 0.97+ |
two CEOs | QUANTITY | 0.96+ |
Cisco DevNet 2020 V5 FULL
>>Hello everyone. This is Dave Vellante, and I want to welcome you to the cubes presentation of accelerating automation with dev net in this special program, we're going to explore how to accelerate digital transformation and how the global pandemic is changing the way we work and the kinds of work that we do, the cube has pulled together experts from Cisco dev net. Now dev net is essentially Cisco as code. I've said many times in the cube, but in my opinion, it's the most impressive initiative coming out of any established enterprise infrastructure company. What Cisco has done brilliantly with dev net is to create an API economy by leveraging its large infrastructure portfolio and its ecosystem. But the linchpin of dev net is the army of trained Cisco engineers, including those with the elite CC I E designation. Now dev net was conceived to train people on how to code infrastructure and develop applications in integrations. It's a platform to create new value and automation is a key to that. Creativity. Now let's kick things off with the architect of dev net senior vice president in general manager of Cisco's dev net and CX ecosystem success. Susie, we roam around the globe presenting accelerating automation with damnit brought to you by Cisco. >>Hello and welcome to the cube. I'm Sean for a year host. We've got a great conversation, a virtual event, accelerating automation with dev net, Cisco dev net. And of course we got the Cisco brain trust here, our cube alumni, Susie wee vice president, senior vice president GM, and also CTO of Cisco dev net and ecosystem success CX all that great stuff. Many Wade Lee, who's the director, senior director of dev net certifications, Eric field, director of developer advocacy, Susie Mandy, Eric. Great to see you. Thanks for coming on. Great to see you, John. So we're not in first. We don't, can't be at the dev net zone. We can't be on site doing dev net creative, all the great stuff we've been doing over the past few years where virtual the cube virtual. Thanks for coming on. Uh, Susie, I gotta ask you because you know, we've been talking years ago when you started this mission and just the success you've had has been awesome, but dev net create has brought on a whole nother connective tissue to the dev net community. This is what this ties into the theme of accelerating automation with dev net, because you said to me, I think four years ago, everything should be a service or X AAS as it's called and automation plays a critical role. Um, could you please share your vision because this is really important and still only five to 10% of the enterprises have containerized things. So there's a huge growth curve coming with developing and programmability. What's your, what's your vision? >>Yeah, absolutely. I mean, what we know is that as more and more businesses are >>Coming online is, I mean, they're all online, but as they're growing into the cloud is they're growing in new areas. As we're dealing with security is everyone's dealing with the pandemic. There's so many things going on. Uh, but what happens is there's an infrastructure that all of this is built on and that infrastructure has networking. It has security, it has all of your compute and everything that's in there. And what matters is how can you take a business application and tie it to that infrastructure? How can you take, you know, customer data? How can you take business applications? How can you connect up the world securely and then be able to, you know, really satisfy everything that businesses need. And in order to do that, you know, the whole new tool that we've always talked about is that the network is programmable. The infrastructure is programmable and you don't need just apps riding on top, but now they get to use all of that power of the infrastructure to perform even better. And in order to get there, what you need to do is automate everything. You can't configure networks manually. You can't be manually figuring out policies, but you want to use that agile infrastructure in which you can really use automation. You can rise to higher level business processes and tie all of that up and down the staff by leveraging automation. >>You know, I remember a few years ago when dev net created for start a, I interviewed Todd Nightingale and we were talking about Meraki, you know, not to get in the weeds, but you know, switches and hubs and wireless. But if you look at what we were talking about, then this is kind of what's going on now. And we were just recently, I think our last physical event was a Cisco, um, uh, Europe in Barcelona before all the COVID hit. And you had this massive cloud surgeon scale happening going on, right when the pandemic hit. And even now more than ever the cloud scale, the modern apps, the momentum hasn't stopped because there's more pressure now to continue addressing more innovation at scale because the pressure to do that, um, cause the business stay alive. And to get your thoughts on, um, what's going on in your world because you were there in person now we're six months in scale is huge. >>We are. Yeah, absolutely. And what happened is as all of our customers, as businesses around the world, as we ourselves all dealt with, how do we run a business from home? You know, how do we keep people safe? How do we keep people at home and how do we work? And then it turns out, you know, business keeps rolling, but we've had to automate even more because you have to go home and then figure out how from home, can I make sure that my it infrastructure is automated out from home? Can I make sure that every employee is out there and working safely and securely, you know, things like call center workers, which had to go into physical locations and be in kind of, you know, just, you know, blocked off rooms to really be secure with their company's information. They had to work from home. >>So we had to extend business applications to people's homes, uh, in countries like, you know, well around the world, but also in India where it was actually not, you know, not, they wouldn't let, they didn't have rules to let people work from home in these areas. So then what had to do was automate everything and make sure that we could administer, you know, all of our customers could administer these systems from home. So that put extra stress on automation. It put extra stress on our customer's digital transformation and it just forced them to, you know, automate digitally, transform quicker. And they had to, because you couldn't just go into a server room and tweak your servers, you had to figure out how to automate all of that. And we're still all in that environment today. >>Now one of the hottest trends before the pandemic was observability, uh, Coobernetti's serve, uh, microservices. So those things, again, all dev ops and, you know, have you guys got some acquisitions, you about thousand eyes? Um, um, you've got a new one you just bought, um, recently port shift to raise the game in security Cooper and all these microservices. So observability super hot, but then people go work at home. As you mentioned, how do you observe, what are you observing? The network is under a huge pressure. I mean, it's crashing on people's zooms and WebExes and, uh, education, huge amount of network pressure. How are people adapting to this and the app side? How are you guys looking at the what's being programmed? What are some of the things that you're seeing with use cases around this program? Ability, challenge and observability challenges. It's a huge deal. >>Yeah, absolutely. And, um, you know, going back to Todd Nightingale, right. You know, back when we talked to Todd before he had Meraki and he had designed this simplicity, this ease of use this cloud managed, you know, doing everything from one central place and now he has Cisco's entire enterprise and cloud business. So he is now applying that at that bigger, um, at that bigger scale for Cisco and for our customers. And he is building in the observability and the dashboards and the automation and the API APIs into all of it. Um, but when we take a look at what our customers needed is again, they had to build it all in. Um, they have to build in and what happened was how your network was doing, how secure your infrastructure was, how well you could enable people to work from home and how well you could reach customers. >>All of that used to be an it conversation. It became a CEO and a board level conversation. So all of a sudden CEOs were actually calling on the heads of it and the CIO and saying, you know, how's our VPN connectivity is everybody working from home? How many people are connected and able to work and what's their productivity. So all of a sudden, all these things that were really infrastructure, it stuff became a board level conversation. And, you know, once again, at first, everybody was panicked and just figuring out how to get people working. But now what we've seen in all of our customers is that they are now building in automation and digital transformation and these architectures, and that gives them a chance to build in that observability, you know, looking for those events, the dashboards, you know, so it really has, has been fantastic to see what our customers are doing and what our partners are doing to really rise to that next level. >>Cause you know, you got to go, but real quick, um, describe what accelerating automation with dev net means. Well, you've >>Been falling, you know, we've been working together on dev net and the vision of the infrastructure programmability and everything for quite some time. And the thing that's really happened is yes, you need to automate, but yes, it takes people to do that and you need the right skill sets and the programmability. So a networker can't be a networker. A networker has to be a network automation developer. And so it is about people and it is about bringing infrastructure expertise together with software expertise and letting people rumblings are definite community has risen to this challenge. Um, people have jumped in, they've gotten their certifications. We have thousands of people getting certified. Uh, you know, we have, you know, Cisco getting certified. We have individuals, we have partners, you know, they're just really rising to the occasion. So accelerate, accelerating automation while it is about going digital. It's also about people rising to the level of, you know, being able to put infrastructure and software expertise together to enable this next chapter of business applications of, you know, cloud directed businesses and cloud growth. So it actually is about people just as much as it is about automation and technology. >>We got dev net created right around the corner, virtual unfortunate won't be in person, but we'll be virtual. Susie. Thank you for your time. We're going to dig into those people, challenges with Mandy and Eric. Thank you for coming on. I know you've got to go, but stay with us. We're going to dig in with Mandy and Eric. >>Thanks. Thank you so much. Have fun. Thanks John. >>Okay. Mandy, you heard, uh, Susie is about people and one of the things that's close to your heart and you've been driving is, uh, as senior director of dev net certifications, um, is getting people leveled up. I mean the demand for skills, cybersecurity network, programmability automation, network design solution architect, cloud multicloud design. These are new skills that are needed. Can you give us the update on what you're doing to help people get into the acceleration of automation game? >>Oh yes, absolutely. The, you know, what we've been seeing is a lot of those business drivers that Susie was mentioning, those are, what's accelerating a lot of the technology changes and that's creating new job roles or new needs on existing job roles where they need new skills. We are seeing customers, partners, people in our community really starting to look at, you know, things like DevSecOps engineer, network, automation, engineer, network, automation, developer, which Susie mentioned and looking at how these fit into their organization, the problems that they solve in their organization. And then how do people build the skills to be able to take on these new job roles or add that job role to their current scope and broaden out and take on new challenges. >>Eric, I want to go to you for a quick second on this, um, um, piece of getting the certifications. Um, first, before you get started, describe what your role is as director developer advocacy, because that's always changing and evolving. What's the state of it now because with COVID people are working at home, they have more time to contact, switch and get some certifications and that they can code more. What's your >>Absolutely. So it's interesting. It definitely is changing a lot. A lot of our historically a lot of focus for my team has been on those outward events. So going to the Devin that creates the Cisco lives and helping the community connect and to help share tech mountain technical information with them, um, doing hands on workshops and really getting people into how do you really start solving these problems? Um, so that's had to pivot quite a bit. Um, obviously Cisco live us. We pivoted very quickly to a virtual event when, when conditions changed and we're able to actually connect as we found out with a much larger audience. So, you know, as opposed to in person where you're bound by the parameters of, you know, how big the convention center is, uh, we were actually able to reach a worldwide audience with our, uh, our definite data that was kind of attached on to Cisco live. >>And we got great feedback from the audience that now we were actually able to get that same enablement out to so many more people that otherwise might not have been able to make it. Um, but to your broader question of, you know, what my team does. So that's one piece of it is getting that information out to the community. So as part of that, there's a lot of other things we do as well. We were always helping out build new sandboxes and your learning labs, things like that, that they can come and get whenever they're looking for it out on a dev net site. And then my team also looks after communities such as the Cisco learning network where this there's a huge community that has historically been there to support people working on their Cisco certifications. We've seen a huge shift now in that group, that all of the people that have been there for years are now looking at the domain certifications and helping other people that are trying to get on board with programmability. They're taking a lot of those same community enablement skills and propping up the community with, you know, helping you answer questions, helping provide content. They've moved now into the dump space as well, and are helping people with that service or what it's great seeing the community come along and really see that. Okay. >>I ask you on the trends around automation, what skills and what developer patterns are you seeing with automation? Are, is there anything in particular, obviously network automation has been around for a long time. Cisco has been leader in that, but as you move up, the stack as modern applications are building, do you see any patterns or trends around what is accelerating automation? What are people learning? >>Yeah, absolutely. So you mentioned a observability was big before COVID and we actually really saw that amplified during COVID. So a lot of people have come to us looking for insights. How can I get that better observability, uh, now that we need it? Well, we're virtual. Um, so that's actually been a huge uptake and we've seen a lot of people that weren't necessarily out looking for things before that are now figuring out how can I do this at scale? I think one good example that, uh, Susie was talking about the VPN example, and we actually had a number SES in the Cisco community that had customers dealing with that very thing where they very quickly had to ramp up. And one in particular actually wrote a bunch of automation to go out and measure all of the different parameters that it departments might care about, about their firewalls, things that you do normally look at me old days, you would size your firewalls based on, you know, assuming a certain number of people working from home. >>And when that number went to a hundred percent things like licenses started coming into play, where they needed to make sure they have the right capacity in their platforms that they weren't necessarily designed for. So one of the STDs actually wrote a bunch of code to go out, use some open source tooling, to monitor and alert on these things and then published it. So the whole community code could go out and get a copy of it, try it out their own environment. And we saw a lot of interest around that in trying to figure out, okay, now I can take that and I can adapt it to what I need to see for my observability. >>That's great. Mandy. I want to get your thoughts on this too, because as automation continues to scale, um, it's going to be a focus and people are at home and you guys had a lot of content online for you recorded every session that didn't the dev Ned zone learnings going on, sometimes linearly. And nonlinearly you got the certifications, which is great. That's key, key, great success there. People are interested, but what are the learnings? Are you seeing? What are people doing? What's the top top trends. >>Yeah. So what we're seeing is like you said, people are at home, they've got time. They want to advance their skillset. And just like any kind of learning people want choice because they want to be able to choose what's matches their time that's available and their learning style. So we're seeing some people who want to dive into full online study groups with mentors, leading them through a study plan. And we have two new, uh, expert led study groups like that. We're also seeing whole teams at different companies who want to do, uh, an immersive learning experience together, uh, with projects and office hours and things like that. And we have a new, um, offer that we've been putting together for people who want those kinds of team experiences called automation boot camp. And then we're also seeing individuals who want to be able to, you know, dive into a topic, do a hands on lab, get some skills, go to the rest of the day of do their work and then come back the next day. >>And so we have really modular self-driven hands on learning through the dev net fundamentals course, which is available through dev net. And then there's also people who are saying, I just want to use the technology. I like to experiment and then go, you know, read the instructions, read the manual, do the deeper learning. And so they're, they're spending a lot of time in our dev net sandbox, trying out different technologies, Cisco technologies with open source technologies, getting hands on and building things. And three areas where we're seeing a lot of interest in specific technologies. One is around SD wan. There's a huge interest in people skilling up there because of all the reasons that we've been talking about security is a focus area where people are dealing with new, new kinds of threats, having to deal with them in new ways and then automating their data center, using infrastructure as code type principles. So those are three areas where we're seeing a lot of interest and you'll be hearing some more about that at dev net create >>Eric and Mandy. If you guys can wrap up this accelerate automation with dev net package and a virtual event here, um, and also tee up dev net create because dev net create has been a very kind of grassroots, organically building momentum over the years. And again, it's super important cause it's now the app world coming together with networking, you know, end to end programmability and with everything as a service that you guys are doing everything with API APIs, I'm only can imagine the enablement that's gonna create. Can you share the summary real quick on accelerating automation with dev net and tee up dev net create Mandy, we'll start with you. >>Yes, I'll go first. And then Eric can close this out. Um, so just like we've been talking about with you at every Devin event over the past years, you know, damnit is bringing APIs across our whole portfolio and up and down the stack and accelerating, uh, automation with dev net. Susie mentioned the people aspect of that the people's skilling up and how that transformed teams, transforms teams. And I think that it's all connected in how businesses are being pushed on their transformation because of current events. That's also a great opportunity for people to advance their careers and take advantage of some of that quickly changing landscape. And so what I think about accelerating automation with dev net, it's about the Duveneck community. It's about people getting those new skills and all the creativity and problem solving that will be unleashed by that community. With those new skills. >>Eric take us home. He accelerating automation, dev net and dev net create a lot of developer action going on in cloud native right now, your thoughts? >>Absolutely. I think it's exciting. I mentioned the transition to virtual for Devin that day, this year for Cisco live. And we're seeing, we're able to leverage it even further with create this year. So, whereas it used to be, you know, confined by the walls that we were within for the event. Now we're actually able to do things like we're adding the start now track for people that want to be there. They want to be a developer, a network automation developer, for instance, we've now got attract just for them where they can get started and start learning. Some of the skills they'll need, even if some of the other technical sessions were a little bit deeper than what they were ready for. Um, so I love that we're able to bring that together with the experienced community that we usually do from across the industry, bringing us all kinds of innovative talks, talking about ways that they're leveraging technology, leveraging the cloud, to do new and interesting things to solve their business challenges. So I'm really excited to bring that whole mix together, as well as getting some of our business units together too, and talk straight from their engineering departments. What are they doing? What are they seeing? What are they thinking about when they're building new APIs into their platforms? What are the, what problems are they hoping >>That customers will be able to solve with them? So I think together seeing all of that and then bringing the community together from all of our usual channels. So like I said, Cisco learning network, we've got a ton of community coming together, sharing their ideas and helping each other grow those skills. I see nothing but acceleration ahead of us for automation. >>Awesome. Thanks so much. >>Can I add one, add one more thing? Yeah. I was just gonna say the other really exciting thing about create this year with the virtual nature of it is that it's happening in three regions. And, um, you know, we're so excited to see the people joining from all the different regions and, uh, content and speakers and the region stepping up to have things personalized to their area, to their community. And so that's a whole new experience for them that create that's going to be fantastic this year. >>Yeah. That's what I was going to close out and just put the final bow on that. By saying that you guys have always been successful with great content focused on the people in the community. I think now during what this virtual dev net virtual dev net create virtual, the cube virtual, I think we're learning new things. People working in teams and groups and sharing content, we're going to learn new things. We're going to try new things and ultimately people will rise up and we'll be resilient. I think when you have this kind of opportunity, it's really fun. And we'll, we'll, we'll ride the wave with you guys. So thank you so much for taking the time to come on the cube and talk about your awesome accelerating automation and dev net. Great. Looking forward to it. Thank you. >>Thank you so much. Happy to be here. >>Okay. I'm Jennifer with the cube virtual here in Palo Alto studios doing the remote content amendment virtual tour face to face. Thank you so much for watching and we'll see you at dev net create thanks for watching. >>Welcome back. And Jeffrey, >>The cube coming to you from our Palo Alto studio with ongoing coverage of the Cisco dev data van, it's called accelerating automation with dev net and the new normal. And we certainly know the new normal is, is not going away. They've been doing this since the middle of March or all the way to October. And so we're excited to have our next guest is Thomas Shively. He's the vice president of product marketing and data center networking for the intent based networking group at Cisco Thomas. Great to see you. >>Hey, good to see you too. Yeah. Yeah. Everybody can see on our background. Exactly, >>Exactly. So, I mean, I'm curious, we've talked to a lot of people. We talked to a lot of leaders, you know, especially like back in March and April with this light switch moment, which was, you know, no time to prep and suddenly everybody has to work from home. Teachers got to teach from home. And so you got the kids home, you got the spouse home, everybody's home trying to get on the network and do their zoom calls in their classes. I'm curious from your perspective, you guys are right there on the, on the network you're right in the infrastructure. What did you hear and see kind of from your customers when suddenly, you know, March 16 hit and everybody had to go home. >>Wow, good point. Hey, I do think we all appreciate the network >>Much more than we used to do before. Uh, and then the only other difference is I'm really more on WebEx calls and zoom calls, but, you know, otherwise, uh, yes. Um, what, what I do see actually is that as I said, network becomes much more operative as a critical piece. And so before we really talked a lot about, uh, agility and flexibility these days, we talk much more about resiliency quite frankly. Uh, and what do I need to have in place with respect to network to get my things from left to right. And you know, it, 2000 East to West, as we say on the data center. Right. Uh, and that just is for most of my customers, a very, very important topic at this point. >>Right. You know, it's, it's amazing to think, you know, had this happened, you know, five years ago, 10 years ago, you know, the ability for so many people in, in, in the information industry to be able to actually make that transition relatively seamlessly, uh, is, is actually pretty amazing. I'm sure there was some, some excitement and some kudos in terms of, you know, it, it is all based on the network and it is kind of this quiet thing in the background that nobody pays attention to. It's like a ref in the football game until they make a bad play. So, you know, it, it is pretty fascinating that you and your colleagues have put this infrastructure and that enabled us to really make that move with, with, with really no prep, no planning and actually have a whole lot of services delivered into our homes that we're used to getting at the office are used to getting at school. >>Yeah. And I mean, to your point, I mean, some of us did some planning, can we clearly talking about some of these, these trends and the way I look at this trans as being distributed data centers and, um, having the ability to move your workloads and access for users to wherever you want to be. And so I think that clearly went on for a while then. So in a sense, we, we, we prep was, or no, but we're prepping for it. Um, but as I said, resiliency just became so much more important than, you know, one of the things I actually do a little block, a little, little, uh, abrupt before a block I put out end of August around resiliency. Uh, you, you, if he didn't, if he didn't put this in place, you better put it in place. Because I think as we all know, we sold our match. This is like maybe two or three months, we're now in October. Um, and I sing, this is the new normal for some time being. Yeah, >>I think so. So let's stick on that theme in terms of, of trends, right? The other great, uh, trend as public cloud, um, and hybrid cloud and multi cloud, there's all types of variants on that theme you had in that blog post about, uh, resiliency in data center, cloud networking, data center cloud, you know, some people think, wait, it's, it's kind of an either, or I either got my data center or I've got my stuff in the cloud and I've got public cloud. And then as I said, hybrid cloud, you're talking really specifically about enabling, um, both inner inner data center resiliency within multi data centers within the same enterprise, as well as connecting to the cloud. That's probably counterintuitive for some people to think that that's something that Cisco is excited about and supporting. So I wonder if you can share, you know, kind of how the market is changing, how you guys are reacting and really putting the things in place to deliver customer choice. >>Yeah, no, it's actually, to me, it's really not a counterintuitive because in the end was what, uh, I'm focusing on. And the company is focused on is what our customers want to do and need to do. Uh, and that's really, um, would, you know, most people call hybrid cloud or multi-cloud, uh, in, in the end, what it is, what it is, is really the ability to have the flexibility to move your workloads where you want them to be. And there are different reasons why you want to place them, right? You might've placed them for security reasons. You might have played some compliance reasons, depending on which customer segment you after, if you're in the United States or in Europe or in Asia, there are a lot of different reasons where you're going to put your sinks. And so I sing in the end, what a, an enterprise looks for is that agility, flexibility, and resiliency. >>And so really what you want to put in place is what we call like the cloud on ramp, right? You need to have an ability to move sings as needed. But the logic context section, which we see in the last couple of months, accelerating is really this whole seam around digital transformation, uh, which goes hand in hand then was, uh, the requirement on the at T side really do. And I T operations transformation, right. How it operates. Uh, and I think that's really exciting to see, and this is where a lot of my discussions I was customers, uh, what does it actually mean with respect to the it organization and what are the operational changes? This a lot of our customers are going through quite frankly, accelerated right. Going through, >>Right. And, and automation is in the title of the event. So automation is, you know, is an increasingly important thing, you know, as the, as we know, and we hear all the time, you know, the flows of data, the complexity of the data, either on the security or the way the network's moving, or as you said, shifting workloads around, based on the dynamic situations, whether that's business security, et cetera, in a software defined networking has been around for a while. How are you seeing kind of this evolution in adding more automation, you know, to more and more processes to free up those, those, um, no kind of limited resources in terms of really skilled people to focus on the things that they should be focused on and not stuff that, that hopefully you can, you know, get a machine to run with some level of. >>Yeah. Yeah. That's a good point. And I said the tech line, I have, you know, sometimes when my mind is really going from a cloud ready, which is in most of our infrastructure is today to cloud native. And so let me a little expand on those, right? There's like the cloud ready is basically what we have put in place over the last five to six years, all the infrastructure that all our customers have, network infrastructure, all the nexus 9,000, they're all cloud ready. Right. And what this really means, do you have API APIs everywhere, right? Whether this is on the box, whether it's on the controller, whether this is on the operations tools, all of these are API enabled and that's just the foundation for automation, right? You have to have that. Now, the next step really is what do you do with that capability? >>Right? And this is the integration with a lot of automation tools, uh, and that's a whole range, right? And this is where the it operation transformation kicks in different customers at different speeds, right? Some just, you know, I use these API APIs and use NoMo tools that they have on a network world just to pull information. Some customers go for further and saying, I want to integrate this with some CMDB tools. Some go even further and saying, this is like the cloud native pleasing, Oh, I want to use, let's say red hat Ansible. I want to use, uh, how she called Terraform and use those things to actually drive how I manage my infrastructure. And so that's really the combination of the automation capability. Plus the integration with relevant cloud native enabling tools that really is happening at this point. We're seeing customers accelerating that, that motion, which really then drives us how they run their it operations. Right? And so that's a pretty exciting, exciting area to see a given. I, we have the infrastructure in place. There's no need for customers to actually do change something. Most of them have already the infrastructures that can do this. It is just no doing the operational change. The process changes to actually get there. >>Right. And it's funny, we, we recently covered, you know, PagerDuty and, and they highlight what you just talked about. The cloud native, which is, you know, all of these applications now are so interdependent on all these different API APIs, you know, pulling data from all of these applications. So a, when they work great, it's terrific. But if there's a problem, you know, there's a whole lot of potential throat to choke out there and find, find those issues. And it's all being connected via the network. So, you know, it's even more critically important, not only for the application, but for all these little tiny components within the application to deliver, you know, ultimately a customer experience within a very small units of time, uh, so that you don't lose that customer. You, you complete that transaction. They, they check out of their shopping cart. You know, all these, these things that are now created with cloud native applications that just couldn't really do before. >>No, you're absolutely right. And that's, this is like, just sit. I'm actually very excited because it opens up a lot of abilities for our customers, how they want to actually structure the operation. Right? One of the nice things around this or automation plus, uh, tool integration, cloning to, and integration is you actually opened this up, not a soul automation train, not just to the network operations personnel, right. You also open it up and can use this for the second ops person or for the dev ops person or for the cloud ops engineering team. Right. Because the way it's structured, the way we built this, um, is literally as an API interface and you can now decide, what is your process do you want to have? And what traditional, you have a request network, operation teams executes the request using these tools and then hand it back over. >>Or do you say, Hey, maybe some of these security things I got to hand over the sec ups team, and they can directly call these these KPIs, right? Or even one step further, you can have the opportunity that the dev ops or the application team actually says, Hey, I got to write a whole infrastructure as code kind of a script or template, and I just execute. Right. And it's really just using what the infrastructure provides. And so that whole range of different user roles and our customer base, what they can do with the automation capability that's available. It's just very, very exciting way because it's literally unleashes a lot of flexibility, how they want to structure and how they want to rebuild the it operations processes. >>That's interesting, you know, cause the, you know, the DevOps culture has taken over a lot, right. Obviously change software programming for the last 20 years. And I think, you know, there's a, there's a lot of just kind of the concept of dev ops versus necessarily, you know, the actual things that you do to execute that technique. And I don't think most people would think of, you know, network ops or, you know, net ops, you know, whatever the equivalent is in the networking world to have, you know, kind of a fast changing dynamic, uh, kind of point of view versus a, you know, stick it in, you know, spec it, stick it in, lock it down. So I wonder if you can, you can share how, you know, kind of that dev ops, um, attitude point of view, workflow, whatever the right verb is, has impacted, you know, things at Cisco and the way you guys think about networking and flexibility within the networking world. >>Yeah, literally, absolutely. And again, it's all customer driven, right? There's none of those. None of those is really actually, you know, a little bit of credit, maybe some of us where we have a vision, but a lot of it is just customer driven feedback. Uh, and yeah, we, we do have network operations teams comes to saying, Hey, we use Ansible heavily on the compute side, we might use this for alpha seven. We want to use the same for networking. And so we made available all these integrations, uh, with sobriety as a state, whether these are the switches, whether these are ACI decent, a controller or our multicell orchestration capabilities, all of these has Ansible integration the way to the right. Uh, the other one, as I mentioned, that how she formed Turco Terraform, we have integrations available and they see the requests for these tools to use that. >>Uh, and so that is emotion where in for all the, you know, and, uh, another block actually does out there, we just posted saying, Neil, all set what you can do and then a Palo to this, right. Just making the integration available. We also have a very, very heavy focus on definite and enablement and training, uh, and you know, a little plugin. I know, uh, probably, uh, part of the segment, the whole definite community that Cisco has is very, very vibrant. Uh, and the beauty of this is right. If you look at us, whether you're a NetApps person or dev ops person or SecOps person, it doesn't really matter. It has a lot of like capability available to just help you get going or go from one level to the next level. Right. And it's simplest thing that like sent books and why moments where you can, we know what's out stress, try sinks out snippets of code Coda there, you can do all of these things. And so we do see it's a kind of a push and pull a tremendous amount of interest and a tremendous, uh, uh, time people spend to learn quite frankly. And that's another site product of, of, you know, the situation we're in and people said, Oh man, and say, okay, online learning, that's the thing. So these, these, these tools are used very, very heavily. Right, >>Right. That's awesome. Cause you know, we've, we've had Susie Lee on a number of times and I know he and Mandy and the team really built this dev net thing. And it really follows along this other theme that we see consistently across other pieces of tech, which is democratization, right. Democratization of the access tool, taking it out of, of just a mahogany row with, again, a really limited number of people that know how to make it work and can make the changes and then opening up to a software defined world where now that the, you know, the, it says application centric, point of view, where the people that are building the apps to go create competitive advantage. Now don't have to wait for, you know, the one network person to help them out out of these environments. Really interesting. And I wonder if, you know, when you look at what's happening with public cloud and how they kind of change the buying parameter, how they kind of changed the degree of difficulty to get projects started, you know, how you guys have kind of integrated that, that type of thought process to make it easier for app developers to get their job done. >>Yeah. I mean, again, it's, it's, uh, I typically look at this more from a, from a customer lands, right? It's the transformation process and it always starts as I want agility. I want flexibility. I want to resiliency, right. This is where we talk to a business owner, what they're looking for. And then that translates into, into an I operations process, right? Your strategy needs to map then how you actually do this. Uh, and that just drives then what tools do you want to have available to actually enable this? Right. And the enablement again is for different roles, right? There is you need to give sync services to the app developer and, uh, the, the platform team and the security team, right. To your point. So the network, uh, can act at the same speed, but you also give to us to the network operations teams because they need to, uh, adjust. >>Then they have the ability to react to, uh, to some of these requirements. Right. And it's not just automation. I say, we, we, we focused on that, but there's also to your point, the, the need, how do I extend between data centers? You know, just, just for backup and recovery and how do I extend into, into public clouds, right? Uh, and in the end, that's a, that's a network connectivity problem. Uh, and we have soft as, uh, we have made as available. We have integrations into, uh, AWS. We have integrations into a joy to actually make this very easy from a, from a network perspective to extend your private, private networks into which of private networks on these public clouds. So from an app development perspective, now it looks like he's on the same network. It's a protective enterprise network. Some of it might sit here. >>Some of it might sit here, but it's really looking the same. And that's really in the enticing, what a business looks at, right. They don't necessarily want to say, I need to have something separate for this deployment. What's a separate for that deployment. What they want is I need to deploy something. I need to do this resilient. And the resilient way in an agile way gives me the tools. And so that's really where we focused, um, and what we're driving, right? It's that combination of automation consistently, and then definite tools, uh, available that we support. Uh, but they're all open. Uh, they're all standard tools as the ones I mentioned, right. That everybody's using. So I'm not getting into this. Oh, this is specific to Cisco, right. It's really democratisation. I actually liked your term. Yeah. >>Yeah. It's, it's a great terminate. And it's, it's really interesting, especially with, with the API APIs and the way everything is so tied together that everyone kind of has to enable this because that's what the customer is demanding. Um, and it is all about the applications and the workloads and where those things are moving, but they don't really want to manage that. They just want to, you know, deliver business benefit to their customers and respond to, uh, you know, competitive threats in the marketplace, et cetera. So it's really an interesting time for the infrastructure, you know, to really support kind of this app first point of view, uh, versus the other way around is kind of what it used to be and, and enable this hyper fast development hyper fast, uh, change in, in, in the competitive landscape or else you will be left behind. Um, so super important stuff. >>Yeah, no, I totally agree. And as I said, I mean, it's, it's kind of interesting is we, we started on the Cisco data center side. We started this probably six or seven years ago. Uh, when we, when we named the application centric, uh, clearly a lot of these concepts evolve, uh, but in a sense it is that reversal of the role from the network provides something and you use to, uh, this is what I want to do. And I need a service, uh, thinking on a networking side to expose. So as that can be consumed. And so that clearly is playing out. Um, and as I said, automation is a key key foundation that we put in place, uh, and our customers, most of our customers at this point, uh, on these, on these products, uh, they have all the capabilities they are, they can literally take advantage. There's really nothing that stops them point. >>Well, it's good times for you because I'm sure you've seen all the memes and in social media, right. What what's driving your digital transformation is that the CEO, the CMO or COVID, and we all know the answer to the question. So I don't think the, the pace of change is going to slow down anytime soon. So keeping the network up and enabling us all to get done, what we have to get done and all the little magic that happens behind the scenes. >>Yeah. No thanks. Thanks for having me. And again, yeah. If you're listening and you're wondering, how do I get started Cisco? Definitely just the place to go. It's fantastic. Fantastic. I highly recommend everybody roll up his sleeves and you know, the best races you can have. >>And we know once the physical events come back, we've been to dev net create a bunch of times, and it's a super vibrant, super excited, but really engaged community sharing. Lots of information is kind of, it's still kind of that early vibe, you know, where everyone is still really enthusiastic and really about learning and sharing information. So, you know, like say Susie and the team are really built a great thing, and we're a, we're happy to continue to cover it. And eventually we'll be back, uh, face to face. I look forward to that as well. All right, thanks. Uh, he's Thomas I'm Jeff, you're watching continuing coverage of Cisco dev net accelerating with automation and programmability >>Kia. Nini is here. He's a distinguished engineer at Cisco TK, my friend. Good to see you again. How are you? Good. I mean, you and I were in Barcelona in January and, you know, we knew we saw this thing coming, but we didn't see it coming this way. Did we know that no one did, but yeah, that was right before everything happened. Well, it's weird. Right? I mean, we were, you know, we, we, it was in the back of our minds in January, we sort of had Barcelona's hasn't really been hit yet. It looked like it was really isolated in China, but, uh, but wow, what a change and I guess, I guess I'd say I'd start with the, we're seeing really a secular change in, in your space and security identity, access management, cloud security, endpoint security. I mean, all of a sudden these things explode as the work from home pivot has occurred, and it feels like these changes are permanent or semi-permanent, what are you seeing out there? >>I don't think anybody thinks the world's going to go back the way it was. Um, to some degree it's, it's changed forever. Um, you know, I, I, I do a lot of my work remotely. Um, and, and so, you know, being a remote worker, isn't such a big deal for me, but for some, it was a huge impact. And like I said, you know, um, remote education, you know, everybody's on the opposite side of a computer. And so the digital infrastructure has just become a lot more important to protect the integrity of it essentially is almost our own integrity these days. Yeah. And when you see that, you know, that work from home pivot, I mean, you know, our estimates are, or along with our partner, DTR about 16% of the workforce was at home working from home prior to COVID and now it's know, North of 70% >>Plus, and that's going to come down maybe a little bit over the next, next six months. We'll see what happens with the fall surge, but, but people essentially accept, expect that to at least double that 16%, you know, going forward indefinitely. So how, what does that, what kind of pressure does that put on the security infrastructure and how, how organizations are approaching security? >>Yeah, I, I just think, uh, from a mindset standpoint, you know, what was optional, uh, maybe, um, last year, uh, is no longer optional and I don't think it's going to go back. Um, I think, I think a lot of people, uh, have changed the way, you know, they live and the way they work. Um, and they're doing it in ways, hopefully that, you know, in some cases, uh, yield more productivity, um, again, um, you know, usually with technology that's severely effective, it doesn't pick sides. So the security slant to it is it frankly works just as well for the bad guys. And so that's, that's the balance we need to keep, which is we need to be extra diligent, uh, on how we go about securing infrastructure, uh, how we go about securing even our, our social channels, because remember all our social channels now are digital. So that's, that's become the new norm. >>You know, you've helped me understand over the years. I remember a line you shared with me in the cube one time is that the adversary is highly capable as sort of the, of the phrase that you used. And, and essentially the way you describe it, as you know, your job as a security practitioner is to decrease the bad guy's return on investment, you know, increase their costs, increase the numerator, but as, as work shifts from home, yeah, I'm in my house, you know, my wifi in my, you know, router with my, you know, dog's name is the password, you know, it's much, much harder for me to, to increase that denominator at home. So can you help? >>Yeah. I mean, it's, it is, it is truly, um, when you think, when you get into the mind of the adversary and, and, uh, you know, the cyber crime out there, they're honestly just like any other business they're trying to operate with high margin. And so if you can get there, if you can get in there and erode their margin, frankly go find something else to do. Um, and, and again, you know, you know, the shift we experienced day to day is it's not just our kids are online in school and, uh, our work is online, but all of the groceries we order, um, you know, this Thanksgiving and holiday season, uh, a lot more online shopping is going to place. So everything's gone digital. And so the question is, you know, how, how do we up our game there so that we can go about our business, uh, effectively. And I make it very expensive for the adversary to operate, uh, and take care of their business. Cause it's nasty stuff. >>I want to ask you about automation generally, and then specifically how it applies to security. So we, I mean, we certainly saw the ascendancy of the hyperscalers and of course they really attacked the it labor problem. We learned a lot from that and an it organizations have applied much of that thinking. And it's critical at scale. I mean, you just can't scale humans at the pace, the technology scales today, how does that apply to security and specifically, how is automation affecting security? >>Yeah, it's, it's, it's the topic these days. Um, you know, businesses, I think, realize that they can't continue to grow at human scale. And so the reason why automation and things like AI and machine learning have a lot of value is because everyone's trying to expand, uh, and operate at machine scale. Now, I mean that for, for businesses, I mean that for, you know, education and everything else now, so are the adversaries, right? So it's expensive for them to operate at Cuban scale and they are going to machine scale, going to machine scale, uh, a necessity is that you're going to have to harness some level of automation, have the machines, uh, work on your behalf, have the machines carry your intent. Um, and when you do that, um, you can do it safely or you could do it dangerously. And that that's really kind of your choice. Um, you know, just because you can automate something doesn't mean you should, um, you, you wanna make sure that frankly, the adversary can't get in there and use that automation on their behalf. So it's, it's a tricky thing because, you know, if, when you take the phrase, you know, uh, how do we, how do we automate security? Well, you actually have to, uh, take care of, of securing the automation first. >>Yeah. We talked about this in Barcelona, where you were explaining that, you know, the, the bad guys, the adversaries are essentially, you know, weaponizing using your own tooling, which makes them appear safe because it's, they're hiding in plain sight. >>Well, there's, they're clever, uh, give them that, um, you know, that there's this phrase that they, they always talk about called living off the land. Um, there's no sense in them coming into your network and bringing their tools and, uh, and being detective, you know, if they can use the tools that's already there, then, uh, they have a higher degree of, of evading, uh, your protection. If they can pose as Alice or Bob, who's already been credentialed and move around your network, then they're moving around the network as Alice or Bob. They're not marked as the adversary. So again, you know, having the detection methods available to find their behavior anomalies and things like that become a paramount, but also, you know, having the automation to contain them, to eradicate them, to, you know, minimize their effectiveness, um, without it, I mean, ideally without human interaction, cause you, you just, can you move faster, you move quicker. Um, and I, I see that with an asterisk because, um, if, if done wrong, frankly, um, you're just making their job more effective. >>I wonder if we could talk about the market a little bit, uh, it's I'm in the security space, cybersecurity 80 plus billion, which by the way, is just a little infant Tessa mill component of our GDP. So we're not spending nearly enough to protect that massive, uh, GDP, but guys, I wonder if you could bring up the chart because when you talk to CSOs and you ask them, what's your, what's your biggest challenge? Let's say lack of talent. And, and so what this chart shows is from ETR, our, our, our survey partner and on the vertical axis is net score. And that's an indication of spending momentum on the horizontal axis is market share, which is a measure of presence, a pervasiveness, if you will, inside the data sets. And so there's a couple of key points here. I wanted to put forth to our audience and then get your reactions. >>So you can see Cisco, I highlighted in red, Cisco is business and security is very, very strong. We see it every quarter. It's a growth area that Chuck Robbins talks about on the, on the conference call. And so you can see on the horizontal axis, you've got, you know, big presence in the data set. I mean, Microsoft is out there, but they're everywhere, but you're right there in that, in that data set. And then you've got for such a large presence, you've got a lot of momentum in the marketplace, so that's very impressive. But the other point here is you've got this huge buffet of options. There's just a zillion vendors here. And that just adds to the complexity. This is of course only a subset of what's in the security space. You know, the people who answered for the survey. So my question is how can Cisco help simplify this picture? Is it automation? Is it, you know, you guys have done some really interesting tuck in acquisitions and you're bringing that integration together. Can you talk about that a little bit? >>Yeah. I mean, that's an impressive chart. I mean, when you look to the left there it's, um, I had a customer tell me once that, you know, I came to this trade show, looking for transportation, and these people are trying to sell me car parts. Um, that's the frustration customers have, you know, and I think what Cisco has done really well is to really focus on the outcomes. Um, what is the customer outcome? Cause ultimately that's, that is what the customer wants. You know, there might be a few steps to get to that outcome, but the closest you can closer, you can get to delivering outcomes for the customer, the better you are. And I think, I think security in general has just year over year have been just written with, um, you need to be an expert. Um, you need to buy all these parts and put it together yourself. And, and I think, I think those days are behind us, but particularly as, as security becomes more pervasive and we're, you know, we're selling to the business, we're not selling to the, you know, t-shirt wearing hacker anymore. >>Yeah. So, well, well, how does cloud fit in here? Because I think there's a lot of misconceptions about cloud people that God put my data in the cloud I'm safe, but you know, of course we know it's a shared responsibility model. So I'm interested in your, your thoughts on that. Is it really, is it a sense of complacency? A lot of the cloud vendors, by the way, say, Oh, the state of security is great in the cloud. Whereas many of us out there saying, wow, it's, it's not so great. Uh, so what are your thoughts on that, that whole narrative and what Cisco's play in, in cloud? >>I think cloud, um, when you look at the services that are delivered via the cloud, you see that exact pattern, which is you see customers paying for the outcome or as close to the outcome as possible. Um, you know, no, no data center required, no disk drive required, you just get storage, you know, it's, it's, it's all of those things that are again, closer to the outcome. I think the thing that interests me about cloud two is it's really been, it's really punctuated the way we go about building systems. Um, again, at machine scale. So, you know, before, when I write code and I think about what computers are gonna run on, or, you know, what servers are going to is you're going to run on those. Those thoughts never crossed my mind anymore. You know, I'm modeling the intent of what the service should do and the machines then figure it out. So, you know, for instance, on Tuesday, if the entire internet shows up, uh, the, the system works without fail. And if on Wednesday, if only North America shows up, you know, so what, but, but there's no way you could staff that, right? There's just no human scale approach that gets you there. And that's, that's the beauty of all of this cloud stuff is, um, it really is, uh, the next level of how we computer science. >>So you're talking about infrastructure as code and that applies to, you know, security as code. That's what, you know, dev net is really all about. I've said many times, I think Cisco of the, the large established enterprise companies is one of the few, if not the only, that really has figured out, you know, that developer angle, because it's practical do, you're not trying to force your way into developers, but, you know, I wonder if you could, you could talk a little bit about that trend and where you see it going. >>Yeah, no, that is, that is truly the trend. Every time I walk into dev net, um, the big halls at Cisco live, it is Cisco as code. Um, everything about Cisco is being presented through an API. It is automation ready. And, and frankly, that is, um, that is the love language of the cloud. Um, it's it's machines, if the machines talking to machines in very effective ways. So, you know, it is the, the, uh, I, I think, I think necessary, maybe not sufficient but necessary for, um, you know, doing all the machine scale stuff. What what's also necessary, uh, is to, um, to secure if, if infrastructure is code therefore, um, what, what secure, uh, what security methodologies do we have today that we use to secure code while we have automated testing, we have threat modeling, right? Those things actually have to be now applied to infrastructure. So when I, when I talk about how do you do, uh, automation securely, you do it the same way you secure your code, you test it, you, you threaten model, you, you, you say, you know, Ken, my adversary, uh, exhibit something here that drives the automation in a way that I didn't intend it to go. Um, so all of those practices apply. It's just, everything is code these days. >>I've often said that security and privacy are sort of two sides of the same coin. And I want to ask you a question and it's really, to me, it's not necessarily Cisco and company likes companies like Cisco's responsibility, but I wonder if there's a way in which you can help. And of course, there's this Netflix documentary circling around the social dilemma. I don't know if you have a chance to see it, but basically dramatize is the way in which companies are appropriating our data to sell us ads and, you know, creating our own little set of facts, et cetera. And that comes down to sort of how we think about privacy and admin. It's good from the standpoint of awareness, you know, you may or may not care if you're a social media user. I love tick doc. I don't care, but they sort of laid out this pretty scary scenario with a lot of the inventors of those technologies. You have any thoughts on that? And you'll consist go play a role there in terms of protecting our privacy mean beyond GDPR and California consumer privacy act. Um, what do you think? >>Yeah. Um, uh, I'll give you my, you know, my humble opinion is you, you fix social problems with social tools, you fixed technology problems with technology tools. Um, I think there is a social problem. Um, uh, that needs to be rectified the, you know, um, we, we, weren't built as human beings to live and interact with an environment that agrees with us all the time. It's just pretty wrong. So yeah, that, that, that, um, that series that really kind of wake up a lot of people it is, is, you know, it's probably every day I hear somebody asked me if I, I saw, um, but I do think it also, you know, with that level of awareness, I think we, we overcome it or we compensate by what number one, just being aware that it's happening. Um, number two, you know, how you go about solving it, I think maybe come down to an individual or even a community's, um, solution and what might be right for one community might be, you know, not the same for the other. So you have to be respectful in that manner. >>Yeah. So it's, it's, it's almost, I think if I could, you know, play back, what I heard is, is yeah. Technology, you know, maybe got us into this problem, but technology alone is not going to get us out of the problem. It's not like some magic AI bot is going to solve this. It's got to be, you know, society has to really, really take this on as your premise. >>When I, when I first started playing online games, I'm going back to, you know, the text based adventure stuff like muds and Mose. I did a talk at, at MIT one time and, um, this old curmudgeon in the back of the room, um, we were talking about democracy and we were talking about, you know, the social processes that we had modeled in our game and this and that. And this guy just gave us the SmackDown. He needs to be walked up to the front of the room and said, you know, all you techies, you judge efficiency by how long it takes. He says, democracy is a completely the opposite, which is you need to sleep on it. In fact, you shouldn't be scared if somebody can decide in a minute, what is good for the community? It, two weeks later, they probably have a better idea of what's good for the community. So it almost has the opposite dynamic. And that was super interesting to me, >>Really interesting, you know, you read the, like the, the Lincoln historians and he was criticized in the day for having taken so long, you know, to make certain decisions, but, you know, ultimately when he acted acted with, with confidence. Um, so to that point, but, um, so what, what else are you working on these days that, uh, that are, that is, is interesting that maybe you want to share with our audience? Anything that's really super exciting for you or are you >>Yeah. You know, generally speaking, um, try not try and make it a little harder for the bad guys to operate. I guess that's a general theme making it simpler for the common person to use, uh, tools. Um, again, you know, all of these security tools, no matter how fancy it is, it's not that we're losing the complexity, it's that we're moving the complexity away from the user so that they can drive at human scale. And we can do things at machine scale and kind of working those two together is sort of the, the, the magic recipe. Um, it's, it's not easy, but, um, but it is, it is fun. So that's, that's what keeps me engaged. >>I'm definitely seeing, I wonder if you see it as just sort of a, obviously a heightened organization awareness, but I'm also seeing shifts in the organizational structures. You know, the, you know, it used to be a sec ops team and an Island. Okay, it's your problem? You know, the, the, the CSO cannot report into the, to the CIO because that's like the Fox in the hen house, a lot of those structures are, are, are changing. It seems, and be becoming a, this responsibility is coming much more ubiquitous across the organization. What are you seeing there? And what are you? >>And it's so familiar to me because, you know, um, I, I started out as a musician. So, you know, bands bands are a great analogy. You know, you play bass, I big guitar. You know, somebody else plays drums, everybody knows their role and you create something that's larger than the sum of all parts. And so that, that analogy I think, is coming to, you know, we, we saw it sort of with dev ops where, you know, the developer, doesn't just throw their coat over the wall and it's somebody else's problem. They move together as a band. And, and that's what I think, um, organizations are seeing is that, you know, why, why stop there? Why not include marketing? Why not include sales? Why don't we move together as a business? Not just here's the product and here's the rest of the business. That's, that's, that's pretty awesome. Um, I think, uh, we see a lot of those patterns, uh, particularly for the highly high performance businesses. >>You know, in fact, it's interesting, you have great analogy by the way. And you actually see in that within Cisco, you're seeing sort of a, and I know sometimes you guys don't like to talk about the plumbing, but I think it matters. I mean, you've got a leadership structure now. I I've talked to many of them. They seem to really be more focused on how their connect connecting, you know, across organizations. And it's increasingly critical in this world of, you know, of silo busters. Isn't it? >>Yeah, no, I mean, you almost, as, as you move further and further away, you know, you can see how ridiculous it was before it would be like acquiring the band and say, okay, all your guitar players go over here. All your bass players go over there. Like what happened to the band? That's what I'm talking about is, you know, moving all of those disciplines, moving together and servicing the same backlog and achieving the same successes together is just so awesome. Well, I, I always feel better after talking to you. You know, I remember I remember art. Coviello used to put out his letter every year and I was reading. I'd get depressed. We spend all this money now we're less secure. But when I talked to you TK, I feel like much more optimistic. So I really appreciate the time you spend on the cube. It's, it's awesome to have you as a guest. I love these, I love these sessions. So things thanks for inviting me and I miss you, you know, hopefully, you know, next year we can get together at some of the Cisco shows or other shows, but be well and stay weird. Like the sign says kidney, thanks so much for coming to the Q. We, uh, we really appreciate it. And thank you for watching everybody. This is Dave Volante. We've right back with our next guest. This short break, >>After the cubes coverage, just to keep virtuals coverage of dev net create virtual. We're not face to face the cubes been there with dev net and dev net create. Since the beginning, dev net create was really a part of the dev net community. Looking out at the external market outside of Cisco, which essentially is the cloud native world, which is going mainstream. We've got a great guest here. Who's, who's been the company's been on the cube. Many times. We've been talking to them recently acquired by Cisco thousand eyes. We have Joe Vaccaro is beast vice president of product. Uh, Joe, welcome to the cube. Thanks for coming on. Great. And thanks for having me. You have the keys to the kingdom, you, the vice president of product, which means you get to look inside and you get to look outside, figure it all out, uh, make everything run on thousand eyes. >>You guys have been finding common language, uh, across multiple layers of network intelligence, external services. This is the heart of what we're seeing in innovation with multi-cloud microservices, cloud native. This is really a hot area it's converged in multiple theaters and technology. Super important. I want to get into that with you, but first thousand eyes is recently acquired by Cisco, um, big acquisition, uh, super important, the new CEO of Cisco, very clear API, everything we're seeing that come out. That's a big theme at dev net create the ecosystem of Cisco's going outside their own, you know, their, their walls outside of the Cisco network operators, network engineers. We're talking to developers talking programmability. This is the big theme. What's it like at Cisco? Tell us, honestly, the COVID hits. You get acquired by Cisco, tell us what's happening. >>Yeah, it's really been an exciting six months for the entire team and customers, >>You know, as we all kind of shifted to the new normal of working from home. And I think, you know, that change alone really kind of amplified. Even some of the fundamental beliefs that we have as a company that you know, cloud is becoming the new data center or customers that Indra internet has become the new network and the new enterprise network backbone. And that SAS has really become the new application stack. And as you think about these last six months, those fundamental truths have never been more evident as we rely upon the cloud to be able to, to work as we rely upon our own home networks and the internet in order to be productive. And as we access more sized applications on a daily basis. And as you think about those fundamental truths, what's common across all of them is that you rely upon them now more than ever, not only to run your business, but to any of your employees would be productive, but you don't own them. And if you don't own them, then you lack the ability in a traditional way to be able to understand that digital experience. And I think that's ultimately what, what thousand eyes is trying to solve for. And I think it's really being amplified in really these last six months. >>Talk about the Cova dynamic because I think it highlighted and certainly accelerated digital transformation, but specifically exposes opportunities, challenges, weaknesses, I've talked to many CXOs CSOs. Uh, sec security is huge. Um, the home of the conference book talk track we'll get to in a second, but it exposes what's worth doubling down on what to abandoned from a project standpoint, as people start to look at their priorities, they're going, Hey, we got to have a connected experience. We got to have security. People are working at home. No one has VPNs at home. VPNs are passe. Maybe it's SD when maybe it's something else they're on a backbone. They're connecting to the internet, a lot of different diversity in connections. At the same time, you got a ton of modern apps running for these networks. This is a huge issue. COVID is exposed this at scale. What's your view on this? And what is thousand eyes thinking about this? >>You know, if you think about the kind of legacy application delivery, it went from largely users in an office connected over, say a dedicated corporate network, largely to traditional say internal hosted applications. And that was a early, simple, uh, connectivity bath. And as you mentioned, we've seen amplifications in terms of the diversity from the users. So users are not in the office. Now they're connected in distributed disparate locations that are dynamically changing. And you think that how they're getting to that application, they're going across a really complex service chain of different network services that are working together across as public internet backbone will totally to land them on an application. And then those applications themselves are becoming now, as you mentioned, distributed largely based upon a microservices architecture and increasing their own dependence upon third party sample size applications to fulfill say, functions of that application, those three things together. >>Ultimately you're creating that level level of complex service chain that really makes it difficult to understand the digital experience and ultimately the it organization newly chartered with not just delivering the infrastructure, but delivering the right experience. And you then have a way to be able to see, to gain that visibility, that experience, you know, to measure it and understand, and to provide that intelligence and then ultimately to act on it, to be able to ensure that your employees, as well as your customers are getting the right overall, um, approach to being able to leverage those assets. >>It's funny, you know, as you get into some of these high-scale environments, a lot of these concepts are converging. You know, we had terms like automation, self healing networks. Um, you mentioned microservices early, you mentioned data at the clouds, the new data center, uh, or when's the new land. However, we're going to look at it. It's a whole different architecture. So I want to get your thoughts on, on the automation piece of networking and internet outages, for instance, um, because when you, you know, there's so many outages going up and down, it is like, uh, catching, looking for a needle in a haystack, right. So, um, we've had this conversation with you guys on the cube before, how does automation occur when you guys look at those kinds of things? Uh, what's important to look at, can you comment on and react to, you know, the internet outages and how you find resolve those? >>Yeah. It's um, it was really great. And as you mentioned, automation really in a place that a key, when you think about the, just a broad problem that it is trying to drive and, you know, from our lens, we look at it in really three ways. First off is you have to be able to gain the level of visibility from where it matters and be able to, to test and be able to provide that level of active measurements across the, the type of ways you want to be able to inspect the network. But then also from the right vantage points, you want to inspect it. But what we talk about right inside, you know, data, um, alone, doesn't solve that problem. As you mentioned, that needle in the haystack, you know, data just provides the raw metrics that are screaming across the screen. You have to then enable that data to provide meeting. >>You need to enable that data become intelligent. And that intelligence comes through the automation of being able to process that data very quickly, allow you to be able to see the unseen, to allow you to be able to quickly understand the issues that are happening across this digital supply chain to identify issues that are even happening outside of your own control across the public internet. And then the last step of automation really comes in the form of the action, right? How do you enable that intelligence to be put, to use? How do you enable that intelligence to then drive across the rest of your it workflow as well as to be able to be used as a signaling engine, to be able to then make the fundamental changes back at the network fabric, whether that is a dressing or modifying your BGB pairing, that we see happen within our customers using thousand eyes data, to be able to route around major internet outages that we've seen over the past six months, or to be able to then that data, to be able to optimize the ultimate experience that they're delivering to both our customers, as well as our employees, >>Classic policy based activity, taking it to a whole nother level. I got to get your thoughts on the employees working at home. Okay. Because, um, you know, most it, people are like, Oh yeah, we're going to forecast in cases of disruption or a hurricane or a flood or hurricane Sandy, but now with COVID, everyone's working at home. So who would have forecasted a hundred percent, um, you know, work from home, which puts a lot of pressure on him, everything. So I got to ask you, now that employees are working at home, how do you tie network visibility to the actual user experience? >>Yeah, that's a great question. As you, you know, we saw it within our own customer base, you know, when COVID head and we saw this rise of work from home, it teams were really scrambling and said, okay, I have to light up this, say VPN infrastructure, or I need to now be able to support my users in a work from home situation where I don't control the corporate network. In essence, now you have essentially thousands. Every employee is acting across their own corporate network and people were then using thousand eyes in different ways to be able to monitor their CTPs infrastructure across, back into the corporate network, as well as in using our thousand eyes end point agents that runs on a local, a user's laptop or machine in their home to help you to be able to gain that visibility down to that last mile of connectivity. >>Because when a user calls up support and says, I'm having trouble say accessing my application, whether that's Salesforce or something else, what ultimately might be causing that issue might not necessarily be a Salesforce issue, right? It could be the device in the device performance in terms of CPU, memory utilization. It could be the wifi and the signal quality within your wifi network. It could be your access point. It could be your raw, local home router. It can be your local ISP. It could be the path that you're taking ultimately to your corporate network or that application. There's so many places that could go wrong that are now difficult to be able to see, unless you have the ability to see comprehensively from the user to the application, and to be able to understand that full end to end path, >>You know, it teams have also been disrupted. They've been on offsite prop off property as well, but you've got the cloud. How has your technology helped the it teams? Can you give some examples there? Um, >>Yeah, a great way is, you know, how people use thousand eyes as part of that data sharing ecosystem. Again, that notion of how do you go from visibility to intelligence action and where in the past you might be able as an it administrator to walk over to their network team and say, Hey, can you take a look at what I'm seeing now? That's no longer available. So how do you be able to work efficiently as the United organization? You know, we think a thousand eyes in how our customers are using us a thousand times becomes a common operating language that allows them to be able to analyze across from the application down into the underlying infrastructure, through those different layers of the network what's happening. And where do you need to focus your attention? And then furthermore, with 10,000 eyes in terms of a need, enabling that data sharing ecosystem, leveraging our share link capability really gives them the ability to say, you know, what, here's what I'm seeing and be able to send that to anybody within the it organization. But it goes even further and many times in recent times, as well as over the course of people using thousand eyes, they take those share links and actually send them to their external providers because they're not just looking to resolve issues within their own it organization. They're having to work collaboratively with a different ISP. If they're pairing with, with their cloud providers that they're appearing, uh, they're leveraging, or the SAS applications that are part of that core dependency of how they deliver their experience. >>I asked you the question, we think about levels of visibility and making the lives easier for it. Teams. Um, you see a lot of benefits with thousand eyes. You pointed out a few of them just got to ask you the question. So if I'm an it person I'm in the trenches, are you guys have, uh, an aspirin or a vitamin or both? Can you give an example because there's a lot of pain point out there. So yeah. Give me a cup, a couple Advils and aspirins, but also you're an enabler to the new things are evolving. You pointed out some use case. You talk about the difference between where you're helping people pain points and also enabling them be successful for it teams. >>Yeah, that's a great analogy. You're thinking it, like you said, it definitely sits on both sides of that spectrum, you know, thousand eyes is the trusted tool, the source of truth for it. Organizations when issues are happening as their alarm bells are ringing, as they are generating the, um, the different, uh, on call, uh, to be able to jump into a war situation thousand eyes is that trusted source of truth. Allow them to focus, to be able to resolve that issue in the heat of the moment. But that was a nice also when we think about baselining, your experience, what's important is not understanding that experience at that moment at time, but also how that's deviated over time. And so by leveraging thousand eyes on a continuous basis, it gives you that ability to see the history of that experience, to understand how your network is changing is as you mentioned, networks are constantly evolving, right? >>The internet itself is constantly changing. It's an organic system, and you need to be able to understand not only what are the metrics that are moving out of your bounds, but then what is potentially the cause of that as a network has evolved. And then furthermore, you can be begin to use that as you mentioned, in terms of your vitamin type of an analogy, to be able to understand the health of your system over time on a baseline basis so that you can begin to, uh, be able to ensure its success in a great way to really kind of bring that to light. As people using say, thousand eyes as part of the same se land-based rollout, where you're looking to say benchmark, and you can confidence as you look to scale out in either, you know, benchmarking different ESPs within that, I feel like connectivity for as you look to ensure a level of success with a single branch, give you that competence to then scale out to the rest of your organization. >>That's great insights. The classic financial model ROI got baseline and upside, right? You got handle the baseline as you pointed out, and the upside music experience connectivity, you know, application performance, which drives revenue, et cetera. So great point. Great insight, Joe. Thank you so much for that insight. It's got a final question for you. I want to just riff a little bit with you on the industry. A lot of us have been having debates about automation and who doesn't, who doesn't love automation. Automation is awesome, right? Automate things, but as the trend starts going on, as everything is a service or X, a S as it's called, certainly Cisco's going down that road. Talk about your view about the difference between automation and everything is a service because at the end of the day, everything will be a service, but without automation, you really can't have services, right? So, you know, automation, automation, automation, great, great drum to bang all day long, but then also you got the same business side saying as a service, as a service, pushing that into the products, it means not trivial. Talk about, talk about how you look at automation and everything as a service and the relationship and interplay between those two concepts. >>Yeah. Ultimately I think about in terms of what is the problem that the business is trying to solve in ultimately, what is the deal that they're trying to face? And in many ways, right, they're being exploded with increase of data that needs, they need to be able to not only process and gather, but then be able to then make use of, and then from that, as we mentioned, once you've processed that data and you've said, gather the insights from it. You need to be able to then act on that data. And automation plays a key role of allowing you to be able to then put that through your workflow. Because again, as that, it experience becomes even more complex as more and more services get put into that digital supply chain. As you adopt say increased complexity within your infrastructure, by moving to a multicloud architecture where you look to increase the number of say, network services that you're leveraging across that digital experience. >>Ultimately you need with the level of automation, you'll be able to see outside of your own vantage point. You need to be able to look at the problem from as broad of a, a broad of a way as possible. And, you know, data and automation allows you to be able to do what is fundamentally difficult to do from a very narrow point of view, in terms of the visibility you gather intelligence you generate, and then ultimately, how do you act on that data as quick as possible to be able to provide the value of what you're looking for. >>It's like a feature it's under the hood. The feature of everything comes to the surface is automation, data, machine learning, all the goodness in the software. I mean, that's really kind of what we're talking about here. Isn't it a final question for you as we wrap up, uh, dev net create really, again, is going beyond Cisco's dev net community going into the industry ecosystem where developers are there. Um, these are folks that want infrastructure as code. They want network as code. So network programmability, huge topic. We've been having that conversation, uh, with Cisco and others throughout the industry for the past three years. What's your message to developers out there that are watching this who say, Hey, I just want to develop code. Like I want, you know, you guys got that. That was nice. Thanks so much. You know, you take care of that. I just want to write code. What's your message to those folks out there who want to tap some of these new services, these new automation, these new capabilities, what's your message. >>And ultimately, I think, you know, when you're looking at thousand eyes, um, you know, from a fraud perspective, you know, we try to build our product in an API first model to allow you to be able to then shift left of how you think about that overall experience. And from a developer standpoint, you know, what I'd say is, is that while you're developing in your silo, you're going to be part of a larger ultimate system. In your experience you deliver within your application is now going to be dependent upon not only the infrastructure that's running upon, but the network it's connected to, and then ultimately the user in the sense of that user and by leveraging that thousand eyes and being able to then integrate thousand into how you think closely on that experience, that's going to help ensure that ultimately the application experience that the developer's looking to deliver meets that objective. And I think what I would say is, you know, while you need to focus on your, uh, your role as a developer, having the understanding of how you fit into the larger ecosystem and what the reality of the, of how your users access that application is critical. >>Awesome, Joe, thank you so much. Again, trust is everything letting people understand that what's going on underneath is going to be viable and capable. You guys got a great product and congratulations on the acquisition that Cisco made of your company. We've been following you guys for a long time and a great technology chops, great market traction, congratulations to everyone, 1,009. Thanks for coming on sharing. I appreciate it. Thanks Joe Vaccaro, vice president of product here, but thousand nine is now part of Cisco, John, for your host of the cube cube virtual for dev net, create virtual. Thanks for watching. >>Even prior to the pandemic, there was a mandate to automate the hyperscale cloud companies. They've shown us that to scale. You really have to automate you human labor. It just can't keep up with the pace of technology. Now, post COVID that automation mandate is even more pressing. Now what about the marketplace? What are S E seeing on the horizon? The cubes Jeff Frick speaks with Cisco engineers to gather their insights and explore the definite specialized partner program. We've got a Coon Jacobs. He's the director of systems engineering for Cisco. >>Good to see Kuhn. >>Thank you for having me >>Joining him as Eric nip. He is the VP of system systems engineering for Cisco. Good to see Eric. Good to be here. Thank you. Pleasure. So before we jump into kind of what's going on now in this new great world of programmability and, and control, I want to kind of go back to the future for a minute because when I was doing some research for this interview, it was cool. I saw an old presentation that you were giving from 2006 about the changing evolution of the, uh, the changing evolution of networking and moving from. I think that the theme was a human centered human centered network. And you were just starting to touch a little bit on video and online video. Oh my goodness, how far we have come, but I would love to get kind of a historical perspective because we've been talking a lot and I know Eric son plays football about the football analogy of the network is kind of like an offensive lineman where if they're doing a good job, you don't hear much about them, but they're really important to everything. >>And the only time you hear about them as the women, the flag gets thrown. So if you look back with the historical perspective, the load and the numbers and the evolution of the network, as we've moved to this modern time, and, you know, thank goodness cause of COVID hit five years ago, 10 years ago, 15 years ago, you know, all of us in the information space would not have been able to make this transition. So I just, I just love to get some historical perspective cause you've been kind of charting this and mapping this for a very long time. >>Yeah. W we absolutely have. I think, you know, what you're referring to was back in the day, the human network campaign, and to your point, the load, the number of hosts that traffic that just overall, the intelligence of the network has just evolved tremendously over these last decade and a half, uh, 15 years or so. And you look at where we are now in terms of the programmable nature of the network and what that enables in terms of new degrees of relevance that we can create for the customers and how, you know, the role of it has changed entirely again, especially during this pandemic, you know, the fact that it's now as a serve as an elastic is absolutely fundamental to being able to ensure, uh, on an ongoing basis, a great customer experience. And so, uh, it's been, it's been, uh, a very interesting ride. >>And then just to close the loop, the, one of your more later interviews talking to Sylvia, your question is, are you a developer or an engineer? So it was, and, and your whole advice to all these network engineers is just, just don't jump in and start doing some coding and learning. So, you know, the focus and really the emphasis and where the opportunity to differentiate as a company is completely shifting gears over to the, you know, really software defined side. >>Oh, absolutely. So I mean, you look at how the software world and the network has come together and how we're applying now, you know, basically the same construct of CIC pipeline to network, uh, infrastructure, look at network really as, and get all of the benefits from that. And the familiarity of it, the way that our engineers have had to evolve. And that is just, you know, quite, quite significant in, in, in like the skill set. And the best thing is jump in, right. You know, dip your toe in the water, but continue to evolve that skill set. And, you know, don't, don't be shy. It's a leap of faith for some of us who've been in the industry a bit longer. We like to look at ourselves as the craftsman of the network, but now it's definitely a software centricity and programmability, right? >>So Eric, you've got some digital exhaust out there too, that I was able to dig up going back to 2002 752 page book and the very back corner of a dark dirty dusty Amazon warehouse is managing Cisco network security, 752 pages. Wow. How has security change from a time where before I could just read a book, a big book, you know, throw some protocols in and probably block a bunch of ports to the world that we live in today, where everything is connected. Everything is API driven, everything is software defined. You've got pieces of workloads spread out all over the place and Oh, by the way, you need to bake security in at every single level of the application stack. >>Yeah, no, I'm so, wow. The kudos that you, you found that book I'm really impressed. There was a thank you a little street, correct. So I want to hit on something that you, you talked about. Cause I think it's very important to, to this overall conversation. If we think about the scale of the network and Coon hit on it briefly, you talked about it as well. We're seeing a massive explosion of devices by the estimated by the end of this year, there's going to be about 27 billion devices on the global internet. That's about 3.7 devices for every man, woman and child life. And if we extrapolate that out over the course of the next decade on the growth trajectory we're on. And if you look at some of the published research on this, it's estimated there could be upwards of 500 billion devices accessing the global internet on a, on a daily basis in the primarily that, that, that is a IOT devices, that's digitally connected devices. >>Anything that can be connected will be connected, but then introduces a really interesting security challenge because every one of those devices that is accessing the global internet is within a company's infrastructure or accessing pieces of corporate data is a potential attack factor. So we really need to, and I think the right expression for this is we need to reimagine security because security is, as you said, not about parameters. You know, I wrote that book back in 2002, I was talking about firewalls and a cutting edge technology was intrusion prevention and intrusion detection. Now we need to look at security really in the, in the guys up or under the, under the, under the realm of really two aspects, the identity who is accessing the data and the context, what data is being accessed. And that is going to require a level of intelligence, a level of automation and the technologies like machine learning and automated intelligence are going to be our artificial intelligence rather are going to be table stakes because of the sheer scale of what we're trying to secure is going to be untenable under current, you know, just current security practices. I mean, the network is going to have to be incredibly intelligent and leverage again, a lot of that, uh, that AI type of data to match patterns of potential attacks and ideally shut them down before they ever cause any type of damage. >>Yeah, it's really interesting. I mean, one thing that COVID has done a bunk many things is kind of retaught us all about the power of exponential curves and how extremely large those things are and how fast they grow. We at Dave runs it on a Google cloud a couple of years ago. And I remember him talking about early days at Google when they were starting to map out kind of, as you described kind of map out their growth curves, and they just figured out they could not hire if they hired everybody, they couldn't hire enough people to deal with it. Right. So really kind of rethinking automation and rethinking about the way that you manage these things and the level, right. The old, is it a pet or is it, or is it, um, uh, part of a herd and, and I think it's interesting what you talked about, uh, con really the human powered internet and being driven by a lot of this video, but to what you just said, Eric, the next big wave, right. >>Is IOT and five G. And I think, you know, you talk about 3.7 million devices per person. That's nothing compared to right. All these sensors and all these devices and all these factories, because five G is really targeted to machine the machines, which there's a lot of them and they trade a lot of information really, really quickly. So, you know, I want to go back to you Coon thinking about this next great wave in a five G IOT kind of driven world where it's kind of like when voice kind of fell off compared to IP traffic on the network. I think you're going to see the same thing, kind of human generated data relative to machine generated data is also going to fall off dramatically as a machine generated data just skyrocket through the roof. >>Yeah, no, absolutely. And I think too, also what Eric touched on the visibility on that, and they've been able to process that data at the edge. That's going to catalyze cloud adoption even further, and it's going to, you know, make the role of the network, the connectivity of it all and the security within that crucially important. And then you look at the role of programmability within that. We're seeing the evolution going so fast. You look at the element of the software defined network in an IOT speed space. We see that we have a host Sarah that are not necessarily, um, you know, behaving like other hosts would, uh, on a network, for example, manufacturing floor, uh, production robot, or a security camera. And what we're seeing is we're seeing, you know, partners and customers employing programmability to make sure that we overcome some of the shortcomings, uh, in terms of where the network is at, but then how do you customize it in terms of the relevance that can provide, >>Um, bringing on board those, uh, those hosts in a very transparent way, and then, you know, keep, keep the agility of it and keep the speed of innovation going. >>So, Eric, I want to come back to you and shift gears kind of back to the people will leave the IOT in the machines along, along for a minute, but I'm curious about what does beat the boss. I mean, I go to your LinkedIn profile and it's just filled with congratulatory statements, but everyone's talking about beating the boss. You know, it's, it's a really, you know, kind of interesting and different way to, to motivate people, to build this new skillset in terms of getting software certifications, uh, within the Cisco world. And I just thought it was really cute the way that you, uh, clearly got people motivated, cause there's posts all over the place and they've all got their, their nice big badge or their certification, but, you know, at a higher level, it is a different motivation to be a developer versus an you're an a technician. And it's kind of a different point of view. And I just wonder if you could share, you know, some of the ways that you're, you're kind of encouraging, you know, kind of this transformation within your own workforce, as well as the partners, et cetera, and really adopting kind of almost a software first and this program kind of point of view versus, you know, I'm just wiring stuff up. >>Apparently a lot of people like to beat me. So I mean, not itself was a, was a, a, it was a great success, but you know, if we think we take a step back, you know, what is Cisco about as an organization? Um, I mean, obviously he looked back to the very early days of our vision, right? It was, it was to change the way the world worked, played, live and learn. And that you think about, and you hit on this when we were, you know, we were discussion with co with Kuhn in the early days of COVID. We really saw that play out as so much shifted from, you know, in-person type of interactions to virtual interactions in the network that, uh, that our, our customers, our partners, our employees built over the course of the last several years, the last three decades really helped the world continue to, um, to, to do business for students to continue to go to school or clinicians, to connect with patients. >>If I think about that mission to me, programmability is just the next iteration of that mission, continuing to enable the world to communicate, continuing, to enable customers, employees, uh, partners, uh, to essentially leverage the network for more than just connectivity now to leverage it for critical insight. Again, if we look at some of the, uh, some of the use cases that we're seeing for social distancing and contact tracing and network has a really important place to play there because we can pull insight from it, but it isn't necessarily an out of the box type of integration. So I look at programmability and in what we're doing with, with dev net to give relevance to the network for those types of really critical conversations that every organization is having right now, it's a way to extrapolate. It's a way to pull critical data so that I can make a decision. >>And if that is automated, or if that decision requires some type of manual intervention, regardless, we're still about connecting. And in this case, we're connecting insight with the people who need it most, right. The debit challenge we ran is really in respect for how critical this new skill set is going to be. It's not enough, like I said, just to connect the world anymore. We need to leverage that network, the network for that critical insight. And when we drove, we were, we created the beat, the boss challenge. It was really simple. Hey guys, I think this is important and I am going to go out and I'm going to achieve the certification myself, because I don't want to continue to be very relevant. I want to continue to be able to provide that insight for my customers and partners. So therefore I'm going for anybody that can get there before me. Maybe there's a little incentive tied to it and the incentive, although it's funny, we interviewed a lot of, a lot of our team who, who achieved it when incentive was secondary, they just wanted to have the bragging rights, like yeah, I beat Eric. Right? >>Right. Absolutely. No, it's a, it's it, you know, putting your money where your mouth is, right. If it's important, then why you should do it too. And, and you know, the whole, you're not asking people to do what you wouldn't do yourself. So I think there's a lot of good leadership, uh, leadership lessons there as well, but I want to extend kind of the conversation on the covert impact, right? Cause I'm sure you've seen all the social media means, you know, who's driving your digital transformation, the CEO, the CMO or COVID. And we all know the answer to the question, but you know, you guys have already been dealing with kind of an increased complexity around enterprise infrastructure world in terms of cloud and public cloud and hybrid cloud and multi cloud. And people are trying to move stuff all the way around now suddenly had this COVID moment right in, in March, which is really a light switch moment. >>People didn't have time to plan or prepare for suddenly everybody working from home. And it's not only you, but your spouse and your kids and everybody else. So I, but now we're six months plus into this thing. And I would just love to get your perspective and kind of the change from, Oh my goodness, we have to react to the light switch moment. What do we do to make sure people can, can get, get what they need when they need it from where they are a bubble, but then really moving from this is a, an emergency situation, a stop gap situation to, Hmm, this is going to extend for some period of time. And even when it's the acute crisis is over, you know, this is going to drive a real change in the way that people communicate in the way that people, where they sit and do their jobs and, and kind of how customers are responding accordingly as the, you know, kind of the narrative has changed from an emergency stop gap to this is the new normal that we really need to plan for. >>So, uh, I think, I think you said it very well. I think anything that could be digitized, any, any interaction that could be driven virtually was, and what's interesting is we, as you said, we went from that light switch moment where I, and I believe the status, this, and I'll probably get number wrong, but like in the United States here at the beginning, at the end of February, about 2% of the knowledge worker population was virtual, you know, working from home or in a, in a remote work environment. And over the course of about 11 days, that number went from 2% to 70%. Wow. Interesting that it worked, you know, there was a lot of hiccups along the way, and there was a lot of organizations making really quick decisions on how do I enable VPN scale of mass? How do I leverage, uh, you know, things like WebEx for virtual meetings and virtual connectivity, uh, much faster now that as you said, that we kind of gotten out of the fog of, of, of war for our fog of battle organizations are looking at what they accomplished. >>And it was nothing short of Herculean and looking at this now from a transition to, Oh my gosh, we need to change too. We have an opportunity to change. And we're looking, we see a lot of organizations specifically around, uh, financial services, healthcare, uh, the, uh, the K through 20, uh, educational environment, all looking at how can they do more virtually for a couple of reasons. Obviously there is a significant safety factor. And again, we're still in that we're still on the height of this pandemic. They want to make sure their employees, their customers, students, patients remain safe. But second, um, we've found in, in discussions with a lot of senior it executives that our customers, that people are happier working from home, people are more productive working from home. And that, again, the network that's been built over the course of the last few decades has been resilient enough to allow that to happen. >>And then third, there is a potential cost savings here outside of people. The next most expensive resource that organizations are paying for is real estate. If they can shrink that real estate footprint while providing a better user experience at the locations that they're maintaining, again, leveraging things like location services, leveraging things like a unified collaboration. That's very personalized to the end user's experience. They're going to do that. And again, they're going to save money. They're going to have happier employees and ultimately they're going to make their, uh, their employees and their customers a lot safer. So we see, we believe that there is in some parts of the economy, a shift that is going to be more permanent and some estimates put it as high as 15% of the current workforce is going to stay in there in a virtual or a semi virtual working environment for the foreseeable future. >>And I, and I, and I would say, I'd say 15% is low, especially if you, if you qualify it with, you know, part time, right. I, there was a great interview we were doing and talking about working from home, we used to work from home as the exception, right? Cause the cable person was coming, are you getting a new washing machine or something where now that's probably getting, you know, in many cases we'll shift to the other where I'm generally gonna work from home unless, you know, somebody is in town or having an important meeting or there's some special collaboration that drives me to be in. But you know, I want to go back to you Kuhn and, and really doubled down on, you know, I think most people spent too much time focusing, especially, we'll just say within the virtual events base where we play on the things you can't do virtually, we can't meet in the hall. >>We can't grab a quick coffee and a drink instead of focusing on the positive things like we're accomplishing right here, you're in Belgium, right. Eric is in Ohio, we're in California. Um, and you know, we didn't take three days to, to travel and, and check into a hotel and all that stuff to get together, uh, for this period of time. So there's a lot of stuff that digital enables. And I think, you know, people need to focus more on that versus continuing to focus on the two or three things that, that it doesn't replace and it doesn't replace those. So let's just get that off the table and move on with our lives. Cause those aren't coming back anytime soon. >>No, totally. I think it's the balance of those things. It's guarding the fact that you're not necessarily working for home. I think the trick there is you could be sleeping at the office, but I think the positives are way, way more outspoken. Um, I, you know, I look at myself, I got much more exercise time in these last couple of months than I usually do because you don't travel. You don't have the jet lag and the connection. And then you talked about those face to face moments. I think a lot of people are in a way, um, wanting to go back to the office part time as, as Eric also explained. But a lot of it you can do virtually we have virtual coffees with team or, you know, even here in Belgium, our, our local general manager has a virtual effort. TIF every Friday obviously skipped the one this week. But, uh, you know, there's, there's ways to be very creative with the technology and the quality of the technology that the network enables, um, you know, to, to get the best of both worlds. Right? >>So I just, we're going to wrap the segment. I want to give you guys both the last word you both been at Cisco for a while and, you know, Susie, we, and the team on dev net has really grown this thing. I think we were there at the very beginning couple of four, five, six years ago. I can't keep track of time anymore, but you know, it's really, really grown and, you know, the timing is terrific to get into this more software defined world, which is where we are. I wonder if you could just, you know, kind of share a couple thoughts as you know, with a little bit of perspective and you know, what you're excited about today and kind of what you see coming down the road since you guys have been there for a while you've been in this space, uh, let's start with Yukon. >>I think the possibility it creates, I think really programmability software defined is really about the art of the possible it's what you can dream up and then go code. Um, uh, Eric talked about the relevance of it and how it maximizes that relevance on a customer basis. Um, you know, and then it is the evolution of, of the teams in terms of the creativity that they can bring to it. Uh, we're seeing really people dive into that and customers, um, co-creating with us. And I think that's where we're going in terms of like the evolution of the value proposition there in terms of what technology >>Can provide, but also how it impacts people. Has it been discussed and redefines process? >>I love that the art of the possible, which is a lot harder to execute in a, in hardware than software certainly takes a lot longer. I'd love to get your, uh, your thoughts. >>Absolutely. So I started my career at Cisco, uh, turning, uh, putting IP phones onto the network. And back then, you know, it was, you know, 2001, 2002, when, uh, the idea of putting telephones onto the network was such a, um, just such an objectionable idea. And so many purists were telling us all the reasons it wouldn't work. Now, if we go forward again, 19 years, the idea of not having them plugging into the network is a ridiculous idea. So we have a, we're looking at an inflection point in this industry, and it's really, it's not about programming. It's not necessarily about programming. It's about doing it smarter. It's about being more efficient. It's about driving automation, but again, it is, it's about unlocking the value of what the network is. We've moved so far past. What can, you know, just connectivity, the network touches everything and it's more workload moves to the cloud is more workload moves to things like containers. >>Um, the network is the really, the only common element that ties all of these things together. The network needs to take its rightful place, uh, in the end, the, it lexicon as being that critical or that poor critical insight provider, um, for, for how users are interacting with the network, how users are interacting with applications, how applications are interacting with them in another program, ability is a way to do that more efficiently, uh, with greater a greater degree of certainty with much greater relevance into the overall delivery of it services and digitization. So to me, I think we're going to look back 20 years from now, probably even 10 and say, man, we used to configure things manually. What was that like? And I think, I think really this is, this is the future. And I think we want to be aligned with where we're going versus where we've been. >>All right. Well, Coon, Eric, thank you for, for sharing your perspective. You know, it's, it's really nice to have, you know, some historical reference, uh, and it's also nice to be living in a new age where you can, you can, you know, stay at the same company and, and still refresh, you know, new challenges, new opportunities and grow this thing. Cause as you said, I remember those IP first IP phone days and I thought, well, mob bell must be happy because the old mother's day problem is finally solved when we don't have to have a dedicated connection between every mother and every child in the middle of may. So good news. So thank you very much for sharing your, uh, your insights and really, uh, really enjoyed the >>Thank you. >>We've been covering dev net create for a number of years. I think since the very first show and Susie, we and the team really built a practice, built a company, built a lot of momentum around software in the Cisco ecosystem and in getting devs really to start to build applications and drive kind of the whole software defined networking thing forward. And a big part of that is partners and working with partners and, and developing solutions and, you know, using brain power, that's outside of the four walls of Cisco. So we're excited to have, uh, our next guest, uh, a partner for someone is Brad Hoss. He is the engineering director for dev ops at Presidio, Brad. Great to see you. >>Hey Jeff, great to be here. >>Absolutely. And joining him is Chuck Stickney. Chuck is the business development architect for Cisco dev net partners. And he has been driving a whole lot of partner activity for a very long period of time. Chuck, great to see you. >>Thanks Jeff. Great to be here and looking forward to this conversation. >>Absolutely. So let's, let's start with you Chuck, because I think, um, you know, you're leading this kind of partner effort and, and you know, software defined, networking has been talked about for a long time and you know, it's really seems to be maturing and, and software defined everything right. Has been taking over, especially with, with virtualization and moving the flexibility and the customer program ability customability in software and Mo and taking some of that off the hardware. Talk about, you know, the programs that you guys are putting together and how important it is to have partners to kind of move this whole thing forward, versus just worrying about people that have Cisco badges. >>Yeah, Jeff, absolutely. So along this whole journey of dev net where we're, we're trying to leverage that customization and innovation built on top of our Cisco platforms, most of Cisco's businesses transacted through partners. And what we hear from our customers and our partners is they want to, our customers want to way to be able to identify, does this partner have the capabilities and the skills necessary to help me go down this automation journey I'm trying to do, do a new implementation. I want to automate that. How can I find a partner to, to get there? And then we have some of our partners that have been building these practices going along the step in that journey with us for the last six years, they really want to say, Hey, how can I differentiate myself against my competitors and give an edge to my customers to show them that, yes, I have these capabilities. I've built a business practice. I have technology, I have technologists that really understand this capability and they have the net certifications to prove it, help me be able to differentiate myself throughout our ecosystem. So that's really what our Danette partner specialization is all about. >>Right. That's great. And Brad, you're certainly one of those partners and I want to get your perspective because partners are oftentimes a little bit closer to the customer cause you've got your kind of own set of customers that you're building solutions and just reflect on, we know what happened, uh, back in March 15th, when basically everybody was told to go home and you can't go to work. So, you know, there's all the memes and social media about who, you know, who pushed forward your digital transformation, the CEO, the CMO or COVID. And we all know what the answer is, whatever you can share some information as to what happened then, and really for your business and your customers, and then reflect now we're six months into it months plus, and, and you know, this new normal is going to continue for a while. How's the customer attitudes kind of changed now that they're kind of buckled down past the light switch moment and really we need to put in place some foundation to carry forward for a very long time potentially. >>Yeah, it's really quite interesting actually, you know, when code first hit, we got a lot of requests to help with automation of provisioning our customers and in the whole digital transformation got really put on hold for a little bit there and I'd say it became more of, of the workplace transformation. So we were quickly, uh, you know, migrating customers to, you know, new typologies where instead of the, the, you know, users sitting in those offices, they were sitting at home and we had to get them connected rapidly in a, we have a lot of success there in those beginning months with, you know, using automation and programmability, um, building, you know, provisioning portals for our customers to get up and running really fast. Um, and that, that, that was what it looked like in those early days. And then over time, I'd say that's the asks from our customers has started to transition a little bit. >>You know, now they're asking, you know, how can I take advantage of the technology to, you know, look at my offices in a different way, you know, for example, you know, how many people are coming in and out of those locations, you know, what's the usage of my conference rooms. Um, are there, uh, are there, um, situations where I can use that information? Like how many people are in the building and at a certain point in time and make real estate decisions on that, you know, like, do I even need this office anymore? So, so the conversations have really changed in ways that you couldn't have imagined before March. Right. >>And I wonder with, with you Chuck, in terms of the Cisco point of view, I mean, the network is amazing. It had had, COVID struck five years ago, 10 years ago, 15 years ago, you know, clearly there's a lot of industries that are suffering badly entertainment, um, restaurant, business, transportation, they, you know, hospitality, but for those of us in kind of the information industry, the switch was pretty easy. Um, you know, and, and the network enables the whole thing. And so I wonder if, you know, kind of from your perspective as, as suddenly, you know, the importance of the network, the importance of security and the ability now to move to this new normal very quickly from a networking perspective. And then on top of that, having, you know, dev net with, with the software defined on top, you guys were pretty much in a good space as good as space as you could be given this new challenge thrown at you. >>Yeah, Jeff, we completely agree with that. A new Cisco has pushed the idea that the network is transformational. The network is the foundation, and as our customers have really adopted that message, it is enabled that idea for the knowledge workers to be able to continue on. So for myself, I've, I've worked for home the entire time I've been at Cisco. So the last 13 years, this is, you know, the, the change to the normalcy is I never get on a plane anymore, but my day to day functions are still the same. And it's built because of the capabilities we have with the network. I think the transition that we've seen in the industry, as far as kind of moving to that application type of economy, as we go to microservices, as we go to a higher dependency upon cloud, those things have really enabled the world really to be able to better respond to this, to this COVID situation. And I think it's helped to, to justify the investments that's that our customers have made as well as what our partners have been, being able to do to deliver on that multicloud capability, to take those applications, get them closer to the end user instead of sitting in a common data center and then making it more applicable to, to users wherever they may be, not just inside of that traditional form. >>Right. Right. It's interesting that Brad, you, you made a comment on another interview. I was watching getting ready for this one in terms of, uh, applications now being first class citizens was, was what you said. And it's kind of interesting coming from an infrastructure point of view, where before it was, you know, what do I have and what can I build on it now really it's the infrastructure that responds back to the application. And even though you guys are both in the business of, of networking and infrastructure, it's still this recognition that apps first is the way to go, because that gives people the competitive advantage that it gives them the ability to react in the marketplace and to innovate and move faster. So, you know, it's, it's a really interesting twist to be able to support an application first, by having a software defined in a more programmable infrastructure stack. >>Yeah, no doubt. And, you know, I think that the whole push to cloud was really interesting in the early days, it was like, Hey, we're going to change our applications to be cloud first. You know? And then I think the terminology changed over time, um, to more cloud native. So when we, when we look at what cloud has done over the past five years with customers moving, you know, their, their assets into the cloud in the early days that we were all looking at it just like another data center, but what it's really become is a place to host your applications. So when we talk about cloud migrations with our customers now, we're, we're no longer talking about, you know, the assets per se, we're talking about the applications and what did those applications look like? And even what defines an application right now, especially with the whole move to cloud native and microservices in the automation that helps make that all happen with infrastructure as code. >>You're now able to bundle the infrastructure with those applications together as a single unit. So when you define that application, as infrastructure, as code the application in this definition of what those software assets for the infrastructure are, all are wrapped together and you've got change control, version control, um, and it's all automated, you know, it's, it's a beautiful thing. And I think it's something that we've all kind of hoped would happen. You know, in, when I look back at the early definitions of software defined networking, I think everybody was trying to figure it out and they didn't really fully understand what that meant now that we can actually define what that network infrastructure could look like as it's, as it's wrapped around that application in a code template, maybe that's Terraform or Ansible, whatever that might be, whatever method or tool that you're using to bring it all together. It's, you know, it's really interesting now, I think, I think we've gotten to the point where it's starting to make a lot more sense than, you know, those early days of SDN, uh we're out, you know, it was, was it a controller or is it a new version of SNMP? You know, now it makes sense it's actually something tangible. >>Right, right. But still check, as you said, right. There's still a lot of API APIs and there's still a lot of component pieces to these applications that are all run off the network that all have to fit, uh, that had to fit together. You know, we cover PagerDuty summit and you know, their whole thing is trying to find out where the, where the problems are within the very few microseconds that you have before the customer abandons their shopping cart or whatever the particular application. So again, the network infrastructure and the program ability super important. But I wonder if you could speak to the automation because there's just too much stuff going on for individual people to keep track of and they shouldn't be keeping track of it because they need to be focusing on the important stuff, not this increasing amount of bandwidth and traffic going through the network. >>Yeah, absolutely. Jeff said the bandwidth that's necessary in order to support everybody working from home to support this video conference. I mean, we used to do this sitting face to face. Now we're doing this over the internet. The amount of people necessary to, to be able to facilitate that type of traffic. If we're doing it the way we did 10 years ago, we would not scale it's automation. That makes that possible. That allows us to look higher up the ability to do that. Automatic provisional provisioning. Now that we're in microservices now, everything is cloud native. We have the ability to, to better, to better adjust, to and adapt to changes that happen with the infrastructure below hand. So if something goes wrong, we can very quickly spend something ups to take that load off where traditionally it was open up a ticket. Let me get someone in there, let me fix it. >>Now it's instantaneously identify the solution, go to my playbook, figure out exactly what solution I need to deploy and put that out there. And the network engineering team, the infrastructure engineering team, they just simply need to get notified that this happened. And as long as there's traceability and a point that Brad made, as far as you being able to go through here doing the automation of the documentation side of it. I know when I was a network engineer, one of the last things we ever did was documentation. But now that we have the API is from the infrastructure. And then the ability to tie that into other systems like an IP address management or a change control, or a trouble ticketing system, that whole idea of I made an infrastructure change. And now I can automatically do that documentation update and record. I know who did it. I know when they did it and I know what they did, and I know what the test results were even five years ago, that was fantasy land. Now, today that's just the new normal, that's just how we all operate. Right. >>Right, right. So I want to get your take on the other side, >>Cloud multicloud >>Public cloud, you know, as, as I think you said Brad, when public cloud first came out, there was kind of this, this rush into, we're going to throw everything in there then for, for, for different reasons. People decided maybe that's not the best, the best solution, but really it's horses for courses. Right. And, and I think it was pretty interesting that, that you guys are all supporting the customers that are trying to figure out where they're going to put their workloads. And Oh, by the way, that might not be a static place, right. It might be moving around based on, you know, maybe I do my initial dev and, and, and Amazon. And then when I go into production, maybe I want to move it into my data center and then maybe I'm having a big promotion or something I want to flex capability. So from, from your perspective in helping customers work through this, cause still there's a lot of opinions about what is multicloud, what is hybrid cloud and you know, it's horses for courses, how are you helping people navigate that? And what does having programmable infrastructure enable you to do for helping customers kind of sort through, you know, everybody talks about their journey. I think there's still, you know, kind of bumbling down, bumbling down paths, trying to find new things, what works, what doesn't work. And I think it's still really early days and trying to mesh all this stuff together. Yeah, >>Yeah. No doubt. It is still early days. And you know, I, I, I go back to it being application centric because, you know, being able to understand that application, when you move to the cloud, it may not look like what it used to look like when you, when you move it over there, you may be breaking parts off of it. Some of them might be running on a platform as a service while other pieces of it are running as infrastructure as service. And some of it might still be in your data center. Those applications are becoming much more complex than they used to be because we're breaking them apart into different services. Those services could live all over the place. So with automation, we really gain the power of being able to combine those things. As I mentioned earlier, those resources, wherever they are and be defined in that infrastructure as code and automation. >>But you know, aside from, I think we focus a lot about provisioning. When we talk about automation, we also have these amazing capabilities on, on the side of, uh, operations too. Like we've got streaming telemetry, and the ability to gain insights into what's going on in ways that we didn't have before, or at least in the, in, you know, in the early days of monitoring software, right? You knew exactly what that device was, where it was. It probably had a friendly name, like maybe it was, uh, something from the Hobbit right now. You've got things coming up and spinning and spinning up and spinning down, moving all over the place. In that thing. You used to know what that was. Now you have to quickly figure out where it went. So the observability factor is a huge thing that I think everybody, um, should be paying attention to attention, to moving forward with regards to when you're moving things to the cloud or even to other data centers or, you know, in your premise, I'm breaking that into microservices. >>You really need to understand what's going on. And the, you know, programmability and API APIs and, you know, yang models are tied into streaming telemetry. Now there's just so many great things coming out of this, you know, and it's all like a data structure that, that people who are going down this path and the dev net path there, they're learning these data structures and being able to rationalize and make sense of that. And once you understand that, then all of these things come together, whether it's cloud or a router or switch, um, Amazon, you know, it doesn't matter. You're on, you're all speaking a common language, which is that data structure. >>That's great. Chuck, I want to shift gears a little bit. Cause there was something that you said in another interview when I was getting ready for this one about, about in a dev net, really opening up a whole different class of partners for Cisco, um, as, as really more of a software, a software lead versus kind of the traditional networking lead. I wonder if you can put a little more color on that. Um, because clearly as you said, partners are super important. It's your primary go to market and, and Presidios, I'm sure the best partner that you have in the whole world that's and you know, you said there's some, there's some, you know, non traditional people that would not ever be a Cisco partner that suddenly you guys are playing with because of really the software lead. >>Yeah. Jeff that's exactly right. So as we've been talking to folks with dev nets and whether it'd be at one of the Cisco live events in the dev net zone or the prior dev net create events, we'll have, we'll have people come up to us who Cisco today views as a, as a customer because they're not in our partner ecosystem. They want to be able to deliver these capabilities to our customers, but they have no interest in being in the resell market. This what we're doing with the doublet that gives us the ability to bring those partners into the ecosystem, share them with our extremely large dev net community so they can get access to those, to those potential customers. But also it allows us to do partner to partner type of integration. So Brad and Presidio, they built a fantastic networking. They always have the fantastic networking business, but they've built this fantastic automation business that's there, but they may come into, into a scenario where it's working with a vertical or working with the technology case that they may not have an automation practice for. >>We can leverage some of these software specific partners to come in there and do a joint, go to markets where, so they can go where that traditional channel partner can leverage their deep Cisco knowledge in those customer relationships that they have and bring in that software partner almost as a subcontractor to help them deliver that additional business value on top of that traditional stack, that brings us to this business outcomes that the customers are looking for and a much faster fashion and a much more collaborative fashion. That's terrific. Well, again, it's a, it's, it's unfortunate that we can't be in person. I mean, the, the Cisco dev net shows, you know, they're still small, they're still intimate. There's still a lot of, uh, information sharing and, you know, great to see you. And like I said, we've been at the computer museum, I think the last couple of years and in, in San Francisco. So I look forward to a time that we can actually be together, uh, maybe, maybe for next year's event, but, uh, thank you very much for stopping by and sharing the information. Really appreciate it. Happy to be here from around the globe. It's the cube presenting, accelerating automation with Devin brought to you by Cisco. >>When I'm Sean for the cube, your host for accelerating automation with dev net, with Cisco, and we're here to close out the virtual event with Mindy Whaley, senior director, Mandy, take it away. >>Thank you, John. It's been great to be here at this virtual event and hearing all these different automation stories from our different technology groups, from customers and partners. And what I'd like to take a minute now is to let people know how they can continue this experience at DevNet create, which is our free virtual event happening globally. On October 13th, there's going to be some really fun stuff. We're going to have our annual demo jam, which is kind of like an open mic for demos, where the community gets to show what they've been building. We're also going to be, um, giving out and recognizing our dev net creator award winners for this year, which is a really great time where we recognize our community contributors who have been giving back to the community throughout the year. And then we find really interesting channels. We have our creators channels, which is full of technical talks, lightening talks. >>This is where our community, external Cisco people come in share what they've been working on, what they've been working learning during the year. We also have a channel called API action, which is where you can go deep into, you know, IOT or collaboration or data center automation and get demos talks from engineers on how to do certain use cases. And also a new segment called street from engineering, where you get to hear from the engineers, building those products as well. And we have a start now for those people just getting started, who may need to dive into some basics around coding, API APIs and get that's a whole channel dedicated to getting them started so that they can start to participate in some of the fun challenges that we're going to have during the event. And we're going to have a few fun things. Like we have some definite advocate team members who are awesome, musically talented. They're going to share some performances with us. So, um, we encourage everyone to join us there. Pick your favorite channel, uh, join us in whichever time zone you live in. Cause we'll be in three different time zones. And, um, we would love for you to be there and to hear from you during the event. Thanks so much. >>That's awesome. Very innovative, multiple time zones, accelerating automation with dev net. Thank you so much for watching and we'll see you at dev net create thanks for watching.
SUMMARY :
accelerating automation with damnit brought to you by Cisco. automation with dev net, because you said to me, I think four years ago, I mean, what we know is that as more and more businesses are And in order to do that, you know, the whole new tool that we've always talked about you know, not to get in the weeds, but you know, switches and hubs and wireless. kind of, you know, just, you know, blocked off rooms to really be secure And they had to, because you couldn't just go into a server room and tweak your servers, So those things, again, all dev ops and, you know, have you guys got some acquisitions, And, um, you know, going back to Todd Nightingale, right. you know, looking for those events, the dashboards, you know, so it really has, Cause you know, you got to go, but real quick, um, describe what accelerating automation with dev net It's also about people rising to the level of, you know, Thank you for your time. Thank you so much. Can you give us the update on starting to look at, you know, things like DevSecOps engineer, network, Eric, I want to go to you for a quick second on this, um, um, piece of getting the certifications. So, you know, as opposed to in person where you know, helping you answer questions, helping provide content. the stack as modern applications are building, do you see any patterns or trends around what is parameters that it departments might care about, about their firewalls, things that you do normally look at me out, okay, now I can take that and I can adapt it to what I need to see for my observability. And nonlinearly you got the certifications, which is great. who want to be able to, you know, dive into a topic, do a hands on lab, you know, read the instructions, read the manual, do the deeper learning. you know, end to end programmability and with everything as a service that you guys are doing everything with API with you at every Devin event over the past years, you know, damnit is bringing APIs across our action going on in cloud native right now, your thoughts? So, whereas it used to be, you know, confined by the walls that we were within for the event. So I think together seeing all of that and then bringing the community together Thanks so much. um, you know, we're so excited to see the people joining from all the different regions and, And we'll, we'll, we'll ride the wave with you guys. Thank you so much. Thank you so much for watching and we'll see you at dev net create thanks for watching. And Jeffrey, The cube coming to you from our Palo Alto studio with ongoing coverage of the Cisco dev data van, Hey, good to see you too. you know, especially like back in March and April with this light switch moment, which was, you know, no time to prep and suddenly Hey, I do think we all appreciate the network And you know, it, 2000 East to West, You know, it's, it's amazing to think, you know, had this happened, you know, but as I said, resiliency just became so much more important than, you know, you know, kind of how the market is changing, how you guys are reacting and really putting the things in place to you know, most people call hybrid cloud or multi-cloud, uh, in, in the end, what it is, And so really what you want to put in place is what we call like the cloud on ramp, thing, you know, as the, as we know, and we hear all the time, you know, the flows of data, the complexity of the data, And I said the tech line, I have, you know, sometimes when my mind is really going Some just, you know, I use these API APIs and use NoMo And it's funny, we, we recently covered, you know, PagerDuty and, and they highlight what And what traditional, you have a request network, operation teams executes the request Or do you say, Hey, maybe some of these security things I got to hand over the sec ups team, you know, the actual things that you do to execute that technique. None of those is really actually, you know, a little bit of credit, maybe some of us where we have a vision, Uh, and so that is emotion where in for all the, you know, Now don't have to wait for, you know, the one network person to help them out out of these environments. Uh, and that just drives then what tools do you want to have available to actually Then they have the ability to react to, uh, to some of these requirements. And that's really in the enticing, They just want to, you know, deliver business benefit to their customers and respond to, uh, network provides something and you use to, uh, this is what I want to do. Well, it's good times for you because I'm sure you've seen all the memes and in social media, know, the best races you can have. Lots of information is kind of, it's still kind of that early vibe, you know, where everyone is still really enthusiastic I mean, we were, you know, we, we, it was in the back of our minds in January, And like I said, you know, um, remote expect that to at least double that 16%, you know, Um, and they're doing it in ways, hopefully that, you know, in some cases, And, and essentially the way you describe it, as you know, your job as a security And so the question is, you know, how, how do we up our game there so that we I want to ask you about automation generally, and then specifically how it applies to security. I mean that for, for businesses, I mean that for, you know, education and everything else the, the bad guys, the adversaries are essentially, you know, weaponizing using your own Well, there's, they're clever, uh, give them that, um, you know, uh, GDP, but guys, I wonder if you could bring up the chart because when you talk to CSOs and you ask And so you can see on the horizontal axis, you've got, you know, big presence in the data set. Um, that's the frustration customers have, you know, I'm safe, but you know, of course we know it's a shared responsibility model. I think cloud, um, when you look at the services that are delivered via the cloud, out, you know, that developer angle, because it's practical do, you're not trying to force your way into for, um, you know, doing all the machine scale stuff. It's good from the standpoint of awareness, you know, you may or may not care if you're a social media user. I saw, um, but I do think it also, you know, with that level of awareness, you know, society has to really, really take this on as your premise. front of the room and said, you know, all you techies, you judge efficiency by how long it takes. for having taken so long, you know, to make certain decisions, but, you know, again, you know, all of these security tools, no matter how fancy it is, You know, the, you know, And it's so familiar to me because, you know, um, I, you know, of silo busters. So I really appreciate the time you spend on the cube. You have the keys to the kingdom, you know, their, their walls outside of the Cisco network operators, network engineers. And I think, you know, that change alone really kind of amplified. At the same time, you got a ton of modern apps running for these networks. And you think that how they're getting to that application, to be able to see, to gain that visibility, that experience, you know, to measure it and understand, It's funny, you know, as you get into some of these high-scale environments, a lot of these concepts are converging. But what we talk about right inside, you know, data, um, alone, doesn't solve that problem. to process that data very quickly, allow you to be able to see the unseen, Because, um, you know, most it, people are like, runs on a local, a user's laptop or machine in their home to help you to to see, unless you have the ability to see comprehensively from the user Can you give some examples there? And where do you need to focus your attention? So if I'm an it person I'm in the trenches, are you guys have, And so by leveraging thousand eyes on a continuous basis, it gives you that ability to see And then furthermore, you can be begin to use that as you mentioned, in terms of your vitamin type of an analogy, You got handle the baseline as you pointed out, and the upside music experience connectivity, And automation plays a key role of allowing you to be able to then put that through your workflow. you know, data and automation allows you to be able to do what is fundamentally difficult to do from a very narrow you know, you guys got that. And I think what I would say is, you know, We've been following you guys for a long time and a You really have to automate you human labor. I saw an old presentation that you were giving from 2006 And the only time you hear about them as the women, the flag gets thrown. I think, you know, what you're referring to was back in the day, the human network campaign, a company is completely shifting gears over to the, you know, really software defined side. And that is just, you know, quite, quite significant in, a book, a big book, you know, throw some protocols in and probably block a bunch of ports to And if you look at some of the published research going to be untenable under current, you know, just current security practices. And I remember him talking about early days at Google when they were starting to map out kind of, as you described kind of map out their Is IOT and five G. And I think, you know, you talk about 3.7 million devices And what we're seeing is we're seeing, you know, partners and customers employing and then, you know, keep, keep the agility of it and keep the speed of innovation going. And I just wonder if you could share, you know, some of the ways that you're, you're kind of encouraging, And that you think about, and you hit on this when we were, of that mission, continuing to enable the world to communicate, continuing, and I am going to go out and I'm going to achieve the certification myself, because I don't want to continue to And we all know the answer to the question, but you know, you guys have already been dealing with kind of an increased complexity it's the acute crisis is over, you know, this is going to drive a real change uh, you know, things like WebEx for virtual meetings and virtual connectivity, uh, And that, again, the network that's been built over the course of the last few decades has been And again, they're going to save money. the other where I'm generally gonna work from home unless, you know, somebody is in town or having an important meeting or there's some special Um, and you know, we didn't take three days to, But, uh, you know, really grown and, you know, the timing is terrific to get into this more software defined world, art of the possible it's what you can dream up and then go code. Has it been discussed and redefines process? I love that the art of the possible, which is a lot harder to execute in a, in hardware than software And back then, you know, it was, you know, 2001, 2002, And I think we want to be aligned with where we're going it's really nice to have, you know, some historical reference, uh, and it's also nice to be you know, using brain power, that's outside of the four walls of Cisco. Chuck is the business development architect for Talk about, you know, the programs that you guys are putting together and how important it is to have partners to kind and the skills necessary to help me go down this automation journey I'm trying to do, And we all know what the answer is, whatever you can share some information as to what happened then, So we were quickly, uh, you know, migrating customers to, You know, now they're asking, you know, how can I take advantage of the technology to, And then on top of that, having, you know, dev net with, So the last 13 years, this is, you know, the, the change to the normalcy is I And even though you guys are both in the business of, of networking and infrastructure, it's still this recognition now, we're, we're no longer talking about, you know, the assets per se, those early days of SDN, uh we're out, you know, it was, was it a controller or is You know, we cover PagerDuty summit and you know, Jeff said the bandwidth that's necessary in order to support everybody working And as long as there's traceability and a point that Brad made, as far as you being able to go through here doing the automation So I want to get your take on the other side, I think there's still, you know, kind of bumbling down, bumbling down paths, I go back to it being application centric because, you know, things to the cloud or even to other data centers or, you know, in your premise, And the, you know, programmability and API and Presidios, I'm sure the best partner that you have in the whole world that's and you one of the Cisco live events in the dev net zone or the prior dev net create events, There's still a lot of, uh, information sharing and, you know, great to see you. When I'm Sean for the cube, your host for accelerating automation with dev net, And then we find really interesting channels. And also a new segment called street from engineering, where you get to hear from the engineers, Thank you so much for watching and we'll see you at dev net create thanks
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Mandy | PERSON | 0.99+ |
Cisco | ORGANIZATION | 0.99+ |
Susie | PERSON | 0.99+ |
Sylvia | PERSON | 0.99+ |
Alice | PERSON | 0.99+ |
Susie Mandy | PERSON | 0.99+ |
John | PERSON | 0.99+ |
California | LOCATION | 0.99+ |
Dave Vellante | PERSON | 0.99+ |
Eric | PERSON | 0.99+ |
Microsoft | ORGANIZATION | 0.99+ |
Ohio | LOCATION | 0.99+ |
Asia | LOCATION | 0.99+ |
Belgium | LOCATION | 0.99+ |
Europe | LOCATION | 0.99+ |
Joe | PERSON | 0.99+ |
2002 | DATE | 0.99+ |
China | LOCATION | 0.99+ |
Barcelona | LOCATION | 0.99+ |
Dave Volante | PERSON | 0.99+ |
Joe Vaccaro | PERSON | 0.99+ |
Bob | PERSON | 0.99+ |
Jeff Frick | PERSON | 0.99+ |
Todd | PERSON | 0.99+ |
Jeffrey | PERSON | 0.99+ |
2006 | DATE | 0.99+ |
two | QUANTITY | 0.99+ |
Jennifer | PERSON | 0.99+ |
Susie Lee | PERSON | 0.99+ |
January | DATE | 0.99+ |
India | LOCATION | 0.99+ |
March | DATE | 0.99+ |
Jeff | PERSON | 0.99+ |
Wade Lee | PERSON | 0.99+ |
Chuck Robbins | PERSON | 0.99+ |
15% | QUANTITY | 0.99+ |
October | DATE | 0.99+ |
Session 8 California’s Role in Supporting America’s Space & Cybersecurity Future
(radio calls) >> Announcer: From around the globe, its theCUBE covering Space & Cybersecurity Symposium 2020, hosted by Cal poly. Hello, welcome back to theCUBE virtual coverage with Cal Poly for the Space and Cybersecurity Symposium, a day four and the wrap up session, keynote session with the Lieutenant Governor of California, Eleni Kounalakis. She's here to deliver her keynote speech on the topic of California's role in supporting America's Cybersecurity future. Eleni, take it away. >> Thank you, John, for the introduction. I am Lieutenant Governor Eleni Kounalakis. It is an honor to be part of Cal Poly Space and Cybersecurity Symposium. As I speak kind of Pierre with the governor's office of business and economic development is available on the chat, too ready to answer any questions you might have. California and indeed the world are facing significant challenges right now. Every day we are faced with the ongoing COVID-19 pandemic and the economic downturn that is ensued. We have flattened the curve in California and are moving in the right direction but it is clear that we're not out of the woods yet. It is also impossible right now to escape the reality of climate change from the fire sparked by exceptionally rare, dry lightening events to extreme heat waves threatening public health and putting a strain on our electricity grid. We see that climate change is here now. And of course we've been recently confronted with a series of brutal examples of institutionalized racism that have created an awakening among people of all walks of life and compelled us into the streets to march and protest. In the context of all this, we cannot forget that we continue to be faced with other less visible but still very serious challenges. Cybersecurity threats are one of these. We have seen cities, companies and individuals paralyzed by attacks costing time and money and creating an atmosphere of uncertainty and insecurity. Our state agencies, local governments, police departments, utilities, news outlets and private companies from all industries are target. The threats around cybersecurity are serious but not unlike all the challenges we face in California. We have the tools and fortitude to address them. That is why this symposium is so important. Thank you, Cal Poly and all the participants for being here and for the important contributions you bring to this conference. I'd like to also say a few words about California's role in America's future in space. California has been at the forefront of the aerospace industry for more than a century through all the major innovations in aerospace from wooden aircraft, to World War II Bombers, to rockets and Mars rovers. California has played a pivotal role. Today, California is the number one state in total defense spending, defense contract spending and total number of personnel. It is estimated the Aerospace and Defense Industry, provides $168 billion in economic impact to our state. And America's best trained and most experienced aerospace and technology workforce lives here in California. The fact that the aerospace and defense sector, has had a strong history in California is no accident. California has always had strong innovation ecosystem and robust infrastructure that puts many sectors in a position to thrive. Of course, a big part of that infrastructure is a skilled workforce. And at the foundation of a skilled workforce is education. California has the strongest system of public higher education in the world. We're home to 10 university of California campuses, 23 California State university campuses and 116 California Community Colleges. All told nearly 3 million students are enrolled in public higher education. We also have world renowned private universities including the California Institute of Technology and Stanford University numbers one and three in the country for aerospace engineering. California also has four national laboratories and several NASA facilities. California possesses a strong spirit of innovation, risk taking and entrepreneurship. Half of all venture capital funding in the United States, goes to companies here in California. Lastly, but certainly no less critical to our success, California is a diverse state. 27% of all Californians are foreign born, 27% more than one in four of our population of 40 million people are immigrants from another country, Europe central and South America, India, Asia, everywhere. Our rich cultural diversity is our strength and helps drive our economy. As I look to the future of industries like cybersecurity and the growing commercial space industry, I know our state will need to work with those industries to make sure we continue to train our workforce for the demands of an evolving industry. The office of the lieutenant governor has a unique perspective on higher education and workforce development. I'm on the UC Board of Regents, the CSU Board of Trustees. And as of about two weeks ago, the Community Colleges Board of Governors. The office of the lieutenant governor is now the only office that is a member of every governing board, overseeing our public higher education system. Earlier in the symposium, we heard a rich discussion with Undersecretary Stewart Knox from the California Labor and Workforce Development Agency about what the state is doing to meet the needs of space and cybersecurity industries. As he mentioned, there are over 37,000 job vacancies in cybersecurity in our state. We need to address that gap. To do so, I see an important role for public private partnerships. We need input from industry and curriculum development. Some companies like Lockheed Martin, have very productive partnerships with universities and community colleges that train students with skills they need to enter aerospace and cyber industries. That type of collaboration will be key. We also need help from the industry to make sure students know that fields like cybersecurity even exist. People's early career interests are so often shaped by the jobs that members of their family have or what they see in popular culture. With such a young and evolving field like cybersecurity, many students are unaware of the job opportunities. I know for my visits to university campuses that students are hungry for STEM career paths where they see opportunities for good paying jobs. When I spoke with students at UC Merced, many of them were first generation college students who went through community college system before enrolling in a UC and they gravitated to STEM majors. With so many job opportunities available to STEM students, cybersecurity ought to be one that they are aware of and consider. Since this symposium is being hosted by Cal Poly, I wanted to highlight the tremendous work they're doing as leaders in the space and cybersecurity industry. Cal Poly California Cybersecurity Institute, does incredible work bringing together academia, industry and government training the next generation of cyber experts and researching emerging cybersecurity issues. As we heard from the President of Cal Poly, Jeff Armstrong the university is in the perfect location to contribute to a thriving space industry. It's close to Vandenberg Air Force Base and UC Santa Barbara and could be home to the future permanent headquarters of US Space Command. The state is also committed to supporting this space industry in the Central Coast. In July, the State of California, Cal poly US-based force and the others signed a memorandum of understanding to develop a commercial space port at Vandenberg Air Force Base and to develop a master plan to grow the commercial space industry in the region. Governor Newsom has made a commitment to lift up all regions of the state. And this strategy will position the Central Coast to be a global leader in the future of the space industry. I'd like to leave you with a few final thoughts, with everything we're facing. Fires, climate change, pandemic. It is easy to feel overwhelmed but I remain optimistic because I know that the people of the State of California are resilient, persistent, and determined to address our challenges and show a path toward a better future for ourselves and our families. The growth of the space industry and the economic development potential of projects like the Spaceport at Vandenberg Air Force Base, our great example of what we can look forward to. The potential for the commercial space industry to become a $3 trillion industry by mid century, as many experts predict is another. There are so many opportunities, new companies are going to emerge doing things we never could have dreamed of today. As Lieutenant General John Thompson said in the first session, the next few years of space and cyber innovation are not going to be a pony ride at the state fair, they're going to be a rodeo. We should all saddle up. Thank you. >> Okay, thank you very much, Eleni. I really appreciate it. Thank you for your participation and all your support to you and your staff. You guys doing a lot of work, a lot going on in California but cybersecurity and space as it comes together, California's playing a pivotal role in leading the world and the community. Thank you very much for your time. >> Okay, this session is going to continue with Bill Britton. Who's the vice president of technology and CIO at Cal Poly but more importantly, he's the director of the cyber institute located at Cal Poly. It's a global organization looking at the intersection of space and cybersecurity. Bill, let's wrap this up. Eleni had a great talk, talking about the future of cybersecurity in America and its future. The role California is playing, Cal Poly is right in the Central Coast. You're in the epicenter of it. We've had a great lineup here. Thanks for coming on. Let's put a capstone on this event. >> Thank you, John. But most importantly, thanks for being a great partner helping us get this to move forward and really changing the dynamic of this conversation. What an amazing time we're at, we had quite an unusual group but it's really kind of the focus and we've moved a lot of space around ourselves. And we've gone from Lieutenant General Thompson and the discussion of the opposition and space force and what things are going on in the future, the importance of cyber in space. And then we went on and moved on to the operations. And we had a private company who builds, we had the DOD, Department Of Defense and their context and NASA and theirs. And then we talked about public private partnerships from President Armstrong, Mr. Bhangu Mahad from the DOD and Mr. Steve Jacques from the National Security Space Association. It's been an amazing conference for one thing, I've heard repeatedly over and over and over, the reference to digital, the reference to cloud, the reference to the need for cybersecurity to be involved and really how important that is to start earlier than just at the employment level. To really go down into the system, the K through 12 and start there. And what an amazing time to be able to start there because we're returning to space in a larger capacity and it's now all around us. And the lieutenant governor really highlighted for us that California is intimately involved and we have to find a way to get our students involved at that same level. >> I want to ask you about this inflection point that was a big theme of this conference and symposium. It was throughout the interviews and throughout the conversations, both on the chat and also kind of on Twitter as well in the social web. Is that this new generation, it wasn't just space and government DOD, all the normal stuff you see, you saw JPL, the Hewlett Foundation, the Defense Innovation Unit, Amazon Web Services, NASA. Then you saw entrepreneurs come in, who were doing some stuff. And so you had this confluence of community. Of course, Cal Poly had participated in space. You guys does some great job, but it's not just the physical face-to-face show up, gets to hear some academic papers. This was a virtual event. We had over 300 organizations attend, different organizations around the world. Being a virtual event you had more range to get more people. This isn't digital. This symposium isn't about Central California anymore. It's global. >> No, it really has gone. >> What really happened to that? >> It's really kind of interesting because at first all of this was word of mouth for this symposium to take place. And it just started growing and growing and the more that we talk to organizations for support, the more we found how interconnected they were on an international scale. So much so that we've decided to take our cyber competition next year and take it globally as well. So if in fact as Major General Shaw said, this is about a multinational support force. Maybe it's time our students started interacting on that level to start with and not have to grow into it as they get older, but do it now and around space and around cybersecurity and around that digital environment and really kind of reduce the digital dividing space. >> Yeah, General Thompson mentioned this, 80 countries with programs. This is like the Olympics for space and we want to have these competitions. So I got great vision and I love that vision, but I know you have the number... Not number, the scores and from the competition this year that happened earlier in the week. Could you share the results of that challenge? >> Yeah, absolutely. We had 83 teams participate this year in the California Cyber Innovation Challenge. And again, it was based around a spacecraft scenario where a spacecraft, a commercial spacecraft was hacked and returned to earth. And the students had to do the forensics on the payload. And then they had to do downstream network analysis, using things like Wireshark and autopsy and other systems. It was a really tough competition. The students had to work hard and we had middle school and high school students participate. We had an intermediate league, new schools who had never done it before or even some who didn't even have STEM programs but were just signing up to really get involved in the experience. And we had our ultimate division which was those who had competed in several times before. And the winner of that competition was North Hollywood. They've been the winning team for four years in a row. Now it's a phenomenal program, they have their hats off to them for competing and winning again. Now what's really cool is not only did they have to show their technical prowess in the game but they also have to then brief and out-brief what they've learned to a panel of judges. And these are not pushovers. These are experts in the field of cybersecurity in space. We even had a couple of goons participating from DefCon and the teams present their findings. So not only are we talking technical, we're talking about presentation skills. The ability to speak and understand. And let me tell you, after reading all of their texts to each other over the weekend adds a whole new language they're using to interact with each other. It's amazing. And they are so more advanced and ready to understand space problems and virtual problems than we are. We have to challenge them even more. >> Well, it sounds like North Hollywood got the franchise. It's likethe Patriots, the Lakers, they've got a dynasty developing down there in North Hollywood. >> Well, what happens when there's a dynasty you have to look for other talent. So next year we're going global and we're going to have multiple states involved in the challenge and we're going to go international. So if North Hollywood pulls it off again next year, it's going to be because they've met the best in the world than defeated >> Okay, the gauntlet has been thrown down, got to take down North Hollywood from winning again next year. We'll be following that. Bill, great to get those results on the cyber challenge we'll keep track and we'll put a plug for it on our site. So we got to get some press on that. My question to you is now as we're going digital, other theme was that they want to hire digital natives into the space force. Okay, the DOD is looking at new skills. This was a big theme throughout the conference not just the commercial partnerships with government which I believe they had kind of put more research and personally, that's my personal opinion. They should be putting in way more research into academic and these environments to get more creative. But the skill sets was a big theme. What's your thoughts on how you saw some of the highlight moments there around skill sets? >> John, it's really interesting 'cause what we've noticed is in the past, everybody thinks skill sets for the engineering students. And it's way beyond that. It's all the students, it's all of them understanding what we call cyber cognizance. Understanding how cybersecurity works whatever career field they choose to be in. Space, there is no facet of supporting space that doesn't need that cyber cognizance. If you're in the back room doing the operations, you're doing the billing, you're doing the contracting. Those are still avenues by which cybersecurity attacks can be successful and disrupt your space mission. The fact that it's international, the connectivities, all of those things means that everyone in that system digitally has to be aware of what's going on around them. That's a whole new thought process. It's a whole new way of addressing a problem and dealing with space. And again it's virtual to everyone. >> That's awesome. Bill, great to have you on. Thank you for including theCUBE virtual, our CUBE event software platform that we're rolling out. We've been using it for the event and thank you for your partnership in this co-creation opening up your community, your symposium to the world, and we're so glad to be part of it. I want to thank you and Dustin and the team and the President of Cal Poly for including us. Thank you very much. >> Thank you, John. It's been an amazing partnership. We look forward to it in the future. >> Okay, that's it. That concludes the Space and Cybersecurity Symposium 2020. I'm John Furrier with theCUBE, your host with Cal Poly, who put on an amazing virtual presentation, brought all the guests together. And again, shout out to Bill Britton and Dustin DeBrum who did a great job as well as the President of Cal poly who endorsed and let them do it all. Great event. See you soon. (flash light sound)
SUMMARY :
and the wrap up session, keynote session and for the important and the community. of the cyber institute the reference to the need for but it's not just the and the more that we talk to This is like the Olympics for space And the students had to do It's likethe Patriots, the Lakers, in the challenge and we're of the highlight moments for the engineering students. and the President of Cal We look forward to it in the future. as the President of Cal poly
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Amazon Web Services | ORGANIZATION | 0.99+ |
John | PERSON | 0.99+ |
DOD | ORGANIZATION | 0.99+ |
NASA | ORGANIZATION | 0.99+ |
Eleni | PERSON | 0.99+ |
Dustin | PERSON | 0.99+ |
Jeff Armstrong | PERSON | 0.99+ |
National Security Space Association | ORGANIZATION | 0.99+ |
Bill Britton | PERSON | 0.99+ |
California | LOCATION | 0.99+ |
Dustin DeBrum | PERSON | 0.99+ |
California Institute of Technology | ORGANIZATION | 0.99+ |
John Furrier | PERSON | 0.99+ |
California Labor and Workforce Development Agency | ORGANIZATION | 0.99+ |
Defense Innovation Unit | ORGANIZATION | 0.99+ |
Lockheed Martin | ORGANIZATION | 0.99+ |
America | LOCATION | 0.99+ |
UC Board of Regents | ORGANIZATION | 0.99+ |
Steve Jacques | PERSON | 0.99+ |
Bill Britton | PERSON | 0.99+ |
United States | LOCATION | 0.99+ |
July | DATE | 0.99+ |
Cal poly | ORGANIZATION | 0.99+ |
Cal Poly | ORGANIZATION | 0.99+ |
Hewlett Foundation | ORGANIZATION | 0.99+ |
$3 trillion | QUANTITY | 0.99+ |
Department Of Defense | ORGANIZATION | 0.99+ |
Asia | LOCATION | 0.99+ |
$168 billion | QUANTITY | 0.99+ |
Bhangu Mahad | PERSON | 0.99+ |
next year | DATE | 0.99+ |
India | LOCATION | 0.99+ |
Cal Poly California Cybersecurity Institute | ORGANIZATION | 0.99+ |
CSU Board of Trustees | ORGANIZATION | 0.99+ |
Bill | PERSON | 0.99+ |
President | PERSON | 0.99+ |
four years | QUANTITY | 0.99+ |
Olympics | EVENT | 0.99+ |
23 | QUANTITY | 0.99+ |
Central Coast | LOCATION | 0.99+ |
JPL | ORGANIZATION | 0.99+ |
Stanford University | ORGANIZATION | 0.99+ |
Pierre | PERSON | 0.99+ |
three | QUANTITY | 0.99+ |
116 | QUANTITY | 0.99+ |
earth | LOCATION | 0.99+ |
27% | QUANTITY | 0.99+ |
South America | LOCATION | 0.99+ |
Vandenberg Air Force Base | LOCATION | 0.99+ |
Community Colleges Board of Governors | ORGANIZATION | 0.99+ |
first session | QUANTITY | 0.99+ |
40 million people | QUANTITY | 0.99+ |
mid century | DATE | 0.99+ |
Lakers | ORGANIZATION | 0.99+ |
California Cyber Innovation Challenge | EVENT | 0.99+ |
Undersecretary | PERSON | 0.99+ |
UC Merced | ORGANIZATION | 0.99+ |
Governor | PERSON | 0.99+ |
Central California | LOCATION | 0.99+ |
Vandenberg Air Force Base | LOCATION | 0.99+ |
North Hollywood | ORGANIZATION | 0.99+ |
this year | DATE | 0.99+ |
US Space Command | ORGANIZATION | 0.99+ |
four national laboratories | QUANTITY | 0.98+ |
10 university | QUANTITY | 0.98+ |
over 300 organizations | QUANTITY | 0.98+ |
80 countries | QUANTITY | 0.98+ |
3 teams | QUANTITY | 0.98+ |
Eleni Kounalakis | PERSON | 0.98+ |
ACCELERATING AUTOMATION WITH DEVNET full
>>Hello everyone. This is Dave Volante, and I want to welcome you to the cubes presentation of accelerating automation with Devon it in this special program, we're going to explore how to accelerate digital transformation and how the global pandemic is changing the way we work and the kinds of work that we do, the cube has pulled together experts from Cisco dev net. Now dev net is essentially Cisco as code. I've said many times in the cube that in my opinion, it's the most impressive initiative coming out of any established enterprise infrastructure company. What Cisco has done brilliantly with dev net is to create an API economy by leveraging its large infrastructure portfolio and its ecosystem. But the linchpin of dev net is the army of trained Cisco engineers, including those with the elite CC I E designation. Now dev net was conceived to train people on how to code infrastructure and develop applications in integrations. >>It's a platform to create new value and automation is a key to that creativity. So today you're going to hear from a number of experts. For example, TK key Anini is a distinguished engineer and a security pro. He's going to join us, his colleagues, Thomas Scheiber and Joe Vaccaro. They're going to help us understand how to apply automation to your data center networks, cloud, and security journeys. Cisco's Eric nip and Coon Jacobs will also be here with a look into Cisco's marketplace shifts. We'll also hear from dev net partners. Now let's kick things off with the architect of dev net, senior vice president and general manager of Cisco's dev net and CX ecosystem success. Susie, we roam around the globe. It's the cube presenting >>Decelerating automation with damnit >>Brought to you by Cisco. >>Hello and welcome to the cube. I'm Sean for a year host. We've got a great conversation, a virtual event, accelerating automation with dev net, Cisco dev net. And of course we got the Cisco brain trust here, our cube alumni, Susie wee vice president, senior vice president GM, and also CTO of Cisco dev net and ecosystem success CX, all that great stuff. Any Wade Lee, who's the director, a senior director of dev net certifications, Eric field, director of developer advocacy, Susie Mandy, Eric. Great to see you. Thanks for coming on. Great to see you, John. So we're not in first, then we don't, can't be at the dev net zone. We can't be on site doing dev net, create all the great stuff we've been doing over the past few years. We're virtual the cube virtual. Thanks for coming on. Uh, Susie, I got to ask you because you know, we've been talking years ago when you started this mission and just the success you had has been awesome, but dev net create has brought on a whole nother connective tissue to the dev net community. This is what this ties into the theme, accelerating automation with dev net, because you said to me, I think four years ago, everything should be a service or X, a AAS as it's called and automation plays a critical role. Um, could you please share your vision because this is really important and still only five to 10% of the enterprises have containerized things. So there's a huge growth curve coming with developing and programmability. What's your, what's your vision? >>Yeah, absolutely. I mean, what we know is that as more and more businesses are coming online as well, I mean, they're all online, but as they're growing into the cloud is they're growing in new areas. As we're dealing with security is everyone's dealing with the pandemic. There's so many things going on, but what happens is there's an infrastructure that all of this is built on and that infrastructure has networking. It has security, it has all of your compute and everything that's in there. And what matters is how can you take a business application and tie it to that infrastructure? How can you take, you know, customer data? How can you take business applications? How can you connect up the world securely and then be able to, you know, really satisfy everything that businesses need. And in order to do that, you know, the whole new tool that we've always talked about is that the network is programmable. The infrastructure is programmable and you don't need just apps writing on top, but now they get to use all of that power of the infrastructure to perform even better. And in order to get there, what you need to do is automate everything. You can't configure networks manually. You can't be manually figuring out policies, but you want to use that agile infrastructure in which you can really use automation. You can rise to higher level business processes and tie all of that up and down the staff by leveraging automation. >>You know, I remember a few years ago when dev net created for started, I interviewed Todd Nightingale and we were talking about Meraki, you know, not to get in the weeds, but you know, switches and hubs and wireless. But if you look at what we were talking about, then this is kind of what's going on now. And we were just recently, I think our last physical event was a Cisco, um, uh, Europe in Barcelona before all the covert hit. And you had this massive cloud surgeon scale happening going on, right when the pandemic hit. And even now more than ever the cloud scale, the modern apps, the momentum hasn't stopped because there's more pressure now to continue addressing more innovation at scale because the pressure to do that, um, cause the business to stay alive and to get your thoughts on, um, what's going on in your world because you were there in person now we're six months in scale is huge. >>We are. Yeah, absolutely. And what happened is as all of our customers, as businesses around the world, as we ourselves all dealt with, how do we run a business from home? You know, how do we keep people safe? How do we keep people at home and how do we work? And then it turns out, you know, business keeps rolling, but we've had to automate even more because you have to go home and then figure out how from home, can I make sure that my it infrastructure is automated out from home? Can I make sure that every employee is out there working safely and securely, you know, things like call center workers, which had to go into physical locations and be in kind of, you know, just, you know, uh, blocked off rooms to really be secure with their company's information. They had to work from home. >>So we had to extend business applications to people's homes, uh, in countries like, you know, well around the world, but also in India where it was actually not, you know, not, they wouldn't let, they didn't have rules to let people work from home in these areas. So then what we had to do was automate everything and make sure that we could administer, you know, all of our customers could administer these systems from home. So that put extra stress on automation. It put extra stress on our customer's digital transformation and it just forced them to, you know, automate digitally, transform quicker. And they had to, because you couldn't just go into a server room and tweak your servers, you had to figure out how to automate all of that. And we're still all in that environment today. >>You know, one of the hottest trends before the pandemic was observability, uh, Coobernetti's serve, uh, microservices. So those things, again, all dev ops and you know, you guys got some acquisitions youth about thousand eyes. Um, um, you got a new one you just bought, um, recently port shift to raise the game and security, Kubernetes, all these microservices. So observability super hot, but then people go work at home. As you mentioned, how do you observe, what are you observing? The network is under a huge pressure. I mean, it's crashing on people's zooms and WebExes and, uh, education, huge amount of network pressure. How are people adapting to this and the app side? How are you guys looking at the what's being programmed? What are some of the things that you're seeing with use cases around this program? Ability, challenge and observability challenges. It's a huge deal. >>Yeah, absolutely. And, um, you know, going back to Todd Nightingale, right. You know, back when we talked to Todd before he had Meraki and he had designed this simplicity, this ease of use this cloud managed, you know, doing everything from one central place. And now he has Cisco's entire enterprise and cloud business. So he is now applying that at that bigger, at that bigger scale for Cisco and for our customers. And he is building in the observability and the dashboards and the automation of the API APIs into all of it. Um, but when we take a look at what our customers needed is again, they had to build it all in. Um, they had to build it. And what happened was how your network was doing, how secure your infrastructure was, how well you could enable people to work from home and how well you could reach customers. >>All of that used to be an it conversation. It became a CEO and a board level conversation. So all of a sudden CEOs were actually, you know, calling on the heads of it and the CIO and saying, you know, how's our VPN connectivity is everybody working from home, how many people are connected and able to work and what's their productivity. So all of a sudden, all these things that were really infrastructure, it stuff became a board level conversation. And, you know, once again, at first everybody was panicked and just figuring out how to get people. But now what we've seen in all of our customers is that they are now building in automation and digital transformation and these architectures, and that gives them a chance to build in that observability, you know, looking for those events, the dashboards, you know, so it really has, has been fantastic to see what our customers are doing and what our partners are doing to really rise to that next level. >>I know you got to go, but real quick, um, describe what accelerating automation with dev net means. >>Well, you've been following, you know, we've been working together on dev net and the vision of the infrastructure programmability and everything for quite some time. And the thing that's really happened is yes, you need to automate, but yes, it takes people to do that and you need the right skill sets and the programmability. So a networker can't be a networker. A networker has to be a network automation developer. And so it is about people and it is about bringing infrastructure expertise together with software expertise and letting people run things are definite community has risen to this challenge. Um, people have jumped in, they've gotten their certifications. We have thousands of people getting certified. Uh, you know, we have, you know, Cisco getting certified. We have individuals, we have partners, you know, they're just really rising to the occasion. So accelerate, accelerating automation while it is about going digital. It's also about people rising to the level of, you know, being able to put infrastructure and software expertise together to enable this next chapter of business applications of, you know, cloud directed businesses and cloud growth. So it actually is about people just as much as it is about automation and technology. >>And we got dev net created right around the corner of virtual unfortunate. Won't be in person, but we'll be virtual. Susie. Thank you for your time. We're going to dig into those people, challenges with Mandy and Eric. Thank you for coming on. I know you got to go, but stay with us. We're going to dig in with Mandy and Eric. Thanks. >>Thank you so much. Have fun. Thanks John. >>Okay. Mandy, you heard Susie is about people. And one of the things that's close to your heart you've been driving is a senior director of dev net certifications, um, is getting people leveled up. I mean the demand for skills, cybersecurity network, programmability automation, network design solution architect, cloud multi-cloud design. These are new skills that are needed. Can you give us the update on what you're doing to help people get into the acceleration of automation game? >>Oh yes, absolutely. The, you know, what we've been seeing is a lot of those business drivers that Susie was mentioning, those are, what's accelerating a lot of the technology changes and that's creating new job roles or new needs on existing job roles where they need new skills. We are seeing customers, partners, people in our community really starting to look at, you know, things like DevSecOps engineer, network, automation, engineer, network automation, which Susie >>Mentioned, and looking at how these fit into their organization, the problems that they solve in their organization. And then how do people build the skills to be able to take on these new job roles or add that job role to their current scope and broaden out and take on new challenges. >>Eric, I want to go to you for a quick second on this, um, um, piece of getting the certifications. Um, first, before you get started, describe what your role is as director of developer advocacy, because that's always changing and evolving. What's the state of it now because with COVID people are working at home, they have more time to contact, switch and get some certifications and that they can code more. What's your, what's your role? >>Absolutely. So it's interesting. It definitely is changing a lot. A lot of our historically a lot of focus for my team has been on those outward events. So going to the Devin that creates the Cisco lives and helping the community connect and to help share tech mountain technical information with them, um, doing hands on workshops and really getting people into how do you really start solving these problems? Um, so that's had to pivot quite a bit. Um, obviously Cisco live us. We committed very quickly to a virtual event when, when conditions changed and we're able to actually connect as we found out with a much larger audience. So, you know, as opposed to in person where you're bound by the parameters of, you know, how big the convention center is, uh, we were actually able to reach a worldwide audience with our, uh, our definite date that was kind of attached on to Cisco live. >>And we got great feedback from the audience that now we're actually able to get that same enablement out to so many more people that otherwise might not have been able to make it. Um, but to your broader question of, you know, what my team does. So that's one piece of it is getting that information out to the community. So as part of that, there's a lot of other things we do as well. We were always helping out build new sandboxes and your learning labs, things like that, that they can come and get whenever they're looking for it out on the dev net site. And then my team also looks after community, such as the Cisco learning network where this there's a huge community that has historically been there to support people working on their Cisco certifications. And we've seen a huge shift now in that group that all of the people that have been there for years are now looking at the domain certifications and helping other people that are trying to get on board with programmability. They're taking a lot of those same community enablement skills and propping up the community with, you know, helping you answer questions, helping provide content. They've moved now into the dev net space as well, and are helping people with that servicer. So it's great seeing the community come along and really see that >>I got to ask you on the trends around automation, what skills and what developer patterns are you seeing with automation? Are, is there anything in particular, obviously network automation has been around for a long time. Cisco has been leader in that, but as you move up, the stack as modern applications are building, do you see any patterns or trends around what is accelerating automation? What are people learning? Yeah, absolutely. >>So you mentioned, uh, observability was big before COVID and we actually really saw that amplified during COVID. So a lot of people have come to us looking for insights. How can I get that better observability, uh, now that we needed? Well, we're virtual. Um, so that's actually been a huge uptake and we've seen a lot of people that weren't necessarily out looking for things before that are now figuring out how can I do this at scale? And I think one good example that, uh, Susie was talking about the VPN example, and we actually had a number of SES in the Cisco community that had customers dealing with that very thing where they very quickly had to ramp up. And one in particular actually wrote a bunch of automation to go out and measure all of the different parameters that it departments might care about, about their firewalls, things that you do normally look at me all days, you would size your firewalls based on, you know, assuming a certain number of people working from home. >>And when that number went to a hundred percent things like licensing started coming into play, where they needed to make sure they had the right capacity in their platforms that they weren't necessarily designed for. So one of the STDs actually wrote a bunch of code to go out, use some open source tooling, to monitor and alert on these things and then published it. So the whole community could go out and get a copy of it, try it out their own environment. And we saw a lot of interest around that and trying to figure out, okay, now I can take that and I can adapt it to what I need to see for my observability. >>That's great. Mandy. I want to get your thoughts on this too, because as automation continues to scale, it's going to be a focus and people are at home and you guys had a lot of content online for you recorded every session that didn't the dev Ned zone learnings going on, sometimes linearly. And nonlinearly you got the certifications, which is great. That's key, key, great success there. People are interested, but what are the learnings? Are you seeing? What are people doing? What's the top top trends. >>Yeah. So what we're seeing is like you said, people are at home, they've got time. They want to advance their skillset. And just like any kind of learning people want choice because they want to be able to choose what's matches their time that's available and their learning style. So we're seeing some people who want to dive into full online study groups with mentors, leading them through a study plan. And we have two new, uh, expert led study groups like that. We're also seeing whole teams at different companies who want to do, uh, an immersive learning experience together, uh, with projects and office hours and things like that. And we have a new, um, offer that we've been putting together for people who want those kinds of team experiences called automation boot camp. And then we're also seeing individuals who want to be able to, you know, dive into a topic, do a hands on lab, get some skills, go to the rest of the day of do their work and then come back the next day. >>And so we have really modular self-driven hands on learning through the dev net fundamentals course, which is available through dev net. And then there's also people who are saying, I just want to use the technology. I like to experiment and then go, you know, read the instructions, read the manual, do the deeper learning. And so they're, they're spending a lot of time in our dev net sandbox, trying out different technologies, Cisco technologies with open source technologies, getting hands on and building things. And three areas where we're seeing a lot of interest in specific technologies. One is around SD wan. There's a huge interest in people skilling up there because of all the reasons that we've been talking about security is a focus area where people are dealing with new scale, new kinds of threats, having to deal with them in new ways and then automating their data center, using infrastructure as code type principles. So those are three areas where we're seeing a lot of interest and you'll be hearing some more about that at dev net create >>Awesome. Eric and Mandy, if you guys can wrap up, um, this accelerated automation with dev net package and a virtual event here, um, and also tee up dev net create because dev net create has been a very kind of grassroots, organically building momentum over the years. Again, it's super important cause it's now the app world coming together with networking, you know, end to end programmability and with everything as a service that you guys are doing everything with API APIs, um, only can imagine the enablement that's gonna name, uh, create, can you share the summary real quick on accelerating automation with, at and T up dev net create Mandy we'll start. Yeah. >>Yes. I'll go first. And then Eric can close this out. Um, so just like we've been talking about with you at every definite event over the past years, you know, that's bringing APIs across our whole portfolio and up and down the stack and accelerating, uh, automation with dev net. Susie mentioned the people aspect of that. The people skilling up and how that transformed teams, transforms teams. And I think that it's all connected in how businesses are being pushed on their transformation because of current events. That's also a great opportunity for people to advance their careers and take advantage of some of that quickly changing landscape. And so what I think about accelerating automation with dev net, it's about the dev community. It's about people getting those new skills and all the creativity and problem solving that will be unleashed by that community. With those new skills. >>Eric take us home. He accelerating automation, dev net and dev net create a lot of developer action going on in cloud native right now, your thoughts? >>Absolutely. I think it's exciting. I mentioned the transition to virtual for Devin that day, this year for Cisco live. And we're seeing, we're able to leverage it even further with creative this year. So, whereas it used to be, you know, confined by the walls that we were within for the event. Now we're actually able to do things like we're adding the start now track for people that want to be there. They want to be a developer, a network automation developer, for instance, we've now got attract just for them where they can get started and start learning. Some of the skills they'll need, even if some of the other technical sessions were a little bit deeper than what they were ready for. Um, so I love that we're able to bring that together with the experienced community that we usually do from across the industry, bringing us all kinds of innovative talks, talking about ways that they're leveraging technology, leveraging the cloud, to do new and interesting things to solve their business challenges. >>So I'm really excited to bring that whole mix together, as well as getting some of our business units together too, and talk straight from their engineering departments. What are they doing? What are they seeing? What are they thinking about when they're building new APIs into their platforms? What are the, what problems are they hoping that customers will be able to solve with them? So I think together seeing all of that and then bringing the community together from all of our usual channels. So like I said, Cisco learning network, we've got a ton of community coming together, sharing their ideas and helping each other grow those skills. I see nothing but acceleration ahead of us for automation. >>Awesome. Thanks so much, God, man, you can add, add one more thing. >>I'm just going to say the other really exciting thing about create this year with the virtual nature of it is it it's happening in three regions and um, you know, we're so excited to see the people joining from all the different regions and uh, content and speakers and the region stepping up to have things personalized to their area, to their community. And so that's a whole new experience for them that create that's going to be fantastic this year. Yeah. >>I was just gonna close out and just put the final bow on that by saying that you guys have always been successful with great content focused on the people in the community. I think now during what this virtual dev net virtual dev net create virtual, the cube virtual, I think we're learning new things. People working in teams and groups and sharing content, we're going to learn new things. We're going to try new things and ultimately people will rise up and we'll be resilient. I think when you have this kind of opportunity, it's really fun. And we'll, we'll, we'll ride the wave with you guys. So thank you so much for taking the time to come on the cube and talk about your awesome accelerating automation and dev net. Great. Looking forward to it. Thank you. >>Yeah. >>The cube virtual here in Palo Alto studios doing the remote content amendment say virtual until we're face to face. Thank you so much for watching and we'll see you at dev net create thanks for watching Jeffrey here with the cube. Uh, we have our ongoing coverage of the Cisco dev net event. It's really accelerating with automation and programmability in the new normal, and we know the new normal is definitely continuing to go. We've been doing this since the middle of March and now we're in October. So we're excited to have our next guest he's Thomas Sheba. He is the vice president of product management for data center for Cisco Thomas. Great to see you. >>Hey, good to see you too. Yeah. Yeah. Everybody can see on our background. >>Exactly, exactly. So, I mean, I'm curious, we've talked to a lot of people. We talked to a lot of leaders, you know, especially like back in March and April with this light moment, which was, >>You know, no time to prep and suddenly everybody has to work from home. Teachers got to teach from home. And so you've got the kids home, you've got the spouse home, everybody's home trying to get on the network and do their zoom calls and their classes. I'm curious from your perspective, you guys are right there on the, on the network you're right in the infrastructure. What did you hear and see kind of from your customers when suddenly, you know, March 16th hit and everybody had to go home? >>Well, good point, Hey, I do think we all appreciate the network much more than we used to do before. Uh, and then the only other difference is I'm really more on WebEx calls to zoom calls, but you know, otherwise, uh, yes. Um, what, what I do see actually is that as I said, network becomes much more obvious as a critical piece. And so before we really talked a lot about, uh, agility and flexibility these days, we talk much more about resiliency quite frankly. Uh, and what do I need to have in place with respect to network to get my things from left to right. And you know, it was 2000, he still West, as we say on the data center. Uh, and that just is for most of my customers, a very, very important topic at this point. Right. >>You know, it's, it's amazing to think, you know, had this happened, you know, five years ago, 10 years ago, you know, the ability for so many people in, in, in the information industry to be able to actually make that transition relatively seamlessly, uh, is, is actually pretty amazing. I'm sure there was some, some excitement and some kudos in terms of, you know, it, it is all based on the network and it is kind of this quiet thing in the background that nobody pays attention to. It's like a ref in the football game until they make a bad play. So, you know, it is pretty fascinating that you and your colleagues have put this infrastructure and that enabled us to really make that move with, with, with really no prep, no planning and actually have a whole lot of services delivered into our homes that we're used to getting at the office are used to getting at school. >>Yeah. And I mean, to your point, I mean, some of us did some planning. Can we clearly talking about some of these, these trends in the way I look at this trends as being distributed data centers and, um, having the ability to move your, your workloads and access for users to wherever you want to be. And so I think that clearly went on for a while. And so in a sense, we, we, we prep was, are normal, but we're prepping for it. Um, but as I said, resiliency just became so much more important than, you know, one of the things I actually do a little plot, a little, little, uh, Bret before a block I put out end of August around resiliency. Uh, you, you, if you didn't, if you didn't put this in place, you better put it in place. Because I think as we all know, we saw her March. This is like maybe two or three months, we're now in October. Um, and I sing, this is the new normal for some time being. >>Yeah, I think so. So let's stick on that theme in terms of trends, right? The other great trend as public cloud, um, and cloud and multi cloud, there's all types of variants on that theme you had in that blog post about, uh, resiliency in data center, cloud networking, data center cloud, you know, some people think, wait, it's, it's kind of an either, or I either got my data center or I've got my stuff in the cloud and I've got public cloud. And then as I said, hybrid cloud, you're talking really specifically about enabling, um, both inner inner data center resiliency within multi data centers within the same enterprise, as well as connecting to the cloud. That's probably counterintuitive for some people to think that that's something that Cisco is excited about and supporting. So I wonder if you can share, you know, kind of how the market is changing, how you guys are reacting and really putting the things in place to deliver customer choice. >>Yeah, no, it's actually, to me it's really not a counterintuitive because in the end was what, uh, I'm focusing on. And the company is focusing on is what our customers want to do and need to do. Uh, and that's really, um, would, you know, most people call hybrid cloud or multi-cloud, uh, in, in the end, what it is, what it is, is really the ability to have the flexibility to move your workloads where you want them to be. And there are different reasons why you want to place them, right? You might've placed them for security reasons. You might've played some clients reasons, depending on which customer segment you after, if you're in the United States or in Europe or in Asia, there are a lot of different reasons where you're going to put your things. And so I think in the end, what, uh, an enterprise looks for is that agility, flexibility, and resiliency. >>And so really what you want to put in place is what we call like the cloud on ramp, right? You need to have an ability to move sings as needed, but the logic context section, which we see in the, um, last couple of months, accelerating is really this whole seam around digital transformation, uh, which goes hand in hand then was, uh, the requirement on the at T side really do. And I T operations transformation, right. How it operates. Uh, and I think that's really exciting to see, and this is excellent. Well, a lot of my discussions, I was customers, uh, what does it actually mean with respect to the it organization and what are the operational changes? This a lot of our customers are going through quite frankly, accelerated right. Going through, >>Right. And, and automation is in the title of the event. So automation is, you know, is an increasingly important thing, you know, as the, as we know, and we hear all the time, you know, the flows of data, the complexity of the data, either on the security or the way the network's moving, or as you said, shifting workloads around, based on the dynamic situations, whether that's business security, et cetera, in a software defined networking has been around for a while. How are you seeing kind of this evolution in adding more automation, you know, to more and more processes to free up those, those, um, no kind of limited resources in terms of really skilled people to focus on the things that they should be focusing and not stuff that, that hopefully you can, you know, get a machine to run with some level of automation. Yeah. >>Yeah. That's a good point. And it said the tech line, I have, you know, sometimes when my mind is really going from a cloud ready, which has in most of the infrastructure is today to cloud native. And so let me a little expand on those, right? There's like the cloud ready is basically what we have put in place over the last five to six years, all the infrastructure that all our customers have, network infrastructure, all the nexus 9,000, they're all cloud ready. Right. And what this really means, do you have API APIs everywhere, right? Whether this is on the box, whether it's on the controller, whether this is on the operations tools, all of these are API enabled and that's just a foundation for automation, right? You have to have that. Now, the next step really is what do you do with that capability? Right? >>And this is the integration with a lot of automation tools. Uh, and that's a whole range, right? This is where the it operation transformation kicks in different customers at different speed, right? Some just, you know, I use these API APIs and use normal tools that they have in a network world just to pull information. Some customers go for it further and saying, I want to integrate this with like some CMDB tools. Some go even further and saying, this is like the cloud native pieces saying, Oh, I want to use, let's say red hat Ansible. I want to use, uh, how she called Terraform and use those things to actually drive how I manage my infrastructure. And so that's really the combination of the automation capability. Plus the integration was relevant cloud native enabling tools that really is happening at this point. We're seeing customers accelerating that, that motion, which really then drives us how they run their it operations. Right. And so that's a pretty exciting, exciting area to see, uh, giving us, I said, we have the infrastructure in place. There's no need for customers to actually do change something. Most of them have already the infrastructures that can do this is just no doing the operational change. The process changes to actually get there. >>Right. And it's funny, we, we recently covered, you know, PagerDuty and, and they highlight what you just talked about, the cloud native, which is, you know, all of these applications now are so interdependent on all these different API APIs, you know, pulling data from all these applications. So a, when they work great, it's terrific. But if there's a problem, you know, there's a whole lot of potential throats to choke out there and find, find those issues. And it's all being connected via the network. So, you know, it's even more critically important, not only for the application, but for all these little tiny components within the application to deliver, you know, ultimately a customer experience within a very small units of time, uh, so that you don't lose that customer or you, you complete that transaction. They, they check out of their shopping cart. You know, all these, these things that are now created with cloud native applications that just couldn't really do before. >>No, you're absolutely right. And that's, this is like, just to say, sit, I'm actually very excited because it opens up a lot of abilities for our customers, how they to actually structure the operation. Right. One of the nice things around this or automation plus a tool integration to an integration is you actually opened us up, not a sole automation train, not just to the network operations personnel. Right. You also open it up and can use this for the SecOps person or for the dev ops person or for the cloud ops engineering team. Right. Because the way it's structured, the way we built this, um, it's literally as an API interface and you can now decide, what is your process do you want to have? And what traditional process you have a request network, operation teams executes the request using these tools and then hand it back over. >>Or do you say, Hey, maybe some of these security things I gotta hand over the sec ups team and they can directly call, uh, these, these API is right, or even one step further. You can have the opportunity that the dev ops or the application team actually says, Hey, I got to write a whole infrastructure as code kind of a script or template, and I just execute. Right. And it's really just using what the infrastructure provides. And so that whole range of different user roles and our customer base, what they can do with the automation capability that's available. It's just very, very exciting way because it's literally unleashes a lot of flexibility, how they want to structure and how they want to rebuild the it operations processes. >>Interesting. You know, cause the, you know, the DevOps culture has taken over a lot, right. Obviously changed software programming for the last 20 years. And, and I think, you know, there's a, there's a lot of just kind of the concept of dev ops versus necessarily, you know, the actual things that you do to execute that technique. And I don't think most people would think of, you know, network ops or, you know, net ops, you know, whatever the equivalent is in the networking world to have, you know, kind of a fast changing dynamic, uh, kind of point of view versus a, you know, stick it in, you know, spec it, stick it in, lock it down. So I wonder if you can, you can share how, you know, kind of that dev ops, um, attitude point of view, workflow, whatever the right verb is, has impacted, you know, things at Cisco and the way you guys think about networking and flexibility within the networking world. >>Yeah, literally, absolutely. And again, it's all customer driven, right? There's none of those, none of this is really actually, you know, a little bit of credit, maybe some of us where we have a vision, but a lot of it's just customer driven feedback. Uh, and yeah, we, we do have network operations teams comes from saying, Hey, we use Ansible heavily on the compute side, we might use this for alpha seven. We want to use the same for networking. And so we made available all these integrations, uh, with sobriety as a state, whether these are the switches, whether these are ACI dcnm controller or our multi-site orchestration capabilities, all of these has Ansible integration the way to the right, the other one, as I mentioned, that how she from Turco Terraform, we have integrations available and they see the requests for these tools to use that. >>Uh, and so that is the emotion we're in for all the, you know, and, uh, another block actually does out there, we just posted saying all set what you can do and then a Palo to this, right. Just making the integration available. We also have a very, very heavy focus on definite and enablement and training, uh, and you know, a little clock. And I know, uh, probably, uh, part of the segment, the whole definite community that Cisco has is very, very vibrant. Uh, and the beauty of this is right. If you look at those, whether you're a net ops person or a dev ops person or a SecOps person, it doesn't really matter. It has a lot of like capability available to just help you get going or go from one level to the next level. Right? And there's simple things like sandbox environments where you can, we know what's out stress, try sinks out snippets of code are there, you can do all of these things. And so we do see it's a kind of a push and pull a tremendous amount of interest and a tremendous, uh, uh, time people spend to learn quite frankly, then that's another site product of, of, you know, the situation where, and people said, Oh man, and say, okay, online learning is the thing. So these, these, these tools are used very, very heavily, right? >>That's awesome. Cause you know, we've, we've had Susie Lee on a number of times and I know he and Mandy and the team really built this dev net thing. And it really follows along this other theme that we see consistently across other pieces of tech, which is democratization, right democratization of the access tool, taking it out of, of just a mahogany row with, again, a really limited number of people that know how to make it work and it can make the changes and then opening it up to a software defined world where now that the, you know, the it's as application centric, point of view, where the people that are building the apps to go create competitive advantage. Now don't have to wait for, you know, the one network person to help them out in and out of these environments. Really interesting. And I wonder if, you know, when you look at what's happened with public cloud and how they kind of change the buying parameter, how they kind of change the degree of difficulty to get project started, you know, how you guys have kind of integrated that, that type of thought process to make it easier for app developers to get their job done. >>Yeah. I mean, again, it's, it's, uh, I typically look at this more from a, from a customer lens, right? It's the transformation process and it always starts as I want agility. I want flexibility. I want to resiliency, right? This is where we talk to a business owner, what they're looking for. And then that translates into, into an I, to operations process, right? Your strategy needs to map then how you actually do this. Uh, and that just drives then what tools do you want to have available to actually enable this? Right? And the enablement again is for different roles, right? There is you need to give sync services to the app developer and, uh, the, the platform team and the security team, right. To your point. So the network, uh, can act at the same speed, but you also give to us to the network operations teams because they need to adjust. >>Then they have the ability to react to, uh, to some of these requirements. Right. And it's just automation. I think we, we, we focused on that, but there's also to your point, the, the need, how do I extend between data centers? You know, just, just for backup and recovery and how do I extend into, into public clouds, right? Uh, and in the end, that's a, that's a network connectivity problem. Uh, and we have soft as, uh, we have made as available. We have integrations into, uh, AWS. We have integrations into a joy to actually make this very easy from a, from a network perspective to extend your private domains, private networks into which have private networks on these public clouds. So from an app development perspective, now it looks like he's on the same network. It's a protective enterprise network. Some of it might sit here. >>Some of it might sit here, but it's really looking the same. And that's really in the enticing. What, what a business looks at, right? They don't necessarily want to say, I need to have something separate for this deployment was a separate for that deployment. What they want is I need to deploy something. I need to do this resilient. And the resilient way in an agile way gives me the tools. And so that's really where we focused, um, and what we're driving, right? It's that combination of automation consistently, and then definite tools, uh, available that we support. Uh, but they're all open. Uh, they're all standard tools as the ones I mentioned, right. That everybody's using. So I'm not getting into this, Oh, this is specific to Cisco, right. Uh, it's really democratization. I actually liked your term. Yeah. >>It's a great terminate. And it's, it's really interesting, especially with, with the API APIs and the way everything is so tied together that everyone kind of has to enable this because that's what the customer is demanding. Um, and it is all about the applications and the workloads and where those things are moving, but they don't really want to manage that. They just want to, you know, deliver business benefit to their customers and respond to, uh, you know, competitive threats in the marketplace, et cetera. So it's really an interesting time for the infrastructure, you know, to really support kind of this app first point of view, uh, versus the other way around is kind of what it used to be and, and enable this hyper fast development hyper fast, uh, change in the competitive landscape or else you will be left behind. Um, so super important stuff. >>Yeah, no, I totally agree. And as I said, I mean, it's, it's kind of interesting because we, we started on a Cisco data center. So we started this probably six or seven years ago. Uh, when we, when we named the application centric, uh, clearly a lot of these concepts evolve, uh, but in a sense it is that reversal of the role from the network provides something and you use to, uh, this is what I want to do. And I need a service, uh, thinking on a networking side to expose. So as that can be consumed. And so that clearly is playing out. Um, and as I said, automation is a key key foundation that we put in place, uh, and our customers, most of our customers at this point, uh, on, on these products, >>They have all the capabilities there. They can literally take advantage. There's really nothing that stops them >>Good times for you, because I'm sure you've seen all the memes and social media, right? What what's driving your digital transformation. Is it the CEO, the CMO or COVID, and we all know the answer to the question. So I don't think the, the pace of change is going to slow down anytime soon. So keeping the network up and enabling us all to get done, what we have to get done and all the little magic that happens behind the scenes. >>Yeah. No thanks. Thanks for having me. And again, yeah. If you're listening and you're wondering, how do I get started Cisco? Definitely just the place to go. It's fantastic. Fantastic. And I highly recommend everybody roll up your sleeves, you know, the best reasons you can have. >>Yeah. And we know once the physical events come back, we've been to dev net create a bunch of times, and it's a super vibrant, super excited, but really engaged community sharing. Lots of information is kind of, it's still kind of that early vibe, you know, where everyone is still really enthusiastic and really about learning and sharing information. So I say Susie and the team are really built a great thing, and we're a, we're happy to continue to cover it. And eventually we'll be back, uh, face to face. >>Okay. I look forward to that as well. >>All right, thanks. Uh, he's Thomas I'm Jeff, you're watching continuing coverage of Cisco dev net accelerating with automation and programmability >>TK Kia. Nini is here. He's a distinguished engineer at Cisco TK, my friend. Good to see you again. How are you? Good. I mean, you and I were in Barcelona in January and, you know, we knew we saw this thing coming, but we didn't see it coming this way. Did we know that no one did, but yeah, that was right before everything happened. Well, it's weird. Right? I mean, we were, you know, we, we, it was in the back of our minds in January, we sort of had Barcelona's hasn't really been hit yet. It looked like it was really isolated in China, but, uh, but wow, what a change and I guess, I guess I'd say I'd start with the, we're seeing really a secular change in your space and security identity, access management, cloud security, endpoint security. I mean, all of a sudden these things explode as the work from home pivot has occurred. >>Uh, and it feels like these changes are permanent or semi-permanent, what are you seeing out there? Yeah, I don't, I don't think anybody thinks the world's going to go back the way it was. Um, to some degree it's, it's changed forever. Um, you know, I, I, I do a lot of my work remotely. Um, and, and so, you know, being a remote worker, isn't such a big deal for me, but for some, it was a huge impact. And like I said, you know, um, remote work, remote education, you know, everybody's on the opposite side, a computer. And so the digital infrastructure has just become a lot more important to protect. And the integrity of it essentially is almost our own integrity these days. >>Yeah. And when you see that, you know, that work from home pivot, I mean, you know, our estimates are along with a partner DTR about 16% of the workforce was at home working from home prior to COVID and now it's, you know, North of 70% plus, and that's going to come down maybe a little bit over the next six months. We'll see what happens with the fall surge, but, but people essentially accept, expect that to at least double that 16%, you know, going forward indefinitely. So how, what is that, what kind of pressure does that put on the security infrastructure and how, how organizations are approaching security? >>Yeah, I just think, uh, from a mindset standpoint, you know, what was optional, uh, maybe, um, last year, uh, is no longer optional and I don't think it's going to go back. Um, I think, I think a lot of people, uh, have changed the way, you know, they live and the way they work. Um, and they're doing it in ways, hopefully that in some cases, uh, yield more productivity, um, again, um, you know, usually with technology that's severely effective, it doesn't pick sides. So the security slant to it is it frankly works just as well for the bad guys. And so that's, that's the balance we need to keep, which is we need to be extra diligent, uh, on how we go about securing infrastructure, uh, how we go about securing even our social channels, because remember all our social channels now are digital. So that's, that's become the new norm. >>You know, you've helped me understand over the years. I remember a line you shared with me in the cube one time is that the adversary is highly capable, is sort of the phrase that you used. And essentially the way you describe it, as you know, your job as a security practitioner is to decrease the bad guy's return on investment, you know, increase their costs, increase the numerator, but as, as work shifts from home, yeah, I'm in my house, you know, my wifi in my, you know, router with my dog's name is the password. You know, it's much, much harder for me to, to increase that denominator at home. So how can you help? >>Yeah. I mean, it's, it is, it is truly, um, when you think, when you get into the mind of the adversary and, and, uh, you know, the cyber crime out there, they're honestly just like any other business they're trying to operate with high margin. And so if you can get there, if you can get in there and erode their margin, frankly go find something else to do. Um, and, and again, you know, you know, the shift we experienced day to day is it's not just our kids are online in school and, uh, our work is online, but all the groceries we order, um, uh, you know, this Thanksgiving and holiday season, uh, a lot more online shopping is going to take place. So, you know, everything's gone digital. And so the question is, you know, how, how do we up our game there so that we can go about our business, uh, effectively and make it very expensive for the adversary to operate, uh, and take care of their business? Cause it's nasty stuff. >>I want to ask you about automation generally, and then specifically how it applies to security. So we, I mean, we certainly saw the ascendancy of the hyperscalers and of course they really attacked the it labor problem. We learned a lot from that and an it organizations have applied much of that thinking. And the it's critical at scale. I mean, you just can't scale humans at the pace, the technology scales today, how does that apply to security and specifically, how is automation affecting security? >>Yeah, it's, it's, it's the topic these days. Um, you know, businesses, I think, realize that they can't continue to grow at human scale. And so the reason why automation and things like AI and machine learning have a lot of value is because everyone's trying to expand, uh, and operate at machine scale. Now, I mean that for, for businesses, I mean that for education and everything else now, so are the adversaries, right? So it's expensive for them to operate at Cuban scale and they are going to machine scale, going to machine scale, uh, a necessity is that you're going to have to harness some level of automation, have the machines, uh, work on your behalf, have the machines carry your intent. Um, and when you do that, um, you can do it safely or you could do it dangerously. And that that's really kind of your choice. Um, you know, just because you can automate something doesn't mean you should, um, you, you wanna make sure that frankly, the adversary can't get in there and use that automation on their behalf. So it's, it's a tricky thing because, you know, if when you take the phrase, you know, how do we, how do we automate security? Well, you actually have, uh, take care of, of securing the automation first. >>Yeah. We talked about this in Barcelona, where you were explaining that, you know, the bad guys, the adversaries are essentially, you know, weaponizing using your own tooling, which makes them appear safe because it's, they're hiding in plain sight. Right? >>Well, there's, they're clever, uh, give them that, um, you know, there's this phrase that they, they always talk about called living off the land. Um, there's no sense in them coming into your network and bringing their tools and, uh, and being detective, you know, if they can use the tools that's already there, then, uh, they have a higher degree of, of evading, uh, your protection. If they can pose as Alice or Bob, who's already been credentialed and move around your network, then they're moving around the network as Alice or Bob. They're not marked as the adversary. So again, you know, having the detection methods available to find their behavior anomalies and things like that become a paramount, but also, you know, having the automation to contain them, to eradicate them, to, you know, minimize their effectiveness, um, without it, I mean, ideally without human interaction, cause you, you just, can you move faster, you move quicker. Um, and I see that with an asterisk because, um, if done wrong, frankly, um, you're just making their job more effective. >>I wonder if we could talk about the market a little bit, uh, it's I'm in the security space, cybersecurity 80 plus billion, which by the way, is just a little infant testable component of our GDP. So we're not spending nearly enough to protect that, that massive, uh, GDP, but guys, I wonder if you could bring up the chart because when you talk to CSOs and you ask them, what's your, what's your biggest challenge? They'll say lack of talent. And, and so what this chart shows is from ETR, our, or our survey partner, and on the vertical axis is net score. And that's an indication of spending momentum on the horizontal axis is market share, which is a measure of presence, a pervasiveness, if you will, inside the datasets. And so there's a couple of key points here. I wanted to put forth to our audience and then get your reactions. >>So you can see Cisco, I highlighted in red, Cisco is business and security is very, very strong. We see it every quarter. It's a growth area that Chuck Robbins talks about on the, on the conference call. And so you can see on the horizontal axis, you've got a big presence in the data set. I mean, Microsoft is out there, but they're everywhere, but you're right there, uh, in that, in that dataset. And then you've got for such a large presence, you've got a lot of momentum in the marketplace, so that's very impressive. But the other point here is you've got this huge buffet of options. There's just a zillion vendors here. And that just adds to the complexity. This is of course only a subset of what's in the security space. You know, the people who answered for the survey. So my question is how can Cisco help, you know, simplify this picture? Is it automation? Is it, you know, you guys have done some really interesting tuck in acquisitions and you're bringing that integration together. Can you talk about that a little bit? >>Yeah. I mean, that's an impressive chart. I mean, when you look to the left there it's, um, I had a customer tell me once that, you know, I came to this trade show, looking for transportation and these people are trying to sell me car parts. Um, that's the frustration customers have, you know, and I think what Cisco has done really well is to really focus on outcomes. Um, what is the customer outcome? Cause ultimately that's, that is what the customer wants. You know, there might be a few steps to get to that outcome, but the closest closer you can get to delivering outcomes for the customer, the better you are. And I think, I think security in general has just year over year have been just written with, um, you need to be an expert. Um, you need to buy all these parts and put it together yourself. And, and I think, I think those days are behind us, but particularly as, as security becomes more pervasive and we're, you know, we're selling to the business, we're not selling to the, you know, t-shirt wearing hacker anymore. >>Yeah. So, well, well how does cloud fit in here? Because I think there's a lot of misconceptions about cloud people that God put my data in the cloud I'm safe, but you know, of course we know it's a shared responsibility model. So I'm interested in your, your thoughts on that. Is it really, is it a sense of complacency? A lot of the cloud vendors, by the way, say, Oh, the state of security is great in the cloud. Whereas many of us out there saying, wow, it's, it's not so great. Uh, so what are your thoughts on that, that whole narrative and what Cisco's play in cloud? >>I think cloud, um, when you look at the services that are delivered via the cloud, you see that exact pattern, which is you see customers paying for the outcome or as close to the outcome as possible. Um, you know, no, no data center required, no disk drive required, you just get storage, you know, it's, it's, it's all of those things that are again, closer to the outcome. I think the thing that interests me about cloud two is it's really been, it's really punctuated the way we go about building systems. Um, again at machine scale. So, you know, before, when I write code and I think about, Oh, what computers are gonna run on or, you know, what servers are going to is you're going to run on those. Those thoughts never crossed my mind anymore. You know, I'm modeling the intent of what the service should do and the machines then figure it out. So, you know, for instance, on Tuesday, if the entire internet shows up, uh, the, the system works without fail. And if on Wednesday, if only North America shows up, you know, so, but, but there's no way you could staff that, right. There's just no human scale approach that gets you there. And that's, that's the beauty of all of this cloud stuff is, um, it really is, uh, the next level of how we do computer science. >>So you're talking about infrastructure as code and that applies to security as code. That's what dev net is really all about. I've said many times, I think Cisco of the large established enterprise companies is one of the few, if not the only, that really has figured out, you know, that developer angle, because it's practical. What are you doing? You're not trying to force your way into developers, but, you know, I wonder if you could, you could talk a little bit about that trend and where you see it going. >>Yeah, no, that is, that is truly the trend. Every time I walk into dev net, um, the big halls at Cisco live, it is Cisco as code. Um, everything about Cisco is being presented through an API. It is automation ready. And frankly, that is, um, that is the, the love language of the cloud. Um, it's it's machines is the machines talking to machines in very effective ways. So, you know, it is the, the, uh, I, I think, I think necessary, maybe not sufficient but necessary for, um, you know, doing all the machine scale stuff. What what's also necessary, uh, is to, um, to secure if infrastructure is code therefore, um, what, what secure, uh, what security methodologies do we have today that we use to secure code? While we have automated testing, we have threat modeling, right? Those things actually have to be now applied to infrastructure. So then when I, when I talk about how do you do, uh, automation securely, you do it the same way you secure your code, you test it, you, you threat model, you, you, you say, you know, Ken, my adversary, uh, exhibit something here that drives the automation in a way that I didn't intend it to go. Um, so all of those practices apply. It's just, everything has code these days. >>I've often said that security and privacy are sort of two sides of the same coin. And I want to ask you a question and it's really, you know, to me, it's not necessarily Cisco and company like companies like Cisco's responsibility, but I wonder if there's a way in which you can help. And of course, there's this Netflix documentary circling around the social dilemma. I don't know if you have a chance to see it, but basically dramatizes the way in which companies are appropriating our data to sell us ads and, you know, creating our own little set of facts, et cetera. And that comes down to sort of how we think about privacy and admin. It's good from the standpoint of awareness, you know, you may or may not care if you're a social media user. I love tick-tock, I don't care, but, but, but they, they sort of laid out. This is pretty scary scenario with a lot of the inventors of those technologies. You have any thoughts on that and you'll consist go play a role there in terms of protecting our privacy. I mean, beyond GDPR and California, consumer privacy act, um, what do you think? >>Yeah. Um, uh, I'll give you my, you know, my humble opinion is you, you fix social problems with social tools, you fixed technology problems with technology tools. Um, I think there is a social problem, um, that needs to be rectified the, you know, um, we, we, weren't built as, um, human beings to live and interact with an environment that agrees with us all the time. It's just pretty wrong. So yeah, that, that, that, um, that series that really kind of wake up a lot of people it is, is, you know, it's probably every day I hear somebody asked me if I, I saw, um, but I do think it also, you know, with that level of awareness, I think we, we overcome it or we compensate by what number one, just being aware that it's happening. Um, number two, you know, how you go about solving it, I think maybe come down to an individual or even a communities, um, solution and what might be right for one community might be, you know, not the same for the other. So you have to be respectful in that manner. >>Yeah. So it's, it's, it's almost, I think if I could play back, what I heard is, is yeah. Technology, you know, maybe got us into this problem, but technology alone is not going to get us out of the problem. It's not like some magic AI bot is going to solve this. It's got to be, you know, society has to really, really take this on as your premise. >>That's a good point. When I, when I first started playing online games, I'm going back to the text-based adventure stuff, like muds and moves. I did a talk at, at MIT one time, and I'm this old curmudgeon in the back of the room. Um, we were talking about democracy and we were talking about, you know, the social processes that we had modeled in our game and this and that. And this guy just gave us the SmackDown. He basically walked up to the front of the room and said, you know, all you techies, you judge efficiency by how long it takes. He says, democracy is a completely the opposite, which is you need to sleep on it. In fact, you should be scared if somebody can decide in a minute, what is good for the community? It, two weeks later, they probably have a better idea of what's good for the community. So it almost has the opposite. And that was super interesting to me. >>That's really interesting, you know, you read the, like the, the Lincoln historians and he was criticized in the day for having taken so long, you know, to make certain decisions, but ultimately when he acted acted with, with confidence. Um, so to that point, but, um, so what, what else are you working on these days that, uh, that are, that is interesting that maybe you want to share with our audience? Anything that's really super exciting for you or you, >>Yeah. You know, generally speaking, I'm trying to try and make it a little harder for the bad guys to operate. I guess that's a general theme making it simpler for the common person to use, uh, tools. Um, again, you know, all of these security tools, no matter how fancy it is, it's not that we're losing the complexity, it's that we're moving the complexity away from the user so that they can thrive at human scale. And we can do things at machine scale and kind of working those two together is sort of the, the magic recipe. Um, it's, it's not easy, but, um, but it is, it is fun. So that's, that's what keeps me engaged. >>I'm definitely seeing, I wonder if you see it just sort of a, obviously a heightened organization awareness, but I'm also seeing shifts in the organizational structures. You know, the, you know, it used to be a sec ops team and an Island. Okay, it's your problem? You know, the, the, the CSO cannot report into the, to the CIO because that's like the Fox in the hen house, a lot of those structures are, are, are changing. It seems it'd be becoming this responsibility is coming much more ubiquitous across the organization. What are you seeing there and what are you putting on? >>And it's so familiar to me because, you know, um, I, I started out as a musician. So, you know, bands bands are a great analogy. You know, you play bass, I big guitar. You know, somebody else plays drums, everybody knows their role and you create something that's larger than, you know, the sum of all parts. And so that, that analogy I think, is coming to, you know, we, we saw it sort of with dev ops where, you know, the developer, doesn't just throw their coat over the wall and it's somebody else's problem. They move together as a band. And, and that's what I think, um, organizations are seeing is that, you know, why, why stop there? Why not include marketing? Why not include sales? Why don't we move together as a business? Not just here's the product and here's the rest of the business. That's, that's, that's pretty awesome. Um, I think, uh, we see a lot of those patterns, uh, particularly for the highly high-performance businesses. >>No, in fact, it's interesting you for great analogy, by the way. And you actually see in that within Cisco, you're seeing sort of a, and I know sometimes you guys don't like to talk about the plumbing, but I think it matters. I mean, you got a leadership structure now. I I've talked to many of them. They seem to really be more focused on how they're connect, connecting, you know, across organizations. And it's increasingly critical in this world of, you know, of silo busters, isn't it? Yeah, no, I mean, you almost, as, as you move further and further away, you know, you can see how ridiculous it was before it would be like acquiring the band and say, okay, all you can talk later is go over here. All your bass players go over there. I'm like, what happened to the band? >>That's what I'm talking about is, you know, moving all of those disciplines, moving together and servicing the same backlog and achieving the same successes together is just so awesome. Well, I always, I always feel better after talking to you. You know, I remember I remember art. Coviello used to put out his, his letter every year and I was reading. I'd get depressed. We spend all this money now we're less secure. But when I talked to you TK, I feel like much more optimistic. So I really appreciate the time you spend on the cube. It's awesome to have you as a guest. I love these, I love these sessions. So thanks. Thanks for inviting me. And I miss you. I, you know, hopefully, you know, next year we can get together at some of the Cisco shows or other shows, but be well and stay weird. Like the sign says doing my part to get Kenny, thanks so much for coming to the cube. We, uh, we really appreciate it. And thank you for watching everybody. This is Dave Volante. We've right back with our next guest. This short break, >>Come back to the cubes coverage, just to keep virtuals coverage of dev net create virtual will not face to face the cubes. Been there with dev net and dev net create. Since the beginning, dev net create was really a part of the dev net community. Looking out at the external market outside of Cisco, which essentially is the cloud native world, which is going mainstream. We've got a great guest here. Who's who's been the company's been on the cube. Many times. We've been talking to them recently acquired by Cisco thousand eyes. We have Joe Vaccaro is BC vice president of product, Joe, welcome to the cube. Thanks for coming on. Great. And thanks for having me. You have the keys to the kingdom, you, the vice president of product, which means you get to look inside and you get to look outside, figure it all out, uh, make everything run on thousand eyes. >>You guys have been finding common language, uh, across multiple layers of network intelligence, external services. This is the heart of what we're seeing in innovation with multicloud microservices, cloud native. This is really a hot area. It's converging multiple theaters in technology. Super important. I want to get into that with you. But first thousand nine was recently acquired by Cisco, um, big acquisition, uh, super important new CEO of Cisco, very clear API, everything we're seeing that come out. That's a big theme at dev net create the ecosystem of Cisco's going outside their own, you know, their, their walls outside of the Cisco network operators, network engineers. We're talking to developers talk programmability. This is the big theme. What's it like at Cisco? Tell us, honestly, the COVID hits. You get acquired by Cisco, tell us what's happening. >>Yeah, surely been an exciting six months, 4,000 eyes on the entire team and our customers, you know, as we all kind of shifted to the new normal of working from home. And I think, you know, that change alone really kind of amplified. Even some of the fundamental beliefs that we have as a company that you know, cloud is becoming the new data center or customers that Indra internet has become the new network and the new enterprise network backbone. And that SAS has really become the new application stack. And as you think about these last six months, those fundamental truths have never been more evident as we rely upon the cloud to be able to, to work as we rely upon our own home networks and the internet in order to be productive. And as we access more sized applications on a daily basis. And as you think about those fundamental truths, what's common across all of them is that you rely upon them now more than ever, not only to run your business, but to any of your employees would be productive, but you don't own them. And if you don't own them, then you lack the ability in a traditional way to be able to understand that digital experience. And I think that's ultimately what, what thousand eyes is trying to solve for. And I think it's really being amplified in really these last six months. >>Talk about the COVID dynamic because I think it highlighted and certainly accelerated digital transformation, but specifically exposes opportunities, challenges, weaknesses, I've talked to many CXOs CSOs. Uh, sec security is huge. Um, home of the conference book talk track, we'll get to in a second, but exposes what's worth doubling down on what to abandon from a project standpoint, as people start to look at their priorities, they're going, Hey, we got to have a connected experience. We got to have security. People are working at home. No one has VPNs at home VPNs or passe, maybe it's way. And maybe it's something else they're on a backbone. They're connecting to the internet, a lot of different diversity in connections. At the same time, you got a ton of modern apps running along for these networks. This is a huge issue. COVID is exposed us at scale. What's your view on this? And what does thousand eyes thinking about this? >>You know, if you think about the kind of legacy application delivery, it went from largely users in an office connected over, say a dedicated corporate network, largely to traditional say internal hosted applications. And that was early simple connectivity bath. And as you mentioned, we've seen amplifications in terms of the diversity from the users. So users are not in the office. Now they're connected in distributed disparate locations that are dynamically changing. When you think that how they're getting to that application, they're going across a really complex service chain of different network services that are working together across as public internet backbone will totally to land them on an application. And then those applications themselves are becoming now, as you mentioned, distributed largely based upon a microservices architecture and increasing their own dependence upon third party sample size applications to fulfill say key functions of that application, those three things together. >>Ultimately you're creating that level of level of complex service chain that really makes it difficult to understand the digital experience. And ultimately the it organization it's really chartered with not just delivering the infrastructure, but delivering the right experience. And you have to then have a way to be able to see, to gain that visibility, that experience, you know, to measure it and understand, and to provide that intelligence and then ultimately to act on it, be able to ensure that your employees, as well as your customers are getting the right overall, um, approach to being able to leverage those assets. >>It's funny, you know, I was getting to some of these high scale environments, a lot of these concepts are converging. You know, we had terms like automation, self healing networks. Um, you mentioned microservices early, you mentioned data out of the clouds, the new data center, uh, or when's the new land. However, we're gonna look at it. It's a whole different architecture. So I want to get your thoughts on, on the automation piece of networking and internet outages, for instance, um, because when you, you know, there's so many outages going up and down, it is like, uh, catching, looking for a needle in a haystack, right. So, um, we've had this conversation with you guys on the cube before, how does automation occur when you guys look at those kinds of things? Uh, what's important to look at, can you comment on and react to, you know, the internet outages and how you find resolve those? >>Yeah. It's um, it was really great. And as you mentioned, automation really in a place that a key, when you think about the, just a broad problem that it is trying to drive and, you know, from our lens, we look at it in really three ways. You're first off is you have to be able to gain the level of visibility from where it matters and be able to, to test and be able to provide that level of active measurements across the, the type of ways you want to be able to inspect the network. But then also from the right vantage points, you want to inspect it. But what we talk about right aside, you know, data alone, doesn't solve that problem. As you mentioned, that needle in the haystack, you know, data just provides the raw metrics that are screaming across the screen, and you have to then enable that data to provide meeting. >>You need to enable that data become intelligent. And that intelligence comes through the automation of being able to process that data very quickly, allow you to be able to see the unseen, allow you to be able to quickly understand the issues that are happening across this digital supply chain to identify issues that are even happening outside of your own control across the public internet. And then the last step of automation really comes in the, of the action, right? How do you enable that intelligence to be put, to use? How do you enable that intelligence to then drive across the rest of your it workflow as well as to be able to be used as a signaling engine, to be able to then make the fundamental changes back at the network fabric, whether that is a dressing or modifying your BGB pairing, that we see happen with our customers using thousand eyes data, to be able to route around major internet outages that we've seen over the past six months, or to be able to then use that data, to be able to optimize the ultimate experience that they're delivering to both our customers, as well as their employees, >>Classic policy based activities. And you take it to a whole nother level. I got to get your thoughts on the employees working at home. Okay. Because, um, you know, most it people like, Oh yeah, we're going to forecast in cases of disruption or a hurricane or a flood or hurricane Sandy, but now with COVID, everyone's working at home. So who would have forecasted a hundred percent, um, you know, work from home, which puts a lot of pressure on him, everything. So I gotta ask you, now that employees are working at home, how do you tie network visibility to the actual user experience? >>Yeah, that's a great question. As you, you know, we saw within our own customer base, you know, when COVID head and we saw this rise of work from home, it teams are really scrambling and said, okay, I have to light up this, say VPN infrastructure, or I need to now be able to support my users in a work from home situation where I don't control the corporate network. In essence, now you have essentially thousands. Every employee is acting across their own corporate network and people were then using thousand eyes in different ways to be able to monitor their safety VPN infrastructure across, uh, back into the corporate network, as well as in using our thousand eyes end point agents that runs on a local, a user's laptop or machine in their home to help you to be able to gain that visibility down to that last mile of connectivity. >>Because when a user calls up support and says, I'm having trouble say accessing my application, whether that's Salesforce or something else, what ultimately might be causing that issue might not necessarily be a Salesforce issue, right? It could be the device and the device performance in terms of CPU, memory utilization. It could be the wifi and the signal quality within your wifi network. It could be your access point. It could be your raw, local home router. It can be your local ISP. It could be the path that you're taking ultimately to your corporate network or that application. There's so many places that could go wrong that are now difficult to be able to see, unless you have the ability to see comprehensively from the user to the application, and to be able to understand that full end to end path, >>You know, it teams have also been disrupted. They've been on offsite prop off property as well, but you got the cloud. How is your technology help the it teams? Can you give some examples there? Um, >>Yeah, great way is, you know, how people use thousand eyes as part of that data sharing ecosystem. Again, that notion of how do you go from visibility to intelligence action and we're in the past, you might be able as an it administrator to walk over to their network team and say, Hey, can you take a look at what I'm seeing now? That's no longer available. So how do you be able to work efficiently as the United organization? You know, we think a thousand eyes in how our customers are using us a thousand times becomes a common operating language that allows them to be able to analyze across from the application down into the underlying infrastructure, through those different layers of the network what's happening. And where do you need to focus your attention? And then furthermore, with 10,000 eyes in terms of a need nibbling, that data sharing ecosystem, leveraging our share link capability really gives them the ability to say, you know, here's what I'm seeing and be able to send that to anybody within the it organization, but it goes even further and many times in recent times, as well as over the course of people using thousand eyes, they take those share links and actually send them to their external providers because they're not just looking to resolve issues within their own it organization. >>They're having to work collaboratively with the different ISP that they're appearing with with their cloud providers that they're appearing, uh, they're leveraging, or the SAS applications that are part of that core dependency of how they deliver their experience. >>I asked you the question when you think about levels of visibility and making the lives easier for it, teams, um, and see a lot of benefits with thousand eyes. You pointed out a few of them. It's got to ask you the question. So if I'm an it person I'm in the trenches, are you guys have, uh, an aspirin or a vitamin or both? Can you give an example because there's a lot of pain point out there. So yeah. Give me a cup, a couple Advils and aspirins, but also you're an enabler to the new things are evolving. You pointed out some use case. You talked about the difference between where you're helping people pain points and also enabling them be successful for it teams. >>Yeah, that's a great analogy. You're thinking it, like you said, it definitely sits on both sides of that spectrum, you know, thousand eyes is the trusted tool, the source of truth for it. Organizations when issues are happening as their alarm bells are ringing, as they are generating the, um, the different, uh, on call, uh, to be able to jump into a worm situation thousand eyes is that trusted source of truth. Allow them to focus, to be able to resolve the issue in the heat of the moment. But that was a nice also when we think about baselining, your experience, what's important is not understanding that experience at that moment in time, but also how that's deviated over time. And so by leveraging thousand eyes on a continuous basis, it gives you the ability to see the history of that experience, to understand how your network is changing is as you mentioned, networks are constantly evolving, right? >>The internet itself is constantly changing. It's an organic system, and you need to be able to understand not only what are the metrics that are moving out of your balance, but then what is potentially the cause of that as a network has evolved. And then furthermore, you can be begin to use that as you mentioned, in terms of your vitamin type of an analogy, to be able to understand the health of your system over time on a baseline basis so that you can begin to be able to ensure its success in a great way to really kind of bring that to light. As people using say, thousand eyes as part of the same SC land-based rollout, where you're looking to seek benchmark and confidence as you look to scale out in either, you know, benchmarking different ISP within that, I feel like connectivity for as you look to ensure a level of success with a single branch to give you that competence, to then scale out to the rest of your organization. >>That's great insights, the classic financial model ROI, you get baseline and upside, right? You got handle the baseline as you pointed out, and the upside music experience connectivity, you know, application performance, which drives revenue, et cetera. So great point. Great insight, Joe. Thank you so much for that insight. It's got a final question for you. I want to just riff a little bit with you on the industry. A lot of us have been having debates about automation. I mean, who doesn't, who doesn't love automation. Automation is awesome, right? Automate things. But as the trend starts going on, as everything is a service or X, a S as it's called, certainly Cisco's going down that road. Talk about your view about the difference between automation and everything is a service because at the end of the day, everything will be a service, but without automation, you really can't have services, right? So, you know, automation, automation, automation, great, great drum to bang all day long, but then also you got the same business side saying as a service, as a service, pushing that into the products means not trivial. Talk about, talk about how you'd look at automation and everything as a service and the relationship and interplay between those two concepts. >>Yeah. Ultimately I think about in terms of what is the problem that the business is trying to solve in ultimately, what is the value that they're trying to face? And in many ways, right, they're being exploded with increase of data that needs, they need to be able to not only processing gather, but then be able to then make use of, and then from that, as we mentioned, once you've processed that data and you'd say, gather the insights from it. You need to be able to then act on that data. And automation plays a key role of allowing you to be able to then put that through your workflow. Because again, as that, it experience becomes even more complex as more and more services get put into that digital supply chain. As you adopt say increased complexity within your infrastructure, by moving to a multicloud architecture where you look to increase the number of say, network services that you're leveraging across that digital experience. >>Ultimately you need the level of automation. You'd be able to see outside of your own vantage point. You need to be able to look at the problem from as broad of a, a broad of a way as possible. And you know, data and automation allows you to be able to do what is fundamentally to do from a very narrow point of view, in terms of the visibility you gather intelligence you generate, and then ultimately, how do you act on that data as quick as possible to be able to provide the value of what you're looking to solve. >>It's like a feature it's under the hood. The feature of everything comes to the surface is automation, data, machine learning, all the goodness in the software. I mean, that's really kind of what we're talking about here. Isn't it a final question for you as we wrap up, uh, dev net create really, again, is going beyond Cisco's dev net community going into the industry ecosystem where developers are there. Um, these are folks that want infrastructure as code. They want network as code. So network programmability, huge topic. We've been having that conversation, uh, with Cisco and others throughout the industry for the past three years. What's your message to developers out there that are watching this who say, Hey, I just want to develop code. Like I want, you know, you guys got that. That was nice. Thanks so much. You know, you take care of that. I just want to write code. What's your message to those folks out there who want to tap some of these new services, these new automation, these new capabilities, what's your message. >>You know, ultimately I think, you know, when you look at thousand eyes, um, you know, from a product perspective, you know, we try to build our product in an API first model to allow you to be able to then shift left of how you think about that overall experience. And from a developer standpoint, you know, what I'd say is, is that while you're developing in your silo, you're going to be part of a larger ultimate system. In your experience you deliver within your application is now going to be dependent upon not only the infrastructure it's running upon, but the network gets connected to, and then ultimately the user and the stance of that user, if I leveraging a thousand eyes and being able to then integrate that into how you think closely on that experience, that's going to help ensure that ultimately the application experience that the is looking to deliver meets that objective. And I think what I would say is, you know, while you need to focus on your, uh, your role as a developer, having the understanding of how you fit into the larger ecosystem and what the reality of the, of how your users will access that application is critical. >>Awesome, Joe, thank you so much. Again, trust is everything letting people understand that what's going on underneath is going to be, you know, viable and capable. You guys got a great product and congratulations on the acquisition that Cisco made of your company. And we've been following you guys for a long time and a great technology chops, great market traction, congratulations to everyone, 1,009. Thanks for coming on today. >>I appreciate it. Thanks for having me >>Vice president of product here with thousand eyes. Now, part of Cisco, John, for your host of the cube cube virtual for dev net, create virtual. Thanks for watching. >>Even prior to the pandemic, there was a mandate to automate the hyperscale cloud companies. They've shown us that to scale. >>You really have to automate your human labor. It just can't keep up with the pace of technology. Now, post COVID that automation mandate is even more pressing. Now what about the marketplace? What are S E seeing on the horizon? The cubes Jeff Frick speaks with Cisco engineers to gather their insights and explore the definite specialized partner program. We've got >>Coon Jacobs. He's the director of systems engineering for Cisco. Good to see Kuhn, >>Thank you for having me >>And joining him as Eric nappy is the VP of system systems engineering for Cisco. Good to see Eric. Good to be here. Thank you. Pleasure. So before we jump into kind of what's going on now in this new great world of programmability and, and control, I want to kind of go back to the future for a minute, because when I was doing some research for this interview, it was Coon. I saw an old presentation that you were giving from 2006 about the changing evolution of the, uh, the changing evolution of networking and moving from. I think the theme was a human centered human centered network. And you were just starting to touch a little bit on video and online video. Oh my goodness, how far we have come, but, but I would love to get kind of a historical perspective because we've been talking a lot and I know Eric son plays football about the football analogy of the network is kind of like an offensive lineman where if they're doing a good job, you don't hear much about them, but they're really important to everything. >>And the only time you hear about them is when a flag gets thrown. So if you look back with the historical perspective, the load and the numbers and the evolution of the network, as we've moved to this modern time, and, you know, thank goodness cause of COVID hit five years ago, 10 years ago, 15 years ago, you know, all of us in the information space would not have been able to make this transition. So I just, I just love to get some historical perspective cause you've been kind of charting this and mapping this for a very long time. >>Yeah, we absolutely have. I think, you know, what you're referring to was back in the day, the human network campaign, and to your point, the load, the number of hosts that traffic, the just overall the intelligence of the network has just evolved tremendously over these last decade and a half, uh, 15 years or so. And you look at where we are now in terms of the programmable nature of the network and what that enables in terms of new degrees of relevance that we can create for the customers. Um, and how, you know, the role of it has changed entirely again, especially during this pandemic, you know, the fact that it's now as a service and elastic, uh, is, is absolutely fundamental to being able to ensure, uh, on an ongoing basis, a great customer experience. And so, uh, it's been, it's been, uh, a very interesting ride. >>Yeah. And then, and then just to close the loop, the, one of your more later interviews talking to Sylvia, your question is, are you a developer or an engineer? So it was, and, and your whole advice to all these network engineers is just, just don't jump in and start doing some coding and learning. So, you know, the focus and really the emphasis and where the opportunity to differentiate as a company is completely shifting gears over to the S you know, really software defined side. >>Oh, absolutely. So, I mean, you look at how the software world and the network has come together and how we're applying now, you know, basically the same construct of CICB pipeline to network, uh, infrastructure, look at network really as code and get all of the benefits from that. And the familiarity of it, the way that our engineers have had to evolve. And that is just, you know, quite, quite significant in, in, in like the skill set. And the best thing is jump in, right. Um, you know, dip your toe in the water, but continue to evolve that skill set. And, uh, you know, don't, don't be shy. It's, it's a leap of faith for some of us who've been in the industry a bit longer. Uh, you know, we like to look at ourselves as the craftsman of the network, but now it's definitely a software centricity and programmability, right? >>So Eric, you've got some digital exhaust out there too, that I was able to dig up going back to 2002 752 page book, and the very back corner of a dark dirty dusty Amazon warehouse is managing Cisco network security, 752 pages. Wow. How has security changed from a time where before I could just read a book, a big book and, you know, throw some protocols in and probably block a bunch of ports to the world that we live in today, where everything is connected. Everything is API driven, everything is software defined. You've got pieces of workloads spread out all over the place and Oh, by the way, you need to bake security in at every single level of the application stack. >>Yeah, no I'm so, wow. Cocoon is that you, you found that book on the I'm really impressed. There was a thank you a little street, correct. So, uh, I want to hit on something that you, you talked about. Cause I think it's very important to, to this overall conversation. If we think about the scale of the network and Coon hit on it briefly, you talked about it as well. We're seeing a massive explosion of devices by the I, you know, it's estimated by the end of this year, there's going to be about 27 billion devices on the global internet. That's about 3.7 devices for every man, woman and child life. And if we extrapolate that out over the course of the next decade on the growth trajectory we're on. And if you look at some of the published research on this, it's estimated there could be upwards of 500 billion devices accessing the global internet on a, on a daily basis. >>And primarily that, that, that is a IOT devices. That's digitally connected devices. Anything that can be connected will be connected, but then introduces a really interesting security challenge because every one of those devices that is accessing the global internet is within a company's infrastructure or accessing pieces of corporate data is a potential attack factor. So we really need to, and I think the right for this is we need to reimagine security because security is, as you said, not about perimeters. You know, I wrote that book back in 2002, I was talking about firewalls and a cutting edge technology was intrusion prevention and intrusion detection. Now we need to look at security really in the, in the guise of, or under the, under the, under the realm of really two aspects, the identity who is accessing the data in the context, what data is being accessed. >>And that is going to require a level of intelligence, a level of automation and the technologies like machine learning and automated intelligence are going to be our artificial intelligence rather are going to be table stakes because the sheer scale of what we're trying to secure is going to be untenable, undercurrent, you know, just current security practices. I mean, the network is going to have to be incredibly intelligent and leverage again, a lot of that, uh, that AI type of data to match patterns of potential attacks and ideally shut them down before they ever cause any type of damage. >>Really interesting. I mean, one thing that COVID has done a bunk many things is kind of retaught us all about the power of exponential curves and how extremely large those things are and how fast they grow. We had Dave runs and on a Google cloud a couple of years ago. And I remember him talking about early days of Google when they were starting to map out kind of, as you described kind of map out their growth curves, and they just figured out they could not hire if they hired everybody, they couldn't hire enough people to deal with it. Right. So really kind of rethinking automation and rethinking about the way that you manage these things and the level, right. The old, is it a pet or is it, or is it, um, uh, part of a herd? And I think it's interesting what you talked about, uh, can really the human powered internet and being driven by a lot of this video, but to what you just said, Eric, the next big wave, right. >>Is IOT and five G. And I think, you know, you talk about 3.7 million devices per person. That's nothing compared to right. All these sensors and all these devices and all these factories, cause five G is really targeted to machine the machines, which there's a lot of them and they trade a lot of information really, really quickly. So, you know, I want to go back to you Coon thinking about this next great wave in a five G IOT kind of driven world where it's kind of like when voice kind of fell off compared to IP traffic on the network. I think you're going to see the same thing, kind of human generated data relative to machine generated data is also going to fall off dramatically as a machine generated data, just skyrocket through the roof. >>Yeah, no, absolutely. And I think too, also what Eric touched on the visibility on that, and they'd be able to process that data at the edge. That's going to catalyze cloud adoption even further, and it's going to know, make the role of the network, the connectivity of it all and the security within that crucially important. And then you look at the role of programmability within that. We're seeing the evolution going so fast. You look at the element of the software defined network in an IOT speed space. We see that we have hosts there that are not necessarily, um, you know, behaving like other hosts would, uh, on a network, for example, manufacturing floor, uh, production robot, or a security camera. And what we're seeing is we're seeing partners and customers employing program ability to make sure that we overcome some of the shortcomings, uh, in terms of where the network is at, but then how do you customize it in terms of the relevance that it can provide, uh, bringing on board, uh, those, uh, those hosts in a very transparent way, and then, you know, keep, keep the agility of it and keep the speed of innovation going. >>Right. >>Right. So Eric, I want to come back to you and shift gears kind of back to the people will leave the IOT and the machines along, along for a minute, but I'm curious about what does beat the boss. I mean, I go to your LinkedIn profile and it's just filled with congratulatory statements, but everyone's talking about beating the boss. You know, it's, it's a really, you know, kind of interesting and different way to, to motivate people, to build this new skillset in terms of getting software certifications, uh, within the Cisco world. And I just thought it was really cute the way that you clearly got people motivated, cause there's posts all over the place and they've all got their, their nice big badge or their certification, but, you know, at a higher level, it is a different motivation to be a developer versus an engineer and a technician. And it's kind of a different point of view. And I just wonder if you could share, you know, some of the ways that you're, you're kind of encouraging, you know, kind of this transformation within your own workforce, as well as the partners, et cetera, and really adopting kind of almost a software first and this program kind of point of view versus, you know, I'm just wiring stuff up. >>Apparently a lot of people like to beat me. So of itself was a, was a, it was a great success, but you know, if we think we take a step back, you know, what is Cisco about as an organization? Um, I mean obviously if you look back to the very early days of our vision, right, it was, it was to change the way the world worked, played, live and learn. And that you think about, and you hit on this when we were, you know, you were discussion with co with Kuhn in the early days of COVID. We really saw that play out as so much shifted from, you know, in-person type of interactions to virtual interactions in the network that, uh, that our, our customers, our partners, our employees built over the course of the last several, the last three decades really helped the world continue to, um, to, to do business for students to continue to go to school or clinicians, to connect with patients. >>If I think about that mission to meet programmability is just the next iteration of that mission, continuing to enable the world to communicate, continuing, to enable customers, employees, uh, partners, uh, to essentially leverage the network for more than just connectivity now to leverage it for critical insight. Again, if we look at some of the, uh, some of the use cases that we're seeing for social distancing and contact tracing and network has a really important place to play there because we can pull insight from it, but it isn't necessarily an out of the box type of integration. So I look at programmability and in what we're doing with, with dev net to give relevance to the network for those types of really critical conversations that every organization is having right now, it's a way to extrapolate. It's a way to pull critical data so that I can make a decision. >>And if that decision is automated, or if that decision requires some type of a manual intervention, regardless, we're still about connecting. And in this case, we're connecting insight with the people who need it most, right. The debit challenge we ran is really in respect for how critical this new skill set is going to be. It's not enough. Like I said, just to connect the world anymore. We need to leverage that network, the network for that critical insight. And when we drove, we were, we created the beat, the boss challenge. It was really simple. Hey guys, I think this is important and I am going to go out and I'm going to achieve the certification myself, because I want to continue to be very relevant. I want to continue to be able to provide that insight for my customers and partners. So therefore I'm going for it. Anybody that can get there before me, maybe there's a little incentive tied to the incentive. Although it's funny, we interviewed a lot of, a lot of our team who, uh, who achieved it when incentive was secondary. They just wanted to have the bragging rights, like, yeah, I beat Eric, right. >>You know, putting your money where your mouth is, right. If it's important, then why, you know, you should do it too. And, and you know, the whole, you're not asking people to do what you wouldn't do yourself. So I think there's a lot of good leadership, uh, leadership lessons there as well. But I want to extend kind of the conversation on the covert impact, right? Cause I'm sure you've seen all the social media meme, you know, who's driving your digital transformation, the CEO, the CMO or COVID. And we all know the answer to the question, but you know, you guys have already been dealing with kind of an increased complexity around enterprise infrastructure world in terms of cloud and public cloud and hybrid cloud and multi cloud. And people are trying to move stuff all, all the way around now suddenly had this COVID moment right in, in March, which is really a light switch moment. >>People didn't have time to plan or prepare for suddenly everybody working from home. And it's not only you, but your spouse and your kids and everybody else. So, but now we're six months plus into this thing. And I would just love to get your perspective and kind of the change from, Oh my goodness, we have to react to the light switch moment. What do we do to make sure people can, can get, get what they need when they need it from where they are. Uh, but, but then really moving from this is a, an emergency situation, a stop gap situation to, Hmm, this is going to extend for some period of time. And even when it's the acute crisis is over, you know, this is going to drive a real change in the way that people communicate in the way that people, where they sit and their jobs and, and kind of how customers are responding accordingly as the, you know, kind of the narrative has changed from an emergency stop gap to this is the new normal that we really need to plan for. >>So, uh, I think, I think you said it very well. I think anything that could be digitized, any, any interaction that could be driven virtually was, and what's interesting is we, as you said, we went from that light switch moment where I believe the stat is this, and I'll probably get the number wrong, but like in the United States here at the beginning, at the end of February, about 2% of the knowledge worker population was virtual, you know, working from home or in a remote work environment. And over the course of about 11 days, that number went from 2% to 70%. Wow. Interesting that it worked, you know, there was a lot of hiccups along the way, and there was a lot of organizations making really quick decisions on how do I enable VPN scale of mass? How do I, you know, leverage, uh, you know, things like WebEx for virtual meetings and virtual connectivity, uh, much faster now that as you said, that we kinda gotten out of the fog of war or frog fog of battle organizations are looking at what they accomplished. >>And it was nothing short of Herculean and looking at this now from a transition to, Oh my gosh, we need to change too. We have an opportunity to change. And we're looking, we see a lot of organizations specifically around, uh, financial services, healthcare, uh, the, uh, the K through 20, uh, educational environment, all looking at how can they do more virtually for a couple of reasons. Obviously there is a significant safety factor. And again, we're still in that we're still on the height of this pandemic. They want to make sure their employees, their customers, students, patients remain safe. But second, um, we've found in, in discussions with a lot of senior it executives that are customers that people are happier working from home. People are more productive working from home. And that, again, the network that's been built over the course of the last few decades has been resilient enough to allow that to happen. >>And then third, there is a potential cost savings here outside of people. The next most expensive resource that organizations are paying for is real estate. If they can shrink that real estate footprint while providing a better user experience at the locations that they're maintaining, again, leveraging things like location services, leveraging things like a unified collaboration. That's very personalized to the end user's experience. They're going to do that. And again, they're going to save money. They're going to have happier employees and ultimately they're going to make their, uh, their employees and their customers a lot safer. So we see, we believe that there is in some parts of the economy, a shift that is going to be more permanent in some estimates, put it as high as 15% of the current workforce is going to >>Stay in a virtual or a semi virtual working environment for the foreseeable future. >>Interesting. And I, and I, and I would say, I'd say 15% is low, especially if you, if you qualify it with, you know, part-time right. I, there was a great interview we were doing and talking about working from home, we used to work from home as the exception, right? Cause the cable person was coming, are you getting a new washing machine or something where now that's probably getting, you know, in many cases we'll shift to the other where I'm generally going to work from home, unless, you know, somebody is in town or having an important meeting or there's some special collaboration, uh, that drives me to be in. But you know, I want to go back to you Kuhn and, and really doubled down on, you know, I think most people spent too much time focusing, especially, we'll just say within the virtual events space where we play on the things you can't do virtually, we can't meet in the hall. >>We can't grab a quick coffee and a drink instead of focusing on the positive things like we're accomplishing right here, you're in Belgium, right. Eric is in Ohio, we're in California. Um, and you know, we didn't take three days to travel and, and check into a hotel and, and all that stuff to get together, uh, for this period of time. So there's a lot of stuff that digital enables. And I think, you know, people need to focus more on that versus continuing to focus on the two or three things that, that it doesn't replace and it doesn't replace those. So let's just get that off the table and move on with our lives. Cause those aren't coming back anytime soon. >>No, totally. I think it's the balance of those things. It's guarding the fact that you're not necessarily working for home. I think the trick there is you could be sleeping at the office, but I think the positives are way, way more outspoken. Um, I, you know, I look at myself, I got much more exercise time in these last couple of months than I usually do because you don't travel. You don't have the jet lag and the connection. And then you talked about those face to face moments. I think a lot of people are in a way, um, wanting to go back to the office part-time as, as Eric also explain, but a lot of it you can do virtually we have virtual coffees with team, or, you know, even here in Belgium, our local general manager has a virtual effort, TIF every Friday, obviously skip the one this week. But, uh, you know, there's, there's ways to be very creative with the technology and the quality of the technology that enables, um, you know, to, to get the best of both worlds. Right? >>So I just, we're going to wrap the segment. I want to give you guys both the last word you both been at Cisco for a while and, you know, Susie, we, and the team on dev net has really grown this thing. I think we were there at the very beginning couple of four or five, six years ago. I can't keep track of time anymore, but it has really, really grown. And, you know, the timing is terrific to get into this more software defined world, which is where we are. I wonder if you could just, you know, kind of share a couple of thoughts as you know, with a little bit of perspective and you know, what you're excited about today and kind of what you see coming down the road since you guys have been there for a while you've been in this space, uh, let's start with Yukon. >>I think the possibility it creates, I think really programmability software defined is really >>About the art of the possible it's what you can dream up and then go code. Um, Eric talked about the relevance of it and how it maximizes the relevance on a customer basis. Um, you know, and then it is the evolution of the teams in terms of the creativity that they can bring to us. We've seen really people dive into that and customers co-creating with us. And I think that's where we're going in terms of the evolution of the value proposition there in terms of what technology can provide, but also how it impacts people as we discussed and redefines process >>That the art of the possible, which is a lot harder to execute in a, in hardware than software certainly takes a lot longer. I'd love to get your, uh, your thoughts. >>Absolutely. So I started my career at Cisco, uh, turning, uh, putting IP phones onto the network. And back then, you know, it was, you know, 2001, 2002, when, uh, the idea of putting telephones onto the network was such a, um, just such an objectionable idea. And so many purists were telling us all the reasons it wouldn't work. Now, if we go forward again, 19 years, the idea of not having them plugging into the network is a ridiculous idea. So we have a, we're looking at an inflection point in this industry and it's really, it's not about programming. It's not necessarily about programming. It's about doing it smarter. It's about being more efficient. It's about driving automation, but again, it's, it's about unlocking the value of what the network is. We've moved so far past. What can, you know, just connectivity, the network touches everything and there's more workload moves to the cloud is more workload moves to things like containers. >>Um, the network is the really, the only common element that ties all of these things together. The network needs to take its rightful place in the end, the it lexicon as being that critical or that critical insight provider, um, for, for how users are interacting with the network, how users are interacting with applications, how applications are interacting with one, another program ability is a way to do that more efficiently, uh, with greater a greater degree of certainty with much greater relevance into the overall delivery of it services and digitization. So to me, I think we're going to look back 20 years from now, probably even 10 and say, man, we used to configure things manually. What was that like? I think, I think really this is, this is the future. And I think we want to be aligned with where we're going versus where we've been. Right. >>Well, Coon, Eric, thank you for sharing your perspective. You know, it's, it's really nice to have, you know, some historical reference, uh, and it's also nice to be living in a new age where you can, you can, you know, stay at the same company and still refresh, you know, new challenges, new opportunities and grow this thing. Cause as you said, I remember those IP first IP phone days and I thought, well, my bell must be happy because the old mother's problem is finally solved. And when we don't have to have a dedicated connection between every mother and every child in the middle of may. So good news. So thank you very much for sharing your, uh, your insights and really, uh, really enjoyed the conversation. >>Thank you. >>We've been covering dev net create for a number of years. I think since the very first show and Susie, we and the team really built, uh, a practice built a company, built a lot of momentum around software in the Cisco ecosystem and in getting devs really to start to build applications and drive kind of the whole software defined networking thing forward. And a big part of that is partners and working with partners and, and developing solutions and, you know, using brain power. That's outside of the four walls of Cisco. So we're excited to have, uh, our next guest, uh, partner for someone is Brad Hoss. He is the engineering director for dev ops at Presidio, Brad. Great to see you. >>Hey Jeff, great to be here. >>And joining him is Chuck Stickney. Chuck is the business development architect for Cisco DevNet partners and he has been driving a whole lot of partner activity for a very long period of time. Chuck, great to see you. >>Thanks Jeff. Great to be here and looking forward to this conversation. >>So let's, let's start with you Chuck, because I think, um, you know, you're leading this kind of partner effort and, and you know, software defined, networking has been talked about for a long time and you know, it's really seems to be maturing and, and software defined everything right. Has been taking over, especially with, with virtualization and moving the flexibility and the customer program ability customability in software and Mo and taking some of that off the hardware. Talk about, you know, the programs that you guys are putting together and how important it is to have partners to kind of move this whole thing forward, versus just worrying about people that have Cisco badges. >>Yeah, Jeff, absolutely. So along this whole journey of dev net where we're, we're trying to leverage that customization and innovation built on top of our Cisco platforms, most of Cisco's business is transacted through partners. And what we hear from our customers and our partners is they want to, our customers want a way to be able to identify, does this partner have the capabilities and the skills necessary to help me go down this automation journey I'm trying to do, do a new implementation. I want to automate that. How can I find a partner to, to get there? And then we have some of our partners that have been building these practices going along this step, in that journey with us for the last six years, they really want to say, Hey, how can I differentiate myself against my competitors and give an edge to my customers to show them that, yes, I have these capabilities. I've built a business practice. I have technology, I have technologists that really understand this capability and they have the dub net certifications to prove it helped me be able to differentiate myself throughout our ecosystem. So that's really what our Danette partner specialization is all about. Right. >>That's great. And Brad, you're certainly one of those partners and I want to get your perspective because partners are oftentimes a little bit closer to the customer cause you've got your kind of own set of customers that you're building solutions and just reflect on, we know what happened, uh, back in March 15th, when basically everybody was told to go home and you can't go to work. So, you know, there's all the memes and social media about who, you know, who pushed forward your digital transformation, the CEO, the CMO, or COVID. And we all know what the answer is, whatever you can share some information as to what happened then, and really for your business and your customers, and then reflect now we're six months into it, six months plus, and, and you know, this new normal is going to continue for a while. How's the customer attitudes kind of changed now that they're kind of buckled down past the light switch moment and really we need to put in place some foundation to carry forward for a very long time potentially. >>Yeah, it's really quite interesting actually, you know, when code first hit, we got a lot of requests to help with automation of provisioning our customers and in the whole, you know, digital transformation got really put on hold for a little bit there and I'd say it became more of, of the workplace transformation. So we were quickly, uh, you know, migrating customers to, you know, new typologies where instead of the, the, you know, users sitting in those offices, they were sitting at home and we had to get them connected rapidly in a, we, we didn't have a lot of success there in those beginning months with, you know, using automation and programmability, um, building, you know, provisioning portals for our customers to get up and running really fast. Um, and that, that, that was what it looked like in those early days. And then over time, I'd say that the asks from our customers has started to transition a little bit. >>You know, now they're asking, you know, how can I take advantage of the technology to, you know, look at my offices in a different way, you know, for example, you know, how many people are coming in and out of those locations, you know, what's the usage of my conference rooms. Um, are there, uh, are there, um, situations where I can use that information? Like how many people are in the building and at a certain point in time and make real estate decisions on that, you know, like, do I even need this office anymore? So, so the conversations have really changed in, in ways that you couldn't have imagined before March. >>Right. And I wonder with, with you Chuck, in terms of the Cisco point of view, I mean, the network is amazing. It had had, COVID struck five years ago, 10 years ago, 15 years ago, you know, clearly there's a lot of industries that are suffering badly entertainment, um, restaurant, business, transportation, they, you know, hospitality, but for those of us in kind of the information industry, the switch was pretty easy. Um, you know, and, and the network enables the whole thing. And so I wonder if, you know, kind of from your perspective as, as suddenly, you know, the importance of the network, the importance of security and the ability now to move to this new normal very quickly from a networking perspective. And then on top of that, having, you know, dev net with, with the software defined on top, you guys were pretty much in a good space as good as space as you could be given this new challenge thrown at you. >>Yeah, Jeff, we completely agree with that. Uh, Cisco has always pushed the idea that the network is transformational. The network is the foundation, and as our customers have really adopted that message, it is enabled that idea for the knowledge workers to be able to continue on. So for myself, I've, I've worked for home the entire time I've been at Cisco. So the last 13 years, this is, you know, the, the change to the normalcy is I never get on a plane anymore, but my day to day functions are still the same. And it's built because of the capabilities we have with the network. I think the transition that we've seen in the industry, as far as kind of moving to that application type of economy, as we go to microservices, as we go to a higher dependency upon cloud, those things have really enabled the world really to be able to better respond to this, to this COVID situation. And I think it's helped to, to justify the investments that's that our customers have made as well as what our partners have been, being able to do to deliver on that multicloud capability, to take those applications, get them closer to the end user instead of sitting in a common data center and then making it more applicable to, to users wherever they may be, not just inside of that traditional four walls. >>Right, right. That's interesting. And Brad, you, you made a comment on another interview. I was watching getting ready for this one in terms of, uh, applications now being first class citizens was, was what you said. And it's kind of interesting coming from an infrastructure point of view, where before it was, you know, what do I have and what can I build on it now, I really it's the infrastructure that responds back to the application. And even though you guys are both in the business of, of networking and infrastructure, it's still this recognition that apps first is the way to go, because that gives people the competitive advantage that it gives them the ability to react in the marketplace and to innovate and move faster. So, you know, it's, it's a really interesting twist to be able to support an application first, by having a software defined in a more programmable infrastructure stack. >>Yeah, no doubt. And, you know, I think that the whole push to cloud was really interesting in the early days, it was like, Hey, we're going to change our applications to be cloud first. You know? And then I think the terminology changed over time, um, to more cloud native. So when we, when we look at what cloud has done over the past five years with customers moving, you know, their, their assets into the cloud in the early days that we were all looking at it just >>Like another data center, but what it's really become is a place to host your applications. So when we talk about cloud migrations with our customers now, we're, we're no longer talking about, you know, the assets per se, we're talking about the applications and what, what did those applications look like? And even what defines an application right now, especially with the whole move to cloud native and microservices in the automation that helps make that all happen with infrastructure as code. You're now able to bundle the infrastructure with those applications together as a single unit. So when you define that application, as infrastructure, as code the application in the definition of what those software assets for the infrastructure are, all are wrapped together and you've got change control, version control, um, and it's all automated, you know, it's, it's a beautiful thing. And I think it's something that we've all kind of hoped would happen. >>You know, when I look back at the early definitions of software defined networking, I think everybody was trying to figure it out and they didn't really fully understand what that meant now that we can actually define what that network infrastructure could look like as it's, as it's wrapped around that application in a code template, maybe that's Terraform or Ansible, whatever that might be, whatever method or tool that you're using to, to bring it all together. It's, it's, you know, it's really interesting now, I think, I think we've gotten to the point where it's starting to make a lot more sense than, you know, those early days of SDN, uh we're out, you know, it was a, was it a controller or is it a new version of SNMP? You know, now it makes sense. It's actually something tangible. Right, >>Right. But still check, as you said, right. There's still a lot of API APIs and there's still a lot of component pieces to these applications that are all run off the network that all have to fit, uh, that had to fit together. You know, we cover PagerDuty summit and you know, their whole thing is trying to find out where the, where the problems are within the very few microseconds that you have before the customer abandons their shopping cart or whatever the particular application. So again, the network infrastructure and the program ability super important. But I wonder if you could speak to the automation because there's just too much stuff going on for individual people to keep track of, and they shouldn't be keeping track of it because they need to be focusing on the important stuff, not this increasing amount of bandwidth and traffic going through the network. >>Yeah, absolutely. Jeff said the bandwidth that's necessary in order to support everybody working from home to support this video conference. I mean, we, we used to do this sitting face to face. Now we're doing this over the internet. The amount of people necessary to, to be able to facilitate that type of traffic. If we're doing it the way we did 10 years ago, we would not >>Scale it's automation. That makes that possible. That allows us to look higher up the ability to do that automatic provisional provisioning. Now that we're in microservices now that everything is cloud native, we have the ability to, to better, to better adjust to and adapt to changes that happen with the infrastructure below hand. So if something goes wrong, we can very quickly spend something up to take that load off where traditionally it was open up a ticket. Let me get someone in there, let me fix it. Now it's instantaneously identify the solution, go to my playbook, figure out exactly what solution I need to deploy and put that out there. And the network engineering team, the infrastructure engineering team, they just simply need to get notified that this happened. And as long as there's traceability and a point that Brad made, as far as you being able to go through here doing the automation of the documentation side of it. >>I know when I was a network engineer, one of the last things we ever did was documentation. But now that we have the API is from the infrastructure. And then the ability to tie that into other systems like an IP address management or a change control, or a trouble ticketing system, that whole idea of I made an infrastructure change. And now I can automatically do that documentation update and record. I know who did it. I know when they did it and I know what they did, and I know what the test results were even five years ago, that was fantasy land. Now, today that's just the new normal, that's just how we all operate. >>Right. Right, right. So I want to get your take on the other trend, which is cloud multicloud, public cloud. You know, as, as I think you said Brad, when public cloud first came out, there was kind of this, this rush into, we're going to throw everything in there then for, for, for different reasons. People decided maybe that's not the best, the best solution, but really it's horses for courses. Right. And, and I think it was pretty interesting that, that you guys are all supporting the customers that are trying to figure out where they're going to put their workloads. And Oh, by the way, that might not be a static place, right. It might be moving around based on, you know, maybe I do my initial dev and, and, and Amazon. And then when I go into production, maybe I want to move it into my data center. >>And then maybe I'm having a big promotion or something I want to flex capability. So from, from your perspective and helping customers work through this, because still there's a lot of opinions about what is multicloud, what is hybrid cloud and, you know, it's horses for courses. How are you helping people navigate that? And what does having programmable infrastructure enable you to do for helping customers kind of sort through, you know, everybody talks about their journey. I think there's still kind of bumbling down, bumbling down paths, trying to find new things, what works, what doesn't work. And I think it's still really early days and trying to mesh all this stuff together. Yeah, >>Yeah. No doubt. It is still early days. And you know, I, I, I go back to it being application centric because, you know, being able to understand that application, when you move to the cloud, it may not look like, what did he still look like when you, when you move it over there, you may be breaking parts off of it. Some of them might be running on a platform as a service while other pieces of it are running as infrastructure as a service. >>And some of it might still be in your data center. Those applications are becoming much more complex than they used to be because we're breaking them apart into different services. Those services could live all over the place. So with automation, we really gain the power of being able to combine those things. As I mentioned earlier, those resources, wherever they are, can be defined in that infrastructure as code and automation. But you know, the side from provisioning, I think we focus a lot about provisioning. When we talk about automation, we also have these amazing capabilities on, on the side of operations too. Like we've got streaming telemetry in the ability to, to gain insights into what's going on in ways that we didn't have before, or at least in the, in, you know, in the early days of monitoring software, right. You knew exactly what that device was, where it was. >>It probably had a friendly name, like maybe it was, uh, something from the Hobbit right now. You've got things coming up and spinning and spinning up and spinning down, moving all over the place. And that thing you used to know what that was. Now, you have to quickly figure out where it went. So the observability factor is a huge thing that I think everybody should be paying attention to attention, to moving forward with regards to when you're moving things to the cloud or even to other data centers or, you know, in your premise, um, breaking that into microservices, you really need to understand what's going on in the, you know, programmability and API APIs and, you know, yang models are tied into streaming telemetry. Now there's just so many great things coming out of this, you know, and it's all like a data structure that, that people who are going down this path and the dev net path, they're learning these data structures and being able to rationalize and make sense of them. And once you understand that, then all of these things come together, whether it's cloud or a router or switch, um, Amazon, you know, it doesn't matter. You're, you're all speaking a common language, which is that data structure. >>That's great. Chuck, I want to shift gears a little bit, cause there was something that you said in another interview when I was getting ready for this one about, about Deb, not really opening up a whole different class of partners for Cisco, um, as, as really more of a software, a software lead versus kind of the traditional networking lead. I wonder if you can put a little more color on that. Um, because clearly as you said, partners are super important. It's your primary go to market and, and Presidios, I'm sure the best partner that you have in the whole world that's and you know, you said there's some, there's some non traditional people that would not ever be a Cisco partner that suddenly you guys are playing with because of really software lead. >>Yeah. Jeff that's exactly right. So as we've been talking to folks with dev nets and whether it'd be at one of the Cisco live events in the dev net zone or at the prior dev net create events, we'll have, we'll have people come up to us who Cisco today views us as a customer because they're not in our partner ecosystem. They want to be able to deliver these capabilities to our customers, but they have no interest in being in the resell market. This what we're doing with the dev that specialization gives us the ability to bring those partners into the ecosystem, share them with our extremely large dev net community so they can get access to those, to those potential customers. But also it allows us to do partner to partner type of integration. So Brad and Presidio, they built a fantastic networking. They always have the fantastic networking business, but they built this fantastic automation business that's there, but they may come into, into a scenario where it's working with their vertical and working with the technology piece, that they may not have an automation practice for. >>We can leverage some of these software specific partners to come in there and do a joint, go to markets where, so they can go where that traditional channel partner can leverage their deep Cisco knowledge in those customer relationships that they have and bring in that software partner almost as a subcontractor to help them deliver that additional business value on top of that traditional stack, that brings us to this business outcomes. If the customers are looking for and a much faster fashion and a much more collaborative fashion, that's terrific. Well, again, it's a, it's, it's unfortunate that we can't be in person. I mean, the, the Cisco dev net shows, you know, they're still small, they're still intimate. There's still a lot of, uh, information sharing and, you know, great to see you. And like I said, we've been at the computer museum, I think the last couple of years and in, in San Francisco. So I look forward to a time that we can actually be together, uh, maybe, maybe for next year's event, but, uh, thank you very much for stopping by and sharing the information. Really appreciate it. It happens happy to be here >>From around the globe. It's the cube presenting, accelerating automation with dev net brought to you by Cisco. What I'm Sean for the cube, your host for accelerating automation with dev net with Cisco. And we're here to close out the virtual event with Mindy Whaley, senior director, Mandy, take it away. >>Thank you, John. It's been great to be here at this virtual event, hearing all these different automation stories from our different technology groups, from customers and partners. And what I'd like to take a minute now is to let people know how they can continue this experience at dev net create, which is our free virtual event happening globally. On October 13th, there's going to be some really fun stuff. We're going to have our annual demo jam, which is kind of like an open for demos where the community gets to show what they've been building. We're also going to be, um, giving out and recognizing our dev net creator award winners for this year, which is a really great time where we recognize our community contributors who have been giving back to the community throughout the year. And then we find really interesting channels. We have our creators channels, which is full of technical talks, lightening talks. >>This is where our community, external Cisco people come in share what they've been working on, what they've been working learning during the year. We also have a channel called API action, which is where you can go deep into IOT or collaboration or data center automation and get demos talks from engineers on how to do certain use cases. And also a new segment called straight from engineering, where you get to hear from the engineers, building those products as well. And we have a start now for those people just getting started, who may need to dive into some basics around coding, API APIs and get that's a whole channel dedicated to getting them started so that they can start to participate in some of the fun challenges that we're going to have during the event. And we're going to have a few fun things. Like we have some definite, um, advocate team members who are awesome, musically talented. They're going to share some performances with us. So, um, we encourage everyone to join us there. Pick your favorite channel, uh, join us in whichever time zone you live in. Cause we'll be in three different time zones. And, um, we would love for you to be there and to hear from you during the event. >>That's awesome. Very innovative, multiple time zones, accelerating automation with dev net. Thank you so much for watching and we'll see you at dev net create thanks for watching.
SUMMARY :
the way we work and the kinds of work that we do, the cube has pulled They're going to help us understand how to apply automation to your into the theme, accelerating automation with dev net, because you said to me, to get there, what you need to do is automate everything. you know, not to get in the weeds, but you know, switches and hubs and wireless. kind of, you know, just, you know, uh, blocked off rooms to really be secure And they had to, because you couldn't just go into a server room and tweak your servers, So those things, again, all dev ops and you know, you guys got some acquisitions youth about thousand And, um, you know, going back to Todd Nightingale, right. So all of a sudden CEOs were actually, you know, calling on the heads of it and the CIO and saying, It's also about people rising to the level of, you know, I know you got to go, but stay with us. Thank you so much. And one of the things that's close to your heart starting to look at, you know, things like DevSecOps engineer, network, And then how do people build the skills to be Eric, I want to go to you for a quick second on this, um, um, piece of getting the certifications. So, you know, as opposed to in person where you know, helping you answer questions, helping provide content. I got to ask you on the trends around automation, what skills all of the different parameters that it departments might care about, about their firewalls, things that you do normally out, okay, now I can take that and I can adapt it to what I need to see for my observability. it's going to be a focus and people are at home and you guys had a lot of content online for you recorded every who want to be able to, you know, dive into a topic, do a hands on lab, you know, read the instructions, read the manual, do the deeper learning. you know, end to end programmability and with everything as a service that you guys are doing everything with API with you at every definite event over the past years, you know, that's bringing APIs across our action going on in cloud native right now, your thoughts? So, whereas it used to be, you know, confined by the walls that we were within for the event. So I'm really excited to bring that whole mix together, as well as getting some of our business units together it is it it's happening in three regions and um, you know, we're so excited to see the people So thank you so much for taking the time to come on the cube and talk about Thank you so much for watching and we'll see you at dev net create thanks for watching Jeffrey Hey, good to see you too. you know, especially like back in March and April with this light moment, which was, customers when suddenly, you know, March 16th hit and everybody had to go home? And you know, it was 2000, he still West, You know, it's, it's amazing to think, you know, had this happened, you know, five years ago, but as I said, resiliency just became so much more important than, you know, you know, kind of how the market is changing, how you guys are reacting and really putting the things in place to you know, most people call hybrid cloud or multi-cloud, uh, in, in the end, what it is, And so really what you want to put in place is what we call like the cloud on ramp, on the things that they should be focusing and not stuff that, that hopefully you can, you know, And it said the tech line, I have, you know, sometimes when my mind is really going from a Some just, you know, I use these API APIs and use normal And it's funny, we, we recently covered, you know, PagerDuty and, and they highlight what And what traditional process you have a request network, operation teams executes the request opportunity that the dev ops or the application team actually says, Hey, I got to write a whole infrastructure You know, cause the, you know, the DevOps culture has taken over a lot, none of this is really actually, you know, a little bit of credit, maybe some of us where we have a vision, Uh, and so that is the emotion we're in for all the, you know, And I wonder if, you know, when you look at what's happened with public cloud and Uh, and that just drives then what tools do you want to have available to actually Then they have the ability to react to, uh, to some of these requirements. And that's really in the enticing. They just want to, you know, deliver business benefit to their customers and respond to, uh, network provides something and you use to, uh, this is what I want to do. They have all the capabilities there. Is it the CEO, the CMO or COVID, and we all know the answer to the question. you know, the best reasons you can have. Lots of information is kind of, it's still kind of that early vibe, you know, where everyone is still really enthusiastic with automation and programmability I mean, we were, you know, we, we, it was in the back of our minds in January, you know, um, remote work, remote education, you know, that 16%, you know, going forward indefinitely. Yeah, I just think, uh, from a mindset standpoint, you know, what was optional, And essentially the way you describe it, as you know, your job as a security practitioner And so the question is, you know, how, how do we up our game there so that we I want to ask you about automation generally, and then specifically how it applies to security. Um, you know, just because you can automate something doesn't mean you should, the bad guys, the adversaries are essentially, you know, weaponizing using your you know, having the automation to contain them, to eradicate them, uh, GDP, but guys, I wonder if you could bring up the chart because when you talk to CSOs and you ask And so you can see on the horizontal axis, you've got a big presence in the data set. Um, that's the frustration customers have, you know, cloud I'm safe, but you know, of course we know it's a shared responsibility model. I think cloud, um, when you look at the services that are delivered via the cloud, but, you know, I wonder if you could, you could talk a little bit about that trend and where you see it going. for, um, you know, doing all the machine scale stuff. It's good from the standpoint of awareness, you know, you may or may not care if you're a social media user. for one community might be, you know, not the same for the other. you know, society has to really, really take this on as your premise. front of the room and said, you know, all you techies, you judge efficiency by how long it takes. so to that point, but, um, so what, what else are you working on these days that, uh, again, you know, all of these security tools, no matter how fancy it is, You know, the, you know, And it's so familiar to me because, you know, um, I, of, you know, of silo busters, isn't it? So I really appreciate the time you spend on the cube. You have the keys to the kingdom, you know, their, their walls outside of the Cisco network operators, network engineers. And I think, you know, that change alone really kind of amplified. you got a ton of modern apps running along for these networks. And then those applications themselves are becoming now, as you mentioned, distributed largely based upon to be able to see, to gain that visibility, that experience, you know, to measure it and understand, It's funny, you know, I was getting to some of these high scale environments, a lot of these concepts are converging. But what we talk about right aside, you know, data alone, doesn't solve that problem. to process that data very quickly, allow you to be able to see the unseen, And you take it to a whole nother level. you to be able to gain that visibility down to that last mile of connectivity. to see, unless you have the ability to see comprehensively from the user but you got the cloud. And where do you need to focus your attention? They're having to work collaboratively with the different ISP that they're appearing with with their It's got to ask you the question. And so by leveraging thousand eyes on a continuous basis, it gives you the ability to see And then furthermore, you can be begin to use that as you mentioned, in terms of your vitamin type of an analogy, You got handle the baseline as you pointed out, and the upside music experience connectivity, And automation plays a key role of allowing you to be able to then put that through your workflow. And you know, you know, you guys got that. And I think what I would say is, you know, is going to be, you know, viable and capable. I appreciate it. Now, part of Cisco, John, for your host of the cube cube Even prior to the pandemic, there was a mandate to automate the You really have to automate your human labor. He's the director of systems engineering for Cisco. I saw an old presentation that you were giving from 2006 And the only time you hear about them is when a flag gets thrown. Um, and how, you know, the role of it has changed as a company is completely shifting gears over to the S you know, really software defined side. And that is just, you know, quite, quite significant in, a book, a big book and, you know, throw some protocols in and probably block a bunch of ports to We're seeing a massive explosion of devices by the I, you know, it's estimated by the end security is, as you said, not about perimeters. going to be untenable, undercurrent, you know, just current security practices. And I think it's interesting what you talked about, uh, Is IOT and five G. And I think, you know, you talk about 3.7 million devices And then you look at the role of programmability within that. And I just thought it was really cute the way that you clearly got people motivated, And that you think about, and you hit on this when we were, of that mission, continuing to enable the world to communicate, continuing, and I am going to go out and I'm going to achieve the certification myself, because I want to continue to If it's important, then why, you know, you should do it too. it's the acute crisis is over, you know, this is going to drive a real change you know, leverage, uh, you know, things like WebEx for virtual meetings and virtual connectivity, And that, again, the network that's been built over the course of the last few decades has been And again, they're going to save money. you know, in many cases we'll shift to the other where I'm generally going to work from home, unless, you know, And I think, you know, people need to focus more on that And then you talked about those face to face moments. And, you know, the timing is terrific to get into this more software defined world, About the art of the possible it's what you can dream up and then go code. That the art of the possible, which is a lot harder to execute in a, in hardware than software And back then, you know, it was, you know, 2001, 2002, And I think we want to be aligned with where we're going you know, some historical reference, uh, and it's also nice to be living in a new age where you can, you know, using brain power. Chuck is the business development architect for Cisco DevNet Talk about, you know, the programs that you guys are putting together and how important it is to have partners to kind and the skills necessary to help me go down this automation journey I'm trying to do, And we all know what the answer is, whatever you can share some information as to what happened then, and in the whole, you know, digital transformation got really put on hold for You know, now they're asking, you know, how can I take advantage of the technology to, And so I wonder if, you know, kind of from your perspective as, as suddenly, So the last 13 years, this is, you know, the, the change to the normalcy is I And even though you guys are both in the business of, of networking and infrastructure, it's still this recognition And, you know, I think that the whole push to cloud was really interesting we're, we're no longer talking about, you know, the assets per se, we're talking about the applications starting to make a lot more sense than, you know, those early days of SDN, You know, we cover PagerDuty summit and you know, their whole thing is trying to find out Jeff said the bandwidth that's necessary in order to support everybody working And as long as there's traceability and a point that Brad made, as far as you being able to go through here doing the automation And then the ability to tie that into other systems And, and I think it was pretty interesting that, that you guys are all supporting the customers And what does having programmable infrastructure enable you to do I go back to it being application centric because, you know, But you know, the side from provisioning, I think we focus a lot about provisioning. things to the cloud or even to other data centers or, you know, in your premise, and Presidios, I'm sure the best partner that you have in the whole world that's and you one of the Cisco live events in the dev net zone or at the prior dev net create events, There's still a lot of, uh, information sharing and, you know, great to see you. accelerating automation with dev net brought to you by Cisco. And then we find really interesting channels. And also a new segment called straight from engineering, where you get to hear from the engineers, Thank you so much for watching and we'll see you at dev net create thanks
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Mandy | PERSON | 0.99+ |
Sylvia | PERSON | 0.99+ |
Cisco | ORGANIZATION | 0.99+ |
Eric | PERSON | 0.99+ |
Susie | PERSON | 0.99+ |
John | PERSON | 0.99+ |
Susie Mandy | PERSON | 0.99+ |
two | QUANTITY | 0.99+ |
California | LOCATION | 0.99+ |
Joe Vaccaro | PERSON | 0.99+ |
Dave Volante | PERSON | 0.99+ |
Jeff Frick | PERSON | 0.99+ |
Microsoft | ORGANIZATION | 0.99+ |
2006 | DATE | 0.99+ |
Alice | PERSON | 0.99+ |
Joe | PERSON | 0.99+ |
Eric nappy | PERSON | 0.99+ |
Ohio | LOCATION | 0.99+ |
Belgium | LOCATION | 0.99+ |
Europe | LOCATION | 0.99+ |
Thomas Scheiber | PERSON | 0.99+ |
Bob | PERSON | 0.99+ |
October | DATE | 0.99+ |
January | DATE | 0.99+ |
Barcelona | LOCATION | 0.99+ |
2002 | DATE | 0.99+ |
Asia | LOCATION | 0.99+ |
March | DATE | 0.99+ |
Susie Lee | PERSON | 0.99+ |
Jeff | PERSON | 0.99+ |
2% | QUANTITY | 0.99+ |
China | LOCATION | 0.99+ |
Dave | PERSON | 0.99+ |
Armstrong and Guhamad and Jacques V2
>>from around the globe. It's the Cube covering >>space and cybersecurity. Symposium 2020 hosted by Cal Poly >>Over On Welcome to this Special virtual conference. The Space and Cybersecurity Symposium 2020 put on by Cal Poly with support from the Cube. I'm John for your host and master of ceremonies. Got a great topic today in this session. Really? The intersection of space and cybersecurity. This topic and this conversation is the cybersecurity workforce development through public and private partnerships. And we've got a great lineup. We have Jeff Armstrong's the president of California Polytechnic State University, also known as Cal Poly Jeffrey. Thanks for jumping on and Bang. Go ahead. The second director of C four s R Division. And he's joining us from the office of the Under Secretary of Defense for the acquisition Sustainment Department of Defense, D O D. And, of course, Steve Jake's executive director, founder, National Security Space Association and managing partner at Bello's. Gentlemen, thank you for joining me for this session. We got an hour conversation. Thanks for coming on. >>Thank you. >>So we got a virtual event here. We've got an hour, have a great conversation and love for you guys do? In opening statement on how you see the development through public and private partnerships around cybersecurity in space, Jeff will start with you. >>Well, thanks very much, John. It's great to be on with all of you. Uh, on behalf Cal Poly Welcome, everyone. Educating the workforce of tomorrow is our mission to Cal Poly. Whether that means traditional undergraduates, master students are increasingly mid career professionals looking toe up, skill or re skill. Our signature pedagogy is learn by doing, which means that our graduates arrive at employers ready Day one with practical skills and experience. We have long thought of ourselves is lucky to be on California's beautiful central Coast. But in recent years, as we have developed closer relationships with Vandenberg Air Force Base, hopefully the future permanent headquarters of the United States Space Command with Vandenberg and other regional partners, we have discovered that our location is even more advantages than we thought. We're just 50 miles away from Vandenberg, a little closer than u C. Santa Barbara, and the base represents the southern border of what we have come to think of as the central coast region. Cal Poly and Vandenberg Air force base have partner to support regional economic development to encourage the development of a commercial spaceport toe advocate for the space Command headquarters coming to Vandenberg and other ventures. These partnerships have been possible because because both parties stand to benefit Vandenberg by securing new streams of revenue, workforce and local supply chain and Cal Poly by helping to grow local jobs for graduates, internship opportunities for students, and research and entrepreneurship opportunities for faculty and staff. Crucially, what's good for Vandenberg Air Force Base and for Cal Poly is also good for the Central Coast and the US, creating new head of household jobs, infrastructure and opportunity. Our goal is that these new jobs bring more diversity and sustainability for the region. This regional economic development has taken on a life of its own, spawning a new nonprofit called Reach, which coordinates development efforts from Vandenberg Air Force Base in the South to camp to Camp Roberts in the North. Another factor that is facilitated our relationship with Vandenberg Air Force Base is that we have some of the same friends. For example, Northrop Grumman has has long been an important defense contractor, an important partner to Cal poly funding scholarships and facilities that have allowed us to stay current with technology in it to attract highly qualified students for whom Cal Poly's costs would otherwise be prohibitive. For almost 20 years north of grimness funded scholarships for Cal Poly students this year, their funding 64 scholarships, some directly in our College of Engineering and most through our Cal Poly Scholars program, Cal Poly Scholars, a support both incoming freshman is transfer students. These air especially important because it allows us to provide additional support and opportunities to a group of students who are mostly first generation, low income and underrepresented and who otherwise might not choose to attend Cal Poly. They also allow us to recruit from partner high schools with large populations of underrepresented minority students, including the Fortune High School in Elk Grove, which we developed a deep and lasting connection. We know that the best work is done by balanced teams that include multiple and diverse perspectives. These scholarships help us achieve that goal, and I'm sure you know Northrop Grumman was recently awarded a very large contract to modernized the U. S. I. C B M Armory with some of the work being done at Vandenberg Air Force Base, thus supporting the local economy and protecting protecting our efforts in space requires partnerships in the digital realm. How Polly is partnered with many private companies, such as AWS. Our partnerships with Amazon Web services has enabled us to train our students with next generation cloud engineering skills, in part through our jointly created digital transformation hub. Another partnership example is among Cal Poly's California Cybersecurity Institute, College of Engineering and the California National Guard. This partnership is focused on preparing a cyber ready workforce by providing faculty and students with a hands on research and learning environment, side by side with military, law enforcement professionals and cyber experts. We also have a long standing partnership with PG and E, most recently focused on workforce development and redevelopment. Many of our graduates do indeed go on to careers in aerospace and defense industry as a rough approximation. More than 4500 Cal Poly graduates list aerospace and defense as their employment sector on linked in, and it's not just our engineers and computer sciences. When I was speaking to our fellow Panelists not too long ago, >>are >>speaking to bang, we learned that Rachel sins, one of our liberal arts arts majors, is working in his office. So shout out to you, Rachel. And then finally, of course, some of our graduates sword extraordinary heights such as Commander Victor Glover, who will be heading to the International space station later this year as I close. All of which is to say that we're deeply committed the workforce, development and redevelopment that we understand the value of public private partnerships and that were eager to find new ways in which to benefit everyone from this further cooperation. So we're committed to the region, the state in the nation and our past efforts in space, cybersecurity and links to our partners at as I indicated, aerospace industry and governmental partners provides a unique position for us to move forward in the interface of space and cybersecurity. Thank you so much, John. >>President, I'm sure thank you very much for the comments and congratulations to Cal Poly for being on the forefront of innovation and really taking a unique progressive. You and wanna tip your hat to you guys over there. Thank you very much for those comments. Appreciate it. Bahng. Department of Defense. Exciting you gotta defend the nation spaces Global. Your opening statement. >>Yes, sir. Thanks, John. Appreciate that day. Thank you, everybody. I'm honored to be this panel along with President Armstrong, Cal Poly in my long longtime friend and colleague Steve Jakes of the National Security Space Association, to discuss a very important topic of cybersecurity workforce development, as President Armstrong alluded to, I'll tell you both of these organizations, Cal Poly and the N S. A have done and continue to do an exceptional job at finding talent, recruiting them in training current and future leaders and technical professionals that we vitally need for our nation's growing space programs. A swell Asare collective National security Earlier today, during Session three high, along with my colleague Chris Hansen discussed space, cyber Security and how the space domain is changing the landscape of future conflicts. I discussed the rapid emergence of commercial space with the proliferations of hundreds, if not thousands, of satellites providing a variety of services, including communications allowing for global Internet connectivity. S one example within the O. D. We continue to look at how we can leverage this opportunity. I'll tell you one of the enabling technologies eyes the use of small satellites, which are inherently cheaper and perhaps more flexible than the traditional bigger systems that we have historically used unemployed for the U. D. Certainly not lost on Me is the fact that Cal Poly Pioneer Cube SATs 2020 some years ago, and they set the standard for the use of these systems today. So they saw the valiant benefit gained way ahead of everybody else, it seems, and Cal Poly's focus on training and education is commendable. I especially impressed by the efforts of another of Steve's I colleague, current CEO Mr Bill Britain, with his high energy push to attract the next generation of innovators. Uh, earlier this year, I had planned on participating in this year's Cyber Innovation Challenge. In June works Cal Poly host California Mill and high school students and challenge them with situations to test their cyber knowledge. I tell you, I wish I had that kind of opportunity when I was a kid. Unfortunately, the pandemic change the plan. Why I truly look forward. Thio feature events such as these Thio participating. Now I want to recognize my good friend Steve Jakes, whom I've known for perhaps too long of a time here over two decades or so, who was in acknowledge space expert and personally, I truly applaud him for having the foresight of years back to form the National Security Space Association to help the entire space enterprise navigate through not only technology but Polly policy issues and challenges and paved the way for operational izing space. Space is our newest horrifying domain. That's not a secret anymore. Uh, and while it is a unique area, it shares a lot of common traits with the other domains such as land, air and sea, obviously all of strategically important to the defense of the United States. In conflict they will need to be. They will all be contested and therefore they all need to be defended. One domain alone will not win future conflicts in a joint operation. We must succeed. All to defending space is critical as critical is defending our other operational domains. Funny space is no longer the sanctuary available only to the government. Increasingly, as I discussed in the previous session, commercial space is taking the lead a lot of different areas, including R and D, A so called new space, so cyber security threat is even more demanding and even more challenging. Three US considers and federal access to and freedom to operate in space vital to advancing security, economic prosperity, prosperity and scientific knowledge of the country. That's making cyberspace an inseparable component. America's financial, social government and political life. We stood up US Space force ah, year ago or so as the newest military service is like the other services. Its mission is to organize, train and equip space forces in order to protect us and allied interest in space and to provide space capabilities to the joint force. Imagine combining that US space force with the U. S. Cyber Command to unify the direction of space and cyberspace operation strengthened U D capabilities and integrate and bolster d o d cyber experience. Now, of course, to enable all of this requires had trained and professional cadre of cyber security experts, combining a good mix of policy as well as high technical skill set much like we're seeing in stem, we need to attract more people to this growing field. Now the D. O. D. Is recognized the importance of the cybersecurity workforce, and we have implemented policies to encourage his growth Back in 2013 the deputy secretary of defense signed the D. O d cyberspace workforce strategy to create a comprehensive, well equipped cyber security team to respond to national security concerns. Now this strategy also created a program that encourages collaboration between the D. O. D and private sector employees. We call this the Cyber Information Technology Exchange program or site up. It's an exchange programs, which is very interesting, in which a private sector employees can naturally work for the D. O. D. In a cyber security position that spans across multiple mission critical areas are important to the d. O. D. A key responsibility of cybersecurity community is military leaders on the related threats and cyber security actions we need to have to defeat these threats. We talk about rapid that position, agile business processes and practices to speed up innovation. Likewise, cybersecurity must keep up with this challenge to cyber security. Needs to be right there with the challenges and changes, and this requires exceptional personnel. We need to attract talent investing the people now to grow a robust cybersecurity, workforce, streets, future. I look forward to the panel discussion, John. Thank you. >>Thank you so much bomb for those comments and you know, new challenges and new opportunities and new possibilities and free freedom Operating space. Critical. Thank you for those comments. Looking forward. Toa chatting further. Steve Jakes, executive director of N. S. S. A Europe opening statement. >>Thank you, John. And echoing bangs thanks to Cal Poly for pulling these this important event together and frankly, for allowing the National Security Space Association be a part of it. Likewise, we on behalf the association delighted and honored Thio be on this panel with President Armstrong along with my friend and colleague Bonneau Glue Mahad Something for you all to know about Bomb. He spent the 1st 20 years of his career in the Air Force doing space programs. He then went into industry for several years and then came back into government to serve. Very few people do that. So bang on behalf of the space community, we thank you for your long life long devotion to service to our nation. We really appreciate that and I also echo a bang shot out to that guy Bill Britain, who has been a long time co conspirator of ours for a long time and you're doing great work there in the cyber program at Cal Poly Bill, keep it up. But professor arms trying to keep a close eye on him. Uh, I would like to offer a little extra context to the great comments made by by President Armstrong and bahng. Uh, in our view, the timing of this conference really could not be any better. Um, we all recently reflected again on that tragic 9 11 surprise attack on our homeland. And it's an appropriate time, we think, to take pause while the percentage of you in the audience here weren't even born or babies then For the most of us, it still feels like yesterday. And moreover, a tragedy like 9 11 has taught us a lot to include to be more vigilant, always keep our collective eyes and ears open to include those quote eyes and ears from space, making sure nothing like this ever happens again. So this conference is a key aspect. Protecting our nation requires we work in a cybersecurity environment at all times. But, you know, the fascinating thing about space systems is we can't see him. No, sir, We see Space launches man there's nothing more invigorating than that. But after launch, they become invisible. So what are they really doing up there? What are they doing to enable our quality of life in the United States and in the world? Well, to illustrate, I'd like to paraphrase elements of an article in Forbes magazine by Bonds and my good friend Chuck Beans. Chuck. It's a space guy, actually had Bonds job a fuse in the Pentagon. He is now chairman and chief strategy officer at York Space Systems, and in his spare time he's chairman of the small satellites. Chuck speaks in words that everyone can understand. So I'd like to give you some of his words out of his article. Uh, they're afraid somewhat. So these are Chuck's words. Let's talk about average Joe and playing Jane. Before heading to the airport for a business trip to New York City, Joe checks the weather forecast informed by Noah's weather satellites to see what pack for the trip. He then calls an uber that space app. Everybody uses it matches riders with drivers via GPS to take into the airport, So Joe has lunch of the airport. Unbeknownst to him, his organic lunch is made with the help of precision farming made possible through optimized irrigation and fertilization, with remote spectral sensing coming from space and GPS on the plane, the pilot navigates around weather, aided by GPS and nose weather satellites. And Joe makes his meeting on time to join his New York colleagues in a video call with a key customer in Singapore made possible by telecommunication satellites. Around to his next meeting, Joe receives notice changing the location of the meeting to another to the other side of town. So he calmly tells Syria to adjust the destination, and his satellite guided Google maps redirects him to the new location. That evening, Joe watches the news broadcast via satellite. The report details a meeting among world leaders discussing the developing crisis in Syria. As it turns out, various forms of quote remotely sensed. Information collected from satellites indicate that yet another band, chemical weapon, may have been used on its own people. Before going to bed, Joe decides to call his parents and congratulate them for their wedding anniversary as they cruise across the Atlantic, made possible again by communications satellites and Joe's parents can enjoy the call without even wondering how it happened the next morning. Back home, Joe's wife, Jane, is involved in a car accident. Her vehicle skids off the road. She's knocked unconscious, but because of her satellite equipped on star system, the crash is detected immediately and first responders show up on the scene. In time, Joe receives the news books. An early trip home sends flowers to his wife as he orders another uber to the airport. Over that 24 hours, Joe and Jane used space system applications for nearly every part of their day. Imagine the consequences if at any point they were somehow denied these services, whether they be by natural causes or a foreign hostility. And each of these satellite applications used in this case were initially developed for military purposes and continue to be, but also have remarkable application on our way of life. Just many people just don't know that. So, ladies and gentlemen, now you know, thanks to chuck beans, well, the United States has a proud heritage being the world's leading space faring nation, dating back to the Eisenhower and Kennedy years. Today we have mature and robust systems operating from space, providing overhead reconnaissance to quote, wash and listen, provide missile warning, communications, positioning, navigation and timing from our GPS system. Much of what you heard in Lieutenant General J. T. Thompson earlier speech. These systems are not only integral to our national security, but also our also to our quality of life is Chuck told us. We simply no longer could live without these systems as a nation and for that matter, as a world. But over the years, adversary like adversaries like China, Russia and other countries have come to realize the value of space systems and are aggressively playing ketchup while also pursuing capabilities that will challenge our systems. As many of you know, in 2000 and seven, China demonstrated it's a set system by actually shooting down is one of its own satellites and has been aggressively developing counter space systems to disrupt hours. So in a heavily congested space environment, our systems are now being contested like never before and will continue to bay well as Bond mentioned, the United States has responded to these changing threats. In addition to adding ways to protect our system, the administration and in Congress recently created the United States Space Force and the operational you United States Space Command, the latter of which you heard President Armstrong and other Californians hope is going to be located. Vandenberg Air Force Base Combined with our intelligence community today, we have focused military and civilian leadership now in space. And that's a very, very good thing. Commence, really. On the industry side, we did create the National Security Space Association devoted solely to supporting the national security Space Enterprise. We're based here in the D C area, but we have arms and legs across the country, and we are loaded with extraordinary talent. In scores of Forman, former government executives, So S s a is joined at the hip with our government customers to serve and to support. We're busy with a multitude of activities underway ranging from a number of thought provoking policy. Papers are recurring space time Webcast supporting Congress's Space Power Caucus and other main serious efforts. Check us out at NSS. A space dot org's One of our strategic priorities in central to today's events is to actively promote and nurture the workforce development. Just like cow calling. We will work with our U. S. Government customers, industry leaders and academia to attract and recruit students to join the space world, whether in government or industry and two assistant mentoring and training as their careers. Progress on that point, we're delighted. Be delighted to be working with Cal Poly as we hopefully will undertake a new pilot program with him very soon. So students stay tuned something I can tell you Space is really cool. While our nation's satellite systems are technical and complex, our nation's government and industry work force is highly diverse, with a combination of engineers, physicists, method and mathematicians, but also with a large non technical expertise as well. Think about how government gets things thes systems designed, manufactured, launching into orbit and operating. They do this via contracts with our aerospace industry, requiring talents across the board from cost estimating cost analysis, budgeting, procurement, legal and many other support. Tasker Integral to the mission. Many thousands of people work in the space workforce tens of billions of dollars every year. This is really cool stuff, no matter what your education background, a great career to be part of. When summary as bang had mentioned Aziz, well, there is a great deal of exciting challenges ahead we will see a new renaissance in space in the years ahead, and in some cases it's already begun. Billionaires like Jeff Bezos, Elon Musk, Sir Richard Richard Branson are in the game, stimulating new ideas in business models, other private investors and start up companies. Space companies are now coming in from all angles. The exponential advancement of technology and microelectronics now allows the potential for a plethora of small SAT systems to possibly replace older satellites the size of a Greyhound bus. It's getting better by the day and central to this conference, cybersecurity is paramount to our nation's critical infrastructure in space. So once again, thanks very much, and I look forward to the further conversation. >>Steve, thank you very much. Space is cool. It's relevant. But it's important, as you pointed out, and you're awesome story about how it impacts our life every day. So I really appreciate that great story. I'm glad you took the time Thio share that you forgot the part about the drone coming over in the crime scene and, you know, mapping it out for you. But that would add that to the story later. Great stuff. My first question is let's get into the conversations because I think this is super important. President Armstrong like you to talk about some of the points that was teased out by Bang and Steve. One in particular is the comment around how military research was important in developing all these capabilities, which is impacting all of our lives. Through that story. It was the military research that has enabled a generation and generation of value for consumers. This is kind of this workforce conversation. There are opportunities now with with research and grants, and this is, ah, funding of innovation that it's highly accelerate. It's happening very quickly. Can you comment on how research and the partnerships to get that funding into the universities is critical? >>Yeah, I really appreciate that And appreciate the comments of my colleagues on it really boils down to me to partnerships, public private partnerships. You mentioned Northrop Grumman, but we have partnerships with Lockie Martin, Boeing, Raytheon Space six JPL, also member of organization called Business Higher Education Forum, which brings together university presidents and CEOs of companies. There's been focused on cybersecurity and data science, and I hope that we can spill into cybersecurity in space but those partnerships in the past have really brought a lot forward at Cal Poly Aziz mentioned we've been involved with Cube set. Uh, we've have some secure work and we want to plan to do more of that in the future. Uh, those partnerships are essential not only for getting the r and d done, but also the students, the faculty, whether masters or undergraduate, can be involved with that work. Uh, they get that real life experience, whether it's on campus or virtually now during Covic or at the location with the partner, whether it may be governmental or our industry. Uh, and then they're even better equipped, uh, to hit the ground running. And of course, we'd love to see even more of our students graduate with clearance so that they could do some of that a secure work as well. So these partnerships are absolutely critical, and it's also in the context of trying to bring the best and the brightest and all demographics of California and the US into this field, uh, to really be successful. So these partnerships are essential, and our goal is to grow them just like I know other colleagues and C. S u and the U C are planning to dio, >>you know, just as my age I've seen I grew up in the eighties, in college and during that systems generation and that the generation before me, they really kind of pioneered the space that spawned the computer revolution. I mean, you look at these key inflection points in our lives. They were really funded through these kinds of real deep research. Bond talk about that because, you know, we're living in an age of cloud. And Bezos was mentioned. Elon Musk. Sir Richard Branson. You got new ideas coming in from the outside. You have an accelerated clock now on terms of the innovation cycles, and so you got to react differently. You guys have programs to go outside >>of >>the Defense Department. How important is this? Because the workforce that air in schools and our folks re skilling are out there and you've been on both sides of the table. So share your thoughts. >>No, thanks, John. Thanks for the opportunity responded. And that's what you hit on the notes back in the eighties, R and D in space especially, was dominated by my government funding. Uh, contracts and so on. But things have changed. As Steve pointed out, A lot of these commercial entities funded by billionaires are coming out of the woodwork funding R and D. So they're taking the lead. So what we can do within the deal, the in government is truly take advantage of the work they've done on. Uh, since they're they're, you know, paving the way to new new approaches and new way of doing things. And I think we can We could certainly learn from that. And leverage off of that saves us money from an R and D standpoint while benefiting from from the product that they deliver, you know, within the O D Talking about workforce development Way have prioritized we have policies now to attract and retain talent. We need I I had the folks do some research and and looks like from a cybersecurity workforce standpoint. A recent study done, I think, last year in 2019 found that the cybersecurity workforce gap in the U. S. Is nearing half a million people, even though it is a growing industry. So the pipeline needs to be strengthened off getting people through, you know, starting young and through college, like assess a professor Armstrong indicated, because we're gonna need them to be in place. Uh, you know, in a period of about maybe a decade or so, Uh, on top of that, of course, is the continuing issue we have with the gap with with stamps students, we can't afford not to have expertise in place to support all the things we're doing within the with the not only deal with the but the commercial side as well. Thank you. >>How's the gap? Get? Get filled. I mean, this is the this is again. You got cybersecurity. I mean, with space. It's a whole another kind of surface area, if you will, in early surface area. But it is. It is an I o t. Device if you think about it. But it does have the same challenges. That's kind of current and and progressive with cybersecurity. Where's the gap Get filled, Steve Or President Armstrong? I mean, how do you solve the problem and address this gap in the workforce? What is some solutions and what approaches do we need to put in place? >>Steve, go ahead. I'll follow up. >>Okay. Thanks. I'll let you correct. May, uh, it's a really good question, and it's the way I would. The way I would approach it is to focus on it holistically and to acknowledge it up front. And it comes with our teaching, etcetera across the board and from from an industry perspective, I mean, we see it. We've gotta have secure systems with everything we do and promoting this and getting students at early ages and mentoring them and throwing internships at them. Eyes is so paramount to the whole the whole cycle, and and that's kind of and it really takes focused attention. And we continue to use the word focus from an NSS, a perspective. We know the challenges that are out there. There are such talented people in the workforce on the government side, but not nearly enough of them. And likewise on industry side. We could use Maura's well, but when you get down to it, you know we can connect dots. You know that the the aspect That's a Professor Armstrong talked about earlier toe where you continue to work partnerships as much as you possibly can. We hope to be a part of that. That network at that ecosystem the will of taking common objectives and working together to kind of make these things happen and to bring the power not just of one or two companies, but our our entire membership to help out >>President >>Trump. Yeah, I would. I would also add it again. It's back to partnerships that I talked about earlier. One of our partners is high schools and schools fortune Margaret Fortune, who worked in a couple of, uh, administrations in California across party lines and education. Their fifth graders all visit Cal Poly and visit our learned by doing lab and you, you've got to get students interested in stem at a early age. We also need the partnerships, the scholarships, the financial aid so the students can graduate with minimal to no debt to really hit the ground running. And that's exacerbated and really stress. Now, with this covert induced recession, California supports higher education at a higher rate than most states in the nation. But that is that has dropped this year or reasons. We all understand, uh, due to Kobe, and so our partnerships, our creativity on making sure that we help those that need the most help financially uh, that's really key, because the gaps air huge eyes. My colleagues indicated, you know, half of half a million jobs and you need to look at the the students that are in the pipeline. We've got to enhance that. Uh, it's the in the placement rates are amazing. Once the students get to a place like Cal Poly or some of our other amazing CSU and UC campuses, uh, placement rates are like 94%. >>Many of our >>engineers, they have jobs lined up a year before they graduate. So it's just gonna take key partnerships working together. Uh, and that continued partnership with government, local, of course, our state of CSU on partners like we have here today, both Stephen Bang So partnerships the thing >>e could add, you know, the collaboration with universities one that we, uh, put a lot of emphasis, and it may not be well known fact, but as an example of national security agencies, uh, National Centers of Academic Excellence in Cyber, the Fast works with over 270 colleges and universities across the United States to educate its 45 future cyber first responders as an example, so that Zatz vibrant and healthy and something that we ought Teoh Teik, banjo >>off. Well, I got the brain trust here on this topic. I want to get your thoughts on this one point. I'd like to define what is a public private partnership because the theme that's coming out of the symposium is the script has been flipped. It's a modern error. Things air accelerated get you got security. So you get all these things kind of happen is a modern approach and you're seeing a digital transformation play out all over the world in business. Andi in the public sector. So >>what is what >>is a modern public private partnership? What does it look like today? Because people are learning differently, Covert has pointed out, which was that we're seeing right now. How people the progressions of knowledge and learning truth. It's all changing. How do you guys view the modern version of public private partnership and some some examples and improve points? Can you can you guys share that? We'll start with the Professor Armstrong. >>Yeah. A zai indicated earlier. We've had on guy could give other examples, but Northup Grumman, uh, they helped us with cyber lab. Many years ago. That is maintained, uh, directly the software, the connection outside its its own unit so that students can learn the hack, they can learn to penetrate defenses, and I know that that has already had some considerations of space. But that's a benefit to both parties. So a good public private partnership has benefits to both entities. Uh, in the common factor for universities with a lot of these partnerships is the is the talent, the talent that is, that is needed, what we've been working on for years of the, you know, that undergraduate or master's or PhD programs. But now it's also spilling into Skilling and re Skilling. As you know, Jobs. Uh, you know, folks were in jobs today that didn't exist two years, three years, five years ago. But it also spills into other aspects that can expand even mawr. We're very fortunate. We have land, there's opportunities. We have one tech part project. We're expanding our tech park. I think we'll see opportunities for that, and it'll it'll be adjusted thio, due to the virtual world that we're all learning more and more about it, which we were in before Cove it. But I also think that that person to person is going to be important. Um, I wanna make sure that I'm driving across the bridge. Or or that that satellites being launched by the engineer that's had at least some in person training, uh, to do that and that experience, especially as a first time freshman coming on a campus, getting that experience expanding and as adult. And we're gonna need those public private partnerships in order to continue to fund those at a level that is at the excellence we need for these stem and engineering fields. >>It's interesting People in technology can work together in these partnerships in a new way. Bank Steve Reaction Thio the modern version of what a public, successful private partnership looks like. >>If I could jump in John, I think, you know, historically, Dodi's has have had, ah, high bar thio, uh, to overcome, if you will, in terms of getting rapid pulling in your company. This is the fault, if you will and not rely heavily in are the usual suspects of vendors and like and I think the deal is done a good job over the last couple of years off trying to reduce the burden on working with us. You know, the Air Force. I think they're pioneering this idea around pitch days where companies come in, do a two hour pitch and immediately notified of a wooden award without having to wait a long time. Thio get feedback on on the quality of the product and so on. So I think we're trying to do our best. Thio strengthen that partnership with companies outside the main group of people that we typically use. >>Steve, any reaction? Comment to add? >>Yeah, I would add a couple of these air. Very excellent thoughts. Uh, it zits about taking a little gamble by coming out of your comfort zone. You know, the world that Bond and Bond lives in and I used to live in in the past has been quite structured. It's really about we know what the threat is. We need to go fix it, will design it says we go make it happen, we'll fly it. Um, life is so much more complicated than that. And so it's it's really to me. I mean, you take you take an example of the pitch days of bond talks about I think I think taking a gamble by attempting to just do a lot of pilot programs, uh, work the trust factor between government folks and the industry folks in academia. Because we are all in this together in a lot of ways, for example. I mean, we just sent the paper to the White House of their requests about, you know, what would we do from a workforce development perspective? And we hope Thio embellish on this over time once the the initiative matures. But we have a piece of it, for example, is the thing we call clear for success getting back Thio Uh, President Armstrong's comments at the collegiate level. You know, high, high, high quality folks are in high demand. So why don't we put together a program they grabbed kids in their their underclass years identifies folks that are interested in doing something like this. Get them scholarships. Um, um, I have a job waiting for them that their contract ID for before they graduate, and when they graduate, they walk with S C I clearance. We believe that could be done so, and that's an example of ways in which the public private partnerships can happen to where you now have a talented kid ready to go on Day one. We think those kind of things can happen. It just gets back down to being focused on specific initiatives, give them giving them a chance and run as many pilot programs as you can like these days. >>That's a great point, E. President. >>I just want to jump in and echo both the bank and Steve's comments. But Steve, that you know your point of, you know, our graduates. We consider them ready Day one. Well, they need to be ready Day one and ready to go secure. We totally support that and and love to follow up offline with you on that. That's that's exciting, uh, and needed very much needed mawr of it. Some of it's happening, but way certainly have been thinking a lot about that and making some plans, >>and that's a great example of good Segway. My next question. This kind of reimagining sees work flows, eyes kind of breaking down the old the old way and bringing in kind of a new way accelerated all kind of new things. There are creative ways to address this workforce issue, and this is the next topic. How can we employ new creative solutions? Because, let's face it, you know, it's not the days of get your engineering degree and and go interview for a job and then get slotted in and get the intern. You know the programs you get you particularly through the system. This is this is multiple disciplines. Cybersecurity points at that. You could be smart and math and have, ah, degree in anthropology and even the best cyber talents on the planet. So this is a new new world. What are some creative approaches that >>you know, we're >>in the workforce >>is quite good, John. One of the things I think that za challenge to us is you know, we got somehow we got me working for with the government, sexy, right? The part of the challenge we have is attracting the right right level of skill sets and personnel. But, you know, we're competing oftentimes with the commercial side, the gaming industry as examples of a big deal. And those are the same talents. We need to support a lot of programs we have in the U. D. So somehow we have to do a better job to Steve's point off, making the work within the U. D within the government something that they would be interested early on. So I tracked him early. I kind of talked about Cal Poly's, uh, challenge program that they were gonna have in June inviting high school kid. We're excited about the whole idea of space and cyber security, and so on those air something. So I think we have to do it. Continue to do what were the course the next several years. >>Awesome. Any other creative approaches that you guys see working or might be on idea, or just a kind of stoked the ideation out their internship. So obviously internships are known, but like there's gotta be new ways. >>I think you can take what Steve was talking about earlier getting students in high school, uh, and aligning them sometimes. Uh, that intern first internship, not just between the freshman sophomore year, but before they inter cal poly per se. And they're they're involved s So I think that's, uh, absolutely key. Getting them involved many other ways. Um, we have an example of of up Skilling a redeveloped work redevelopment here in the Central Coast. PG and e Diablo nuclear plant as going to decommission in around 2020 24. And so we have a ongoing partnership toe work on reposition those employees for for the future. So that's, you know, engineering and beyond. Uh, but think about that just in the manner that you were talking about. So the up skilling and re Skilling uh, on I think that's where you know, we were talking about that Purdue University. Other California universities have been dealing with online programs before cove it and now with co vid uh, so many more faculty or were pushed into that area. There's going to be much more going and talk about workforce development and up Skilling and Re Skilling The amount of training and education of our faculty across the country, uh, in in virtual, uh, and delivery has been huge. So there's always a silver linings in the cloud. >>I want to get your guys thoughts on one final question as we in the in the segment. And we've seen on the commercial side with cloud computing on these highly accelerated environments where you know, SAS business model subscription. That's on the business side. But >>one of The >>things that's clear in this trend is technology, and people work together and technology augments the people components. So I'd love to get your thoughts as we look at the world now we're living in co vid um, Cal Poly. You guys have remote learning Right now. It's a infancy. It's a whole new disruption, if you will, but also an opportunity to enable new ways to collaborate, Right? So if you look at people and technology, can you guys share your view and vision on how communities can be developed? How these digital technologies and people can work together faster to get to the truth or make a discovery higher to build the workforce? These air opportunities? How do you guys view this new digital transformation? >>Well, I think there's there's a huge opportunities and just what we're doing with this symposium. We're filming this on one day, and it's going to stream live, and then the three of us, the four of us, can participate and chat with participants while it's going on. That's amazing. And I appreciate you, John, you bringing that to this this symposium, I think there's more and more that we can do from a Cal poly perspective with our pedagogy. So you know, linked to learn by doing in person will always be important to us. But we see virtual. We see partnerships like this can expand and enhance our ability and minimize the in person time, decrease the time to degree enhanced graduation rate, eliminate opportunity gaps or students that don't have the same advantages. S so I think the technological aspect of this is tremendous. Then on the up Skilling and Re Skilling, where employees air all over, they can be reached virtually then maybe they come to a location or really advanced technology allows them to get hands on virtually, or they come to that location and get it in a hybrid format. Eso I'm I'm very excited about the future and what we can do, and it's gonna be different with every university with every partnership. It's one. Size does not fit all. >>It's so many possibilities. Bond. I could almost imagine a social network that has a verified, you know, secure clearance. I can jump in, have a little cloak of secrecy and collaborate with the d o. D. Possibly in the future. But >>these are the >>kind of kind of crazy ideas that are needed. Are your thoughts on this whole digital transformation cross policy? >>I think technology is gonna be revolutionary here, John. You know, we're focusing lately on what we call digital engineering to quicken the pace off, delivering capability to warfighter. As an example, I think a I machine language all that's gonna have a major play and how we operate in the future. We're embracing five G technologies writing ability Thio zero latency or I o t More automation off the supply chain. That sort of thing, I think, uh, the future ahead of us is is very encouraging. Thing is gonna do a lot for for national defense on certainly the security of the country. >>Steve, your final thoughts. Space systems are systems, and they're connected to other systems that are connected to people. Your thoughts on this digital transformation opportunity >>Such a great question in such a fun, great challenge ahead of us. Um echoing are my colleague's sentiments. I would add to it. You know, a lot of this has I think we should do some focusing on campaigning so that people can feel comfortable to include the Congress to do things a little bit differently. Um, you know, we're not attuned to doing things fast. Uh, but the dramatic You know, the way technology is just going like crazy right now. I think it ties back Thio hoping Thio, convince some of our senior leaders on what I call both sides of the Potomac River that it's worth taking these gamble. We do need to take some of these things very way. And I'm very confident, confident and excited and comfortable. They're just gonna be a great time ahead and all for the better. >>You know, e talk about D. C. Because I'm not a lawyer, and I'm not a political person, but I always say less lawyers, more techies in Congress and Senate. So I was getting job when I say that. Sorry. Presidential. Go ahead. >>Yeah, I know. Just one other point. Uh, and and Steve's alluded to this in bonded as well. I mean, we've got to be less risk averse in these partnerships. That doesn't mean reckless, but we have to be less risk averse. And I would also I have a zoo. You talk about technology. I have to reflect on something that happened in, uh, you both talked a bit about Bill Britton and his impact on Cal Poly and what we're doing. But we were faced a few years ago of replacing a traditional data a data warehouse, data storage data center, and we partner with a W S. And thank goodness we had that in progress on it enhanced our bandwidth on our campus before Cove. It hit on with this partnership with the digital transformation hub. So there is a great example where, uh, we we had that going. That's not something we could have started. Oh, covitz hit. Let's flip that switch. And so we have to be proactive on. We also have thio not be risk averse and do some things differently. Eyes that that is really salvage the experience for for students. Right now, as things are flowing, well, we only have about 12% of our courses in person. Uh, those essential courses, uh, and just grateful for those partnerships that have talked about today. >>Yeah, and it's a shining example of how being agile, continuous operations, these air themes that expand into space and the next workforce needs to be built. Gentlemen, thank you. very much for sharing your insights. I know. Bang, You're gonna go into the defense side of space and your other sessions. Thank you, gentlemen, for your time for great session. Appreciate it. >>Thank you. Thank you. >>Thank you. >>Thank you. Thank you. Thank you all. >>I'm John Furry with the Cube here in Palo Alto, California Covering and hosting with Cal Poly The Space and Cybersecurity Symposium 2020. Thanks for watching.
SUMMARY :
It's the Cube space and cybersecurity. We have Jeff Armstrong's the president of California Polytechnic in space, Jeff will start with you. We know that the best work is done by balanced teams that include multiple and diverse perspectives. speaking to bang, we learned that Rachel sins, one of our liberal arts arts majors, on the forefront of innovation and really taking a unique progressive. of the National Security Space Association, to discuss a very important topic of Thank you so much bomb for those comments and you know, new challenges and new opportunities and new possibilities of the space community, we thank you for your long life long devotion to service to the drone coming over in the crime scene and, you know, mapping it out for you. Yeah, I really appreciate that And appreciate the comments of my colleagues on clock now on terms of the innovation cycles, and so you got to react differently. Because the workforce that air in schools and our folks re So the pipeline needs to be strengthened But it does have the same challenges. Steve, go ahead. the aspect That's a Professor Armstrong talked about earlier toe where you continue to work Once the students get to a place like Cal Poly or some of our other amazing Uh, and that continued partnership is the script has been flipped. How people the progressions of knowledge and learning truth. that is needed, what we've been working on for years of the, you know, Thio the modern version of what a public, successful private partnership looks like. This is the fault, if you will and not rely heavily in are the usual suspects for example, is the thing we call clear for success getting back Thio Uh, that and and love to follow up offline with you on that. You know the programs you get you particularly through We need to support a lot of programs we have in the U. D. So somehow we have to do a better idea, or just a kind of stoked the ideation out their internship. in the manner that you were talking about. And we've seen on the commercial side with cloud computing on these highly accelerated environments where you know, So I'd love to get your thoughts as we look at the world now we're living in co vid um, decrease the time to degree enhanced graduation rate, eliminate opportunity you know, secure clearance. kind of kind of crazy ideas that are needed. certainly the security of the country. and they're connected to other systems that are connected to people. that people can feel comfortable to include the Congress to do things a little bit differently. So I Eyes that that is really salvage the experience for Bang, You're gonna go into the defense side of Thank you. Thank you all. I'm John Furry with the Cube here in Palo Alto, California Covering and hosting with Cal
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Chuck | PERSON | 0.99+ |
Steve | PERSON | 0.99+ |
Steve Jakes | PERSON | 0.99+ |
John | PERSON | 0.99+ |
Joe | PERSON | 0.99+ |
Steve Jake | PERSON | 0.99+ |
Rachel | PERSON | 0.99+ |
Cal Poly | ORGANIZATION | 0.99+ |
National Security Space Association | ORGANIZATION | 0.99+ |
Jeff Armstrong | PERSON | 0.99+ |
Northrop Grumman | ORGANIZATION | 0.99+ |
PG | ORGANIZATION | 0.99+ |
Chris Hansen | PERSON | 0.99+ |
California | LOCATION | 0.99+ |
AWS | ORGANIZATION | 0.99+ |
Jeff | PERSON | 0.99+ |
Jane | PERSON | 0.99+ |
National Security Space Association | ORGANIZATION | 0.99+ |
Jeff Bezos | PERSON | 0.99+ |
Chuck Beans | PERSON | 0.99+ |
California National Guard | ORGANIZATION | 0.99+ |
New York City | LOCATION | 0.99+ |
Boeing | ORGANIZATION | 0.99+ |
National Security Space Association | ORGANIZATION | 0.99+ |
Cal Poly | ORGANIZATION | 0.99+ |
Bond | PERSON | 0.99+ |
United States Space Force | ORGANIZATION | 0.99+ |
2013 | DATE | 0.99+ |
Singapore | LOCATION | 0.99+ |
94% | QUANTITY | 0.99+ |
Trump | PERSON | 0.99+ |
Richard Branson | PERSON | 0.99+ |
California Cybersecurity Institute | ORGANIZATION | 0.99+ |
United States Space Command | ORGANIZATION | 0.99+ |
June | DATE | 0.99+ |
Thio | PERSON | 0.99+ |
one | QUANTITY | 0.99+ |
Congress | ORGANIZATION | 0.99+ |
Armstrong | PERSON | 0.99+ |
hundreds | QUANTITY | 0.99+ |
United States | LOCATION | 0.99+ |
N S. A | ORGANIZATION | 0.99+ |
four | QUANTITY | 0.99+ |
Cal poly | ORGANIZATION | 0.99+ |
three | QUANTITY | 0.99+ |
Elon Musk | PERSON | 0.99+ |
York Space Systems | ORGANIZATION | 0.99+ |
National Centers of Academic Excellence in Cyber | ORGANIZATION | 0.99+ |
Bezos | PERSON | 0.99+ |
Purdue University | ORGANIZATION | 0.99+ |
One | QUANTITY | 0.99+ |