Image Title

Search Results for RSA Conference:

Sizzle Reel | RSA Conference 2020


 

absolutely I think if I were to net it out Jeff what I'm sensing is there is a whole movement to shift security left which is this whole idea of IT stepping up as the first line of defense reduce cyber exposure take care of patching multi-factor authentication reduce their tax surface intrinsic security right so you know DevOps active ops take care of it right up front with all the apps even get built right then there is another movement to shift things right which is take care of the new new aspects of the attack surface right what the hackers always take advantage of of other areas where in a sense we are unprepared and for a long time they've seen us being unprepared in terms of reducing the attack surface and then they go after the new aspects of the tak surface and what are those IT I ot ot data as as an attack surface and the edge right so so these are areas where there's a lot of activity a lot of innovation you know on the on the air on the floor here if you walk the corners shifting left shifting right as in all the new aspects of the tax F is I'm seeing a lot of conversations a lot of innovation in that area I think it also boils down to real-world examples we've been really understand the demographics that we're working for I think today it's the first time really in history that we have four generations working side-by-side in the workforce so we have to understand that people learn differently training should be adjusted to the type of people that we're teaching but phishing doesn't just oil down to clicking on links phishing teaches also it boils down to tricking somebody getting someone's trust and it can come in different forms for example think of social media how do people connect we're connecting across social media on many different platforms I'll give a very easy example LinkedIn LinkedIn is for business have form we're all connected on LinkedIn why we connect on LinkedIn because that's a social platform that people feel safe on because we're able to connect to each other in a business form I want to think of the person who's getting the first job with an organization their first job in maybe their project manager and they're working for Bank a excited to be working for Bank a hey I'm gonna list all the projects I'm working for so here's now my resume on LinkedIn I'm working on project ABCD and this is my manager I report to perfect there's some information sitting there on LinkedIn now what else I will tell you is that you might have somebody who's looking to get into that Bank what will they do let's look for the lowest hanging fruit who this new project manager oh I see they're working on these projects and they're reporting in to someone well I'm not a project manager I'm a senior project manager from a competing bank I'm gonna befriend them and tell them that I'm really excited about the work they're doing here there's social engineering their way into their friendship into the good graces into their trust once done the video becomes a trusted source people share information freely so people are putting too much information out there on social trusting too easily opening the door for more than a phishing attack and things are just rapidly going out of control right so my co-founder and I both came from the world of being practitioners and we saw how limited the space wasn't actually changing human behavior I was given some animated powerpoints that use this to keep the Russians out of your Network which is a practical joke unless your job is on the line I took a huge step back and I said there are other fields that have figured this out behavioral science being one of them they use positive reinforcement gamification marketing and advertisement has figured out how to engage this human element just look around the RSA floor and there are so many learnings of how we make decisions as human beings that can be applied into changing people's behaviors and security so that's what we did adventure so this is my first early stage company we're still seeking series a we're a young company but our mantras we are the data value company so they have had this very robust analytics engine that goes into the heart of data I can track it and map it and make it beautiful and Along Came McNeely who actually sits on our board Oh does he and they said we need someone who's this week it's all happening so they asked Scott McNealy who is the craziest person in privacy and data that you know and he said oh my god get the done any woman so they got the den of a woman and that's what I do now so I'm taking this analytics value engine I'm pointing it to the board as I've always said Grace Hopper said data value and data risk has to be on the corporate balance sheet and so that's what we're building is a data balance sheet for everyone to use to actually value data for me it starts with technology that takes look we've only got so many security practitioners in the company actually defend your email example we've got to defend every user from those kinds of problems and so how do I find technology solutions that help take that load off the security practitioners so they can focus on the niche examples that are really really well-crafted emails and and and help take that load off the user because users just you're not going to be able to handle that right it's not fair to ask them and like you said it was just poorly timed that helps protect it so how do we help make sure that we're taking that technology load off identify the threats in advance and and protect them and so I think one of the biggest things that Chris and I talk a lot about is how do our solutions help make it easier for people to secure themselves instead of just providing only a technology technology advantage so the virtual analyst is able to sit on premises so it's localized learning collector has to understand the nature of those strats collect to be able to look at the needles of the needles if you will make sense of that and then automatically generate reports based off of that right so it's really an assist tool that a network in min or a security analyst was able to pick up and virtually save hours and hours of time so we have this we call it a thread research group within the company and their job is to take all the data from the sensors we have I mean we have we look at about 25 petabytes of data every day all our solutions are cloud solutions as well as on forum so we get the benefit of basically seeing all the data's that are hitting our customers every day I mean we block about 1 million attacks every minutes like every minute 1 billion attacks every minute minute right we protect over 3 million databases and you know we've mitigated some of the largest DDoS attacks that's ever been reported so we have a lot of date right that we're seen and the interesting thing is that you're right we are having to always we're using that threat research data to see what's happening how the threat landscape is changing therefore guiding us on how we need to augment and add to our products to prevent that but interestingly we're also consuming AI and machine learning as well on our products because we're able to use those solutions to actually do a lot of attack analytics and do a lot of predictive and research for our customers that can kind of guide them about you know where things are happening because what's happening is that before a lot of the tacks were just sort of fast and furious now we're seeing a pattern towards snow snow and continuous if that makes sense we're seeing all these patterns and threats coming in so we're fighting against those technologies like AI Barossa using those technologies to help us soon you know decide where we need to continue to add capabilities to stop it you know the whole bad box thing wasn't a problem right a number of years ago and so it's it's ever-changing your world which frankly speaking makes it an interesting place to be yes who wants to be in a static in a boring place right well I mean we do you're a good package or a bad package you have to traverse the network to be interesting we've all you know put our phones in airplane mode at blackhat or events like that but we don't want to be on it they're really boring when they're offline but they're also really boring too attackers when they're offline as soon as you turn them on you have a problem or could have a problem but as things traverse the network what better place to see who and what's on your network and on the gear and end of the day we're able to provide that visibility we're able to provide that enforcement so as you mentioned 2020 is now the year of awareness for us so the threat aware network we're able to do things like look at encrypted traffic do heuristics and analysis to figure out should that even be on my network because as you bring it into a network and you have to decrypt it a there's privacy concerns of that in these times but also it's computationally expensive to do that so it becomes a challenge from a both a financial perspective as well as a compliance perspective so we're helping solve s even kind of offset that traffic and be able to ensure your network secure so when we started developing our cyber recovery solution about five years ago we used the NIST cybersecurity framework which is a very well known standard that defines really five pillars of how organizations can think about building a cyber resilience strategy a cyber resilience strategy really encompasses everything from perimeter threat detection and response all the way through incident response after an attack and everything that happens in between protecting the data and recovering the data right and critical systems so I think of cyber resilience is that holistic strategy of protecting an organization and its data from a cyberattack yeah I think the human element is the hardest part you know in mind of this conference and its theme the human element the hardest part about this job is that it's not just mechanical issues and routing issues and networking issues but is about dealing with all types of humans innocent humans that do strange and bad things unknowingly and it's in malicious people who do very bad things that is by design and so the research suggests that no matter what we do in security awareness training some four percent of our employee base will continually bail security awareness that's what we fished and actively and so one of the things that we need to do is use automation and intelligence so that you can comb through all of that data and make a better informed decision about what risks are going to mitigate right and for this four percent are habitually abusing the system and can't be retrained well you can isolate them right and make sure that they're separated and then they're not able to to do things that may harm the organization you

Published Date : Mar 5 2020

**Summary and Sentiment Analysis are not been shown because of improper transcript**

ENTITIES

EntityCategoryConfidence
ChrisPERSON

0.99+

Grace HopperPERSON

0.99+

Scott McNealyPERSON

0.99+

2020DATE

0.99+

JeffPERSON

0.99+

LinkedInORGANIZATION

0.99+

four percentQUANTITY

0.99+

first jobQUANTITY

0.99+

oneQUANTITY

0.99+

over 3 million databasesQUANTITY

0.99+

1 billion attacksQUANTITY

0.98+

four percentQUANTITY

0.98+

first timeQUANTITY

0.98+

NISTORGANIZATION

0.98+

about 1 million attacksQUANTITY

0.97+

bothQUANTITY

0.97+

Came McNeelyPERSON

0.95+

about 25 petabytesQUANTITY

0.95+

DevOpsTITLE

0.93+

this weekDATE

0.93+

todayDATE

0.92+

first early stageQUANTITY

0.92+

first lineQUANTITY

0.92+

five pillarsQUANTITY

0.9+

RSA Conference 2020EVENT

0.87+

every minutesQUANTITY

0.85+

every minuteQUANTITY

0.83+

five years agoDATE

0.8+

thingsQUANTITY

0.74+

every minuteQUANTITY

0.71+

number of years agoDATE

0.7+

SizzleORGANIZATION

0.66+

RSATITLE

0.63+

aboutDATE

0.61+

RussiansPERSON

0.55+

every dayQUANTITY

0.54+

four generationsQUANTITY

0.52+

everyQUANTITY

0.52+

ReelPERSON

0.47+

projectTITLE

0.46+

ABCDOTHER

0.38+

BarossaORGANIZATION

0.38+

Chase Cunningham, Forrester | RSA Conference 2019


 

>> Live from San Francisco, it's theCUBE, covering RSA Conference 2019. Brought to you by Forescout. >> Hey, welcome back everybody, Jeff Frick here with theCUBE. We're at RSA Conference in North America. The brand new reopened Moscone Center. They finally finished the remodel, which we're excited about, in the Forescout booth, and excited to have a returning Cube alum, I think we had him on last year at RSA, Dr. Chase Cunningham, principle analyst security and risk for Forester. >> Hey. >> Chase, great to see you again. >> Thanks for having me. >> So what's happened in the last year, since we last saw you? I'm sure you've been keeping busy, and running down lots of ... >> Yeah well, >> Crazy risk. >> It's been really pushing the sort of strategy set around zero trust. I mean if you look around the show floor, you can't go 75 feet without seeing somebody that's got zero trust on a booth, or hear it from somebody, so it's been really pushing that narrative and trying to get people to understand what we're talking about with it. >> And it's really important because it's a very different way of thinking about the world. >> Yeah. >> And you guys have been talking about it for a while. >> For a decade, basically. >> Right. >> Yeah. >> And then we've got all these new complexity that's thrown in that weren't there a decade ago. You've got IOT, you got OT, and then you've got hybrid cloud, right? 'cause everyone, well there's public cloud, but most big enterprises have some in the public cloud, some on their data center. So you've got these crazy hybrid environments; so how are you kind of adjusting the zero trust game, based on some of these new complexities? So really we flip the script a little bit and said, "Okay, if we were to try and fix this from the start, "where would we start?" And we'd obviously start around taking care of the the largest swath and sort of compromise area, which would probably start with users, followed closely by devices, because if we can take care of those two pieces, we can actually gain some ground and work our way going forward. If you've heard a lot of the stuff around micro-segmentation, our sort of approach to micro-segmentation means micro-segment everything. We mean users, accounts, devices, IOT, OT, wired, unwired, whatever it is, if you can apply control to it, and you can segment it away to gain ground, segment it. >> So how do you deal with the micro-segmentation? Because ultimately you could segment down to one, and then you haven't really accomplished much, right? >> Right, a network of one is no good, yeah. >> Exactly; so when you think about micro-segmentation architectures, how are you creating buckets? What are your logical buckets that you're putting things in? >> So really it should be based on the function that you're trying to allow to occur. If you look at the way we architected networks for the last 20-something years it's been around sort of use writ-large. What we're talking about micro-segmentation is, if I'm micro-segmenting devices, those devices should live in a micro-segment where devices do device stuff, and you can keep control of that, and you can see what's coming and leaving. Users should be segmented that way, networks, all of it should be built around function, rather than inter-operability. Inter-operability is a result of good micro-segmentation, not the other way around. >> Right, and that's interesting you say that, we're obviously, we're in the Forescout Booth, >> Yeah. >> and a big piece of what they're talking about is, identifying these devices, but then basically restricting their behavior to what they should be doing. So really following along in your zero trust philosophy. >> Well I said it last year, I'll say the same thing again, a key piece of this whole thing is knowing what's supposed to be occurring and being able to control it, and then respond to it. It's not really that we've changed the evolution of this whole thing, we've just looked at it a little more pragmatically, and applying fixes where you can actually start gaining ground. >> Right, and applying the fixes at all different points in the spectrum, as opposed to just trying to create that big giant wall and a moat. >> Well yeah, moving away from the perimeter model, like the perimeter model has categorically failed. Everyone around here seems to understand that that's a reality; and we're not saying you shouldn't have your defenses up, but your defenses should be much more granular and much more focused on the realities of what enables the business. >> Right, so I'm just curious to get your perspective, you've been doing this for a while, as you walk around the show floor here, and see so many vendors, and so many products, and so many solutions, and so many bright shiny objects; how do you make sense of it? How do you help you customers make sense of it? Because it's not a simple space, and I always just think of the poor CSO's, sitting there like "How am I supposed to absorb, "even just the inbound information "about knowing what's going on," much less get to the point of doing evaluation and making purchase decision and making implementation decision. >> So one of the things that we've been really pushing forward with is using virtualization solutions to build architectures, not PowerPoints, not drawing stuff on a whiteboard, like actually using virtualization to build virtual architectures, and test and design there. It's actually very similar to the way that we write applications, you iterate; you don't write an app and release it, and think you got it right and you're done, you write pieces of code, build the app, you iterate, you move on, because of virtualization, we can do the same thing with security tooling and with networks. So one of our major initiatives is pushing that capability set to our customers to say, "This is how you get there, and you design, "and then you build, and then you deploy," rather than, "Deploy it and hope you got it right." >> And know that it's not going to be right the first time you buy it, right? You just got to write a check and the problem goes away. >> And it's much better if you screw something up virtually to just nuke it and start over, than if you try and do it with a bunch of hardware that you can't actually rip and replace. >> That's interesting, right? 'Cause the digital twin concept has been around in the OT space for a long time. We talk to GE all the time and digital twin in terms of modeling behavior, and a turbine engine is something they've been talking about forever. At a healthcare conference they're talking about digital twinning people, which I thought was pretty interesting. >> Kind of creepy, but yeah >> Kind of creepy, but then you think, "Okay, so I can, "I can test medications, I can do these things," and to your point, if I screw it up, I'm screwing up the twin, I'm not necessarily screwing up the real thing. And you talked about in your last blog post, starting to create some of these environments and architectures to help people do some of this exploration. >> Yeah we launched our first one here at RSA on Tuesday night, we actually put out our own Forester branded virtual reference architecture; and the good thing is is the way that we're approaching it, we can actually have our clients build their own semblance of this, because something everybody forgets is, this is one of the few places where there are snowflakes, right? Everyone has their own individual build, so being able to have yours that you build, maybe different from mine, even though we both line with a strategic concept like zero trust. >> Right. >> So, we're building a library of those. >> So is the go to market on that that you've got an innovations space, and people do it within there? Or are you giving them the tools to build it on PRIM, how's the execution of it? >> So really it's about, we've published a lot of research that says, "This is the way to do it;" now we've got this platform and the capability to say, "This is where you can do it;" and then allowing them to go in there and follow that research to actually design and build it and see that it's actually do-able. >> Right, right; so as you're looking forward, 2019, I can't believe the calendar's flipped already to March. Crazy ... What are your top priorities? What're you working on as you go forward this calendar year? >> It's mostly about ground truth sort of use cases on this adoption of zero trust across the industry; and really getting people to understand that this is something that can be done. So we have write-ups going on customers that have deployed zero trust solutions; and sort of how they did it, why they did it, where they got benefit from, where they're going with it, because we remind people all the time that this a journey. This is not something I wake up in the morning, build a zero trust network, and walk away. This is multi-year in some cases. >> Well it's going multi-year forever right? Because the threats keep changing; and the thing I find really fascinating is that the value of what they're attacking is changing dramatically, right? It used to be maybe I just wanted to do some, crazy little hacks, or change a grade, maybe steal some money from your bank account; but now with some of the political stuff, and the state-sponsored stuff, there's a lot more complex and softer nuance information they the want to get for much softer nuanced objectives, so you're going to have to continue to reevaluate what needs to be locked in tighter and what needs to be less locked up, because you can't lock it all up to the same degree. >> Right, and it's really something that we remind our customers a lot on, that security is being done by the majority of organizations not because they actually want to do security, it's because security makes the customers have more faith and trust in you, they buy more stuff, your revenue goes up, and everyone benefits. >> Right. >> You know, some of these large organizations, they don't have SOC's and do security operations 'cause they want to be a security company, they're a company that has to do security to get more customers. >> Right, have they figured that out yet? The trust thing is such a big deal, and the Big Tech backlash that we're seeing that's going on. >> I had thought that they would have figure it out, but it comes up all the time, and you have to really wrap people's head around that you're not doing security because you think security is cool, or you need to do it, it's to get more customers to grow the business. This is a business enabler, not a tangential business thing. >> Right, it's such a high percentage of the interaction between a company and it's customers, or a company and it's suppliers, is electronic now anyway, whether it's via web browser or an API call, It's such an important piece 'cause that is the way people interact with companies now. They're not going to the bank branch too often. >> With the growth of GDPR and privacy and things like that, companies are being mandated by their clients, by their customers to be able to say, "How do you secure me?" And the business had better be able to answer that. >> Right right, but hopefully they're not, to your point, I thought you were going to say they're doing it for the compliance, but it's a lot more than just compliance, you shouldn't be doing it just for the compliance. >> Yeah, I mean I stand on the compliance is kind of a failed approach. If you chase compliance you will just be compliant. If you actually do security with a strategy in place you will achieve compliance; and that's the difference most people have to wrap their head around, but compliance is something you do, not something you strive to be. >> Love it, well Chase thanks for stopping by and sharing your insight and a lot of good work. Love keeping track of it, keeping an eye on the blog. >> Great, thanks for having me. >> All right, he's Chase, I'm Jeff, you're watching theCUBE, we're at the RSA conference in the Forescout Booth, thanks for watching, we'll see you next time. (low techno music)

Published Date : Mar 7 2019

SUMMARY :

Brought to you by Forescout. and excited to have a returning Cube alum, and running down lots of ... I mean if you look around the show floor, And it's really important because it's and you can segment it away to gain ground, segment it. and you can keep control of that, and a big piece and then respond to it. Right, and applying the fixes and much more focused on the realities Right, so I'm just curious to get your perspective, and think you got it right and you're done, the first time you buy it, right? that you can't actually rip and replace. in the OT space for a long time. and to your point, if I screw it up, and the good thing is is the way that we're approaching it, and follow that research to actually design and build it I can't believe the calendar's flipped already to March. and really getting people to understand and the thing I find really fascinating is Right, and it's really something they're a company that has to do security and the Big Tech backlash that we're seeing that's going on. and you have to really wrap people's head around 'cause that is the way people interact with companies now. And the business had better be able to answer that. you shouldn't be doing it just for the compliance. and that's the difference most people and sharing your insight and a lot of good work. we'll see you next time.

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
JeffPERSON

0.99+

Jeff FrickPERSON

0.99+

2019DATE

0.99+

San FranciscoLOCATION

0.99+

two piecesQUANTITY

0.99+

75 feetQUANTITY

0.99+

MarchDATE

0.99+

Tuesday nightDATE

0.99+

last yearDATE

0.99+

ForescoutORGANIZATION

0.99+

North AmericaLOCATION

0.99+

ForesterORGANIZATION

0.99+

GEORGANIZATION

0.99+

zero trustQUANTITY

0.99+

GDPRTITLE

0.99+

first oneQUANTITY

0.98+

oneQUANTITY

0.98+

Chase CunninghamPERSON

0.98+

RSA Conference 2019EVENT

0.97+

PowerPointsTITLE

0.96+

Moscone CenterLOCATION

0.96+

RSAORGANIZATION

0.94+

SOCORGANIZATION

0.93+

bothQUANTITY

0.92+

first timeQUANTITY

0.92+

a decade agoDATE

0.92+

RSA ConferenceEVENT

0.88+

theCUBEORGANIZATION

0.86+

RSA conferenceEVENT

0.86+

ChasePERSON

0.86+

Forescout BoothLOCATION

0.85+

zeroQUANTITY

0.79+

CubeORGANIZATION

0.78+

a decadeQUANTITY

0.76+

Dr.PERSON

0.72+

around zero trustQUANTITY

0.69+

last 20DATE

0.67+

ForresterLOCATION

0.53+

something yearsQUANTITY

0.4+

Ajay Gupta, Huawei - RSA Conference 2017 - #RSAC #theCUBE


 

(upbeat music) >> Hey welcome back everybody, Jeff Frick here with theCUBE. We are live at Moscone Center at the RSA Convention. 40,000 security professionals are here, talking about security. This thing grows every single year. We're happy to be here and excited for our next guest, Ajay Gupta. He's the Global Director, Product Marketing and Management from Huawei. Welcome. >> Oh thank you, Jeff. Pleasure to be here. Thanks for your time. >> Absolutely, so you've been coming here for years. You laughed at me when I asked how long you've been coming here. >> Oh it's been ages, you can look at me and you can imagine. >> No, look, all hairs still dark. >> Oh come on, you're being too nice to me. >> So what's really changed, as you've been coming for years. Kind of at a global perspective? >> Yeah, yeah I think we've seen the nature of security change, the nature of threats change. The different companies have changed actually over the years. The crowd has gone up and swelled like 40,000 you mentioned. So, we really think this show has really become the gold standard for the trade shows when it comes to security. We weren't there at RSA but last few years we have made it a point to be here every year to talk to the customers here. >> Yeah. >> And you meet all the people from all over the world. That's the best part, customers, partners, everybody. >> It's interesting because a big part of the theme here is collaboration and ecosystem. And nobody can do it alone. Everyone covers different pieces of the puzzle. I know you guys are trying to grow your ecosystem. What does ecosystem mean to Huawei? >> Absolutely. I think we do believe from a security perspective no single vendor can offer the best of the breach security to their customers. We really need partners, the ecosystem. Huawei has something called being integrated. That is, bringing the partners onboard to offer different pieces of the puzzle. In fact it's a good point to mention. We are announcing two announcements this morning actually. The first one what we'll talk about is Avira. It's the best AV engine company in Germany. Huawei really recognizes the importance of the AV. So we are bringing their AV engine on the Huawei's next generation firewall. It really brings two things. Performance and accuracy. That's what people need from a AV point of view. The second announcement we're going to make really is what's called the Huawei USG9000V. It's a security gateway actually. So as the cloud's proliferation, as people are moving to the cloud, as people are using more and more SAS applications, you're going to see lot more security building from the cloud perspective. Our USG9000V is actually the perfect gateway to combat the security threats in the cloud. So virtual data centers, the cloud data centers, the OTT's, we really bring all the different kinds of security in the USG9000V. The announcement we are making is really an upgraded version of the existing security appliance that we call 6000V. Again, it's a software security. Works with different VMs whether it's KVM, whether it's zen, whether MS6. Huawei's own virtual system. Huawei's FushionSphere. The performance is in terabit so you can actually go in and read some of the specs from the Huawei's perspective. One of the best of the V products for virtual security. >> Right. And the cloud's changed everything, right? So many applications are delivered via the cloud now. And even if it's not a cloud and it's an internal cloud people want the flexibility of cloud. They want to scalability of cloud. They really want the way the cloud works for them to deliver the applications to their customers and their employees. >> Definitely. So three things I'm going to mention here from a cloud perspective. What people are looking for from a cloud security perspective is on demand. How do you scale in, scale out as the demands of the bandwidth goes up. You got to make sure your network security is able to keep up with that demand. People are looking for visibility. You've got this multitude of appliances, boxes, cloud boxes, cloud security all over the place. How do you make sense out of it? How do you really bring all of those thresholds, all of those unloads come together into the form of CIO or CSO can really understand. >> Right. >> And the last thing I'm going to make it easy to configure. PLug and play. Some of the automation feature. Automation people are starting to move in the security but you got to be careful when you bring automation from a security perspective. You need to automate task that are not that mission critical. But as we more and more trust, you're going to see more security automation in the industry. >> Yeah. Because when it's cloud it just needs to work, right. Everybody just expects, I can add more capacity, I can spin it down. And it just needs to work. It's somebody else's problem, it's somebody else's data center. >> I don't know what's going on behind the scenes, I just know it works. >> Yeah. >> I pick up my phone, it's going to kick. That's exactly the concept of security. But you got to be really careful when it comes to security because you got to make sure that when, suppose the positive threats and positive and negative threats actually. How do you combat and make sure you automate from the positive point of view and not from a negative point of view. >> But there's one thing that hasn't changed, cloud or no cloud. And they talked about it in the keynote and that great line was every company has at least one person that will click on anything. (laughs) >> Oh, I love it. I love it actually. >> How do we get past, I mean, they're still getting the email from the African king who needs some dollar >> Nigeria, Nigeria >> For Nigeria. >> Let me put I this way. I would say hackers are getting smarter and smarter. How do you keep up with the threats from the hackers who are one step ahead of you. How do you really combat threats, unknown threats, in the future? So I think things we have seen in 2016, the phishing attacks are back on the rise actually. Always do you see Ransomware. Form the point of Ransomware I should mention there's something called par pon ton from Ransomware that I'm going to let you off the hook if you infect two other computers actually. I don't need the money from you. So hackers are coming with those innovations to really go and hack more people actually. You seen what happened with the collected costs. Chrysler had a recall on 1.4 million vehicles in the past. Do you see what's happened with the camera, the surveillance camera. So I think two things we really need to watch out in 2017. One is Ransomware and the number two thing which is extremely, extremely important is industrial IOT actually. >> Absolutely. >> As the sensors get deployed more and more around the world you've got to make sure those sensors are able to keep up with the threat, it's not easy. So what Huawei provides to the table is really end to end security. Two things in security; multi-layered security and security indifference. Those are the principles from the bottom, not from the top down. >> Right. It's funny, the funniest, it's not funny really. The Ransomware story was fake Ransomware. I didn't really put Ransomware on your machine I just told you that I did so go ahead and pay me anyway. And the other thought is really the ability for them to build a business because of Bitcoin as a way to collect anonymous money from people. That enabled a rise in the escalation in Ransomware. It's a complicated world. They give you the last take as people drive away, leave RSA 2017, really what should be the top of mind as they think about what's going to happen and what we'll be talking about when we come back a year from now? >> I think two things I would really suggest people to really take away from the RSA this year. First of all, what's happening in the industry? What's happening in the market? Keep updated with the latest threat. See what vendors had a very comprehensive solution from an end to end perspective. Really go do their own research, making sure that security is not an after thought. Security it needs to be proactive. Security needs to be built up from ground up. Don't regard security as something secondary actually. As long as people put premium on security, that's going to save their face rather than to be appearing on the Wall Street front page or have been hacked. They say there are two kinds of companies. 50% claim that they have been hacked. 50% know they just don't admit it. That's all. >> Alright, very good. Well Ajay thanks for stopping by and congrats on a great show. >> My pleasure, thanks Jeff. Thank you very much. >> He's Ajay Gupta, I'm Jeff Frick. You're watching theCUBE from RSA conference in downtown San Francisco. Thanks for watching. (upbeat music)

Published Date : Feb 20 2017

SUMMARY :

We are live at Moscone Center at the RSA Convention. Pleasure to be here. Absolutely, so you've been coming here for years. as you've been coming for years. the nature of security change, the nature of threats change. That's the best part, customers, partners, everybody. It's interesting because a big part of the theme here of the breach security to their customers. And the cloud's changed everything, right? as the demands of the bandwidth goes up. And the last thing I'm going to make it easy to configure. And it just needs to work. I don't know what's going on behind the scenes, from the positive point of view and not and that great line was every company has at least one I love it actually. I don't need the money from you. Those are the principles from the bottom, And the other thought is really the ability for them What's happening in the market? and congrats on a great show. Thank you very much. Thanks for watching.

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
Ajay GuptaPERSON

0.99+

GermanyLOCATION

0.99+

Jeff FrickPERSON

0.99+

2017DATE

0.99+

JeffPERSON

0.99+

HuaweiORGANIZATION

0.99+

ChryslerORGANIZATION

0.99+

2016DATE

0.99+

50%QUANTITY

0.99+

two announcementsQUANTITY

0.99+

two kindsQUANTITY

0.99+

USG9000VCOMMERCIAL_ITEM

0.99+

AjayPERSON

0.99+

two thingsQUANTITY

0.99+

second announcementQUANTITY

0.99+

40,000QUANTITY

0.99+

1.4 million vehiclesQUANTITY

0.99+

40,000 security professionalsQUANTITY

0.99+

Moscone CenterLOCATION

0.99+

one thingQUANTITY

0.98+

Two thingsQUANTITY

0.98+

first oneQUANTITY

0.98+

two other computersQUANTITY

0.98+

AviraORGANIZATION

0.98+

OneQUANTITY

0.97+

FirstQUANTITY

0.97+

three thingsQUANTITY

0.97+

NigeriaLOCATION

0.96+

this yearDATE

0.96+

#RSACEVENT

0.95+

one stepQUANTITY

0.95+

Wall StreetLOCATION

0.94+

this morningDATE

0.94+

RSA Conference 2017EVENT

0.93+

RansomwareTITLE

0.93+

6000VCOMMERCIAL_ITEM

0.91+

RSAORGANIZATION

0.9+

RSA 2017TITLE

0.84+

RSA conferenceEVENT

0.83+

San FranciscoLOCATION

0.83+

least one personQUANTITY

0.8+

MS6COMMERCIAL_ITEM

0.77+

last few yearsDATE

0.76+

single vendorQUANTITY

0.75+

yearsQUANTITY

0.74+

theCUBEORGANIZATION

0.73+

Nigeria, NigeriaLOCATION

0.73+

AfricanOTHER

0.71+

two thingQUANTITY

0.67+

#theCUBEEVENT

0.66+

a yearQUANTITY

0.65+

zenCOMMERCIAL_ITEM

0.58+

singleQUANTITY

0.54+

terabitQUANTITY

0.52+

RSA ConventionLOCATION

0.52+

HuaweiEVENT

0.52+

SASTITLE

0.47+

Ian Foo, Huawei - RSA Conference 2017 - #RSAC #theCUBE


 

(upbeat techno music) (upbeat techno music) >> Hey welcome back everybody, Jeff Frick here with the Cube, We're in downtown, San Francisco at the RSA Conference. It's like 40,000 people, security people, talking about security. It's a new age in security, with all the things that happened with the election, and all types of interesting phishing attacks, and a lot of professionals here trying to stop the problem. So we're excited to be joined by our next guest, Ian Foo. He's the Director of Product Marketing from Hauwei, Ian welcome. >> Thank you, thank you Jeff, it's good to be here. Glad to join everyone here, it's pretty exciting, very busy. >> Yeah, it's very busy. >> Yep we're here showing what Hauwei has to offer in the market, and what we're highlighting this year at RSA. There are three main areas that we're trying to bring attention to. One of those is the latest in terms of our functional capabilities and offerings in our network security portfolio. So our network security devices. The other is what we're doing in our ecosystem partnership. We're expanding our partnerships, trying to build an ecosystem with industry leading partners. So it'll be well to bring better value to the end users and to our customers. And the third is what we're offering in terms of new platforms and capabilities in technologies, in our innovation in cloud infrastructure security. Helping cloud providers or enterprisers add security to their private cloud, or their cloud service infrastructure. >> Alright so let's unpack those a little bit. >> Sure. >> So the first one is really the cloud. >> Ian: Yes. >> You know, ovbiously with the rise of AWS really driving public cloud. >> [Ian} Yep. >> There's no longer a question and apps like Sales Force. >> Ian: Right. The enterprise is pretty comfortable with cloud. >> Ian: Right. >> How has that really changed your world from a security perspective, supporting public cloud providers? >> Ian: Yep. >> Private cloud providers, and then of course hybrid cloud inside the enterprise that still want to deliver kind of cloud agility, cloud flexibility? Right, so it's actually changed the landscape in quite a few ways. When we move from traditional security within the enterprise, and expand that to cloud service providers, and enterprisers trying to build private cloud, we're looking at a few things that have evolved. We're looking at scale, first and foremost. That's the one that pops into most people's mind. Now, especially in a cloud service provider environment, we're providing services to potentially thousands of customers. Scale reliability, availability becomes critical. Those are areas that we've traditionally excelled in. But what's evolving is the way threats are addressed and recognized, and the way policy is pushed within those environments. So for their customers, cloud service providers are looking for ways to be able to provide policy capabilities that match what the enterpriser is used to in their environment. So we tried to build the technologies and tools that enable cloud service providers to do exactly that. >> Right. >> Provide enterprise class-compliant security capabilities, defense against DDoS attacks within their cloud infrastructure for those enterprisers. >> Yeah it's interesting in the keynote, they talked about every company has at least one person that will click on anything. >> Ian: Right. >> Right. And they also talked about kind of the increased attack area of people's homes. >> Ian: Right. >> Because a lot more people now work from homes. >> Ian: Correct. >> Right? They're accessing the corporate networks. >> Ian: Yep. >> The corporate application. >> That's right. >> From their home, from the coffee shop on their phone. >> Absolutely. >> So that's changed the... >> From their cars. >> The landscape quite a bit. >> Right from yeah... >> And not to mention the cars. >> Yeah so that absolutely has. Again it goes back to what I mentioned earlier. Scale, so now we're looking at a widened threat base, or a widened threat surface, if you will. Especially when it comes to not just consumers, from mobile devices, home access, but now IoT. And when we expand IoT to both, to the industrial Iot as well as consumer Iot, what we're seeing is many more entrance points into what we consider the enterprise space. >> Right. >> And so now securing all of those points of presence, and applying a multi-layered approach to security, becomes much more complicated. And that's where we try to develop the technologies and innovations driven by our customers to help them solve those problems. >> Right, which also kind of drives into one of your other points, is ecosystem. >> Ian: Right. >> Right so we cover a lot of tech shows. >> Ian: Absolutely. >> We got 100 shows a year. And everyone is trying to build an ecosystem because you can't just do it alone. >> Ian: That's right. >> And one of the big themes that came out again, out of the keynote, is this idea of yes we compete, yes there's 40,000 people here. I don't even know how many companies, but we compete on different places. But if we share bad guy information... >> Ian: That's correct. >> ...Effectively, efficiently, it helps us all out in keeping our customers safe. >> Absolutely, absolutely so it's all about ecosystems, because, I think, for a true multi-layered approach, multi-perspective approach to security, it's all about teamwork. Right and as you said, we cant be an expert at everything. We have to recognize, each vendor has to recognize where they're strengths lie, where their fortes are, where their expertise is, and then partner to complement that to provide that multi-layered approach that the end user is looking for. >> Right. >> And that's what we're trying to do. Here we have announced quite a few partnerships. We have aligned with notable names in the industry. Such as, Intel-McAfee, Avira, AlgoSec, and we're working with companies like FireMon, to help build that ecosystem partnership to create that team effect. >> Right >> In providing multi-layered approach, best in breed, multi-layered approach to security in the enterprise. >> Interesting this morning I don't know if that was breaking news, or I just was behind the news, that McAfee is actually going to spin out of Intel and be a wholly-owned company. >> Yeah I heard a little bit about that. Yeah, it's interesting, it's a very dynamic industry. It constantly changes, ongoing here and there. >> Right. That can be great, it allows people to focus in certain ways. But yeah, not surprising there is constant changes in this industry. >> Right, but then the one thing that's stayed the same but is still growing in importance even with cloud, you still have the enterprise data center. >> Ian: Absolutely. Right and those things continue to grow and are very, very important. >> Right. >> And there's just a lot of stuff that's not going to make it to cloud. So how have you seen kind of the enterprise data center kind of situation change? >> Ian: Yep. >> With these new threats, with clouds, with hybrid? >> Right, well so what we're seeing, especially in the enterprise data center is, we're seeing an evolution from traditional fireball security, which is still necessary. But we're seeing that, the attacks and the access points are becoming more sophisticated. We're seeing progression in ransomware and advanced persistent threats. It goes back to what you said before, a component is that there's always going to be that guy that clicks on anything. >> Right. >> And it could, who knows that thing could be? So what we're seeing there is an evolution of security and awareness to the point of customers asking for awareness to applications, to files, to contents. So to that notion, some of the things we're announcing here and sharing with our customers and potential customers, our technologies to help prevent ransomware, our platform like our Firehunter, a sandboxing technology, which provides defenses against advanced persistent threats, as well inline, streaming-based, security capabilities, where we partnered for example with Avira. We complement our network-based security, for streaming inspection of files and contents and streams. We complement that with their abilities in malware and signature-based recognition, to provide a multi-layered, comprehensive approach to dealing with the new types of security threats we're seeing. >> Right, so Ian you been comin to the show for awhile, you've been in the industry for long time. >> Ian: Yep, it's been a bit. >> There's 40,000 people, what's kind of your take, kind of take it a step back from the specifics, >> Ian: Right. >> Like kind of the evolution of the security industry I think... >> Ian: Yep. >> One of the stats I heard the other day is like, 1.5% of the IT spend was for security. Now that's up to like five or ten. >> Ian: Right, right. >> It's growing in importance, but the technology out in front of the security is just rockin and rollin. >> Ian: Right. >> And IoT and 5G is just the next kind of big wave comin. >> Correct >> So, what's kind of your perspective as you look back and kind of look forward? >> Well it's obvious, it's very obvious, from just the numbers you sharing that, rather than be peripheral to the business, security is now core to the business. Instead of just supporting business, it's become a key piece to being able to deliver business reliably. And I think that enterprisers have recognized that. What's happening is that we're seeing an acceleration in the evolution of threats, in the entrance vectors in the various areas. Because of the adoption rate and snowballing effect that we're seeing in technology in general. And I think that security has become better at trying to keep up with that pace, rather than falling behind the curve as we have in the past. Mainly because enterprisers recognized the relevance and importance of it. So we're no longer selling insurance, when we sell security, we're selling business-enabling value, and how we protect brand recognition and brand capabilities for our end users and customers. >> It's a whole nother kettle a fish. >> Ian: Right. >> That we don't have time to get into right now but we went to a presentation last night about the whole insurance angle on... >> Ian: Right. >> On security, which is, like I said, is a whole different kettle a fish. We'll save that for next time so Ian... >> Sounds good. >> Thanks for stoppin by. >> Great well thanks for having us. Great being here with you and enjoy the show. >> Absolutely, he's Ian Foo, I'm Jeff Frick, you're watching The Cube from RSA Conference in San Franciso. (quiet techno music) (upbeat techno music) (upbeat techno music)

Published Date : Feb 20 2017

SUMMARY :

We're in downtown, San Francisco at the RSA Conference. Glad to join everyone here, it's pretty exciting, very busy. And the third is what we're offering in terms of You know, ovbiously with the rise of AWS really driving There's no longer a question and apps like Ian: Right. and expand that to cloud service providers, Provide enterprise class-compliant security Yeah it's interesting in the keynote, they talked about And they also talked about kind of the increased They're accessing the corporate networks. Again it goes back to what I mentioned earlier. and applying a multi-layered approach to security, Right, which also kind of drives into one of And everyone is trying to build an ecosystem And one of the big themes that came out again, in keeping our customers safe. that to provide that multi-layered approach to help build that ecosystem partnership to multi-layered approach to security in the enterprise. that McAfee is actually going to spin out of Intel Yeah, it's interesting, it's a very dynamic industry. to focus in certain ways. but is still growing in importance even with cloud, Right and those things continue to grow and are that's not going to make it to cloud. especially in the enterprise data center is, we're seeing So to that notion, some of the things we're announcing here Right, so Ian you been comin to the show for awhile, Like kind of the evolution of One of the stats I heard the other day is like, It's growing in importance, but the technology from just the numbers you sharing that, the whole insurance angle on... We'll save that for next time so Ian... Great being here with you and enjoy the show. (upbeat techno music)

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
Jeff FrickPERSON

0.99+

JeffPERSON

0.99+

IanPERSON

0.99+

AviraORGANIZATION

0.99+

Ian FooPERSON

0.99+

McAfeeORGANIZATION

0.99+

AlgoSecORGANIZATION

0.99+

40,000 peopleQUANTITY

0.99+

IntelORGANIZATION

0.99+

AWSORGANIZATION

0.99+

100 showsQUANTITY

0.99+

The CubeTITLE

0.99+

tenQUANTITY

0.99+

HauweiORGANIZATION

0.99+

1.5%QUANTITY

0.99+

San FrancisoLOCATION

0.99+

fiveQUANTITY

0.99+

thirdQUANTITY

0.99+

each vendorQUANTITY

0.98+

OneQUANTITY

0.98+

FireMonORGANIZATION

0.98+

bothQUANTITY

0.97+

RSA ConferenceEVENT

0.97+

oneQUANTITY

0.96+

HuaweiORGANIZATION

0.96+

this yearDATE

0.96+

Sales ForceTITLE

0.94+

last nightDATE

0.94+

#RSACEVENT

0.94+

RSA Conference 2017EVENT

0.92+

San FranciscoLOCATION

0.9+

thousands of customersQUANTITY

0.89+

RSA ConferenceEVENT

0.89+

first oneQUANTITY

0.85+

CubeORGANIZATION

0.85+

this morningDATE

0.79+

three main areasQUANTITY

0.78+

one personQUANTITY

0.73+

firstQUANTITY

0.71+

a yearQUANTITY

0.69+

more peopleQUANTITY

0.67+

RSAORGANIZATION

0.64+

#theCUBEORGANIZATION

0.53+

themesQUANTITY

0.51+

FirehunterTITLE

0.43+

Ted Julian, IBM Resilient - RSA Conference 2017 - #RSAC #theCUBE


 

(upbeat electronic music) >> Hey, welcome back everybody. Jeff Frick here with theCUBE. We are live in downtown San Francisco, Moscone Center at the RSA conference. It's one of the biggest conferences, I think after like Salesforce and Oracle that they have in Moscone on the tech scene. Over 40,000 professionals here talking about security, I think it was 34,000 last year. It's so busy they can't find a space for theCUBE, so we just have to make our way in. We're really excited by our next guest, Ted Julian from IBM Resistance, Resilience, excuse me. >> Thank you, it's alright. >> And you are the co-founder of VP Product Management. >> That's right. >> Welcome. >> Thanks, good to be here Jeff, thanks. >> And you said IBM actually purchased a company, >> Ted: A year ago. >> A year ago. So happy anniversary. >> Ted: Yeah, thanks. >> So how is that going? >> It's great. Business is really going well, it's been thrilling to get our product in place and a lot more customers and really see it help make a difference for them. >> Yeah we, Jesse Proudman is a many time CUBE alumni, his company is Blue Box, also bought by IBM. >> Ted: Yes. >> A little while ago, also had a really good experience of, kind of bringing all that horse power. >> They know what they are doing. >> To what his situation was. So let's jump into it. >> Sure. >> Security, it's kind of a dark and ominous keynote this morning. The attack's surface is growing with our homes and IOT. The bad guys are getting smarter, the governments are getting involved, there's just not necessarily bad guys. What's kind of your perspective as you see it year after year acquisition? 40,000 professionals here focused on this problem. >> We are not winning. >> We are not winning? >> Unfortunately, I mean, I guess as a species. Again, what is it? We saw a survey recently from the Ponemon Institute. 70% of organizations acknowledge they didn't have an incident response plan. So you talk about that stuff in the keynote where sort of a breach was inevitable. What are you going to do? Well the thing you'd need to have is a response plan to deal with it, and 70% don't. Cost of a breach also, according to Ponemon Institute is up to $4 million on average, obviously they can be a lot larger than that. >> Right. >> So there's a lot of work to be done to do better. >> And then you hook up a new device, and they are on that new device as soon as it plugs into the internet. They say within an hour, they ran a test today. So is the, I mean where are we winning, Where are we getting better? I mean, I've heard crazy stats that people don't even know they've been breached for like 245 days. >> Ted: Yeah. >> Is that coming down? Are we getting better? >> Certainly the best in the business are, and really the challenge I think as an industry is to percolate that down through the rest of the marketplace. Everybody is going to be breached, so it's not whether or not you are breached, it's how you deal with it come the day, that's really going to differentiate the good organizations from the bad ones. And that's where we've been able to help our customers quite a bit by using our platform to help them get a consistence and repeatable process for how they deal with that inevitable breach when it happens. >> That's interesting. So how much if it is you know kind of building a process for when these things happen versus just the cool, sexy technology that people like to talk about? >> Oh, it's everything. I mean one of the hottest trends that you're going to be seeing all over the show is automation and orchestration. Which is critically important as part of the sort of you get an alert and how do you enrich that to understand that, once you understand that how can you quickly come to sort of a course of action that you want to take. How can you implement that course of action very efficiently? Those things are all important. Computers can help a lot with that but at the end of the day it's smart people making good decisions that are going to be the success factor that determines how well you do. >> Right, right. Another kind of theme that we are hearing over and over is really collaboration amongst the companies amongst the competitors, sharing information about the threat profiles, about the threats that are coming in to kind of enable everybody to actually kind of be on the same team. That didn't always used to be the case, was it? >> Well, people have been working on this for a while but I think what's been a challenge is getting people to feel comfortable contributing their data into that data set. Naturally they are very sensitive about that, right? >> Right. >> This is some of our most confidential information that we've had a security issue and we're really not you know, dying to give that out to the general public. And so I think it's been, the industry's been trying to figure out how can we show enough value back when that information's contributed to some kind of a forum to make people feel more comfortable about doing that? So I think we've seen a little bit of progress over this last year and they'll be more going forward, but this is a, It's marathon not a sprint, I think to solve that problem. But, it is crucial because if we can get to that point that's what ultimately allows us to turn the tables on the bad guys. Because they cooperate, big time, they are sharing vulnerabilities, they are sharing tactics, they are sharing information about targets, and it's only when the good guys similarly share what they're experiencing that we'll have that opportunity to turn the table on them. >> It's funny we had a Verizon thing the other night and the guy said if you are from the investigator point of view, it's probably like a police investigator. They see the same pattern over and over and over and over and over it's only when it's the first time it's happen to you that's it's unique and different. So really the way to kind of short-circuit the whole response. >> How do you find out you've been breached? There is short list. One, Brian Crebs, very famous reporter happens to find out, he tells you. Number two, FBI. >> They tell you. >> Unfortunately, that's usually, it's usually external sources like that as oppose to organization internal systems that tip them off to a breach. Another example of how we are doing better but we need to do a lot better. >> And then there's this whole thing coming up called IOT, right. And 5G and all these connected device in the home, our cars, our nest, So the attacks surface gets giant. Like I said, they said in the keynote, you plug something in the internet they are on it within an hour. How does that really change the way that you kind of think about the problem? >> It makes it a lot harder. The attack surface gets harder, gets bigger, the potential risks go up quite a bit, right. I mean you are talking about heart implants, or things like that which may have connectivity to some degree, then obviously the stakes are severe. But the thing that makes those devices even trickier is so often they're embedded systems, and so unlike your Windows PC's or your Mac where, I mean it's updating itself all the time. >> Right, right. >> And you barely even think about it, you turn it on one morning and there is a new update. A little harder to make those update happen on IOT kinds of devices, either because they're harder to get to or the system's aren't as open or people aren't use to allowing those updates to occur. So even though we may know about the vulnerabilities patching them up is even harder in an IOT environment typically than in a traditional. >> It's crazy. Alright, so give us a little update on Resilient. What exactly is do you guys do inside this crazy eco-system of protecting us all? >> Sure. So five or six years ago, myself and my co-founder John started the company and it was really was acknowledging that we've gone through the era of prevention, to detection and now it's all about response. And at the end of the day when organizations were trying to deal with that we saw them using ticketing systems, spreadsheet, email, chat I mean a mess. And so we built our platform, the Resilient IRP from the ground up specifically to help them tie together the people processing in technology around incident response. And that's gone amazing. I mean the growth that we've seen even before the IBM acquisition but afterwards has been breath taking. And more recently we been adding more and more intelligence in automation and orchestration into the platform, to help not only advise people what to do, which we've done forever, but help them do it, click a bottom and we'll deploy that patch or we'll revoke that user's privileges or what have you. >> Right. Yeah a lot of conversation about kind of evolution of big data, evolution of things like Sparks so that you know can react in real time as opposed to kind of looking back after the fact and then trying to go and sell something. >> For sure. And for us it's really empowering that human. It's either the enrichment activity where they'd normally go to 10 different screens, to look up different data about a malware thread or about vulnerabilities, we just spoon feed that to them right within the platforms so they don't have to have those 10 tabs opened in the browser. And after they'd had a chance to evaluate that, and they want to know what to do, again they don't have to go to another tool and make that action happen, they can as click a button within Resilient and we'll do that for them. >> Alright. Ted Julian, we are rooting for you. >> Ted: Thanks, yeah. >> IBM, give him some more recourses. He's Ted Julian and I'm Jeff Frick. You're watching theCUBE at RSA Conference 2017, at Moscone Center, San Francisco. Thanks for watching.

Published Date : Feb 15 2017

SUMMARY :

It's one of the biggest conferences, So happy anniversary. it's been thrilling to get our product in place Jesse Proudman is a many time CUBE alumni, kind of bringing all that horse power. So let's jump into it. the governments are getting involved, is a response plan to deal with it, And then you hook up a new device, and really the challenge I think as an industry that people like to talk about? as part of the sort of you get an alert to actually kind of be on the same team. is getting people to feel comfortable that opportunity to turn the table on them. and the guy said if you are from the investigator happens to find out, that tip them off to a breach. the way that you kind of think about the problem? I mean you are talking about heart implants, And you barely even think about it, What exactly is do you guys do And at the end of the day so that you know can react in real time so they don't have to have those Ted Julian, we are rooting for you. He's Ted Julian and I'm Jeff Frick.

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
Brian CrebsPERSON

0.99+

JohnPERSON

0.99+

Ted JulianPERSON

0.99+

Jesse ProudmanPERSON

0.99+

Ponemon InstituteORGANIZATION

0.99+

IBMORGANIZATION

0.99+

Jeff FrickPERSON

0.99+

FBIORGANIZATION

0.99+

JeffPERSON

0.99+

10 tabsQUANTITY

0.99+

MosconeLOCATION

0.99+

TedPERSON

0.99+

VerizonORGANIZATION

0.99+

OracleORGANIZATION

0.99+

70%QUANTITY

0.99+

Blue BoxORGANIZATION

0.99+

40,000 professionalsQUANTITY

0.99+

245 daysQUANTITY

0.99+

A year agoDATE

0.99+

10 different screensQUANTITY

0.99+

last yearDATE

0.99+

todayDATE

0.99+

SalesforceORGANIZATION

0.99+

fiveDATE

0.98+

OneQUANTITY

0.98+

IBM Resistance, ResilienceORGANIZATION

0.98+

Over 40,000 professionalsQUANTITY

0.98+

RSAEVENT

0.98+

one morningQUANTITY

0.97+

RSA Conference 2017EVENT

0.97+

CUBEORGANIZATION

0.97+

first timeQUANTITY

0.97+

34,000QUANTITY

0.96+

#RSACEVENT

0.96+

up to $4 millionQUANTITY

0.96+

six years agoDATE

0.96+

MacCOMMERCIAL_ITEM

0.95+

Moscone CenterLOCATION

0.93+

oneQUANTITY

0.93+

Moscone Center, San FranciscoLOCATION

0.9+

this morningDATE

0.89+

an hourQUANTITY

0.85+

WindowsTITLE

0.82+

VP Product ManagementORGANIZATION

0.8+

SparksTITLE

0.79+

theCUBEORGANIZATION

0.74+

San FranciscoLOCATION

0.7+

within an hourQUANTITY

0.69+

Number twoQUANTITY

0.68+

more customersQUANTITY

0.6+

5GOTHER

0.56+

#theCUBEORGANIZATION

0.49+

Tom Corn, VMware - RSA Conference 2017 - #RSAC #theCUBE


 

(upbeat music) >> Hey welcome back everybody, Jeff Frick here with theCUBE. We are live in downtown San Francisco at the RSA conference, RSAC is the hashtag. 40,000 security professionals talking about how to keep us all safe from the bad guys out there and we're excited to be joined by a long time industry veteran, Tom Corn. He's the SVP Security Products from VMware. Tom, welcome. >> Thank you. >> So you've been coming to this show for a while? You've been in the business >> Five years. >> For a while. >> Yes. >> What's kind of your take on the vibe of how this this industry is changing? >> You know it's funny the thing that strikes me when you come to the RSA Conference is at once, how big the industry is and how small the industry is, right? Massive amount of people and it's incredible you walk through the floor if you've been around the industry for any amount of time. How many people you actually you know. It's a small world and a very small community. >> 'Cause they're all here. >> Yeah. >> All 40,000 of them are here. >> They are. They are. >> So big thing that's changed over the last couple of years is Cloud, right? >> Yes. >> And the adoption of cloud in really AWS kind of drive in the public Cloud piece and Salesforce really driving kind of the-- I'm happy with an enterprise application for a Cloudbase application. That wasn't the way before. So how has kind of Cloud impacted the way you think about security? >> Well, I think most of the dialog in Cloud has been how do we secure the Cloud? And I think that's a very valid set of questions in any environment. How am I going to secure this environment? I think the interesting thing that hasn't been talked about as much is is there a way to use the unique properties of the Cloud to secure things? Right? We look to the Cloud and we say, there's all these interesting unique properties automation, a single fabric across a virtualization layer in between applications that are sitting above and the infrastructure, the below. There isn't a lot of dialog until the last maybe year or so in could we use the Cloud and could we use virtualization to secure things? And I think that's actually an enormous opportunity and I'll tell you why. I think that one of the biggest gaps we have in security now is actually an architectural one, right? We're trying to protect applications and data. We're doing it by putting controls of products from around this show floor on machines and on network links. >> Right. >> Right? And those are not the same thing. Aligning controls to the infrastructure is not helping us align them to the applications and data we're trying to protect. And there's, I think, an enormous opportunity to leverage Cloud and virtualization which is actually a translation layer between the two. To really solve this problem in a very very meaningful way. >> So if I'm hearing you right, it's really virtualizing the protection of the data, virtualizing the protection of the-- I don't know if even devices is the right word, right? 'Cause you want to virtualize the devices. You're not really protecting devices. You're protecting the image of a device, I guess. >> Yeah, it's actually allowing us to create, for example, logical boundaries around critical applications and critical data to allow us to align controls to the thing we're protecting. And that's the whole idea behind, for example, micro segmentation which is a very very big move today. This is maybe the best analogy I've heard so far which is-- >> Okay. >> If you think of a data center as a city, when we used to have monolithic stack applications, it was kind of like having an entire application in a skyscraper and it was the only tenant, right? And when you have that, the front of that building, no one in the city could touch any part of that application without going through that door. So access policy was very simple and if I wanted to look at-- well, what looks weird here? If it look normal or weird, someone passing through this door or activity happening there, there's only one tenant. It was a very simple picture. Applications don't look like that. Applications are distributed systems. It's like-- >> Right, right. >> Parts of floors of different buildings in different parts of the city. We've lost-- >> And they're all API based too, right? They're all connected to one another. >> Right, absolutely, absolutely. So that, more than anything, has changed the equation making it despite the fantastic innovation we have across this show floor makes it very difficult for them to do the great job they're capable of doing which is we need somehow to put them in a position to focus 'em, to create a skyscraper, a virtual skyscraper if you will around these critical applications and data. That's one of the biggest opportunities of using the Cloud, of using virtualization to secure things and frankly, what a lot of this whole movement towards micro segmentation is doing. >> So what does that look like? Extending your skyscraper analogy. >> Yeah. >> If it was skyscraper before, what's it going to look like in the future? >> Well as an example, it's about saying this critical application, SAP or some, you know, 3rd gen application is composed of these pieces, these machines, these containers. It's about using the fabric, the overlay, the virtualization or Cloud fabric to create a logical boundary around those. A logical boundary that moves with it, that expands with it, that shrinks with it. If it changes Clouds, it moves with it and it allows you to then say, I want to take the products, whatever security products they want and align them around that boundary. I create a skyscraper again, not by changing my network, not by changing my servers but by creating sort of using just the virtualization layer to create that logical boundary and it's really it's having a really significant impact. It's one of the reasons, I think, as we look to the coming year, this notion of aligning security to applications and the notion of more security innovation coming out of not security companies but infrastructure players and Cloud players, I think it's going to be a thing we're going to see a lot of. >> Alright well I look forward to diggin' more into this because it's always a great innovation when you kind of turn the lens. >> Yeah. >> Right, and reshape the problem in a different-- from a different point of view and that's when you can really see some new opportunies but I know you got to get to your booth. (laughs) So he's Tom Corn. I'm Jeff Frick. You're theCUBE from RSA. Thanks for stopping by Tom. >> My pleasure. >> Alright. See you next time. (upbeat music) (inspirational music)

Published Date : Feb 15 2017

SUMMARY :

conference, RSAC is the hashtag. and how small the industry is, right? They are. the way you think about security? and I'll tell you why. and data we're trying to protect. I don't know if even devices is the right word, right? and critical data to allow us to align controls the front of that building, in different parts of the city. They're all connected to one another. That's one of the biggest opportunities of using the Cloud, So what does that look like? and the notion of more security innovation coming out of when you kind of turn the lens. Right, and reshape the problem in a different-- See you next time.

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
Jeff FrickPERSON

0.99+

Tom CornPERSON

0.99+

TomPERSON

0.99+

twoQUANTITY

0.99+

Five yearsQUANTITY

0.99+

40,000QUANTITY

0.98+

AWSORGANIZATION

0.98+

VMwareORGANIZATION

0.98+

40,000 security professionalsQUANTITY

0.98+

3rd genQUANTITY

0.98+

CloudbaseTITLE

0.97+

RSA ConferenceEVENT

0.97+

RSAORGANIZATION

0.97+

todayDATE

0.96+

one tenantQUANTITY

0.94+

oneQUANTITY

0.94+

RSACEVENT

0.93+

CloudTITLE

0.93+

#RSACEVENT

0.91+

RSA Conference 2017EVENT

0.87+

RSA conferenceEVENT

0.79+

downtown San FranciscoLOCATION

0.77+

lastDATE

0.76+

last couple of yearsDATE

0.76+

theCUBEORGANIZATION

0.76+

SalesforceORGANIZATION

0.74+

VMwareEVENT

0.72+

single fabricQUANTITY

0.69+

SAPORGANIZATION

0.63+

#theCUBEEVENT

0.49+

Tamara McCleary, Thulium.co - RSA Conference 2017 - #RSAC #theCUBE


 

(sleek electronic music) >> Hey, welcome back, everybody. Jeff Frick here with the Cube at the RSA Conference in downtown San Francisco. And we got a really special guest that we grabbed out of the hallway, out of the airplanes, Tamara McCleary, the CEO of Thulium. She's the only person I know that goes to more conferences than me and Ray Wang together, I think. (laughs) Tamara, great to see you. >> Oh my goodness, it is so awesome to find you here! >> Absolutely. So, what do you think of the show? 40,000 people. >> It is absolutely bloody freaking crazy right now. And it is, the show has grown just immensely year after year. And there's so much going on. It's absolute craziness. In fact, it's so busy, I had hard time finding you. >> I know. (laughs) So do you feel more secure with all these fine professionals looking out for you? >> You know what? I actually think right here, right now, we are in the midst of geeks with capes. These are the new superheroes. My cybersecurity superheroes right here. >> Well I'm glad. Because the keynote was a little dark this morning. (laughs) John Lithgow got up there and basically said everything is going to fall apart, except for the heroes with capes that are going to keep our cars running, hospitals up, TV stations going, the lights on. >> Wait a minute, you're not suggesting that fear is being used as a motivator for cybersecurity, are you? >> Well, yeah, we don't want to get into that. I mean, the whole, you know, governments like to influence other government's elections. That's never happened before either. >> Well, you know, the other this is, it would be very scary if you didn't follow you on the Cube because you've got the cutting edge in the know information. >> That's right. We have all the tech-athletes like you. (laughs) >> A tech-athlete! So, what have you see so far? Who are you working for here? What have you kind of seen? What's the, uh, what's the vibe? >> Well I am here on a press pass, so I am covering and talking about what's going on here at the conference. And lots of new cool things that I'm interested in and that is, you know we're talking a lot about the internet of things, we're talking a lot about threats. And you're looking at AI, right? What's AI got to do with security? And what I find interesting is that we have to future forward into, all right, with this machine to machine, machines talking to machines. Machines really are going to be the new cyber attacker. Right? >> Right, right. >> So it's machines having to combat other machines who are posing cyber threats. So I think that's, I don't know. I really geek out on the futuristic stuff. So I'm very interested in seeing how companies are harnessing AI in the cybersecurity space. >> Right. Well we just had an instant guest said, you know, you can be a bad guy on AWS, launch your threat against a customer on AWS, and get paid through AWS. >> What? >> I mean, the whole thing happens inside of the cloud in Seattle. It's amazing. >> Wait a minute. That sounds like a show on Mr. Robot. Right, with Evil Corp! >> It could be. And that's before, no, then they flash to the nest, right? The dark shadow on the nest. >> Ooh! >> As they cut to commercial. (laughs) So what else you got going on this year? I mean, you are literally all over the place. We love to keep track of you on Twitter. We see your airplane pictures taking off and landing in cities all around the world. What do you have on the agenda? What's coming up next? >> Next is Mobile World Congress in Barcelona. >> In Barcelona? >> I'm really excited to be there. >> 'Cause 5G is all the rage, right? >> Yes. >> Big part of IOT. >> Yes, and there's going to be a lot of unveiling going on at Barcelona and I'm excited. >> Spanish ham, which is always good. (laughs) Olives. >> Are you going to be there? >> We are going to cover it from Palo Alto for the people that don't want to go on the airplane ride. So we're going to cover Mobile World Congress from the Palo Alto studio. It'll be kind of that follow the sun thing. You guys will cover it early in the morning, we'll pick up the coverage as you guys are out having good ham, red wine, and olives. >> So I got to remember that I shouldn't be tweeting you after a certain hour, because you're going to know. >> We'll definitely pick them up and retweet them. All right, Tamara, well, thanks. I know you're a busy lady. Thanks for taking a few minutes to stop by and say hi. >> Thank you. >> And find us in this big sea of people. >> Woo! Awesome! >> All right, she's Tamara McClearl. I'm Jeff Rick. And you're watching the Cube. Thanks for watching. (sleek electronic music) (upbeat electronic music)

Published Date : Feb 15 2017

SUMMARY :

that goes to more conferences So, what do you think of the show? And it is, the show has grown just So do you feel more secure These are the new superheroes. except for the heroes with capes I mean, the whole, you know, Well, you know, the other this is, We have all the tech-athletes like you. What's AI got to do with security? I really geek out on the futuristic stuff. Well we just had an instant guest said, you know, the whole thing happens inside of the cloud in Seattle. Right, with Evil Corp! then they flash to the nest, right? We love to keep track of you on Twitter. Yes, and there's going to be a lot of (laughs) It'll be kind of that follow the sun thing. So I got to remember that I shouldn't be tweeting you Thanks for taking a few minutes to stop by and say hi. And you're watching the Cube.

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
Tamara McClearlPERSON

0.99+

Jeff RickPERSON

0.99+

John LithgowPERSON

0.99+

TamaraPERSON

0.99+

Tamara McClearyPERSON

0.99+

Jeff FrickPERSON

0.99+

SeattleLOCATION

0.99+

BarcelonaLOCATION

0.99+

Ray WangPERSON

0.99+

Palo AltoLOCATION

0.99+

AWSORGANIZATION

0.99+

ThuliumORGANIZATION

0.99+

40,000 peopleQUANTITY

0.99+

Mobile World CongressEVENT

0.98+

RSA Conference 2017EVENT

0.97+

this yearDATE

0.96+

Evil CorpORGANIZATION

0.96+

#RSACEVENT

0.94+

this morningDATE

0.87+

Mr. RobotTITLE

0.84+

TwitterORGANIZATION

0.81+

CubeORGANIZATION

0.79+

SpanishOTHER

0.75+

RSA ConferenceEVENT

0.75+

San FranciscoLOCATION

0.74+

Thulium.coEVENT

0.71+

IOTTITLE

0.65+

of peopleQUANTITY

0.55+

inDATE

0.49+

5GORGANIZATION

0.44+

CubeTITLE

0.33+

Rohit Ghai, RSA | RSA Conference 2017


 

(instrumental electronic music) (crowd) >> Hey welcome back everybody, Jeff Frick, here with The Cube. We are live in Moscone Center, with 40,000 security experts at the RSA Conference, the biggest conference of its size, and one of the biggest tech conferences in the industry, second maybe only to Salesforce and Oracle's. So, there's a lot people here, a lot of action-- >> Absolutely. >> We're excited to be joined by the president of RSA, Rohit Ghai. Welcome. >> Thank you. Thank you. >> So first thing, kind of impressions of the show, we were here briefly last year, this thing was 34,000. This year, they're saying it's 40. >> Forty thousand, yeah. Look, RSA has the great burden and privilege of bringing the cyber security community together, and it's a true testimonial to the caliber of the people that this year we are able to attract 40,000 people. We have almost 500 plus, 550-something, I believe vendors and exhibitors. And the level of the conversation, in terms of the CEOs from different countries, the CEOs from all the mega corporations, public sector participants, the entire gamut of cyber security stakeholders are here today. >> That's an interesting kind of take because on one hand, you think there's so many people, but as a few people had mentioned earlier, really they're all here so, and on the grand scheme of things, it's not that many people. It's really this group of people-- >> Exactly. >> And they all know each other. People are all giving each other hugs, as they're walking up and down the booth, so this really is it. >> This is a community, and it's a tight-knit community. It's all the good guys and some linked together (laughing), and figured out what to do about the bad guys (laughing). >> I know, I just hope they all don't go to the bad side at the same time, we'd be in trouble. >> Absolutely. >> One of the things that comes up over and over at tech conferences specifically, and at here, too, is the ecosystem. >> Rohit: Yeah. >> Right? Nobody can do it alone-- >> Rohit: Yep. >> You've got to have an ecosystem-- >> Rohit: Yep. >> And there's a lot of conversations about sharing information-- >> Yep. >> More broadly-- >> Yep. Yep. >> More automated, faster-- >> Rohit: Yep. >> Really an important part of the strategy to fight the bad guys. >> Absolutely. In fact, that was a recurring theme from all the keynote speakers this morning, the notion of working together. The only shot we have of beating the bad guys is if we collaborate and share the information that we have, and go at it together. So, the ecosystem is super important to your point. >> Yep. So, what are some that are accounted for the people that aren't here-- >> Rohit: Yep. Kind of the key themes, some of the big announcement that RSA's make-- >> Rohit: Yeah. >> And I know the press release feed is full (laughing) this morning-- >> Rohit: Yeah. >> But what are you guys excited about for this year? >> Look, what I'm most excited about is a new approach. And here's the way I tee it up, the bad guys are getting really good, right? Every company is going digital, and digital companies are really juicy targets. We don't have enough good guys to fight on our behalf, enough trained good guys, which means we ought to bring technology to assist use, all the things like advanced, artificial intelligence, machine learning, data science, all those things have great capabilities, but the reality is we have to realize the bad guys have all the same technology that we do. So, it's not a technology problem anymore-- >> Right, right. >> We have to play to our strengths, play to our advantage, so this new approach, we call it business-driven security, which means take the security incidents and apply business context to it, enabling customers to take command of their cyber risk, and secure and protect what matters most. >> Right, right. >> So, it's a sense of prioritization, and if we do that successfully, then we are able to keep the bad guys, they're only inside the door, but we can curtail the damage and we can detect the breaches, and respond in a much more expedient manner. >> Right, always the problems within arm's race, right? Both people have the same amount of weapons, so it's how to use those weapons-- >> Rohit: It's how to use the weapons. >> More effectively. >> Absolutely. And therein the context is super important if you're going to apply business context to the way you apply that information-- >> Right. >> With those tools, that's how you win. >> Now, another theme that keeps coming up is kind of state-sponsored threats-- >> Rohit: Yep, yep. >> Which are different than, maybe, kind of commercially, or just-- >> Rohit: Yep, Yep. >> Kind of activists. >> Rohit: Yep. >> That's really changing the game because-- >> Rohit: It is. >> The resources behind those folks significantly bigger. >> Indeed. So, there's new kind of bad guys, like the nation state threat actors, and their objectives are totally different, right? Their objective is not just to steal data, but to tamper with data, and change the conversations as we saw in the case of the election-- >> Right, right. this year, the presidential elections. By tampering data you can actually shift conversations and influence outcomes, so it's a whole new ball game, in terms of the new types of threats and new types of threat actors like nation states, who are getting into the game. >> Yeah, I thought one of the interesting points that came up earlier in the keynote today-- >> Rohit: Yeah. >> I think they called it salting or spiking the algorithm-- >> Rohit: Yep. >> With intentional bad data to send the algorithm on a path, in which it really shouldn't go. >> Exactly, exactly. And the way you respond to that is, again, to back to my point around business-driven security. If you have data, and if you understand the business context around how that data ought to be used, then you're able to protect it and secure it, and make sure it doesn't get weaponized, or used against you. >> Right, right. And another theme that came up at another session I attended is kind of the unique role that companies are in versus-- >> Rohit: Yep. >> The government-- >> Rohit: Yep. >> Because even if there is state-sponsored-- >> Rohit: Yep. >> Issues going on-- >> Rohit: Yep. >> Because many of the companies, RSA included-- >> Rohit: Yeah. >> Operate globally across the number of geos. >> Yep. >> They potentially have even more data, different data, to fight the threat than any one government does on its own. >> Indeed, and this is where sharing of information is vital, and along those lines, RSA is excited to announce this year that we've joined the Cyber Threat Alliance, which is a consortium of private companies who have decided that it's not the threat intel data, it's how you use it that's going to be the differentiating factor. >> Right. >> So, in the spirit and vein of working together, we are sharing threat data with each other, so that we can respond to the bad guys. >> Right. So, give you the last word-- >> Rohit: Yeah. >> It's February 14th, Happy Valentine's Day. Start of the new year, what are some of your priorities as you look down the other road, what are we going to be talking about a year from now? >> Yeah. >> What's things that are on your plate that you're really thinking about? >> Yeah, yeah. Look, so, in the vein of Valentine's Day, I totally love cyber security (laughing). Let me say that, and in terms of what we're looking forward to. Look, RSA is in the game to innovate and set the table, and set the agenda for the cyber security market. We play the role of bringing the cyber security community together, but it's our innovation along the axis of business-driven security. We want to take that conversation, drive that into the industry because we believe that without that, we don't have a shot of beating the bad guys. >> Right. Alright, well, we're all rooting for you (laughing)-- >> Thank you. I appreciate that. >> And everybody else in this building, alright. >> I appreciate that. Thanks. >> He's Rohit. I'm Jeff. You're watching The Cube, live from RSA 2017, in downtown San Francisco. Thanks for watching. >> Thank you. (instrumental electronic music) (upbeat instrumental music)

Published Date : Feb 15 2017

SUMMARY :

and one of the biggest tech conferences We're excited to be joined by the president Thank you. kind of impressions of the show, of bringing the cyber security community together, and on the grand scheme of things, so this really is it. It's all the good guys at the same time, One of the things that of the strategy to fight the bad guys. So, the ecosystem is super important that aren't here-- Kind of the key themes, And here's the way I tee it up, and apply business context to it, keep the bad guys, they're only inside the door, the context is super important that's how you win. and change the conversations as we saw in terms of the new types of threats to send the algorithm on a path, And the way kind of the unique role to fight the threat the threat intel data, So, in the spirit and vein So, give you the last word-- Start of the new year, and set the agenda for the cyber security market. we're all rooting for you (laughing)-- Thank you. I appreciate that. in downtown San Francisco. Thank you.

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
Jeff FrickPERSON

0.99+

JeffPERSON

0.99+

Rohit GhaiPERSON

0.99+

RohitPERSON

0.99+

OracleORGANIZATION

0.99+

RSAORGANIZATION

0.99+

February 14thDATE

0.99+

40QUANTITY

0.99+

last yearDATE

0.99+

Forty thousandQUANTITY

0.99+

Moscone CenterLOCATION

0.99+

Cyber Threat AllianceORGANIZATION

0.99+

40,000 peopleQUANTITY

0.99+

SalesforceORGANIZATION

0.99+

This yearDATE

0.99+

todayDATE

0.99+

secondQUANTITY

0.99+

oneQUANTITY

0.98+

Both peopleQUANTITY

0.98+

this yearDATE

0.98+

40,000 security expertsQUANTITY

0.98+

RSA Conference 2017EVENT

0.97+

Valentine's DayEVENT

0.97+

34,000QUANTITY

0.97+

The CubeTITLE

0.97+

OneQUANTITY

0.96+

The CubeORGANIZATION

0.95+

RSA ConferenceEVENT

0.95+

almost 500 plusQUANTITY

0.94+

this morningDATE

0.92+

San FranciscoLOCATION

0.88+

2017DATE

0.88+

550QUANTITY

0.87+

first thingQUANTITY

0.8+

somethingQUANTITY

0.66+

RSAEVENT

0.61+

presidentialEVENT

0.51+

yearDATE

0.48+

aboutDATE

0.38+

Mark Nunnikhoven, Trend Micro - RSA Conference 2017 - #RSAC #theCUBE


 

(upbeat techno music) >> Hey, welcome back everybody, Jeff Frick here with theCUBE. We're at the RSA conference in downtown San Francsisco. 40,000 security professionals talking about how to keep the bad guys out, especially with IOT and 5G coming right around the corner. Joined by the many time CUBE alumnae, always great to catch up with Mark. Mark Nunnikhoven from Trend Micro, what's your title now? >> VP... >> Cloud research? >> VP Cloud research, that's good. >> Welcome! >> Thank you for having me, I appreciate it. >> So it's always good to see that the booth, you guys always have kind of the craziest, wackiest booths. I was wondering though, if you fell out of the rocket ship and that's how you busted your arm. >> That's definitely a better story, so I think we can go with that, or a transporter malfunction, something like that will be a much better story than the sad truth. >> Okay. >> So you've been coming to this show for a while, we see you at all the AWS events, how is the kind of evolution of cloud and the ongoing expansion of cloud kind of change the game in the world of security? >> Yeah, I think cloud has enabled us to do a lot of things that we've been trying to do for a long time, and you know, so we've talked about enabling granular security throughout the enterprise for years, and it's always been hard because we've had a lot of different vendors, a lot of different systems. When we moved to cloud, it's getting a lot more homogenized, and everything's accessible via an API. So we're seeing a lot of maturity in that space where people are embracing that fact, and starting to enable some things that we've been trying to do, like that solid identity in axis management, you know, that's been really difficult in the enterprise, it's far simpler in a cloud space. >> That's interesting, because the other fact is all these things are now all connected via APIs, right? And there are a whole lot of SAS applications in the enterprise >> Yeah! >> So the attack surface is growing significantly and as was pointed out in the keynote this morning, a lot of people work from home, they plug in their desks, you know, it's just, it's growing very very quickly. >> It is! >> So how do you look at some of these challenges? >> Yeah, and it's funny because it is significant and you look at IOT alone, right? There's billions and billions of devices that are being connected and the devices themselves aren't necessarily so much of a threat, though we did see that this year with the Miray bot net and you know some massive d-dos attacks, but it's the data that's going in the back end that's more of a danger to consumers. And we see that with sas services as well. As a security practitioner, you lose the ability to apply the traditional controls that we're used to. And now you're relying on your service provider to do that for you. But it's still your data. So you're sort of forced to construct this balance of, you know, making sure you're leveraging the controls and options the provider has, but also looking out for things like, you know, people effecting the data going in, and sort of manipulating and gaming the system more, and I think you mentioned they said that this morning too. >> Right, the other thing they said this morning is that every company has at least one person that's trying to connect with a Nigerian prince. >> Yeah! >> Who's going to click on these? >> Well he needs money! He needs money, right? >> Yeah, got to give him a little money. >> Yeah! >> I mean it's funny, as far as we've evolved, you know, every, you know, my wife will say "Oh, I got this weird email", so like don't click it, don't click it! >> Mark: Yeah! >> It's the same old techniques! >> It is, and, you know, I've been doing a lot of research in serverless security lately, and that's driven me to a really weird question. Because it's a collection of services where you don't have the ability to apply any controls directly. And it's sort of started me down this path of what is security mean? And it ties to what you were saying in that at the end of the day, users need to be able to use these systems. And sort of a pet peeve of mine is we tell people not to click on these links, but that's the sole purpose of a link is to be clicked on. So we need to find a better balance of educating people and giving them the context in which to make these decisions and having better reputation systems and better automated controls, so that they don't have the option of clicking or not clicking, they just never see bad links in the first place. >> Right, that's a good strategy. The other theme that's coming in, over and over, is really collaboration within the ecosystem here. To share facts, share knowledge, share data, so that you can pick up patterns faster, you can see notes, really the same thing over and over and over. And really, being the kind of co-op-itician, which is what makes Silicon Valley Silicon Valley. >> It is. And it's nice to see it increasing, I think it's gaining pace. And we're not just seeing it with the vendors, we're also seeing it where competitors in different industries are getting together. So a lot of financial CSOs are collaborating because they have a common enemy. And they realize they can't beat them alone, so if they're sharing threat intelligence amongst themselves, that they all sort of win because if one of them goes down, you know that attack's coming to the next door, right? >> Jeff: Right. >> You know, the next day. And we're doing the same thing in the vendor space, we're being more open to collaboration, and we're sharing research analysis, you know. A lot of vendors are launching bug bounty programs. You know, responsible disclosure is becoming a little more standardized. So not only within the community of vendors, but also within the research community. I think the more we talk, the better off we are because we see it in the underground where criminals are selling services to each other. They go "don't worry about setting up a bot net, Jeff I'll rent you one," so that miray bot net of IOT devices, we found that available for sale, you could lease it for 7500 US would get you almost a gigabyte of d-dos attack. And, you know, that's a really low barrier of entry for criminals, >> Jeff: Yeah. >> We need to make sure that we're making it easy for defenders to defend against that kind of thing. >> Still my favorite is the fake ransomware, where I didn't actually put ransomware in your machine but I told you I did, so go ahead and send the money to the Nigerian guy, and I promise I won't turn it on. >> Well, so that one's one of my favorites, but also sort of the super evil one that we saw this year was okay, I've encrypted your files, and I'll give you the key not for money, but if you encrypt two of your friends. So the pyramid scheme in spreading the attack. And that one was just super evil, cause it's mainly the social side, like, what kind of guy are you? Are you going to encrypt, like, you know? >> Which friends get it, right? >> Exactly, you know. >> Ones at the bottom of the list from Facebook. >> Yeah, but ransomware is a great example of attackers realizing that they can do this at scale, they can be insanely profitable, because even if you don't think you have a lot of valuable data, you probably got personal photos and videos that are really important to you, and if you're not taking basic preventative steps like backing up or patching your systems, then they're going to be able to get 500 bucks out of you, and that doesn't sound like much, but when you multiply that times, you know, 50, 60,000 people, because they just need to click a button or add people to a list, that's a huge amount of cash that's flowing in their coffers. >> Right. The other big change in scale that keeps getting talked about here is government, you know, kind of backed. >> Cyber... >> The nation state? >> Yeah, the nation state, thank you. Totally changing the game again, and as we talked about off air, it's good to know who you're fighting with. At least you can see 'em, but at the same time the scale of resources that they can bring to bare significantly bigger. >> Yeah, and that's the challenge. If you're not a nation state against a nation state, you know, it's David versus Goliath, without a good ending. Yeah, without the rock. You just got a piece of cloth, you're like "I hope I can throw somethin' at ya!" You know, but there is some advantage in knowing your adversary, especially when you're talking about, you know, nation state versus nation state, because everybody's got signature moves, they've got go-to work, you know, and you can kind of track them over time. And we've seen that with some research available, which is a great example of, you know, community participation, places like Mandy sharing information, you know, we do it at Trend Micro, bunch of the community players share like "hey, we found this ABT, we're associating it with, you know, probably a nation state, we're not sure who," but even the government, GHS just had a great release on grizzly stat, which was a very good campaign done, but very detailed analysis. Which we didn't see that three years ago, so helping people out to understand what they're up against, and if you're, you know, a smaller enterprise, or even a larger enterprise, you might not have the resources, but you can still take steps to make it harder. >> Right. >> And that's sort of the name of the game. Make it harder so that you get a better chance at protecting your data and at least being aware when you have been breached. >> Alright Mark, I'm going to give you the last word before we sign off here. What are your kind of priorities for 2017? You know, we talk a year from now, what are we going to talk about that you guys worked on this year? >> Yeah, hopefully, you know, a lot of the same, we're still pushing hard in cloud security around servers and containers, but a lot of my personal research has been pushing more towards teams and security professionals, and what we need to do to adjust to be educators in the space as opposed to being a silo team that's just telling you, saying "hey, you really should do this better." And I think that's a space that as an industry, we're ranking up to, that we have the expertise and we need to make sure the rest of business gets it too. >> I love it. We're hearing about big data all the time, it's a team sport, security is a team sport too. >> It is. It's a great way to put it. >> Alright, Mark Nunnikhoven, I'm Jeff Frick. You're watching theCUBE. We're at RSA, downtown San Francisco. Thanks for watching. (upbeat techno music) (gentle techno music)

Published Date : Feb 15 2017

SUMMARY :

We're at the RSA conference in downtown San Francsisco. out of the rocket ship and that's how you busted your arm. so I think we can go with that, and you know, so we've talked about you know, it's just, it's growing very very quickly. for things like, you know, people effecting the data Right, the other thing they said this morning is that And it ties to what you were saying in that so that you can pick up patterns faster, you know that attack's coming to the next door, right? and we're sharing research analysis, you know. We need to make sure that we're making it easy but I told you I did, so go ahead and send the money and I'll give you the key not for money, but when you multiply that times, you know, you know, kind of backed. the scale of resources that they can bring to bare Yeah, and that's the challenge. And that's sort of the name of the game. Alright Mark, I'm going to give you the last word Yeah, hopefully, you know, a lot of the same, We're hearing about big data all the time, It's a great way to put it. We're at RSA, downtown San Francisco.

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
Mark NunnikhovenPERSON

0.99+

Jeff FrickPERSON

0.99+

JeffPERSON

0.99+

MarkPERSON

0.99+

2017DATE

0.99+

500 bucksQUANTITY

0.99+

Trend MicroORGANIZATION

0.99+

GHSORGANIZATION

0.99+

AWSORGANIZATION

0.99+

FacebookORGANIZATION

0.99+

twoQUANTITY

0.99+

three years agoDATE

0.98+

40,000 security professionalsQUANTITY

0.98+

this yearDATE

0.98+

RSAEVENT

0.97+

Silicon ValleyLOCATION

0.97+

this morningDATE

0.96+

IOTORGANIZATION

0.96+

oneQUANTITY

0.95+

5GORGANIZATION

0.94+

billions andQUANTITY

0.93+

7500 USQUANTITY

0.93+

#RSACEVENT

0.92+

next dayDATE

0.91+

RSA Conference 2017EVENT

0.91+

San FranciscoLOCATION

0.89+

NigerianOTHER

0.88+

theCUBEORGANIZATION

0.85+

CUBEORGANIZATION

0.82+

DavidPERSON

0.81+

Trend MicroEVENT

0.81+

first placeQUANTITY

0.78+

ABTORGANIZATION

0.77+

a yearDATE

0.75+

San FrancsiscoLOCATION

0.74+

50, 60,000 peopleQUANTITY

0.73+

gigabyteQUANTITY

0.7+

billions of devicesQUANTITY

0.69+

at least one personQUANTITY

0.68+

MirayORGANIZATION

0.67+

MandyPERSON

0.66+

GoliathPERSON

0.64+

#theCUBEORGANIZATION

0.56+

RSAORGANIZATION

0.37+

Jason Porter, AT&T - RSA Conference 2017 - #RSAC #theCUBE


 

(upbeat music) >> Hey, welcome back, everybody. Jeff Frick here with The Cube. We're at the RSA Convention in downtown San Francisco. 40,000 people talking security, trying to keep you safe. Keep your car safe, your nest safe, microwave safe, refrigerator safe. >> Everything safe. >> Oh my gosh. Jason Porter, VP, Security Solutions from AT&T, welcome. >> Very good, thanks for having me, Jeff. >> So what are your impressions of the show? This is a crazy event. >> It is crazy, I mean look at all the people. It's the crowds, it's a lot of fun. The best part is just walking the hallways, getting to connect with friends and network and really create new solutions to help our customers. >> It seems to be a reoccurring theme. Everybody sees everybody who's involved in this space is here today. >> Absolutely, yeah, for the next couple of days it's just all in all the time. >> AT&T, obviously, big network, you guys are carrying all this crazy IP traffic that's got good stuff and bad stuff, a lot of fast-moving parts, a ton more data flying through the system. What's kind of your step-back view of what's going on and how are you guys addressing new challenges with 5G and IoT and an ever-increasing amount of data-flow through the network? >> Absolutely, so you're right, at AT&T, we see a ton of traffic. We see 130 petabytes of traffic everyday across our network, so our threat-platform, we pull in five billion threat events every 10 minutes. So-- >> Wait, one more time. Five billion with a B? >> Five billion events every 10 minutes. >> Every 10 minutes. >> So, that's what our big data platform is analyzing with our data scientists and our math, so, lots of volume and activity going on. We have 200 million inpoints, all feeding that threat-platform as well. What are we seeing? We're seeing threats continuing to to grow. Obviously, everybody here at this show knows it, but give you some concrete examples, we've seen a 4,000% increase in IoT vulnerability scanning. IoT is something as a community, as a group here, we definitely need to go solve and that's why we launched our IoT Security Alliance last week. We formed an alliance with some big names out there, like Palo Alto Networks and IBM and Trustonic and others that really, we all have a passion in going out and solving IoT security. It's the number one barrier or concern for adopting IoT. >> You touched on all kinds of stuff there. >> A whole ton of stuff, sorry. >> Let's go to the big data. >> Yeah. >> What's interesting about big data and I always tell kids, right? Every coin has two sides. >> Absolutely. >> The bad part is you've got that much more data to sort through, but the good news is you can use a lot of those same tools. Obviously, it's not a guy sitting with a pager waiting for a red light to go off. >> That's right. >> Analyzing that. How has the big data tools helped you guys to be able to see the threats faster, to react to them faster? >> Yeah. >> To really be more proactive? >> That's a great point, so cyber security is a zero percent unemployment field, right? >> People, you can't get enough people to come work in Cyber security who have the right talent. We had to really evolve. A few years ago, we had to make a big shift that we were not going to just put platforms and people watching screens, looking for blinking red lights, right? We made the shift to a big data threat platform that's basically doing the work of identifying the threats without the people, so we're able to analyze at machine-speed instead of people-speed, which allows us to, as I said, get through many more events. >> Right. >> Much more quickly and allows us to eliminate false-positives and keep our people working really at that, looking at those new threats, those things that we want the people analyzing. >> Right, so the next thing you talked about is IoT. >> Yep. >> My favorite part of Iot is autonomous vehicles just cause I live in Palo Alto. >> Absolutely. >> We see the Google Cars and they're coming soon, right? >> Absolutely. >> But, now you're talking about moving in a 3,000 pound vehicle. >> Yeah. >> Potentially, somebody takes control, so security's so important for IoT. The good news for you guys, 5G's got to be a big part of it. >> Absolutely. >> Not necessarily just for security, but enablement, so you guys are right the heart of IoT. >> Yeah, we are, we have one of the largest IoT deployments in the world. We have the most connected devices and so, what we see is really a need for a layered approach to security. You mentioned 5G, 5G's certainly a part of getting capacity to that, but when you moved to IoT with connected cars and things, you move beyond data harm to physical harm for people and so we've got to be able to up our game and so a layered approach, securing that device, us putting malware detection, but even threat and monitoring what's going on between the hardware and the operating system and the user and then segmenting, say, in a car, telematics from infotainment right? You want to really segment the telematics so that the controls of driving and stopping that car are separate from the infotainment, the internet traffic, the video watching for my kids. >> Right, Spotify, or whatever, right, right right. >> Absolutely and so we do that through SMS, private SMS user groups, private APNs, VPNs, those kinds of things and then of course, you want to build that castle around your data. Your control unit that's managing that car. Make sure you do full UTM threat capabilities. Throw everything you can at that. We've even got some specialized solutions that we've built with some three-letter agencies to really monitor that control point. >> Right, then the last thing you touched on is really partnership. >> Okay. >> And coopetition. >> Yep. >> And sharing which has to be done at a scale that it wasn't before-- >> Absolutely. >> To keep up with the bad guys because apparently, they're sharing all their stuff amongst each other all the time. >> Yeah, absolutely. >> And here we are, 40,000 people, it's an eco-system. How is that evolving in terms of kind of the way that you share data that maybe you wouldn't have wanted to share before for the benefit of the whole? >> Yeah, so, our threat platform, we built it with that in mind with sharing, so it's all, it's surrounded by an API layer, so that we can actually extract data for our customers. Our customers can give us their date. It's interesting, I thought they would want to pull data, but our biggest customers said, no, you know what? We want your data scientists and your math looking at our environment too, so they wanted to push data, but speaking about alliances overall, it's got to be a community as you said. And our IoT Security Alliance is a great example of that. We've got some big suppliers in there, like Palo Alto, but we also have IBM. IBM and AT&T are two of the largest manage-security companies in the planet, so you would think competition, but we came together in this situation because we feel like IoT's one of those things we got to get right as a community. >> Right, right, all right, Jason. I'll give you the last words. >> Okay. >> 2017, we're just getting started, what are kind of your priorities for this year, what will we be talking about a year from now at RSA 2018? >> You're going to continue to hear more about attack types, different attack types, the expanding threats surface of IoT but I think you're going to continue to hear more about our critical infrastructure being targeted. You saw with the dying attack, you're starting to take out major pieces that are impacting people's lives and so you think about power grids and moving into some more critical infrastructure, I think that's going to be more and more the flavor of the day as you continue to progress through the year. >> All right, well hopefully you get good night's sleep. We want you working hard, we're all rooting for ya. >> Absolutely, we're all working on it >> All right, he's Jason Porter from AT&T. I'm Jeff Frick with The Cube. You're watching The Cube from RSA Conference San Francisco. Thanks for watching. (melodic music) (soothing beat)

Published Date : Feb 15 2017

SUMMARY :

40,000 people talking security, trying to keep you safe. So what are your impressions of the show? and really create new solutions to help our customers. It seems to be a reoccurring theme. it's just all in all the time. and how are you guys addressing new challenges with Absolutely, so you're right, at AT&T, Five billion with a B? Five billion events but give you some concrete examples, about big data and I always tell kids, right? to sort through, but the good news is you can use How has the big data tools helped you guys We made the shift to a big data threat platform and keep our people working really at that, is autonomous vehicles just cause I live in Palo Alto. But, now you're talking The good news for you guys, 5G's got to be a big part of it. just for security, but enablement, so you guys to that, but when you moved to IoT with connected cars Absolutely and so we do that through SMS, Right, then the last thing you touched on amongst each other all the time. How is that evolving in terms of kind of the way it's got to be a community as you said. I'll give you the last words. and so you think about power grids and moving into some We want you working hard, we're all rooting for ya. I'm Jeff Frick with The Cube.

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
IBMORGANIZATION

0.99+

Jason PorterPERSON

0.99+

TrustonicORGANIZATION

0.99+

JasonPERSON

0.99+

JeffPERSON

0.99+

AT&TORGANIZATION

0.99+

Jeff FrickPERSON

0.99+

Palo Alto NetworksORGANIZATION

0.99+

two sidesQUANTITY

0.99+

Palo AltoLOCATION

0.99+

4,000%QUANTITY

0.99+

130 petabytesQUANTITY

0.99+

3,000 poundQUANTITY

0.99+

zero percentQUANTITY

0.99+

200 millionQUANTITY

0.99+

twoQUANTITY

0.99+

40,000 peopleQUANTITY

0.99+

Five billionQUANTITY

0.99+

AT&T.ORGANIZATION

0.99+

last weekDATE

0.99+

2017DATE

0.99+

The CubeTITLE

0.99+

Five billion eventsQUANTITY

0.98+

oneQUANTITY

0.98+

this yearDATE

0.97+

RSA ConferenceEVENT

0.97+

SpotifyORGANIZATION

0.96+

five billion threat eventsQUANTITY

0.96+

todayDATE

0.96+

IoT Security AllianceORGANIZATION

0.94+

The CubeORGANIZATION

0.94+

San FranciscoLOCATION

0.93+

GoogleORGANIZATION

0.93+

PaloORGANIZATION

0.92+

#RSACEVENT

0.92+

three-letter agenciesQUANTITY

0.92+

every 10 minutesQUANTITY

0.92+

few years agoDATE

0.9+

TORGANIZATION

0.87+

5GORGANIZATION

0.87+

Every 10 minutesQUANTITY

0.87+

RSA Conference 2017EVENT

0.86+

a ton more dataQUANTITY

0.84+

AltoLOCATION

0.82+

RSA 2018EVENT

0.79+

Every coinQUANTITY

0.74+

RSA ConventionEVENT

0.72+

timeQUANTITY

0.69+

AT&EVENT

0.63+

everydayQUANTITY

0.62+

stuffQUANTITY

0.56+

coupleDATE

0.46+

yearDATE

0.45+

UTMORGANIZATION

0.45+

daysDATE

0.45+

tonQUANTITY

0.43+

CarsCOMMERCIAL_ITEM

0.42+

#theCUBEEVENT

0.37+

George Gerchow, Sumo Logic - RSA Conference 2017 - #RSAC #theCUBE


 

(energetic techno) >> Hey, welcome back everybody, Jeff Frick here with the cube. We're at the RSA conference in downtown San Francisco, Moscone Center. 40 thousand people talking about security, especially with things like IoT, and 5G coming, just right around the corner, so it's important, and we're excited to be joined by industry veteran, George Gerchow. He's VP Security and Compliances at Sumo Logic. George, welcome. >> Thanks, great to be here! Having a fantastic show so far, so thank you. >> So it's funny, before you came on, you knew our last guest, and he even commented. (George laughs) He has a big role, there's 40 thousand people, but this is like, all the world's security experts at one building. >> They're all right here, right now. So if you wanted to plan a massive terrorist attack? >> Don't say that! >> (laughs) We'll be right here, right now! >> Well, and they have a lot of security, it's funny you're laughing, but there's guard dogs, and I got my bag checked a bunch of times. I guess it makes sense. >> (laughs) It absolutely makes sense, but yes, everyone's here, all the who's who, and it was great to see Tom before me. >> And the uh, and the challenges just keep continuing right? With IoT, it's coming right around the corner. Connected devices, sensors. It's funny, in your goodie bag here at RSA, they even give you a little, the little thing to hide the camera on your, on your laptop, right? >> Yeah, they really do, I mean, everything's connected, right? I mean, there is no more hard-shell, soft-center perimeter to security anymore, it's all out there. It's a hostile world, and uh, you just got to do your best to protect yourself. >> Alright, well, hopefully you guys are all staying on the light side, and don't go to the dark side. >> (laughs) Yeah, absolutely. >> So we were talking a lot about threats, and threat intelligence. >> Yeah. >> Can you give us a kind of an update on what you're working on, you know, kind of what your top-of-the-mind of this area? >> Yeah, yeah, absolutely. And so you know, at Sumo Logic, we have a security analytics platform, built that scale, multi-tenant, in the cloud, native-born. Part of my job responsibility is to secure that platform. But one of the things that we were missing, quite honestly, was threat intelligence feeds coming into that platform to be able to do deeper forensics on malicious IPs, indicators of compromise around URLs and domain names, so now we're offering to our customers integrated threat intelligence, intersecurity analytics, for free, (chuckles) and now it's here at RSA to be able to do deeper forensics around some of those indicators of compromise and the bad guys that you were talking about. >> (chuckles) So now that with the, with the security analytics, hopefully you guys can see things faster, you can pick up patterns quicker, you know, you can use real-time streaming things like Spark to actually get ahead of the curve instead of the, what we always hear, spend 250 days since you knew, (chuckles) that you were, uh, compromised. >> Yeah, you're exactly right, it's getting to the root cause much faster, you know? Because you have so many different things that focus on a security team. Like, my team alone is constantly getting things flagged up all the time that we may or may not want to pay attention to. But those things that are really critical, that needle in the haystack that you have to dive into that's a potential threat or vulnerability right away, we want to surface those up very very quickly. So we drink our own champagne, we're running it internally, and now we're offering it externally to our customers as well, too. >> And you just can't do that without machines and automation, right? It's just not possible to keep up with the volume of activity, and to find that needle within just a mass of things that you guys are keeping an eye on. >> You're exactly right. Especially being in the cloud, right? Think about the dynamic, you know, things are taking place, you know, IPs constantly changing. What's my system today might be your system tomorrow. >> Right. >> So having that, more real-time, deeper visibility, into what's taking place on those high threat items, that's even more critical once you're moving out to the cloud for sure. >> Right, and you guys have been involved in the AWS biz, I think we interviewed Sumo Logic like, AWS summit 2013. >> Yep, right. >> In this very building. >> Right! We're native-born, and AWS, >> There you go. >> So great memory! >> So how, so how does kind of the cloud impact, to just more of a general security point of view? People's expectations of behavior of their applications and their data? >> Oh my gosh. >> And it's just like, it's like the dial tone, right? It's almost like (mumbles). >> Right. >> It's just supposed to be there, flex up, flex down as ever I need it. Obviously you got to worry about keeping that real, keeping it safe. How has that impacted the way, uh, that customers expect security? >> Right, so, well, customers now, it's actually behaving a different way too. They're so scared, some of them, of "oh my gosh, my data is leaving beyond my control." but the reality is, I can use some of that scale, and some of those automated systems in the cloud to make the data more secure, once it moves out there. I can leverage the power of code to really lock down how that data is protected against both inside sources and external sources. So it's really, to us, it's been an advantage point. Being native-born, understanding how the cloud works and how to secure data in the cloud, and then now, sharing that with our customers, has really put us ahead of the curve. Like the industry's just now catching up to where we're at. You said 2013, we were here talking about cloud, and now here we are, right? >> Right, right. >> Where other people were like, we're never going to move our stuff out there. Well, guess what? >> Right. >> You're moving out there now. (chuckles) >> And you guys can leverage cloud yourself in terms of your own applications, right? To grow and scale, I mean. >> Absolutely. >> It was amazing, AWS reinvented the Tuesday Night with James Hamilton, which uh, >> Right, yes. >> You probably went through, it's like a rock-star show. But when he goes through the scale of the way, of the infrastructure that AWS can deploy because they have such mass scale, I mean to try to compete with that as an individual company? Pretty tough. >> It's not going to happen, you know? And it's the same thing with us, you know. So if you're really going to do security analytics at scale, well, it's about scale, multiple data sources. I want to be able to go from 10 terabytes to 20 terabytes overnight, and then start looking for the security threats. Well, that's what we do. We built our platform in the cloud to scale at that rate, but now we're just heavily focused on security content and solving problems as people start moving their workloads out to the cloud. We've been there for a while, so we're helping people. And look, we're learning like everyone else every day. Things change, as you've mentioned before. But we have a pretty good approach as to how we lock down our own environment, and we're just sharing it externally now. >> So the other big theme that we keep hearing over and over at the show is collaboration, and companies, kind of coop-petition, which is the Silicon Valley way, has always been, >> Absolutely, no question. >> You know, to share threat information with your, partners in the industry, to try to help get a leg up on the, on the bad guys. Have you seen that kind of collaboration. kind of environment, change over the last several years? >> I am so glad you brought that up, because it is an ecosystem. Like for us, we're taking the threat feeds from Crowdstrike, who's, you know, one of the leaders in the threat feed space. We're also partnering up with WinLogin at this show to really start locking down people's credentials when they come in. And then also great partners like Trend Micro. It takes an ecosystem, there is no silver bullet. There is no one company, one solution that solves a problem. It takes a collaboration of vendors and partners to really be able to get this done, and I feel it and live it internally. >> Right, right. Alright, I'm going to give you last word, George. >> Alright. >> So it's February. What are your top priorities for 2017? What are we going to be talking about a year from now at this show? >> Okay, so one of the top priorities for me is definitely the DDoS attacks in the cloud? You know, so people being able to launch a DDoS attack within AWS at AWS, and have an AWS eat itself. (both chuckle) Like, literally, this keeps me up at night, you know? So, that's one of my -- >> Where's Scott? >> Top priorities. >> Scott, did you hear that? (both laugh) >> Alright, it could happen, so anyway, that's one of the things I'm focused on right now. >> Alright, excellent. >> Sure. >> Well, I know you got to run to the booth, it's a busy show, >> Great show. >> I know you probably have meetings with 39,995 of these other people. (George laughs) He's George Gerchow, I'm Jeff Frick, you're watching The Cube. Thanks for watching. >> Thanks guys, 'preciate it, thanks Jeff. (energetic techno) (sedate synths)

Published Date : Feb 15 2017

SUMMARY :

and 5G coming, just right around the corner, Thanks, great to be here! So it's funny, before you came on, So if you wanted to plan and I got my bag checked a bunch of times. and it was great to see Tom before me. the little thing to hide the camera on your, you just got to do your best to protect yourself. and don't go to the dark side. So we were talking a lot about threats, and the bad guys that you were talking about. (chuckles) that you were, uh, compromised. that needle in the haystack that you have to dive into of things that you guys are keeping an eye on. Think about the dynamic, you know, So having that, Right, and you guys have been involved And it's just like, it's like the dial tone, right? How has that impacted the way, uh, and how to secure data in the cloud, we're never going to move our stuff out there. You're moving out there now. And you guys can leverage cloud yourself I mean to try to compete with that as an individual company? And it's the same thing with us, you know. partners in the industry, to try to help I am so glad you brought that up, Alright, I'm going to give you last word, George. So it's February. Like, literally, this keeps me up at night, you know? that's one of the things I'm focused on right now. I know you probably have meetings (energetic techno)

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
George GerchowPERSON

0.99+

Jeff FrickPERSON

0.99+

ScottPERSON

0.99+

GeorgePERSON

0.99+

2017DATE

0.99+

39,995QUANTITY

0.99+

James HamiltonPERSON

0.99+

AWSORGANIZATION

0.99+

10 terabytesQUANTITY

0.99+

Sumo LogicORGANIZATION

0.99+

20 terabytesQUANTITY

0.99+

250 daysQUANTITY

0.99+

Trend MicroORGANIZATION

0.99+

TomPERSON

0.99+

JeffPERSON

0.99+

2013DATE

0.99+

Silicon ValleyLOCATION

0.99+

FebruaryDATE

0.99+

40 thousand peopleQUANTITY

0.99+

RSAORGANIZATION

0.99+

tomorrowDATE

0.99+

The CubeTITLE

0.99+

bothQUANTITY

0.98+

RSAEVENT

0.98+

CrowdstrikeORGANIZATION

0.98+

todayDATE

0.98+

oneQUANTITY

0.97+

one solutionQUANTITY

0.97+

WinLoginORGANIZATION

0.94+

RSA Conference 2017EVENT

0.94+

Tuesday NightDATE

0.93+

#RSACEVENT

0.91+

SparkTITLE

0.9+

San FranciscoLOCATION

0.89+

Moscone CenterLOCATION

0.88+

one buildingQUANTITY

0.84+

Sumo LogicPERSON

0.83+

one companyQUANTITY

0.81+

yearsDATE

0.69+

summit 2013EVENT

0.67+

lastDATE

0.61+

yearDATE

0.49+

#theCUBETITLE

0.45+

Derek Manky, Fortinet | RSA Conference 2017


 

(upbeat instrumental music) >> Hey welcome back everybody. Jeff Frick here with the Cube. We're at the RSA Conference in downtown San Francisco. 40,000 security professionals here talking about how to keep us all safe, especially when we're in autonomous vehicles, especially when we have connected nest devices. It's a crazy wild world. We're excited to be joined by Derek Manky, the global security strategist for Fortinet. Welcome. >> Hey thanks, pleasure to be here. >> Absolutely. >> We'll talk security right? >> Well I hope so. So for folks that aren't familiar with Fortinet, give us kind of the overview of what you guys are doing. >> Sure I mean tons of different things. So, you know, my department, I work directly with our global threat intelligence team and our labs. So for over 15 years now, we've been building up our labs. We have over 200 threat analysts and researchers worldwide combing through data at any given minute. But the problem is, the data. We live in a big data world now. There's so much, it's very easy to become overwhelmed with data. So we've taken an approach where we have a very intelligent human expertise team, but we've invested a lot into automation, machine learning, artificial intelligence, that you're going to find that's a very important thing moving forward because we need to be able to stay on par with the bad guys. >> Right right. >> The bad guys are very good at automation. They don't have anything holding them down. They're flying full-force, so we're trying to keep up to them. And, you know there's a lot of great initiatives like cyber threat alliance, of course, so we made a big announcement this week on that too. >> Right. So really as things have evolved over those 10 years, I mean the bad news is the amount of data that you guys have to keep track of is growing exponentially. The good news is the tools like machine learning and AI and Spark and Hadoop and, you know the tools that you have to use are much more sophisticated as well. It kind of works both sides of the coin at the same time. >> Yeah but you know what? One thing that we found is that there is a lot of information here, there is a lot of data being thrown out there. You have to make sense of the data. So a big theme and a big focus of ours is making data actionable. So threat intelligence actionable. How do you cross what we call the last mile? How do you take data and information and put it into transparent security controls so the end users, like all of our customers, don't have to do that manually. The manual work is what's killing a lot of people out there. There's a huge gap in cyber security professionals out there. People like network administrators, by the time they receive, say, a PDF document or something manual that they have to plug in an IP address or an update, it's often too late. A lot of this information is very perishable, very fluid. So, we're trying to automate that into the security controls. That comes from a lot of that big data, analytics on the back end. We call it a security fabric. So this is where we can weave in that information into all of our different products. End point, from end point all the way up to the cloud. And the cyber threat alliance is a very big initiative. So we're a founding member of that along with the other founding members I mentioned this week. We're working together to share information. And the goal of that is to share information on a platform and then as a member of the CTA founding member take that information in and push that out into those controls in near real time. That's the big thing. >> That was the big thing right? Because people have shared data before. But it's really kind of this real time emphasis to get it in real time. You know using things like Spark and streaming data. So that you're not reacting after the fact. In the old stat they used to quote us, you know people didn't even know for like 250 days. >> Derek: Yeah. >> Or whatever it was. >> We're bringing a lot of illumination to intelligence as well. Visibility's a big thing. Speed is a very big thing right? How can we get that information out very quickly because like I said the bad guys are moving a million miles a minute. So it's a really important initiative what we're doing with that. The other thing is the quality of information. A lot of information is too hastily shared and I think humans we're at that tipping point right now. Where humans can't fully trust automation. It's like autonomous vehicles. >> Right right. >> You're not going to put it fully in control right? You have to start getting a trust exercise with it and that's what we're trying to do, a lot of this intelligence. >> What was interesting in the keynote this morning one of the new threads they highlighted is people actually feeding the algorithms bad information. >> Poisoning yeah, yeah. Absolutely, yeah, yeah. >> Salting the algorithm is what they call it. To send it down a different path than it should be going. >> I mean the bad guys will put all this thought throughout and evasion techniques. But that's another really nice thing about the cyber threat alliance. Is that we're all collaborating. So we're giving confidence ratings to this. So it's also a quality of sharing system which the industry very badly needs in my opinion too. >> So what's next? Looking at 2017, we're getting started this February. Oh it's Valentine's Day February 14. >> Happy Valentine's Day. >> Happy Valentine's. So a year from now and we talk, what's the top of my priorities? What are you working on for the next little while? >> Yeah absolutely. Again we're going down the CMO automation. You're going to see a lot on the security fabric that we have. So this is how we can have machines automatically learning about environments. Automatically adapting to environments. You look at a lot of security problems out there a lot of the times it's security 101. It's people misconfiguring firewalls, misconfiguring policies and devices. Not having a proper security device in front of their crown jewels or their asset, their digital asset. So that is a big theme that we're doing, it's taking that intelligence and starting to empower our products and solutions to make intelligence decisions on their own. >> Right. >> That's a very big leap forward and we've made significant progress with that. >> It's interesting that you mention that. There's still a lot of 101 work that people aren't doing to the degree that they should. There was a great line in the keynote this morning that every company has at least one person that will click on anything. >> Weakest link in the chain right? Yeah. >> Absolutely. Alright well Derek thanks for stopping by. And congrats on a great show. And really some exciting stuff with that cyber threat alliance. >> Great yeah thanks, a pleasure. >> Alright he's Derek Manky I'm Jeff Frick. You're watching the Cube from RSA in downtown San Francisco. Thanks for watching. (instrumental music)

Published Date : Feb 15 2017

SUMMARY :

We're at the RSA Conference in downtown San Francisco. So for folks that aren't familiar with Fortinet, But the problem is, the data. And, you know there's a lot of great initiatives I mean the bad news is the amount of data that you guys And the goal of that is to share information on a platform So that you're not reacting after the fact. because like I said the bad guys are moving You have to start getting a trust exercise with it is people actually feeding the algorithms bad information. Poisoning yeah, yeah. Salting the algorithm is what they call it. I mean the bad guys will put So what's next? So a year from now and we talk, a lot of the times it's security 101. That's a very big leap forward that people aren't doing to the degree that they should. Weakest link in the chain right? with that cyber threat alliance. You're watching the Cube from RSA in downtown San Francisco.

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
Derek MankyPERSON

0.99+

Jeff FrickPERSON

0.99+

DerekPERSON

0.99+

2017DATE

0.99+

FortinetORGANIZATION

0.99+

250 daysQUANTITY

0.99+

40,000 security professionalsQUANTITY

0.99+

February 14DATE

0.99+

both sidesQUANTITY

0.99+

over 15 yearsQUANTITY

0.99+

10 yearsQUANTITY

0.99+

CTAORGANIZATION

0.98+

Valentine's DayEVENT

0.98+

this weekDATE

0.97+

SparkTITLE

0.96+

FebruaryDATE

0.95+

One thingQUANTITY

0.95+

RSA Conference 2017EVENT

0.94+

a million miles a minuteQUANTITY

0.93+

RSA ConferenceEVENT

0.93+

RSAORGANIZATION

0.91+

this morningDATE

0.88+

Valentine'sEVENT

0.88+

101 workQUANTITY

0.88+

HadoopTITLE

0.87+

San FranciscoLOCATION

0.85+

over 200 threat analystsQUANTITY

0.85+

one ofQUANTITY

0.8+

CubeORGANIZATION

0.76+

least one personQUANTITY

0.71+

a yearQUANTITY

0.66+

CubeTITLE

0.5+

securityOTHER

0.47+

Ajay Gupta, Huawei - RSA Conference 2017 - #RSAC #theCUBE


 

(upbeat music) >> Hey welcome back everybody, Jeff Frick here with theCUBE. We are live at Moscone Center at the RSA Convention. 40,000 security professionals are here, talking about security. This thing grows every single year. We're happy to be here and excited for our next guest, Ajay Gupta. He's the Global Director, Product Marketing and Management from Huawei. Welcome. >> Oh thank you, Jeff. Pleasure to be here. Thanks for your time. >> Absolutely, so you've been coming here for years. You laughed at me when I asked how long you've been coming here. >> Oh it's been ages, you can look at me and you can imagine. >> No, look, all hairs still dark. >> Oh come on, you're being too nice to me. >> So what's really changed, as you've been coming for years. Kind of at a global perspective? >> Yeah, yeah I think we've seen the nature of security change, the nature of threats change. The different companies have changed actually over the years. The crowd has gone up and swelled like 40,000 you mentioned. So, we really think this show has really become the gold standard for the trade shows when it comes to security. We weren't there at RSA but last few years we have made it a point to be here every year to talk to the customers here. >> Yeah. >> And you meet all the people from all over the world. That's the best part, customers, partners, everybody. >> It's interesting because a big part of the theme here is collaboration and ecosystem. And nobody can do it alone. Everyone covers different pieces of the puzzle. I know you guys are trying to grow your ecosystem. What does ecosystem mean to Huawei? >> Absolutely. I think we do believe from a security perspective no single vendor can offer the best of the breach security to their customers. We really need partners, the ecosystem. Huawei has something called being integrated. That is, bringing the partners onboard to offer different pieces of the puzzle. In fact it's a good point to mention. We are announcing two announcements this morning actually. The first one what we'll talk about is Avira. It's the best AV engine company in Germany. Huawei really recognizes the importance of the AV. So we are bringing their AV engine on the Huawei's next generation firewall. It really brings two things. Performance and accuracy. That's what people need from a AV point of view. The second announcement we're going to make really is what's called the Huawei USG9000V. It's a security gateway actually. So as the cloud's proliferation, as people are moving to the cloud, as people are using more and more SAS applications, you're going to see lot more security building from the cloud perspective. Our USG9000V is actually the perfect gateway to combat the security threats in the cloud. So virtual data centers, the cloud data centers, the OTT's, we really bring all the different kinds of security in the USG9000V. The announcement we are making is really an upgraded version of the existing security appliance that we call 6000V. Again, it's a software security. Works with different VMs whether it's KVM, whether it's zen, whether MS6. Huawei's own virtual system. Huawei's FushionSphere. The performance is in terabit so you can actually go in and read some of the specs from the Huawei's perspective. One of the best of the V products for virtual security. >> Right. And the cloud's changed everything, right? So many applications are delivered via the cloud now. And even if it's not a cloud and it's an internal cloud people want the flexibility of cloud. They want to scalability of cloud. They really want the way the cloud works for them to deliver the applications to their customers and their employees. >> Definitely. So three things I'm going to mention here from a cloud perspective. What people are looking for from a cloud security perspective is on demand. How do you scale in, scale out as the demands of the bandwidth goes up. You got to make sure your network security is able to keep up with that demand. People are looking for visibility. You've got this multitude of appliances, boxes, cloud boxes, cloud security all over the place. How do you make sense out of it? How do you really bring all of those thresholds, all of those unloads come together into the form of CIO or CSO can really understand. >> Right. >> And the last thing I'm going to make it easy to configure. PLug and play. Some of the automation feature. Automation people are starting to move in the security but you got to be careful when you bring automation from a security perspective. You need to automate task that are not that mission critical. But as we more and more trust, you're going to see more security automation in the industry. >> Yeah. Because when it's cloud it just needs to work, right. Everybody just expects, I can add more capacity, I can spin it down. And it just needs to work. It's somebody else's problem, it's somebody else's data center. >> I don't know what's going on behind the scenes, I just know it works. >> Yeah. >> I pick up my phone, it's going to kick. That's exactly the concept of security. But you got to be really careful when it comes to security because you got to make sure that when, suppose the positive threats and positive and negative threats actually. How do you combat and make sure you automate from the positive point of view and not from a negative point of view. >> But there's one thing that hasn't changed, cloud or no cloud. And they talked about it in the keynote and that great line was every company has at least one person that will click on anything. (laughs) >> Oh, I love it. I love it actually. >> How do we get past, I mean, they're still getting the email from the African king who needs some dollar >> Nigeria, Nigeria >> For Nigeria. >> Let me put I this way. I would say hackers are getting smarter and smarter. How do you keep up with the threats from the hackers who are one step ahead of you. How do you really combat threats, unknown threats, in the future? So I think things we have seen in 2016, the phishing attacks are back on the rise actually. Always do you see Ransomware. Form the point of Ransomware I should mention there's something called par pon ton from Ransomware that I'm going to let you off the hook if you infect two other computers actually. I don't need the money from you. So hackers are coming with those innovations to really go and hack more people actually. You seen what happened with the collected costs. Chrysler had a recall on 1.4 million vehicles in the past. Do you see what's happened with the camera, the surveillance camera. So I think two things we really need to watch out in 2017. One is Ransomware and the number two thing which is extremely, extremely important is industrial IOT actually. >> Absolutely. >> As the sensors get deployed more and more around the world you've got to make sure those sensors are able to keep up with the threat, it's not easy. So what Huawei provides to the table is really end to end security. Two things in security; multi-layered security and security indifference. Those are the principles from the bottom, not from the top down. >> Right. It's funny, the funniest, it's not funny really. The Ransomware story was fake Ransomware. I didn't really put Ransomware on your machine I just told you that I did so go ahead and pay me anyway. And the other thought is really the ability for them to build a business because of Bitcoin as a way to collect anonymous money from people. That enabled a rise in the escalation in Ransomware. It's a complicated world. They give you the last take as people drive away, leave RSA 2017, really what should be the top of mind as they think about what's going to happen and what we'll be talking about when we come back a year from now? >> I think two things I would really suggest people to really take away from the RSA this year. First of all, what's happening in the industry? What's happening in the market? Keep updated with the latest threat. See what vendors had a very comprehensive solution from an end to end perspective. Really go do their own research, making sure that security is not an after thought. Security it needs to be proactive. Security needs to be built up from ground up. Don't regard security as something secondary actually. As long as people put premium on security, that's going to save their face rather than to be appearing on the Wall Street front page or have been hacked. They say there are two kinds of companies. 50% claim that they have been hacked. 50% know they just don't admit it. That's all. >> Alright, very good. Well Ajay thanks for stopping by and congrats on a great show. >> My pleasure, thanks Jeff. Thank you very much. >> He's Ajay Gupta, I'm Jeff Frick. You're watching theCUBE from RSA conference in downtown San Francisco. Thanks for watching. (upbeat music)

Published Date : Feb 15 2017

SUMMARY :

We are live at Moscone Center at the RSA Convention. Pleasure to be here. Absolutely, so you've been coming here for years. as you've been coming for years. the nature of security change, the nature of threats change. That's the best part, customers, partners, everybody. It's interesting because a big part of the theme here of the breach security to their customers. And the cloud's changed everything, right? as the demands of the bandwidth goes up. And the last thing I'm going to make it easy to configure. And it just needs to work. I don't know what's going on behind the scenes, from the positive point of view and not and that great line was every company has at least one I love it actually. I don't need the money from you. Those are the principles from the bottom, And the other thought is really the ability for them What's happening in the market? and congrats on a great show. Thank you very much. Thanks for watching.

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
Ajay GuptaPERSON

0.99+

GermanyLOCATION

0.99+

Jeff FrickPERSON

0.99+

2017DATE

0.99+

JeffPERSON

0.99+

HuaweiORGANIZATION

0.99+

ChryslerORGANIZATION

0.99+

2016DATE

0.99+

50%QUANTITY

0.99+

two announcementsQUANTITY

0.99+

two kindsQUANTITY

0.99+

USG9000VCOMMERCIAL_ITEM

0.99+

AjayPERSON

0.99+

two thingsQUANTITY

0.99+

second announcementQUANTITY

0.99+

40,000QUANTITY

0.99+

1.4 million vehiclesQUANTITY

0.99+

40,000 security professionalsQUANTITY

0.99+

Moscone CenterLOCATION

0.99+

one thingQUANTITY

0.98+

Two thingsQUANTITY

0.98+

first oneQUANTITY

0.98+

two other computersQUANTITY

0.98+

AviraORGANIZATION

0.98+

OneQUANTITY

0.97+

FirstQUANTITY

0.97+

three thingsQUANTITY

0.97+

NigeriaLOCATION

0.96+

this yearDATE

0.96+

#RSACEVENT

0.95+

one stepQUANTITY

0.95+

Wall StreetLOCATION

0.94+

this morningDATE

0.94+

RSA Conference 2017EVENT

0.93+

RansomwareTITLE

0.93+

6000VCOMMERCIAL_ITEM

0.91+

RSAORGANIZATION

0.9+

RSA 2017TITLE

0.84+

RSA conferenceEVENT

0.83+

San FranciscoLOCATION

0.83+

least one personQUANTITY

0.8+

MS6COMMERCIAL_ITEM

0.77+

last few yearsDATE

0.76+

single vendorQUANTITY

0.75+

yearsQUANTITY

0.74+

theCUBEORGANIZATION

0.73+

Nigeria, NigeriaLOCATION

0.73+

AfricanOTHER

0.71+

two thingQUANTITY

0.67+

#theCUBEEVENT

0.66+

a yearQUANTITY

0.65+

zenCOMMERCIAL_ITEM

0.58+

singleQUANTITY

0.54+

terabitQUANTITY

0.52+

RSA ConventionLOCATION

0.52+

HuaweiEVENT

0.52+

SASTITLE

0.47+

Drew Nielsen, Teleport | KubeCon + CloudNativeCon NA 2022


 

>>Good afternoon, friends. My name is Savannah Peterson here in the Cube Studios live from Detroit, Michigan, where we're at Cuban and Cloud Native Foundation, Cloud Native Con all week. Our last interview of the day served me a real treat and one that I wasn't expecting. It turns out that I am in the presence of two caddies. It's a literal episode of Caddy Shack up here on Cube. John Furrier. I don't think the audience knows that you were a caddy. Tell us about your caddy days. >>I used to caddy when I was a kid at the local country club every weekend. This is amazing. Double loops every weekend. Make some bang, two bags on each shoulder. Caddying for the members where you're going. Now I'm >>On show. Just, just really impressive >>Now. Now I'm caddying for the cube where I caddy all this great content out to the audience. >>He's carrying the story of emerging brands and established companies on their cloud journey. I love it. John, well played. I don't wanna waste any more of this really wonderful individual's time, but since we now have a new trend of talking about everyone's Twitter handle here on the cube, this may be my favorite one of the day, if not Q4 so far. Drew, not reply. AKA Drew ne Drew Nielsen, excuse me, there is here with us from Teleport. Drew, thanks so much for being here. >>Oh, thanks for having me. It's great to be here. >>And so you were a caddy on a whole different level. Can you tell us >>About that? Yeah, so I was in university and I got tired after two years and didn't have a car in LA and met a pro golfer at a golf course and took two years off and traveled around caddying for him and tried to get 'em through Q School. >>This is, this is fantastic. So if you're in school and your parents are telling you to continue going to school, know that you can drop out and be a caddy and still be a very successful television personality. Like both of the gentlemen at some point. >>Well, I never said my parents like >>That decision, but we'll keep our day jobs. Yeah, exactly. And one of them is Cloud Native Security. The hottest topic here at the show. Yep. I want to get into it. You guys are doing some really cool things. Are we? We hear Zero Trust, you know, ransomware and we even, I even talked with the CEO of Dockets morning about container security issues. Sure. There's a lot going on. So you guys are in the middle of teleport. You guys have a unique solution. Tell us what you guys got going on. What do you guys do? What's the solution and what's the problem you solve? >>So Teleport is the first and only identity native infrastructure access solution in the market. So breaking that down, what that really means is identity native being the combination of secret list, getting rid of passwords, Pam Vaults, Key Vaults, Yeah. Passwords written down. Basically the number one source of breach. And 50 to 80% of breaches, depending on whose numbers you want to believe are how organizations get hacked. >>But it's not password 1 23 isn't protecting >>Cisco >>Right >>Now. Well, if you think about when you're securing infrastructure and the second component being zero trust, which assumes the network is completely insecure, right? But everything is validated. Resource to resource security is validated, You know, it assumes work from anywhere. It assumes the security comes back to that resource. And we take the combination of those two into identity, native access where we cryptographically ev, validate identity, but more importantly, we make an absolutely frictionless experience. So engineers can access infrastructure from anywhere at any time. >>I'm just flashing on my roommates, checking their little code, changing Bob login, you know, dongle essentially, and how frustrating that always was. I mean, talk about interrupting workflow was something that's obviously necessary, but >>Well, I mean, talk about frustration if I'm an engineer. Yeah, absolutely. You know, back in the day when you had these three tier monolithic applications, it was kind of simple. But now as you've got modern application development environments Yeah, multi-cloud, hybrid cloud, whatever marketing term around how you talk about this, expanding sort of disparate infrastructure. Engineers are sitting there going from system to system to machine to database to application. I mean, not even a conversation on Kubernetes yet. Yeah. And it's just, you know, every time you pull an engineer or a developer to go to a vault to pull something out, you're pulling them out for 10 minutes. Now, applications today have hundreds of systems, hundreds of microservices. I mean 30 of these a day and nine minutes, 270 minutes times 60. And they also >>Do the math. Well, there's not only that, there's also the breach from manual error. I forgot to change the password. What is that password? I left it open, I left it on >>Cognitive load. >>I mean, it's the manual piece. But even think about it, TR security has to be transparent and engineers are really smart people. And I've talked to a number of organizations who are like, yeah, we've tried to implement security solutions and they fail. Why? They're too disruptive. They're not transparent. And engineers will work their way around them. They'll write it down, they'll do a workaround, they'll backdoor it something. >>All right. So talk about how it works. But I, I mean, I'm getting the big picture here. I love this. Breaking down the silos, making engineers lives easier, more productive. Clearly the theme, everyone they want, they be gonna need. Whoever does that will win it all. How's it work? I mean, you deploying something, is it code, is it in line? It's, >>It's two binaries that you download and really it starts with the core being the identity native access proxy. Okay. So that proxy, I mean, if you look at like the zero trust principles, it all starts with a proxy. Everything connects into that proxy where all the access is gated, it's validated. And you know, from there we have an authorization engine. So we will be the single source of truth for all access across your entire infrastructure. So we bring machines, engineers, databases, applications, Kubernetes, Linux, Windows, we don't care. And we basically take that into a single architecture and single access platform that essentially secures your entire infrastructure. But more importantly, you can do audit. So for all of the organizations that are dealing with FedRAMP, pci, hipaa, we have a complete audit trail down to a YouTube style playback. >>Oh, interesting. We're we're California and ccpa. >>Oh, gdpr. >>Yeah, exactly. It, it, it's, it's a whole shebang. So I, I love, and John, maybe you've heard this term a lot more than I have, but identity native is relatively new to me as as a term. And I suspect you have a very distinct way of defining identity. How do you guys define identity internally? >>So identity is something that is cryptographically validated. It is something you have. So it's not enough. If you look at, you know, credentials today, everyone's like, Oh, I log into my computer, but that's my identity. No, it's not. Right. Those are attributes. Those are something that is secret for a period of time until you write it down. But I can't change my fingerprint. Right. And now I >>Was just >>Thinking of, well no, perfect case in point with touch ID on your meth there. Yeah. It's like when we deliver that cryptographically validated identity, we use these secure modules in like modern laptops or servers. Yeah. To store that identity so that even if you're sitting in front of your computer, you can't get to it. But more importantly, if somebody were to take that and try to be you and try to log in with your fingerprint, it's >>Not, I'm not gonna lie, I love the apple finger thing, you know, it's like, you know, space recognition, like it's really awesome. >>It save me a lot of time. I mean, even when you go through customs and they do the face scan now it actually knows who you are, which is pretty wild in the last time you wanna provide ones. But it just shifted over like maybe three months ago. Well, >>As long as no one chops your finger off like they do in the James Bond movies. >>I mean, we try and keep it a light and fluffy here on the queue, but you know, do a finger teams, we can talk about that >>Too. >>Gabby, I was thinking more minority report, >>But you >>Knows that's exactly what I, what I think of >>Hit that one outta bounds. So I gotta ask, because you said you're targeting engineers, not IT departments. What's, is that, because I in your mind it is now the engineers or what's the, is always the solution more >>Targeted? Well, if you really look at who's dealing with infrastructure on a day-to-day basis, those are DevOps individuals. Those are infrastructure teams, Those are site reliability engineering. And when it, they're the ones who are not only managing the infrastructure, but they're also dealing with the code on it and everything else. And for us, that is who is our primary customer and that's who's doing >>It. What's the biggest problem that you're solving in this use case? Because you guys are nailing it. What's the problem that your identity native solution solves? >>You know, right out of the backs we remove the number one source of breach. And that is taking passwords, secrets and, and keys off the board. That deals with most of the problem right there. But there are really two problems that organizations face. One is scaling. So as you scale, you get more secrets, you get more keys, you get all these things that is all increasing your attack vector in real time. Oh >>Yeah. Across teams locations. I can't even >>Take your pick. Yeah, it's across clouds, right? Any of it >>On-prem doesn't. >>Yeah. Any of it. We, and we allow you to scale, but do it securely and the security is transparent and your engineers will absolutely love it. What's the most important thing about this product Engineers. Absolutely. >>What are they saying? What are some of those examples? Anecdotally, pull boats out from engineering. >>You're too, we should have invent, we should have invented this ourselves. Or you know, we have run into a lot of customers who have tried to home brew this and they're like, you know, we spend an in nor not of hours on it >>And IT or they got legacy from like Microsoft or other solutions. >>Sure, yeah. Any, but a lot of 'em is just like, I wish I had done it myself. Or you know, this is what security should be. >>It makes so much sense and it gives that the team such a peace of mind. I mean, you never know when a breach is gonna come, especially >>It's peace of mind. But I think for engineers, a lot of times it deals with the security problem. Yeah. Takes it off the table so they can do their jobs. Yeah. With zero friction. Yeah. And you know, it's all about speed. It's all about velocity. You know, go fast, go fast, go fast. And that's what we enable >>Some of the benefits to them is they get to save time, focus more on, on task that they need to work on. >>Exactly. >>And get the >>Job done. And on top of it, they answer the audit and compliance mail every time it comes. >>Yeah. Why are people huge? Honestly, why are people doing this? Because, I mean, identity is just such an hard nut to crack. Everyone's got their silos, Vendors having clouds have 'em. Identity is the most fragmented thing on >>The planet. And it has been fragmented ever since my first RSA conference. >>I know. So will we ever get this do over? Is there a driver? Is there a market force? Is this the time? >>I think the move to modern applications and to multi-cloud is driving this because as those application stacks get more verticalized, you just, you cannot deal with the productivity >>Here. And of course the next big thing is super cloud and that's coming fast. Savannah, you know, You know that's Rocket. >>John is gonna be the thought leader and keyword leader of the word super cloud. >>Super Cloud is enabling super services as the cloud cast. Brian Gracely pointed out on his Sunday podcast of which if that happens, Super Cloud will enable super apps in a new architectural >>List. Please don't, and it'll be super, just don't. >>Okay. Right. So what are you guys up to next? What's the big hot spot for the company? What are you guys doing? What are you guys, What's the idea guys hiring? You put the plug in. >>You know, right now we are focused on delivering the best identity, native access platform that we can. And we will continue to support our customers that want to use Kubernetes, that want to use any different type of infrastructure. Whether that's Linux, Windows applications or databases. Wherever they are. >>Are, are your customers all of a similar DNA or are you >>No, they're all over the map. They range everything from tech companies to financial services to, you know, fractional property. >>You seem like someone everyone would need. >>Absolutely. >>And I'm not just saying that to be a really clean endorsement from the Cube, but >>If you were doing DevOps Yeah. And any type of forward-leaning shift, left engineering, you need us because we are basically making security as code a reality across your entire infrastructure. >>Love this. What about the team dna? Are you in a scale growth stage right now? What's going on? Absolutely. Sounds I was gonna say, but I feel like you would have >>To be. Yeah, we're doing, we're, we have a very positive outlook and you know, even though the economic time is what it is, we're doing very well meeting. >>How's the location? Where's the location of the headquarters now? With remote work is pretty much virtual. >>Probably. We're based in downtown Oakland, California. >>Woohoo. Bay area representing on this stage right now. >>Nice. Yeah, we have a beautiful office right in downtown Oakland and yeah, it's been great. Awesome. >>Love that. And are you hiring right now? I bet people might be. I feel like some of our cube watchers are here waiting to figure out their next big play. So love to hear that. Absolutely love to hear that. Besides Drew, not reply, if people want to join your team or say hello to you and tell you how brilliant you looked up here, or ask about your caddy days and maybe venture a guest to who that golfer may have been that you were CAD Inc. For, what are the best ways for them to get in touch with you? >>You can find me on LinkedIn. >>Great. Fantastic. John, anything else >>From you? Yeah, I mean, I just think security is paramount. This is just another example of where the innovation has to kind of break through without good identity, everything could cripple. Then you start getting into the silos and you can start getting into, you know, tracking it. You got error user errors, you got, you know, one of the biggest security risks. People just leave systems open, they don't even know it's there. So like, I mean this is just, just identity is the critical linchpin to, to solve for in security to me. And that's totally >>Agree. We even have a lot of customers who use us just to access basic cloud consoles. Yeah. >>So I was actually just gonna drive there a little bit because I think that, I'm curious, it feels like a solution for obviously complex systems and stacks, but given the utility and what sounds like an extreme ease of use, I would imagine people use this for day-to-day stuff within their, >>We have customers who use it to access their AWS consoles. We have customers who use it to access Grafana dashboards. You know, for, since we're sitting here at coupon accessing a Lens Rancher, all of the amazing DevOps tools that are out there. >>Well, I mean true. I mean, you think about all the reasons why people don't adopt this new federated approach or is because the IT guys did it and the world we're moving into, the developers are in charge. And so we're seeing the trend where developers are taking the DevOps and the data and the security teams are now starting to reset the guardrails. What's your >>Reaction to that? Well, you know, I would say that >>Over the top, >>Well I would say that you know, your DevOps teams and your infrastructure teams and your engineers, they are the new king makers. Yeah. Straight up. Full stop. >>You heard it first folks. >>And that's >>A headline right >>There. That is a headline. I mean, they are the new king makers and, but they are being forced to do it as securely as possible. And our job is really to make that as easy and as frictionless as possible. >>Awesome. >>And it sounds like you're absolutely nailing it. Drew, thank you so much for being on the show. Thanks for having today. This has been an absolute pleasure, John, as usual a joy. And thank all of you for tuning in to the Cube Live here at CU Con from Detroit, Michigan. We look forward to catching you for day two tomorrow.

Published Date : Oct 27 2022

SUMMARY :

I don't think the audience knows that you were a caddy. the members where you're going. Just, just really impressive He's carrying the story of emerging brands and established companies on It's great to be here. And so you were a caddy on a whole different level. Yeah, so I was in university and I got tired after two years and didn't have to school, know that you can drop out and be a caddy and still be a very successful television personality. What's the solution and what's the problem you solve? And 50 to 80% of breaches, depending on whose numbers you want to believe are how organizations It assumes the security comes back to that resource. you know, dongle essentially, and how frustrating that always was. You know, back in the day when you had these three tier I forgot to change I mean, it's the manual piece. I mean, you deploying something, is it code, is it in line? And you know, from there we have an authorization engine. We're we're California and ccpa. And I suspect you have a very distinct way of that is secret for a period of time until you write it down. try to be you and try to log in with your fingerprint, it's Not, I'm not gonna lie, I love the apple finger thing, you know, it's like, you know, space recognition, I mean, even when you go through customs and they do the face scan now So I gotta ask, because you said you're targeting Well, if you really look at who's dealing with infrastructure on a day-to-day basis, those are DevOps individuals. Because you guys are nailing it. So as you scale, you get more secrets, you get more keys, I can't even Take your pick. We, and we allow you to scale, but do it securely What are they saying? they're like, you know, we spend an in nor not of hours on it Or you know, you never know when a breach is gonna come, especially And you know, it's all about speed. And on top of it, they answer the audit and compliance mail every time it comes. Identity is the most fragmented thing on And it has been fragmented ever since my first RSA conference. I know. Savannah, you know, Super Cloud is enabling super services as the cloud cast. So what are you guys up to next? And we will continue to support our customers that want to use Kubernetes, you know, fractional property. If you were doing DevOps Yeah. Sounds I was gonna say, but I feel like you would have Yeah, we're doing, we're, we have a very positive outlook and you know, How's the location? We're based in downtown Oakland, California. Bay area representing on this stage right now. it's been great. And are you hiring right now? John, anything else Then you start getting into the silos and you can start getting into, you know, tracking it. We even have a lot of customers who use us just to access basic cloud consoles. a Lens Rancher, all of the amazing DevOps tools that are out there. I mean, you think about all the reasons why people don't adopt this Well I would say that you know, your DevOps teams and your infrastructure teams and your engineers, I mean, they are the new king makers and, but they are being forced to We look forward to catching you for day

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
Savannah PetersonPERSON

0.99+

30QUANTITY

0.99+

DrewPERSON

0.99+

10 minutesQUANTITY

0.99+

Brian GracelyPERSON

0.99+

JohnPERSON

0.99+

LALOCATION

0.99+

MicrosoftORGANIZATION

0.99+

Drew NielsenPERSON

0.99+

two binariesQUANTITY

0.99+

CiscoORGANIZATION

0.99+

270 minutesQUANTITY

0.99+

50QUANTITY

0.99+

SavannahPERSON

0.99+

firstQUANTITY

0.99+

todayDATE

0.99+

two problemsQUANTITY

0.99+

Detroit, MichiganLOCATION

0.99+

oneQUANTITY

0.99+

SundayDATE

0.99+

two yearsQUANTITY

0.99+

twoQUANTITY

0.99+

AWSORGANIZATION

0.99+

second componentQUANTITY

0.99+

Zero TrustORGANIZATION

0.99+

TeleportORGANIZATION

0.99+

WindowsTITLE

0.99+

LinkedInORGANIZATION

0.99+

three tierQUANTITY

0.99+

John FurrierPERSON

0.99+

Cloud Native FoundationORGANIZATION

0.99+

YouTubeORGANIZATION

0.99+

bothQUANTITY

0.99+

CaliforniaLOCATION

0.99+

tomorrowDATE

0.98+

two bagsQUANTITY

0.98+

LinuxTITLE

0.98+

OneQUANTITY

0.98+

80%QUANTITY

0.98+

three months agoDATE

0.98+

FedRAMPORGANIZATION

0.98+

day twoQUANTITY

0.98+

KubeConEVENT

0.98+

CloudNativeConEVENT

0.97+

Super CloudTITLE

0.97+

GabbyPERSON

0.96+

nine minutesQUANTITY

0.96+

Cube StudiosORGANIZATION

0.95+

a dayQUANTITY

0.95+

CU ConEVENT

0.95+

DoubleQUANTITY

0.94+

TwitterORGANIZATION

0.94+

zero frictionQUANTITY

0.94+

BobPERSON

0.93+

CubeORGANIZATION

0.92+

Caddy ShackTITLE

0.92+

Q SchoolORGANIZATION

0.91+

single access platformQUANTITY

0.91+

zero trustQUANTITY

0.89+

single architectureQUANTITY

0.89+

60QUANTITY

0.88+

downtown Oakland, CaliforniaLOCATION

0.88+

teleportORGANIZATION

0.87+

KubernetesTITLE

0.87+

two caddiesQUANTITY

0.87+

pciORGANIZATION

0.86+

each shoulderQUANTITY

0.85+

CubanORGANIZATION

0.85+

single sourceQUANTITY

0.85+

hundreds of microservicesQUANTITY

0.84+

zero trustQUANTITY

0.83+

DocketsORGANIZATION

0.83+

NA 2022EVENT

0.82+

CAD Inc.ORGANIZATION

0.81+

BayLOCATION

0.8+

one sourceQUANTITY

0.78+

RSA conferenceEVENT

0.78+

hundreds of systemsQUANTITY

0.77+

Cloud NativeEVENT

0.76+

Rakesh Narasimhan, Anitian | CUBE Conversation, August 2022


 

(bright upbeat music) >> Welcome, everyone, to this Cube conversation. It's part of our season two, episode four of the ongoing AWS Startup Showcase Series. Today's theme, "Cybersecurity: Detect and Protect Against Threats." I'm your host, Lisa Martin. I've got one of our alumni back with us. Rakesh Narasimhan joins me, President and CEO of Anitian. Rakesh, it's great to have you back on the program. >> Thank you very much. Pleasure to be here. >> So some congratulations are in order. I see that Anitian was recently awarded nine global InfoSec awards at RSA conference just this year including couple great titles here hot company and security company of the year. Talk to the audience who knows Anitian what is it doing to enable and empower the digital transformation for enterprises that are, I mean, we've been talking about the acceleration of digital transformation. How is Anitian an enabler of that? >> Thank you again for the opportunity. I think the big change that we brought to the table in Anitian is really what is typically a very manual, complex time consuming and quite expensive process. We've just brought software innovations to it and really that's customers who are trying to do compliance or security in the cloud which just provide a platform that basically accelerates a customer's application migration to cloud. And so that ability is the software innovation that we were able to bring to the space and that just wasn't there before. And so we're just happy that we took the opportunity to innovate there and just bring it to the customers. >> So let's now talk to and address those AWS customers. When you're talking to prospects, existing AWS customers what do you say are the differentiators that makes Anitian so unique when in AWS. >> That's a great question. I think the biggest innovation, the biggest thing that we bring to the table is really an acceleration and timeline and completion of their application. So if you're a customer and you're trying to get into a new market for compliance, for example or you're trying to basically get a new application up and running in a secure environment in either one of those cases, we have a product offering a platform offering that enables you to quickly get up and running and get to production. And that's been the reason why we've enjoyed enormous success in the marketplace in the AWS customer base. >> One of the areas where I see that an Anitian has been very successful is in helping cloud software vendors get FedRAMP compliance and be able to access what is a huge federal market. How are you able to do that? >> Yeah, I think the big thing that we focused on was you have a complete class of SaaS vendors out there who provide enormous innovation that they bring to the marketplace but the government market in general has not been able to participate in it because it again, like I said, it's very complex. It takes time and it's very expensive. And so we focused on that opportunity to really make it easier for all these cloud service providers to be able to bring their innovations to the government market, for example, with FedRAMP and so we help with the automation and the acceleration with our platform offering on top of cloud providers like AWS, and that enables the SaaS provider to offer that opportunity that hitherto is not available to now make it available in the government marketplace. And that's a huge buyer, if you will their budgets are huge. They're still buying even on a downturn in the market even as commercial vendors, who look at that, that market everybody's nervous about it. But if you look at the government market they have budget, they're buying and that needs to be provided to the install base. And so we help make that happen. >> How does that make you unique from a competitive perspective to be able to accelerate veteran for AWS customers in particular? >> I think the biggest issue has always been three things, right? It's complex, it's time consuming but most importantly, how quickly can a company make their software innovations available to a large market has always been sort of the challenge especially in the federal market. So we basically pre-engineering a platform taking care of all the requirements of the standard in compliance and security and then essentially help the customer bring that innovation on top of the AWS environment and making that available to the customers and record time. That's the reason why we're able to enjoy the success. Historically, the space has been very very focused on a lot of consulting folks really providing consulting on an hourly basis. We thought of actually bringing a software oriented approach just like people buy email, they buy service and then all the innovations that come along with it for the subscription that you pay. It's a very similar concept we brought to this space prior to this, either people did it themselves or they hired a lot of consulting folks to tell them what to do. And that could take a long time and then not just time and expense but every single time they made a change they would still, again, have to go redo all that work. We just brought a platform approach which is well understood by now in the industry you pay a subscription, you buy a platform and all the innovations come along for them. So that's huge productivity, time to market but most importantly it enables them to achieve their revenue goals because they're trying to get to market and service the customer, right? So we help them accomplish that in record time. >> So you are really impacting your customer's bottom line. You've been very successful in helping AWS public sector customers to accelerate FedRAMP. As you talked about FedRAMP compliance how are you now switching gears to focus on the AWS commercial customers and even enterprise DevOps teams to be able to accelerate cloud application security? >> Yeah, I think, again we started from a place of humility, if you will. You know, there's a lot of vendors a lot of folks make a lot of claims. We wanted to make sure that we first we're very good at doing something. And that's something was really go after the federal market and the success we achieved in that marketplace had a few insights for ourselves which was people really struggle in all kinds of environments, not just public sector. And what we found is that commercial customers are also trying to go to cloud. They're also dealing with the issues of security in securing their environments. And it's really the DevOps and DevSecOps folks on whom this burden falls. And they have to answer to so many different constituencies in an enterprise company. And so we time and time again while we did the work in FedRAMP we learned that, you know it's not just about compliance. It's also about securing on a base of standards. So how could we provide the same pre-engineered environment for DevOps and DevSecops teams to be able to run that environment for their applications that became an 'aha' for us because we were running into it all the time in the public sector side. So we went and talked to a few customers and said, 'Hey, how about we do the same thing on the commercial side for you?' And I wish I could take credit for this but it's actually not true. It's actually customers who came to us and said, 'Hey you did this really well for us in public sector side. Could you provide the same thing for us in the commercial side?' where it's not about all the documentation and all the audits and things that happen on the compliance side of the house. I just want you to provide an environment so that our DevOps teams could just operate in that environment and Devs can work on it. Can you do that? And we'll pay you. And that was born really our idea of secure cloud enterprise. Our primary offering historically has been secure cloud compliance with a compliance business if you will, where people could go into market and have a completely new market to go after. Whereas in the enterprise side we brought those innovations, those learnings and brought it to a commercial market. And so that's the new product, if you will, that we're launching to service that customer base, if you will. >> So if I'm an AWS customer when do I know it's time to contact Anitian and say, 'Guys we need help and we think you're the right ones to help us accelerate.' >> Yeah, I think it's re really straightforward if you are a customer commercial SaaS vendor, if you will, that runs an AWS and you want to go after a new market then you come to us and we can help you quickly get to all the compliance standards so that you can go sell in the government marketplace. That's an offering we already have, or you are a a brand new company and B2B company and you're developing an application and you want a pre-engineered environment that passes all the security standards so that you don't have to worry about it. You have a subscription to AWS and you have a subscription to us. And then that basically provides you a secure environment in which you can start developing your applications and start developing, deploying them much like your DevOps cycle would work. So we provide that basis already for you. So if you're a customer on the B2B side and you're going to cloud to get your applications to the marketplace on AWS, we're a great solution for you to actually have that engineered platform in place already. So those are the two areas where you can contact us and we can help you out. >> And talk to me about when you are in customer conversations especially as we've had such challenging times the last couple of years, how have those customer conversations changed and evolved? Are you seeing an acceleration up the C-suite stack? Is this a key priority for the CEO and his or her team? >> Yeah, I think it's a phenomenal point. I think security's always been top of mind for folks, not just the C-suite, but in boardrooms as well. But you know, the key thing we found is that even in a down market, sometimes in the environment that is playing out in the macro environment. I think the thing that has not changed is people are still trying to figure out how to make their dollar go further. And how do I get a better return on investment? So if you look at our compliance business that growth is all about that market is growing. There's still opportunity, and people are still having budgets and spending. So commercial companies are still trying to figure out how can I extend my market reach into new markets? So that's an area that the C-suite is really interested in. Funny enough, you would think in the cyber world it's a CSOs who are the ones who actually are looking for solutions from us that certainly an audience but CEOs and CROs are the folks who really clamor for our solution because it is their ability to enter a new market and go after a new budget that can grow their business and have an ROI pretty quickly. That's the ability for them to make that decision. So it's very pertinent to their buying behavior that we have aligned ourselves to very simply put by engaging us. They get to go after a new market to establish a new line of revenue they didn't have before. So that's always interesting to any C-suite member as you can imagine. And that's the compliance side. >> Absolutely establishing new revenue streams is huge and that's a big competitive differentiator. We've seen a lot of customers that weren't able in any industry to do that during the challenging pandemic times. And that is a game changer for organizations across industries. >> Exactly, exactly. And wishing that play out, not just on that side, but even on the commercial side where people are also trying to figure out how do I basically make sure it's pre-done so that it's one less thing for me to have to worry about so that I can be more productive. I can get to market pretty quickly which means I can, again, deliver to my customers quickly which means revenue for them as well. So we are the security business, but really if you notice we're solving a business problem for our customers and we're aligned to their ROI so that it's relatively easier for them to make a decision. They certainly get security in compliance but the bigger benefit for them is to grow their business itself. So we are trying to accelerate that momentum for them. >> That's critical, and I'm sure your customers really appreciate the impact that you're having on their growth, their ability to deliver to what I can only presume is their demanding customers. As one of the things I know that's been in short supply the last couple of years, is patience and tolerance. Is there Rakesh a customer story that you think really articulates the value of what Anitian is delivering? Maybe a favorite customer story that you mentioned when you're giving talks? >> Sure, sure. We really have a very customer base across the landscape. If you think about our compliance business, Smartsheet is a great example who partnered early. They were not even in the cloud before. And then that's a great example with AWS where the three of us work together to offer Smartsheet the collaboration software public SaaS company, if you will, who really established themselves and differentiated themselves in the marketplace by offering that on AWS. And we helped them accomplish their FedRAMP itself not just for once, but you know they've been great customers of ours multiple renewals over the years and every single year that the business that they get on the federal sizes increased because of the work that they did first with us. And so, you know, we've look for more opportunities with them, certainly on that part. And increasingly we start thinking about where else can we help them grow? Because typically most customers have a thing to solve on a compliance standard, but it turns out that the compliance journey is, you know some companies are trying to do Socto to be able to even sell. Then you want to do electronic commerce. You might have to do PCI or you want to sell under the federal government. You'll have to do FedRAMP and FedRAMP has moderate, high but depending on the customers you have, including DOD and once you get to DOD, they'll ask for IL4 and IL5. So these are different compliance regimes. If you will think of them as a journey and we want to be the company that provides a seamless progression for customers as they're on that journey so that we can actually deliver something of value. We're not interested in nickel and diamond customers and charging them by the hour, we're a platform player. We want to make sure that they use it to basically get their ROI and growth happening. And we just take care of the hard part of making sure that they're in compliance, right? And similarly, we're bringing the same idea like Smartsheet. I told you about to a commercial marketplace of customers who can do the same thing for commercial apps in the cloud. And so that gives us a very clean way for customers to really become not just productive, but satisfy their customers quickly and hence grow their business. And we celebrate that collaboration and all of that happens because of AWS and our ability to focus on those customers >> Sounds like a great partnership and definite synergy there on I know, and, you know as well, how customer obsessed in their own words AWS. Speaking of customers one more question for you in terms of being on that journey that compliance journey, which isn't a destination, right? It's probably a zigzaggy path. Do you work with customers that both haven't started the process to FedRAMP plans or those that maybe have with a competitor are running into roadblocks? Are those both routes to market for you? >> Yeah, we interestingly enough historically we used to see a lot of folks who have tried to do it themselves and found it hard or for a variety of reasons they just gave up. And so they would come to us. We have also examples of customers who have tried to go down the consulting path and has not worked and come to us so that it's sort of a broken project. We start from there, but a majority of our business is people who've gotten a contract from one of the agencies. Then they're like, 'oh now what!' We need to get this done before September. And so what's the quickest way to get there. And generally that's where we can help you because we are the best, fastest way to get there. And so we get that mix of customers people who have already tried hasn't worked out people who have tried with other folks hasn't worked out, but a majority of the folks are people who don't even know, you know how to go about doing it, but they know they have to do it in order for them to keep the customer that they've won one of the agencies, if you will. So that has given us a very healthy perspective on how to help customers of different kinds in that journey. The other thing is, you know, we've grown tremendously in the last couple of years. And the other thing we learned is every customer is different. And we tried to bring a very common approach to addressing this problem. Even though customers come in all shapes and forms we have startup companies in, you know early forms of maturity. And we have like really iconic, you know unicorn companies who we've helped go through FedRAMP. So the gamut is large, but you know we're learning a lot by doing this. And I think that's the key thing for me. I want our company to be one that is growing with innovation, but at the same time keeping flexibility in our approach so that we are not just learning new things, we're delivering on the harder problems our customers are facing. Cause I think that's where software innovation can really play a big differentiating role. And that's the reason why I always enjoyed being at Anitian and growing the business and keeping the company really, fast moving and innovative. >> Speaking of being fast moving and innovative here we are coming up on the fourth quarter of calendar year 22, what's next for Anitian? What are some of the exciting things that have you pumped up? Have you mojo going for what's next for the rest of the year? >> Yeah, I think a big portion of my enthusiasm for the company and the road ahead is I think it's rare if you look at the industry, oftentimes you see companies that start out with a single solution and then are able to grow from there. One of the best advantages Anitian has is this platform centric approach to do compliance on the journey I talked about. So if you think about that journey every customer that is going to cloud has this challenge that, they either have to comply do a bunch of standards, one or many. And then how do I do that in a platform approach in a common way so that I don't have to worry about it. I play a subscription and I am just protected by that. And I actually get the marketplace. So that's a tremendous journey we are on. We've only done a few of them and we have a whole new set of compliance standards coming on our platform. So that's one way, look forward to that. The other one I'm really looking forward to is the commercial customers. There's a huge opportunity for people to really know that they're sitting on top of a very secure environment in AWS. And how do I quickly propel myself into the marketplace so that I can be differentiated. I can get to market quickly but I can also make sure my innovations are getting to the marketplace as a customer, right? So I think I'm really excited about the things we are bringing to market just not just this year, but next year early next year on the compliance side, as well as the commercial side, that'll actually differentiate us and make it a lasting part of a customer's journey. And that's, I think the best thing you can hope for building a lasting company where your innovations are powering the productivity of your customers in a meaningful manner. And I always feel proud of the team. You mentioned the awards, but honestly more than anything else, we've put together a great team. And the team does a tremendous job with a very good ecosystem of partners. And our humility is it's not just us it's the ecosystem together. And the partnership with Amazon that helps us be the company we are able to be. We live in really story times and we're lucky to be part of this opportunity if you will. >> Yeah better together. That ecosystem is incredibly powerful. Thank you so much Rakesh for talking about what's going on at Anition, how you're helping customers, accelerate FedRAMP compliance, what you're doing in the commercial space and how you're helping your customers really improve their bottom line. We thank you so much for partnering with the Cube for season two, episode four of the AWS startup showcase. >> My pleasure. Thank you very much. >> And we want to thank you for watching but keep it right here for more action on the Cube which as you know, is your leader in tech coverage. I'm Lisa Martin. See you next time. (lively music)

Published Date : Aug 23 2022

SUMMARY :

of the ongoing AWS Pleasure to be here. and empower the digital transformation and just bring it to the customers. So let's now talk to and that enables you to quickly get up One of the areas where I see and that needs to be for the subscription that you pay. on the AWS commercial customers and the success we achieved and say, 'Guys we need help and we think and we can help you quickly get And that's the compliance side. And that is a game changer so that it's one less thing for me to have that you think really articulates but depending on the customers you have, that both haven't started the process So the gamut is large, but you know every customer that is going to cloud of the AWS startup showcase. Thank you very much. And we want to thank you for watching

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
AWSORGANIZATION

0.99+

AmazonORGANIZATION

0.99+

Lisa MartinPERSON

0.99+

RakeshPERSON

0.99+

Rakesh NarasimhanPERSON

0.99+

August 2022DATE

0.99+

two areasQUANTITY

0.99+

next yearDATE

0.99+

AnitianPERSON

0.99+

AnitianORGANIZATION

0.99+

AnitionORGANIZATION

0.99+

three thingsQUANTITY

0.99+

FedRAMPORGANIZATION

0.99+

Cybersecurity: Detect and Protect Against ThreatsTITLE

0.99+

oneQUANTITY

0.99+

bothQUANTITY

0.98+

threeQUANTITY

0.98+

firstQUANTITY

0.98+

TodayDATE

0.97+

this yearDATE

0.96+

SmartsheetTITLE

0.96+

OneQUANTITY

0.95+

early next yearDATE

0.94+

DODTITLE

0.93+

single solutionQUANTITY

0.92+

one wayQUANTITY

0.88+

one more questionQUANTITY

0.88+

AnitianTITLE

0.85+

last couple of yearsDATE

0.83+

one ofQUANTITY

0.81+

RSA conferenceEVENT

0.81+

calendar year 22DATE

0.79+

SeptemberDATE

0.75+

DevSecopsORGANIZATION

0.72+

couple great titlesQUANTITY

0.71+

onceQUANTITY

0.71+

Startup Showcase SeriesEVENT

0.7+

season twoQUANTITY

0.68+

FedRAMPTITLE

0.67+

urthDATE

0.67+

fourOTHER

0.67+

IL5ORGANIZATION

0.66+

episode fourOTHER

0.63+

single timeQUANTITY

0.63+

nine globalQUANTITY

0.62+

singleQUANTITY

0.62+

IL4ORGANIZATION

0.6+

agenciesQUANTITY

0.59+

CubeCOMMERCIAL_ITEM

0.59+

Jay Bretzmann & Philip Bues, IDC | AWS re:Inforce 2022


 

(upbeat music) >> Okay, welcome back everyone. CUBE's coverage here in Boston, Massachusetts, AWS re:inforce 22, security conference. It's AWS' big security conference. Of course, theCUBE's here, all the reinvent, reese, remars, reinforced. We cover 'em all now and the summits. I'm John Furrier, my host Dave Vellante. We have IDC weighing in here with their analysts. We've got some great guests here, Jay Bretzmann research VP at IDC and Philip Bues research manager for Cloud security. Gentlemen, thanks for coming on. >> Thank you. >> Appreciate it. Great to be here. >> Appreciate coming. >> Got a full circle, right? (all laughing) Security's more interesting than storage, isn't it? (all laughing) >> Dave and Jay worked together. This is a great segment. I'm psyched that you guys are here. We had Crawford and Matt Eastwood on at HPE Discover a while back and really the data you guys are getting and the insights are fantastic. So congratulations to IDC. You guys doing great work. We appreciate your time. I want to get your reaction to the event and the keynotes. AWS has got some posture and they're very aggressive on some tones. Some things that we didn't hear. What's your reaction to the keynote? Share your assessment. >> So, you know, I manage two different research services at IDC right now. They are both Cloud security and identity and digital security, right? And what was really interesting is the intersection between the two this morning, because every one of those speakers that came on had something to say about identity or least privileged access, or enable MFA, or make sure that you control who gets access to what and deny explicitly. And it's always been a challenge a little bit in the identity world because a lot of people don't use MFA. And in RSA, that was another big theme at the RSA conference, MFA everywhere. Why don't they use it? Because it introduces friction and all of a sudden people can't get their jobs done. And the whole point of a network is letting people on to get that data they want to get to. So that was kind of interesting, but as we have in the industry, this shared responsibility model for Cloud computing, we've got shared responsibility for between Philip and I. (Philip laughing) I have done in the past more security of the Cloud and Philip is more security in the Cloud. >> So yeah. >> And now with Cloud operation Super Cloud, as we call it, you have on premises, private Cloud coming back, or hasn't really gone anywhere, all that on premises, Cloud operations, public Cloud, and now edge exploding with new requirements. It's really an ops challenge right now. Not so much dev. So the sec and op side is hot right now. >> Yeah, well, we've made this move from monolithic to microservices based applications. And so during the keynote this morning, the announcement around the GuardDuty Malware Protection component, and that being built into the pricing of current GuardDuty, I thought was really key. And there was also a lot of talk about partnering in security certifications, which is also so very important. So we're seeing this move towards filling in that talent gap, which I think we're all aware of in the security industry. >> So Jake, square the circle for me. So Kirk Coofell talked about Amazon AWS identity, where does AWS leave off, and companies like Okta or Ping identity or Cybertruck pickup, how are they working together? Does it just create more confusion and more tools for customers? We know the overused word of seamless. >> Yeah, yeah. >> It's never seamless, so how should we think about that? >> So, identity has been around for 35 years or something like that. Started with the mainframes and all that. And if you understand the history of it, you make more sense to the current market. You have to know where people came from and the baggage they're carrying, 'cause they're still carrying a lot of that baggage. Now, when it comes to the Cloud Service providers, they're more an accommodation from the identity standpoint. Let's make it easy inside of AWS to let you single sign on to anything in the Cloud that they have, right? Let's also introduce an additional MFA capability to keep people safer whenever we can and provide people with tools, to get into those applications somewhat easily, while leveraging identities that may live somewhere else. So there's a whole lot of the world that is still active, directory-centric, right? There's another portion of companies that were born in the Cloud that were able to jump on things like Okta and some of the other providers of these universal identities in the Cloud. So, like I said, if you understand where people came from in the beginning, you start to say, "Yeah, this makes sense." >> It's interesting you talk about mainframe. I always think about Rack F, you know. And I say, "Okay, who did what, when, where?" And you hear about a lot of those themes. So what's the best practice for MFA, that's non-SMS-based? Is it you got to wear something around your neck, is it to have sort of a third party authenticator? What are people doing that you guys would recommend? >> Yeah, one quick comment about adoption of MFA. If you ask different suppliers, what percent of your base that does SSO also does MFA, one of the biggest suppliers out there, Microsoft will tell you it's under 25%. That's pretty shocking. All the messaging that's come out about it. So another big player in the market was called Duo, Cisco bought them. >> Yep. >> And because they provide networks, a lot of people buy their MFA. They have probably the most prevalent type of MFA, it's called Push. And Push can be a red X and a green check mark to your phone, it can be a QR code, somewhere, it can be an email push as well. So that is the next easiest thing to adopt after SMS. And as you know, SMS has been denigrated by NIST and others saying, it's susceptible to man and middle attacks. It's built on a telephony protocol called SS7. Predates anything, there's no certification either side. The other real dynamic and identity is the whole adoption of PKI infrastructure. As you know, certificates are used for all kinds of things, network sessions, data encryption, well, identity increasingly. And a lot of the consumers and especially the work from anywhere, people these days have access through smart devices. And what you can do there, is you can have an agent on that smart device, generate your private key and then push out a public key and so the private key never leaves your device. That's one of the most secure ways to- >> So if our SIM card gets hacked, you're not going to be as vulnerable? >> Yeah, well, the SIM card is another challenge associated with the older ways, but yeah. >> So what do you guys think about the open source connection and they mentioned it up top. Don't bolt on security, implying shift left, which is embedding it in like sneak companies, like sneak do that. Very container oriented, a lot of Kubernetes kind of Cloud native services. So I want to get your reaction to that. And then also this reasoning angle they brought up. Kind of a higher level AI reasoning decisions. So open source, and this notion of AI reasoning. or AI reason. >> And you see more open source discussion happening, so you have your building maintaining and vetting of the upstream open source code, which is critical. And so I think AWS talking about that today, they're certainly hitting on a nerve, as you know, open source continues to proliferate. Around the automated reasoning, I think that makes sense. You want to provide guide rails and you want to provide roadmaps and you want to have sort of that guidance as to, okay, what's a correlation analysis of different tools and products? And so I think that's going to go over really well, yeah. >> One of the other key points about open source is, everybody's in a multi-cloud world, right? >> Yeah. >> And so they're worried about vendor lock in. They want an open source code base, so that they don't experience that. >> Yeah, and they can move the code around, and make sure it works well on each system. Dave and I were just talking about some of the dynamics around data control planes. So they mentioned encrypt everything which is great and I message by the way, I love that one. But oh, and he mentioned data at rest. I'm like, "What about data in flight? "Didn't hear that one." So one of the things we're seeing with SuperCloud, and now multi-cloud kind of as destinations of that, is that in digital transformation, customers are leaning into owning their data flows. >> Yeah. >> Independent of say the control plane aspects of what could come in. This is huge implications for security, where sharing data is huge, even Schmidt on stage said, we have billions and billions of things happening that we see things that no one else sees. So that implies, they're sharing- >> Quad trillion. >> Trillion, 15 zeros. (Jay laughs) >> 15 zeros. >> So that implies they're sharing that or using that pushing that into something. So sharing is huge with cyber security. So that implies open data, data flows. How do you guys see this evolving? I know it's kind of emerging, but it's becoming a nuanced point, that's critical to the architecture. >> Well, yeah, I think another way to look at that is the sharing of intelligence and some of the recent directives, from the executive branch, making it easier for private companies to share data and intelligence, which I think strengthens the cyber community overall. >> Depending upon the supplier, it's either an aggregate level of intelligence that has been anonymized or it's specific intelligence for your environment that everybody's got a threat feed, maybe two or three, right? (John laughs) But back to the encryption point, I mean, I was working for an encryption startup for a little while after I left IBM, and the thing is that people are scared of it. They're scared of key management and rotation. And so when you provide- >> Because they might lose the key. >> Exactly. >> Yeah. >> It's like shooting yourself in the foot, right? So that's when you have things like, KMS services from Amazon and stuff that really help out a lot. And help people understand, okay, I'm not alone in this. >> Yeah, crypto owners- >> They call that hybrid, the hybrid key, they don't know how they call the data, they call it the hybrid. What was that? >> Key management service? >> The hybrid- >> Oh, hybrid HSM, correct? >> Yeah, what is that? What is that? I didn't get that. I didn't understand what he meant by the hybrid post quantum key agreement. >> Hybrid post quantum key exchange. >> AWS never made a product name that didn't have four words in it. (John laughs) >> But he did reference the new NIST algos. And I think I inferred that they were quantum proof or they claim to be, and AWS was testing those. >> Correct, yeah. >> So that was kind of interesting, but I want to come back to identity for a second. So, this idea of bringing traditional IAM and Privileged Access Management together, is that a pipe dream, is that something that is actually going to happen? What's the timeframe, what's your take on that? >> So, there are aspects of privilege in every sort of identity. Back when it was only the back office that used computers for calculations, right? Then you were able to control how many people had access. There were two types of users, admins and users. These days, everybody has some aspect of- >> It's a real spectrum, really. >> Yeah. >> Granular. >> You got the C-suite, the finance people, the DevOps people, even partners and whatever. They all need some sort of privileged access, and the term you hear so much is least-privileged access, right? Shut it down, control it. So, in some of my research, I've been saying that vendors who are in the PAM space, Privilege Access Management space, will probably be growing their suites, playing a bigger role, building out a stack, because they have the expertise and the perspective that says, "We should control this better." How do we do that, right? And we've been seeing that recently. >> Is that a combination of old kind of antiquated systems meets for proprietary hyper scale, or kind of like build your own? 'Cause I mean, Amazon, these guys, Facebook, they all build their own stuff. >> Yes, they do. >> Then enterprises buy services from general purpose identity management systems. >> So as we were talking about knowing the past and whatever, Privileged Access Management used to be about compliance reporting. Just making sure that I knew who accessed what? And could prove it, so I didn't fail at all. >> It wasn't a critical infrastructure item. >> No, and now these days, what it's transitioning into, is much more risk management, okay. I know what our risk is, I'm ahead of it. And the other thing in the PAM space, was really session monitor. Everybody wanted to watch every keystroke, every screen's scrape, all that kind of stuff. A lot of the new Privileged Access Management, doesn't really require that. It's a nice to have feature. You kind of need it on the list, but is anybody really going to implement it? That's the question, right. And then if you do all that session monitoring, does anybody ever go back and look at it? There's only so many hours in the day. >> How about passwordless access? (Jay laughs) I've heard people talk about that. I mean, that's as a user, I can't wait but- >> Well, it's somewhere we want to all go. We all want identity security to just disappear and be recognized when we log in. So the thing with passwordless is, there's always a password somewhere. And it's usually part of a registration action. I'm going to register my device with a username password, and then beyond that I can use my biometrics, right? I want to register my device and get a private key, that I can put in my enclave, and I'll use that in the future. Maybe it's got to touch ID, maybe it doesn't, right? So even though there's been a lot of progress made, it's not quote, unquote, truly passwordless. There's a group, industry standards group called Fido. Which is Fast Identity Online. And what they realized was, these whole registration passwords, that's really a single point of failure. 'Cause if I can't recover my device, I'm in trouble. So they just did new extension to sort of what they were doing, which provides you with much more of like an iCloud vault that you can register that device in and other devices associated with that same identity. >> Get you to it if you have to. >> Exactly. >> I'm all over the place here, but I want to ask about ransomware. It may not be your wheelhouse. But back in the day, Jay, remember you used to cover tape. All the backup guys now are talking about ransomware. AWS mentioned it today and they showed a bunch of best practices and things you can do. Air gaps wasn't one of them. I was really surprised 'cause that's all every anybody ever talks about is air gaps and a lot of times that air gap could be a guess to the Cloud, I guess, I'm not sure. What are you guys seeing on ransomware apps? >> We've done a lot of great research around ransomware as a service and ransomware, and we just had some data come out recently, that I think in terms of spending and spend, and as a result of the Ukraine-Russia war, that ransomware assessments rate number one. And so it's something that we encourage, when we talk to vendors and in our services, in our publications that we write about taking advantage of those free strategic ransomware assessments, vulnerability assessments, as well and then security and training ranked very highly as well. So, we want to make sure that all of these areas are being funded well to try and stay ahead of the curve. >> Yeah, I was surprised to not see air gaps on the list, that's all everybody talks about. >> Well, the old model for air gaping in the land days, the novel days, you took your tapes home and put them in the sock drawer. (all laughing) >> Well, it's a form of air gap. (all laughing) >> Security and no one's going to go there and clean out. >> And then the internet came around and ruined it. >> Guys, final question we want to ask you, guys, we kind of zoom out, great commentary by the way. Appreciate it. We've seen this in many markets, a collection of tools emerge and then there's its tool sprawl. So cyber we're seeing the trend now where mon goes up on stage of all the ecosystems, probably other vendors doing the same thing where they're organizing a platform on top of AWS to be this super platform, for super Cloud capability by building a more platform thing. So we're saying there's a platform war going on, 'cause customers don't want the complexity. I got a tool but it's actually making it more complex if I buy the other tool. So the tool sprawl becomes a problem. How do you guys see this? Do you guys see this platform emerging? I mean tools won't go away, but they have to be easier. >> Yeah, we do see a consolidation of functionality and services. And we've been seeing that, I think through a 2020 Cloud security survey that we released that was definitely a trend. And that certainly happened for many companies over the last six to 24 months, I would say. And then platformization absolutely is something we talk and write about all the time so... >> Couple of years ago, I called the Amazon tool set an erector set because it really required assembly. And you see the emphasis on training here too, right? You definitely need to go to AWS University to be competent. >> It wasn't Lego blocks yet. >> No. >> It was erector set. >> Yeah. >> Very good distinction. >> Loose. >> And you lose a few. (chuckles) >> But still too many tools, right? You see, we need more consolidation. It's getting interesting because a lot of these companies have runway and you look at sale point at stock prices held up 'cause of the Thoma Bravo acquisition, but all the rest of the cyber stocks have been crushed especially the high flyers, like a Sentinel-1 one or a CrowdStrike, but just still M and A opportunity. >> So platform wars. Okay, final thoughts. What do you, think is happening next? What's your outlook for the next year or so? >> So, in the identity space, I'll talk about, Philip can cover Cloud for us. It really is more consolidation and more adoption of things that are beyond simple SSO. It was, just getting on the systems and now we really need to control what you're able to get to and who you are. And do it as transparently as we possibly can, because otherwise, people are going to lose productivity. They're not going to be able to get to what they want. And that's what causes the C-suite to say, "Wait a minute," DevOps, they want to update the product every day. Make it better. Can they do that or did security get in the way? People, every once in a while call security, the Department of No, right? >> They ditch it on stage. They want to be the Department of Yes. >> Exactly. >> Yeah. >> And the department that creates additional value. If you look at what's going on with B2C or CIAM, consumer oriented identity, that is all about opening up new direct channels and treating people like their old friends, not like you don't know them, you have to challenge them. >> We always say, you want to be in the boat together, it sinks or not. >> Yeah. Exactly. >> Philip I'm glad- >> Okay, what's your take? What's your outlook for the year? >> Yeah, I think, something that we've been seeing as consolidation and integration, and so companies looking at from built time to run time, investing in shift left infrastructure is code. And then also in the runtime detection, makes perfect sense to have both the agent and agent lists so that you're covering any of the gaps that might exist. >> Awesome, Jay Phillip, thanks for coming on "theCUBE" with IDC and sharing your- >> Oh, our pleasure- >> Perspective, commentary and insights and outlook. Appreciate it. >> You bet. >> Thank you. >> Okay, we've got the great direction here from IDC analyst here on the queue. I'm John Furrier, Dave Vellante. Be back more after this short break. (bright upbeat music)

Published Date : Jul 26 2022

SUMMARY :

We cover 'em all now and the summits. Great to be here. and the insights are fantastic. and Philip is more security in the Cloud. So the sec and op side is hot right now. and that being built into the So Jake, square the circle for me. and some of the other providers And you hear about a lot of those themes. the market was called Duo, And a lot of the consumers card is another challenge So what do you guys think of the upstream open source so that they don't experience that. and I message by the way, I love that one. the control plane aspects (Jay laughs) So that implies they're sharing that and some of the recent directives, and the thing is that and stuff that really help out a lot. the hybrid key, by the hybrid post quantum key agreement. that didn't have four words in it. the new NIST algos. So that was kind that used computers for and the term you hear so much Is that a combination of old identity management systems. about knowing the past and whatever, It wasn't a critical You kind of need it on the list, I mean, that's as a So the thing with passwordless is, But back in the day, Jay, and stay ahead of the curve. not see air gaps on the list, air gaping in the land days, Well, it's a form of air gap. Security and no one's going And then the internet of all the ecosystems, over the last six to I called the Amazon And you lose a few. 'cause of the Thoma Bravo acquisition, the next year or so? So, in the identity space, They ditch it on stage. And the department that We always say, you want of the gaps that might exist. and insights and outlook. analyst here on the queue.

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
DavePERSON

0.99+

Dave VellantePERSON

0.99+

AWSORGANIZATION

0.99+

Matt EastwoodPERSON

0.99+

AmazonORGANIZATION

0.99+

Jay BretzmannPERSON

0.99+

Jay PhillipPERSON

0.99+

CiscoORGANIZATION

0.99+

John FurrierPERSON

0.99+

AWS'ORGANIZATION

0.99+

FacebookORGANIZATION

0.99+

IBMORGANIZATION

0.99+

JayPERSON

0.99+

Philip BuesPERSON

0.99+

JohnPERSON

0.99+

PhilipPERSON

0.99+

15 zerosQUANTITY

0.99+

MicrosoftORGANIZATION

0.99+

threeQUANTITY

0.99+

Kirk CoofellPERSON

0.99+

each systemQUANTITY

0.99+

Quad trillionQUANTITY

0.99+

IDCORGANIZATION

0.99+

JakePERSON

0.99+

NISTORGANIZATION

0.99+

CrawfordPERSON

0.99+

next yearDATE

0.99+

twoQUANTITY

0.98+

OktaORGANIZATION

0.98+

CIAMORGANIZATION

0.98+

under 25%QUANTITY

0.98+

bothQUANTITY

0.98+

B2CORGANIZATION

0.98+

two typesQUANTITY

0.98+

Thoma BravoORGANIZATION

0.98+

OneQUANTITY

0.98+

CUBEORGANIZATION

0.98+

FidoORGANIZATION

0.97+

CybertruckORGANIZATION

0.97+

Department of NoORGANIZATION

0.97+

2020DATE

0.96+

RSATITLE

0.96+

TrillionQUANTITY

0.96+

AWS UniversityORGANIZATION

0.95+

35 yearsQUANTITY

0.95+

todayDATE

0.95+

Couple of years agoDATE

0.95+

oneQUANTITY

0.95+

this morningDATE

0.95+

SchmidtPERSON

0.94+

LegoORGANIZATION

0.94+

Boston, MassachusettsLOCATION

0.93+

single pointQUANTITY

0.92+

iCloudTITLE

0.91+

Ukraine-Russia warEVENT

0.9+

PhilipORGANIZATION

0.9+

Rack FORGANIZATION

0.89+

billions andQUANTITY

0.89+

one quick commentQUANTITY

0.88+

24 monthsQUANTITY

0.85+

MFATITLE

0.84+

two different research servicesQUANTITY

0.84+

four wordsQUANTITY

0.83+

Phillip Bues & Jay Bretzmann, IDC | AWS re:Inforce 2022


 

>>Okay, welcome back everyone. Cube's coverage here in Boston, Massachusetts, AWS reinforced 22, the security conference. It's ADOS big security conference. Of course, the cubes here, all the reinvent res re Mars reinforce. We cover 'em all now and the summits. I'm John. Very my host, Dave ante have IDC weighing in here with their analysis. We've got some great guests here, Jay Brisbane, research VP at IDC and Philip who research managed for cloud security. Gentlemen, thanks for coming on. Thank you. Appreciate it. Great >>To, to be here. I appreciate the got the full >>Circle, right? Just, security's more interesting >>Than storage. Isn't it? >>Dave, Dave and Jay worked together. This is a, a great segment. I'm psyched that you guys are here. We had Crawford and Matt Eastwood on at HPE discover a while back and really the, the, the data you guys are getting and the insights are fantastic. So congratulations to IDC. You guys doing great work. We appreciate your time. I wanna get your reaction to the event and the keynotes. AWS has got some posture and they're very aggressive on some tones. Some things that they didn't, we didn't hear. What's your reaction to the keynote, share your, your assessment. >>So, you know, I managed two different research services at IDC right now. They are both cloud security and identity and, and digital security. Right. And what was really interesting is the intersection between the two this morning, because every one of those speakers that came on had something to say about identity or least privileged access, or, you know, enable MFA, or make sure that you, you know, control who gets access to what and deny explicitly. Right? And it's always been a challenge a little bit in the identity world because a lot of people don't use MFA. And in RSA, that was another big theme at the RSA conference, right? MFA everywhere. Why don't they use it because it introduces friction and all of a sudden people can't get their jobs done. Right. And the whole point of a network is letting people on to get that data they want to get to. So that was kind of interesting, but, you know, as we have in the industry, this shared responsibility model for cloud computing, we've got shared responsibility for between Philip and I, I have done in the ke past more security of the cloud and Philip is more security in the cloud, >>So yeah. And it's, and now with cloud operation, super cloud, as we call it, you have on premises, private cloud coming back, or hasn't really gone anywhere, all that on premises, cloud operations, public cloud, and now edge exploding with new requirements. Yeah. It's really an ops challenge right now. Not so much dev. So the sick and op side is hot right now. >>Yeah. Well, we've made this move from monolithic to microservices based applications. And so during the keynote this morning, the announcement around the guard duty malware protection component, and that being built into the pricing of current guard duty, I thought was, was really key. And there was also a lot of talk about partnering in security certifications. Yeah. Which is also so very important. So we're seeing this move towards filling in that talent gap, which I think we're all aware of in the security industry. >>So Jake square, the circle for me. So Kirk, Coel talked about Amazon AWS identity, where does AWS leave off and, and companies like Okta or ping identity or crock pickup, how are they working together? Does it just create more confusion and more tools for customers? We, we have, we know the over word overused word of seamless. Yeah. Yeah. It's never seamless. So how should we think about that? >>So, you know, identity has been around for 35 years or something like that started with the mainframes and all that. And if you understand the history of it, you make more sense to the current market. You have to know where people came from and the baggage they're carrying, cuz they're still carrying a lot of that baggage. Now, when it comes to the cloud service providers, they're more an accommodation from the identity standpoint, let's make it easy inside of AWS to let you single sign on to anything in the cloud that they have. Right. Let's also introduce an additional MFA capability to keep people safer whenever we can and, you know, provide people the tools to, to get into those applications somewhat easily, right. While leveraging identities that may live somewhere else. So, you know, there's a whole lot of the world that is still active directory centric, right? There's another portion of companies that were born in the cloud that were able to jump on things like Okta and some of the other providers of these universal identities in the cloud. So, you know, like I said, you, if you understand where people came from in the beginning, you start to, to say, yeah, this makes sense. >>It's, it's interesting. You talk about mainframe. I, I always think about rack F you know, and I say, okay, who did what, when, where, yeah. And you hear about a lot of those themes. What, so what's the best practice for MFA? That's, that's non SMS based. Is it, you gotta wear something around your neck, is it to have sort of a third party authenticator? What are people doing that is that, that, that you guys would recommend? >>Yeah. One quick comment about adoption of MFA. You know, if you ask different suppliers, what percent of your base that does SSO also does MFA one of the biggest suppliers out there Microsoft will tell you it's under 25%. That's pretty shocking. Right? All the messaging that's come out about it. So another big player in the market was called duo. Cisco bought them. Yep. Right. And because they provide networks, a lot of people buy their MFA. They have probably the most prevalent type of MFA it's called push. Right. And push can be, you know, a red X and a green check mark to your phone. It can be a QR code, you know, somewhere, it can be an email push as well. So that is the next easiest thing to adopt after SMS. And as you know, SMS has been denigrated by N and others saying, you know, it's susceptible to man and middle attacks. >>It's built on a telephony protocol called SS seven. Yep. You know, predates anything. There's no certification, either side. The other real dynamic and identity is the whole adoption of PKI infrastructure. As you know, certificates are used for all kinds of things, network sessions, data encryption, well identity increasingly, and a lot of the, you know, consumers and especially the work from anywhere, people these days have access through smart devices. Right. And what you can do there is you can have an agent on that smart device, generate your private key and then push out a public key. And so the private key never leaves your device. That's one of the most secure ways to, so if your >>SIM card gets hacked, you're not gonna be as at vulnerable >>Or as vulnerable. Well, the SIM card is another, you know, challenge associated with the, the older waste. But yeah. Yeah. >>So what do you guys think about the open source connection and, and they, they mentioned it up top don't bolt on security implying shift left, which is embedding it in like sneak companies, like sneak do that, right. Container oriented, a lot of Kubernetes kind of cloud native services. So I wanna get your reaction to that. And then also this reasoning angle, they brought up kind of a higher level AI reasoning decisions. So open source and this notion of AI reasoning >>Automation. Yeah. And, and you see more open source discussion happening, right. So you, you know, you have your building maintaining and vetting of the upstream open source code, which is critical. And so I think AWS talking about that today, they're certainly hitting on a nerve as, you know, open source continues to proliferate around the automated reasoning. I think that makes sense. You know, you want to provide guiderails and you want to provide roadmaps and you wanna have sort of that guidance as to okay. What's the, you know, a correlation analysis of different tools and products. And so I think that's gonna go over really well. >>Yeah. One of the other, you know, key points of what open source is, everybody's in a multi-cloud world, right? Yeah. And so they're worried about vendor lockin, they want an open source code base so that they don't experience that. >>Yeah. And they can move the code around and make sure it works well on each system. Dave and I were just talking about some of the dynamics around data control planes. So yeah. They mentioned encrypt everything, which is great. And I message, by the way, I love that one, but oh. And he mentioned data at rest. I'm like, what about data in flight? Didn't hear that one. So one of the things we're seeing with super cloud, and now multi-cloud kind of, as destinations of that, is that in digital transformation, customers are leaning into owning their data flows. >>Yeah. >>Independent of say the control plane aspects of what could come in. This is huge implications for security, where sharing data is huge. Even Schmidt on Steve said we have billions and billions of things happening that we see things that no one else else sees. So that implies, they're >>Sharing quad trillion, >>Trillion, 15 zeros trillion. Yeah. 15 >>Zeros, 15 zeros. Yeah. >>So that implies, they're sharing that or using that, pushing that into something. So sharing's huge with cyber security. So that implies open data, data flows. What do, how do you guys see this evolving? I know it's kind of emerging, but it's becoming a, a nuanced point that's critical to the architecture. >>Well, I, yeah, I think another way to look at that is the sharing of intelligence and some of the recent directives, you know, from the executive branch, making it easier for private companies to share data and intelligence, which I think strengthens the cyber community overall, >>Depending upon the supplier. Right? Yeah. It's either an aggregate level of intelligence that has been, you know, anonymized or it's specific intelligence for your environment that, you know, everybody's got a threat feed, maybe two or three, right. Yeah. But back to the encryption point, I mean, I was working for an encryption startup for a little while. Right after I left IBM. And the thing is that people are scared of it. Right. They're scared of key management and rotation. And so when you provide, >>Because they might lose the key. >>Exactly. Yeah. It's like shooting yourself in the foot. Right. So that's when you have things like, you know, KMS services from Amazon and stuff, they really help out a lot and help people understand, okay, I'm not alone in this. >>Yeah. Crypto >>Owners, they call that hybrid, the hybrid key, they call the, what they call the, today. They call it the hybrid. >>What was that? The management service. Yeah. The hybrid. So hybrid HSM, correct. >>Yeah. What is that? What is that? I didn't, I didn't get that. I didn't understand what he meant by the hybrid post hybrid, post quantum key agreement. Right. That still notes >>Hybrid, post quantum key exchange, >>You know, AWS never made a product name that didn't have four words in it, >>But he did, but he did reference the, the new N algos. And I think I inferred that they were quantum proof or the claim it be. Yeah. And AWS was testing those. Correct. >>Yeah. >>So that was kind of interesting, but I wanna come back to identity for a second. Okay. So, so this idea of bringing traditional IAM and, and privilege access management together, is that a pipe dream, is that something that is actually gonna happen? What's the timeframe, what's your take on that? >>So, you know, there are aspects of privilege in every sort of identity back when, you know, it was only the back office that used computers for calculations, right? Then you were able to control how many people had access. There were two types of users, admins, and users, right? These days, everybody has some aspect of, >>It's a real spectrum, really >>Granular. You got the, you know, the C suite, the finance people, the DevOps, people, you know, even partners and whatever, they all need some sort of privileged access. And the, the term you hear so much is least privileged access. Right? Shut it down, control it. So, you know, in some of my research, I've been saying that vendors who are in the Pam space privilege access management space will probably be growing their suites, playing a bigger role, building out a stack because they have, you know, the, the expertise and the, and the perspective that says we should control this better. How do we do that? Right. And we've been seeing that recently, >>Is that a combination of old kind of antiquated systems meets for proprietary hyperscale or kind of like build your own? Cause I mean, Amazon, these guys, they Facebook, they all build their own stuff. >>Yes. They >>Do enterprises buy services from general purpose identity management systems. >>So as we were talking about, you know, knowing the past and whatever privileged access management used to be about compliance reporting. Yeah. Right. Just making sure that I knew who accessed what and could prove it. So I didn't fail in art. It wasn't >>A critical infrastructure item. >>No. And now these days, what it's transitioning into is much more risk management. Okay. I know what our risk is. I'm ahead of it. And the other thing in the Pam space was really session monitor. Right. Everybody wanted to watch every keystroke, every screen's scrape, all that kind of stuff. A lot of the new privilege access Mon management doesn't really require that it's nice to have feature. You kind of need it on the list, but is anybody really gonna implement it? That's the question. Right. And then, you know, if, if you do all that session monitor, does anybody ever go back and look at it? There's only so many hours in the day. >>How about passwordless access? You know? Right. I've heard people talk about that. Yeah. I mean, that's as a user, I can't wait, but >>It's somewhere we want to all go. Yeah. Right. We all want identity security to just disappear and be recognized when we log in. So the, the thing with password list is there's always a password somewhere and it's usually part of a registration, you know, action. I'm gonna register my device with a username password. And then beyond that, I can use my biometrics. Right. I wanna register my device and get a private key that I can put in my enclave. And I'll use that in the future. Maybe it's gotta touch ID. Maybe it doesn't. Right. So even though there's been a lot of progress made, it's not quote unquote, truly passwordless, there's a group industry standards group called Fido. Right. Which is fast identity online. And what they realized was these whole registration passwords. That's really a single point of failure. Cuz if I can't recover my device, I'm in trouble. Yeah. So they just did a, a new extension to sort of what they were doing, which provides you with much more of a, like an iCloud vault, right. That you can register that device in and other devices associated with that same iPad that you can >>Get you to it. If you >>Have to. Exactly. I had >>Another have all over the place here, but I, I want to ask about ransomware. It may not be your wheelhouse. Yeah. But back in the day, Jay, remember you used to cover tape. All the, all the backup guys now are talking about ransomware. AWS mentioned it today and they showed a bunch of best practices and things you can do air gaps. Wasn't one, one of 'em. Right. I was really surprised cuz that's all, every anybody ever talks about is air gaps. And a lot of times that air gaps that air gap could be a guess to the cloud. I guess I'm not sure. What are you guys seeing on ransomware >>Apps? You know, we've done a lot of great research around ransomware as a service and ransomware and, and you know, we just had some data come out recently that I think in terms of spending and, and spend and in as a result of the Ukraine, Russia war, that ransomware assessments rate number one. And so it's something that we encourage, you know, when we talk to vendors and in our services, in our publications that we write about taking advantage of those free strategic ransomware assessments, vulnerability assessments, right. As well, and then security and training ranked very highly as well. So we wanna make sure that all of these areas are being funded well to try and stay ahead of the curve. >>Yeah. I was surprised that not the air gaps on the list, that's all everybody >>Talks about. Well, you know, the, the old model for air gaping in the, the land days, the Noel days, you took your tapes home and put 'em in the sock drawer. >>Well, it's a form of air gap security and no one's gonna go there >>Clean. And then the internet came around >>Guys. Final question. I want to ask you guys, we kind zoom out. Great, great commentary by the way. Appreciate it. As the, we've seen this in many markets, a collection of tools emerge and then there's it's tool sprawl. Oh yeah. Right? Yeah. So cyber we're seeing trend now where Mon goes up on stage of all the E probably other vendors doing the same thing where they're organizing a platform on top of AWS to be this super platform. If you super cloud ability by building more platform thing. So we're saying there's a platform war going on, cuz customers don't want the complexity. Yeah. I got a tool, but it's actually making it more complex if I buy the other tool. So the tool sprawl becomes a problem. How do you guys see this? Do you guys see this platform emerging? I mean, tools won't go away, but they have to be >>Easier. Yeah. We do see a, a consolidation of functionality and services. And we've been seeing that, I think through a 20, 20 flat security survey that we released, that that was definitely a trend. And you know, that certainly happened for many companies over the last six to 24 months, I would say. And then platformization absolutely is something we talk 'em right. About all the time. So >>More M and a couple of years ago, I called the, the Amazon tool set in rector set. Yeah. Because it really required assembly. Yeah. And you see the emphasis on training here too, right? Yeah. You definitely need to go to AWS university to be competent. It >>Wasn't Lego blocks yet. No, it was a rector set. Very good distinction rules, you know, and, and you lose a few. It's >>True. Still too many tools. Right. You see, we need more consolidation. That's getting interesting because a lot of these companies have runway and you look, you look at sale point, its stock prices held up cuz of the Toma Bravo acquisition, but all the rest of the cyber stocks have been crushed. Yeah. You know, especially the high flyers, like a Senti, a one or a crowd strike, but yeah, just still M and a opportunity >>Itself. So platform wars. Okay. Final thoughts. What do you thinks happening next? What's what's your outlook for the, the next year or so? >>So in the, in the identity space, I'll talk about Phillip can cover cloud force. You know, it really is more consolidation and more adoption of things that are beyond simple SSO, right. It was, you know, just getting on the systems and now we really need to control what you're able to get to and who you are and do it as transparently as we possibly can because otherwise, you know, people are gonna lose productivity, right. They're not gonna be able to get to what they want. And that's what causes the C-suite to say, wait a minute, you know, DevOps, they want to update the product every day. Right. Make it better. Can they do that? Or did security get in the way people every once in a while I'll call security, the department of no, right? Yeah. Well, >>Yeah. They did it on stage. Yeah. They wanna be the department of yes, >>Exactly. And the department that creates additional value. If you look at what's going on with B to C or C IAM, consumer identity, that is all about opening up new direct channels and treating people like, you know, they're old friends, right. Not like you don't know 'em you have to challenge >>'em we always say you wanna be in the boat together. It sinks or not. Yeah. Right. Exactly. >>Phillip, >>Okay. What's your take? What's your outlook for the year? >>Yeah. I think, you know, something that we've been seeing as consolidation and integration, and so, you know, companies looking at from built time to run time investing in shift left infrastructure is code. And then also in the runtime detection makes perfect sense to have both the agent and agentless so that you're covering any of the gaps that might exist. >>Awesome. Jerry, Phillip, thanks for coming on the queue with IDC and sharing >>Your oh our pleasure perspective. >>Commentary, have any insights and outlook. Appreciate it. You bet. Thank you. Okay. We've got the great direction here from IDC analyst here on the queue. I'm John for a Dave, we're back more after this shirt break.

Published Date : Jul 26 2022

SUMMARY :

We cover 'em all now and the summits. I appreciate the got the full I'm psyched that you guys are here. or, you know, enable MFA, or make sure that you, you know, And it's, and now with cloud operation, super cloud, as we call it, you have on premises, And so during the keynote this morning, the announcement around the guard duty malware protection So Jake square, the circle for me. to keep people safer whenever we can and, you know, provide people the tools to, I, I always think about rack F you know, And as you know, SMS has been denigrated by N and others saying, you know, and a lot of the, you know, consumers and especially the work from anywhere, Well, the SIM card is another, you know, challenge associated with the, So what do you guys think about the open source connection and, and they, they mentioned it up top don't you know, you have your building maintaining and vetting of the upstream open source code, And so they're worried about vendor lockin, they want an open source code base so And I message, by the way, I love that one, but oh. Independent of say the control plane aspects of what could come in. Yeah. 15 Yeah. What do, how do you guys see this evolving? been, you know, anonymized or it's specific intelligence for your environment So that's when you have They call it the hybrid. Yeah. I didn't understand what he meant by the hybrid post hybrid, And I think I inferred So that was kind of interesting, but I wanna come back to identity for a second. So, you know, there are aspects of privilege in every sort of identity back when, You got the, you know, the C suite, the finance people, the DevOps, people, you know, Cause I mean, Amazon, these guys, they Facebook, So as we were talking about, you know, knowing the past and whatever privileged access management used And then, you know, Yeah. somewhere and it's usually part of a registration, you know, action. Get you to it. I had But back in the day, Jay, remember you used to cover tape. And so it's something that we encourage, you know, the Noel days, you took your tapes home and put 'em in the sock drawer. And then the internet came around I want to ask you guys, we kind zoom out. And you know, that certainly happened for many companies over the And you see the emphasis on training here you know, and, and you lose a few. runway and you look, you look at sale point, its stock prices held up cuz of the Toma Bravo acquisition, What do you thinks happening next? the C-suite to say, wait a minute, you know, DevOps, they want to update the product every day. Yeah. direct channels and treating people like, you know, they're old friends, 'em we always say you wanna be in the boat together. What's your outlook for the year? and so, you know, companies looking at from built time to run time investing in shift analyst here on the queue.

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
DavePERSON

0.99+

Jay BretzmannPERSON

0.99+

AWSORGANIZATION

0.99+

AmazonORGANIZATION

0.99+

IBMORGANIZATION

0.99+

Matt EastwoodPERSON

0.99+

Jay BrisbanePERSON

0.99+

JerryPERSON

0.99+

JayPERSON

0.99+

CiscoORGANIZATION

0.99+

FacebookORGANIZATION

0.99+

PhilipPERSON

0.99+

20QUANTITY

0.99+

JohnPERSON

0.99+

PhillipPERSON

0.99+

two typesQUANTITY

0.99+

Phillip BuesPERSON

0.99+

iPadCOMMERCIAL_ITEM

0.99+

IDCORGANIZATION

0.99+

billionsQUANTITY

0.99+

PhilipORGANIZATION

0.99+

Jake squarePERSON

0.99+

threeQUANTITY

0.99+

MicrosoftORGANIZATION

0.99+

StevePERSON

0.99+

twoQUANTITY

0.99+

each systemQUANTITY

0.99+

KirkPERSON

0.99+

CoelPERSON

0.99+

under 25%QUANTITY

0.98+

todayDATE

0.98+

next yearDATE

0.98+

bothQUANTITY

0.98+

15QUANTITY

0.97+

OktaORGANIZATION

0.97+

CrawfordPERSON

0.96+

oneQUANTITY

0.96+

Boston, MassachusettsLOCATION

0.96+

Toma BravoORGANIZATION

0.95+

single pointQUANTITY

0.95+

two different research servicesQUANTITY

0.94+

SS sevenOTHER

0.94+

FidoORGANIZATION

0.94+

ZerosQUANTITY

0.94+

35 yearsQUANTITY

0.94+

this morningDATE

0.93+

24 monthsQUANTITY

0.93+

MFATITLE

0.92+

couple of years agoDATE

0.92+

TrillionQUANTITY

0.92+

2022DATE

0.9+

ADOSEVENT

0.9+

One quick commentQUANTITY

0.89+

SchmidtPERSON

0.88+

15 zerosQUANTITY

0.87+

Russia warEVENT

0.86+

OneQUANTITY

0.84+

RSATITLE

0.83+

four wordsQUANTITY

0.8+

singleQUANTITY

0.76+

20 flatQUANTITY

0.75+

NoelEVENT

0.75+

LegoORGANIZATION

0.73+

Rakesh Narasimha, Anitian & Aditya Muppavarapu, AWS Partner Network | AWS Startup Showcase


 

(upbeat music) >> Hello and welcome today's session of the cube presentation of the 80 best startup showcase. The next big thing in security featuring Anitian for the security track. I'm your host John Furrier. We're here with the CEO of Anitian, Rakesh Narasimhan, and Aditya Muppavarapu global segment leader of Dev ops for 80 minutes partner network, Rakesh, Aditya, Thanks for coming on. Appreciate it. >> Thank you very much, John. Pleasure is mine. >> So this is the track session. We're going to get into the, the into the details on the leadership of digital transformation and dev sec ops automation, cloud security and compliance. So let's get started. But first Rakesh, we last talked you guys had some awards, RSA conference, 2021, virtual. You guys got some serious awards. Give us the update. >> Yeah, thank you very much, John. Yeah, we were, you know, humbled to be recognized. You know, industry recognition is always a great thing. We deliver value for customers and the industry is recognizing it. So at the RSA conference, we got seven different awards you know, very excited that we were chosen for, you know publishers choice and security company of the year editor's choice and blood security and heart company in cloud security automation. So really thrilled about the recognition thanks. >> Awesome. Seven awards. I mean, RSA is obviously a show that's in transition itself. They're transforming no longer part of Dell technologies now kind of on their own kind of speaks to the wave we're in. So congratulations on the success. They're hot startup here in security track. Give us a quick overview what you guys are enabling because this transformation is everywhere. It's in every sector, it's in every vertical dev sec ops shifting left, you know day two operations get ops. All. This is all talking to one thing, developer, productivity programmable infrastructure with security. Rakesh give us a quick overview of >> Yeah. Exactly. Right. John, I think there's a big shift happening obviously to the cloud and, you know, affects every one of our lives in productivity in enterprise applications, consumers you name it. There's a huge change happening, but central to that theme is security. And so it's one of the areas we focus on Anitian is the fastest way for both existing and new applications to be developed in the cloud. And so we make sure that you can get there fastest time to value and time to revenue pretty quickly by providing the best secure and compliance environment for you. That's really the core of what we do as a company. And we look forward to helping all of our customers and the industry >> Aditya you're a global segment lead at AWS partner network. You seeing on successful companies, you've got a winner here, obviously a success story. I want to get your take on this because this is a trend in cloud native scale, you know, heart, you know horizontally scalable, large scale, but shifting left, okay. Get ops big topics where code is being inspected in real time. People want automation. So I've got to ask you, what does shift left mean to to being out there and this in the security world? What does that mean? >> So, instead of applying your security and compliance guard rails only in production, we also need to apply them across your application development and delivery cycles. Instead of having one gate that becomes a bottleneck we should have multiple checkpoints at various stages. This provides a fast feedback for the developers while they're still in the context of developing that feature. So it's easier and less expensive fix the issues and what it is not is this doesn't mean you move all your focus to dev and ignore production. It also doesn't mean developers are now responsible for security and you can get rid of your security teams. We needed a process and a mechanism in place to leverage the expertise off the security teams and offer their services to the developers very early on in the development cycles, thereby enabling and empowering developers to write secure and compliant code >> I mean, to me not to put my old school hat on, but it's, you know I think to me, I view it as security at the point of coding right at the point of, I don't want to say point of sale but the point of writing the code and the old days it used to be like a patches and getting updates and provisioned into, into production. Same that kind of concept. But as a developer, that's kind of the focus is getting the latest knowledge either through tools and technologies to make it easier for me as a developer to inject at the point of code. Is that right? >> That's right. Yeah. >> So what makes Anitian so different and what's successful within AWS? That's, what's the why the success there? Can you share with us why they're so unique in AWS? >> So I think the biggest case for that is really you know, security, oftentimes security is thought of as an impediment sometimes actually believe it or not. So the configuration, the management, the deployment all of that, you got to be able to do and you got to be able to do that at scale. The great thing about the cloud at is scale and a big portion of that is automation. So what we at Anitian have done is taken that lifecycle of taking, you know applications on a variety of states. If you will, if you're trying to get to production you're trying to do one of two things. You're either you're trying to get into a compliance standard, like Fed Ramp you want a very predictable process, or you're just trying to get an application secure pretty quickly. So how can you do either one of those things becomes the challenge and we help you do that by having a pre-engineered environment where configuration defining deployment all that becomes very consistent and very predictable which means we've automated it in a way that it can scale. You can sort of almost have this regularly happening and not just one application with multiple applications for any company. That is, I think the biggest obstacle that has happened for a lot of folks in the enterprise for sure, to try to get to production and keep that cycle going continuously. And we help with that in a big way. That's one of the reasons why we're having a lot of adoption customers working with partners of course and getting industry recognition for it. >> Yeah. I mean, this is one of the benefits of cloud. I want to get you guys both reaction to this, where as things get going, it's kind of like that, you're you you got to take advantage. You can take advantage of all these solutions. So how many of his customer, I want to look for solutions that help me move the ball forward, not backwards right? So, or help me move the ball forward without building anything that I don't need or that's already been built. So here it sounds like if I get this right Anitian is saying, Hey if you're an Amazon customer I can accelerate you with Fed Ramp compliance. So you don't have to spend all these cycle times getting ready or hiring or operationalizing it is that right? I mean, is that the value proposition? >> They're very accurate, John. So what happens is, you know, we're working with Amazon web services, who's really innovated quite a bit in building all the building blocks, if you will. And so, you know, we're standing on the shoulders of giants if you will, to basically get the max level of automation and acceleration happen. So that just like customers have gotten used to not having to buy servers, but guide, compute and storage. If you will, now they're able to secure and also become compliant with the services that we offer. That level of acceleration I think is needed. If you believe that there's going to be a lot more cloud applications, lot more cloud. If you're going to achieve scale, you've got to automate. And if you want to automate, but secure as well you need a mechanism to doing that. That's really where Anitian comes in, if you will. >> Yeah. And I think Fedramp to me is just a great low hanging fruit example because everyone wants to get into the public sector market. They know how hard it is. Kind of like, you know, we want to do it, but stand in line we've got to get some resources. I'm not kind of get that. But the question I want to get to you Rakesh and Aditya is the bigger picture, which is, as you said more cloud applications are coming. So customers in the enterprise have, have or are building fast dev ops teams accelerate the security paradigm. How do you help those, those folks? Because that's really kind of where the action's going. The puck is going to go there too. Right? So beyond Fed Ramp there's other things >> Right? So I think, I think the way we approached it is really, there's like at least two different sets of customers, right? In the federal market itself. You just think about a commercial SAS companies who are trying to enter the, the, the, the the public sector market. Well, you need to clear a standard like Fed Ramp. So we're the fastest way to not just complete it but be able to start selling and producing revenue. That'd be market per using that functionality. If you will, to that market. Similarly, there's a lot of public sector organizations who are trying to move to the cloud because they have traditionally developed applications and architectures based on what they've done over the last 20 plus years. Well guess what, they're also trying to migrate. So how do you help both commercial companies as well as public sector companies transition, if you will to the cloud in a secure way, but also meeting a public standard. We're helping both those organizations to do that migration and that journey if you will, but it's premised on with pre-engineered it, it's the fastest way for you to get there for you to be able to provide your capability and functionality to the larger marketplace. That's one of the main reasons why I think the productivity jump is enormously high because that's how you get to larger marketplace, if you will, to serve that market >> Aditya. So they have to change your title from global segment leader, dev ops to dev sec ops 80 of his partner network here with this solution in a way it's kind of becoming standard. >> Yeah. Security is getting him embedded into all of your development and delivery life cycle. So that dev sec Ops is becoming more and more critical with customers migrating to the cloud and modernizing their applications. >> How much has automation playing into this? Because one of the things we're talking about fueling digital transformation is the automation component of the security piece here Rakesh How important is automation and what how do you set yourself up for that to be successful? >> That's big question. I think that the big key to that is automation. I think automation is there in general in the cloud space. People expect it, frankly. But I think that the key thing what we have done is pre-integrated not just our platform but a variety of the partner ecosystem are on AWS. And so when a customer is looking forward to taking an application and going to the cloud they're not just getting functionality from us and AWS but also a lot of partner functionality around it so that they don't have to build it. Remember this discussion we had earlier about how do you jumpstart that? Well, it's, it's, it's really, instead of them having the best of breed assemble we've pre done it for them, which means it's predictable, it's consistent it's configured correctly. They can rely on it. That allows us to be able to help them move faster which means they can go serve larger markets and obviously make money around it. >> Rakesh, I got to follow up on that and ask you specifically around this business model. Obviously cloud has become great service. Everyone kind of knows that and then kind of sees the edge coming next and all these other issues that are going to provide more opportunities. But I got to ask you for your company what industries and business models are you disrupting? >> Yeah, I think primarily to we're a classic example of software eating the world, right? Primarily what happens is most of the folks that certainly in the compliance arena are really trying to figure out how to do it themselves, right? And then that's primarily the group of people who are sort of trying to figure that out. And then there's a class of who do consulting who are trying to consult with you and what you should do. And we have taken a very software oriented approach built on Amazon that we will not only help you fast forward that but also, you know, get you compliant but also keep you compliant because it's a cycle much like in other industries you've seen there used to be a time when people that email and they used to run email servers and ran the email servers and backups and things of that nature that transitioned over time where people procure that service from somebody else. And it's still a secure, it's still a scalable and they can rely on that service without having to be in that business if you will. So we see us disrupting the consulting and do it yourself world to actually providing a dependable service out there that you can rely on for security and compliance. >> Awesome. Aditya, I got to ask you on the Amazon side obviously you see a lot of it there. What are some of the challenges that you see with security? >> One of the main challenges I see that is that the landscape itself is rapidly changing. As customers are migrating to the cloud and modernizing what used to be a simple monolithic application running on a server and a office or a data center is now distributed hybrid and spans across development practices like microservices managed services, packaged applications, et cetera and also in the infrastructure platform choices have dramatically increased to from on-prem to call data centers, to edge computing, IOT VMs containers, serverless a lot more options. All these leads to more complexity and it increased the number of threat vectors exponentially though this advancement was great from a usability perspective. It now created a whole slew of challenges. This, this is complex. It's very hard to keep up. It's not something you set and forget. One needs to make sure you have the right guardrails in place to make sure you're continuously compliant with with your own policies are also with regulatory compliance frameworks that are needed for your business. Like GDPR, PCI, DSS, Nast, HIPAA Sox, Fed Ramp, et cetera >> For Rakesh. We're specifically on the dev ops efficiency with Amazon. What do you guys, what's your top few value proposition points? You say >> Biggest value proposition honestly is keeping and maintaining security while you're in compliance at scale with speed. I think those are big issues for companies. Like if you, if you're a company you're trying to be in the cloud, you want to enter the federal market. For example, you got to get that quickly. So what could take a lot of money? 18 - 24 months, our prawn malleable we've just completely automated back. And so within a quarter, depending on quickly the two organizations can work. We can get you into the marketplace. That that speed is of enormous value to companies. But also to remember that as Aditya pointed out there's a lot of complexity in the kind of architecture that is evolved but we have to feel like people like in the issue of what we can help customers would is as much as you take advantage of all the cloud style architecture providing the simplicity of providing security consistently and providing compliance consistently quickly. I think there'll always be a value for that because people are always trying to get faster and cheaper quicker. And I think we're able to do that. But remember, security is not just about fast. It's got to be secure, right? We got to be effective, not just efficient but I think that's a big value prop that we're able to bring to the table on AWS. >> Well I want to go, I got you here. I'll see what showcasing you guys as the hot startup who is your customer on Amazon? I'll see, you have customers that sell in marketplace for fedramp. That's a huge, that's the people who are in business to sell software but also other enterprises as well. Right? So could you just quickly break down your customers? And then when do they know it's time to call a Anitian? >> Yeah, so we have two large groups of customers. If you will. Certainly the commercial segment, as well as in the public sector and the commercial side, you have lots of companies in the cyber security enterprise collaboration as a little robotic process automation, all those categories of companies in the commercial environment they're trying to enter the public sector federal market to go sell their services. Well, you have to get compliant. We are the fastest path to get you there time to value type of revenue we can accomplish for you. That's a group of customers we, we have in market. And then we have the other side, which is a lot of government agencies who are themselves trying to migrate to the cloud. So if you're trying to get your applications for sure once on hybrid or on-premise, and you're trying to go to the AWS cloud, well, we're a great way for you to have a pre-engineered environment into which you can move in. So not only are you secure it's, pre-built, it can scale to the cloud that you're in front of migrate to. So we have both those particular sites if you will, of the marketplace. And then in market, we have lots of agencies, big and small and the government side, but also all these categories in the commercial side that I mentioned >> For Rakesh, Anitian's helping a lot of companies sell them to the public sector market. How big is the public sector federal market >> Right? Yeah. Billions of dollars. More than $250 billion is what people say but it's a very large market, but, but remember it's any any commercial SAS company who's trying to go into that federal market is a target market. We can help that customer get in into that market. >> And just real quick, their choice alternative to not working with the Anitian is what? months the pain. And what's the heavy lift as Andy Jassy would say the heavy lifting, undifferentiated lifting a lot of paperwork, a lot of hoops to jump through. Good. Can you just paint a picture of the paths with, and without >> There's three key areas that I think customers or, you know companies have to do, A. they have to understand the standard B. They have to really figure out the technology the integration, the partners, and the platform itself. It's a lift to basically get all of that together and then actually produce the documentation produce all the configuration and in a repeatable way. And that's just to get one application up there. Well, guess what? Not only do you need to get that up there you need to keep that compliant. And then our future standards come in. You need to go upgrade to that. So the best way for me to describe that is either you you come to the Anitian and we make that age just a service that is subscribed to to keep you compliant and grow or you can try to build it yourself, or you try to go get consulting companies to tell you what to do. You still have to do the work. So those are your sort of choices, if you will, which is one of the reasons why we're enjoying the growth we are because we're making it easy and productive for for companies to get there faster. >> Aditya, I want to get to you real quick. Obviously AWS partnering, they're also known as APN. You guys see some of the best hot startups. They all kind of have the same pattern like this. They do something that's hard. They make it easier. They go faster, more. Cost-effective what's the pattern in this cloud-scale world as startups. We're going to be featuring, you know, every as much as we can hot startups coming out of your network, there's a pattern here. What would you say? They are? Well as the DevOps obviously cloud native, besides iterate, move faster. What's the pattern you're seeing for the successful companies. >> It's like, like Andy's says, it's figuring out how to continuously reinvent yourself is the key to stay successful in this market. >> Awesome. For Rakesh, real big success. Congratulations on your awards. I got to ask you, we're asking all the, all the companies this question, what is your defining contribution to the future of cloud scale? >> Great question. I think when I think about what can be accomplished in the future, not just in the past, I think cloud is a huge phenomenon that has completely up-ended the architecture for all sorts of things commercial government, you know, consumer and enterprise. If you will, I would think we would be humbly the people who will ensure that lots of B2B companies and government organizations are able to move to the cloud and are able to be secure and compliant because I believe that there'll be more and more of that happening in the cloud. And the more that is available, just like the commercial world is takes advantage of all those features. I feel like public government organizations also can accomplish the same things very quickly because of folks like us, which means you have a larger segment of population that you can support. That's only going to make the planet more successful. I'm a big optimist when it comes to tech. I know there's a lot of folks who would look down upon tech or I'll think about it as not great. I'm a very big optimist around tech improving people's lives. And I think we have our own humble role in enabling that to happen in the security and compliance >> Well, anything, in my opinion I'm really a big fan of your work and your team. Anything that could bring great innovation into the public sector faster and more effective as good win for society. So I think it's a great mission. Thanks for, for sharing and congratulations on your awards and thanks for being part of our 80 best startup showcase. Appreciate it Rakesh thank you >> Thank you. >> Okay. This is the cube coverage of 80 startup showcase. I'm John for your host of the cube. This is the next big thing in security Anitian in the security track. Thanks for watching. (Up beat music)

Published Date : Jun 24 2021

SUMMARY :

of the cube presentation of Thank you very much, into the details on the leadership of the year editor's kind of speaks to the wave we're in. to the cloud and, you know, So I've got to ask you, and offer their services to the and the old days That's right. all of that, you got to be able to do I mean, is that the value proposition? on the shoulders of giants if you will, So customers in the enterprise have, have it's the fastest way for you to get there to change your title to the cloud and modernizing and going to the cloud But I got to ask you for your company and what you should do. Aditya, I got to ask One needs to make sure you have the We're specifically on the dev ops of all the cloud style That's a huge, that's the people who are We are the fastest path to get you there of companies sell them to the We can help that customer get in of the paths with, and without to keep you compliant and grow get to you real quick. the key to stay successful in this market. I got to ask you, we're asking all the, of population that you can support. into the public sector faster Anitian in the security track.

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
JohnPERSON

0.99+

RakeshPERSON

0.99+

AmazonORGANIZATION

0.99+

AWSORGANIZATION

0.99+

Andy JassyPERSON

0.99+

Aditya MuppavarapuPERSON

0.99+

Rakesh NarasimhaPERSON

0.99+

AnitianPERSON

0.99+

oneQUANTITY

0.99+

18QUANTITY

0.99+

AWS Partner NetworkORGANIZATION

0.99+

More than $250 billionQUANTITY

0.99+

Rakesh NarasimhanPERSON

0.99+

SASORGANIZATION

0.99+

AndyPERSON

0.99+

AdityaPERSON

0.99+

bothQUANTITY

0.99+

Billions of dollarsQUANTITY

0.99+

two organizationsQUANTITY

0.99+

John FurrierPERSON

0.99+

one applicationQUANTITY

0.98+

AnitianORGANIZATION

0.98+

80 minutesQUANTITY

0.98+

GDPRTITLE

0.97+

OneQUANTITY

0.97+

RSAEVENT

0.97+

APNORGANIZATION

0.96+

one gateQUANTITY

0.96+

todayDATE

0.96+

Seven awardsQUANTITY

0.95+

one thingQUANTITY

0.93+

three key areasQUANTITY

0.92+

two large groupsQUANTITY

0.92+

DSSTITLE

0.92+

DellORGANIZATION

0.91+

80 best startup showcaseQUANTITY

0.9+

seven different awardsQUANTITY

0.9+

AdityaORGANIZATION

0.89+

2021DATE

0.88+

two thingsQUANTITY

0.88+

24 monthsQUANTITY

0.88+

80 startupQUANTITY

0.87+

80 best startup showcaseQUANTITY

0.83+

firstQUANTITY

0.83+

RSA conferenceEVENT

0.81+

two different setsQUANTITY

0.8+

last 20 plus yearsDATE

0.8+

FedORGANIZATION

0.77+

Mark Nunnikhoven | CUBE Conversation May 2021


 

(upbeat music) >> Hello, welcome to theCUBE studios of Palo Alto California for RSA conference keynote coverage and conference coverage. I'm Sean for your host of theCUBE. We're breaking down the keynote of RSA day one kickoff. We had Mark Nunnikhoven, who's the distinguished cloud strategist at Lacework. Mark former cube alumni and expert and security has been on many times before, Mark great to see you. Thanks for coming on and helping me break down RSA conference 2021 virtual this year. Thanks for joining. >> Happy to be here. Thanks for having me John. >> You know, one of the things Mark about these security conferences is that interesting, RSA was the last conference we actually did interviews physically face to face and then the pandemic went down and it was a huge shutdown. So we're still virtual coming back to real life. So and they're virtual this year, so kind of a turn of events, but that was kind of the theme this year in the keynote. Changing the game on security, the script has been flipped, connectivity everywhere, security from day one being reinvented. Some people were holding onto the old way some people trying to get on there, on the future wave. Clearly you got the laggards and you've got the innovators all trying to kind of, you know, find their position. This has been obvious in this keynote. What's your take? >> Yeah and that was exactly it. They use that situation of being that last physical security conference, somewhat to their advantage to weave this theme of resiliency. And it's a message that we heard throughout the keynote. It's a message we're going to hear throughout the week. There's a number of talks that are tying back to this and it really hits at the core of what security aims to do. And I think aims is really the right word for it because we're not quite there yet. But it's about making sure that our technology is flexible that it expands and adapts to the situations because as we all know this year, you know basically upended everything we assumed about how our businesses were running, how our communities and society was running and we've all had to adapt. And that's what we saw at the keynote today was they acknowledged that and then woven into the message to drive that home for security providers. >> Yeah and to me one of the most notable backdrops to the entire thing was the fact that the RSA continues to operate from the sell out when Dell sold them for alright $2 billion to a consortium, private privately private equity company, Symphony Technology Group. So there they're operating now on their own. They're out in the wild, as you said, cybersecurity threats are ever increasing, the surface area has changed with cloud native. Basically RSA is a 3000 person startup basically now. So they've got secure ID, the old token business we all have anyone's had those IDs you know it's pretty solid, but now they've got to kind of put this event back together and mobile world Congress is right around the corner. They're going to try to actually have a physical event. So you have this pandemic problem of trying to get the word out and it's weird. It's kind of, I found it. It's hard to get your hands around all the news. >> It is. And it's, you know, we're definitely missing that element. You know, we've seen that throughout the year people have tried to adapt these events into a virtual format. We're missing those elements of those sorts of happenstance run-ins I know we've run into each other at a number of events just sort of in the hall, you get to catch up, but you know as part of those interactions, they're not just social but you also get a little more insight into the conference. Hey, you know, did you catch this great talk or are you going to go catch this thing later? And we're definitely missing that. And I don't think anyone's really nailed this virtual format yet. It's very difficult to wrap your head around like you said, I saw a tweet online from one InfoSec analyst today. It was pointed out, you know, there were 17 talks happening at the same time, which you know, in a physical thing you'd pick one and go to it in a virtual there's that temptation to kind of click across the channels. So even if you know what's going on it's hard to focus in these events. >> Yeah the one conference has got a really good I think virtual platform is Docker con, they have 48 panels, a lot of great stuff there. So that's one of more watching closest coming up on May 27. Check that one out. Let's get into this, let's get into the analysis. I really want to get your thoughts on this because you know, I thought the keynote was very upbeat. Clearly the realities are presenting it. Chuck Robbins, the CEO of Cisco there and you had a bunch of industry legends in there. So let's start with, let's start with what you thought of Rowan's keynote and then we'll jump into what Chuck Robbins was saying. >> Sure yeah. And I thought, Rohit, you know, at first I questioned cause he brought up and he said, I'm going to talk about tigers, airplanes and sewing machines. And you know, as a speaker myself, I said, okay, this is either really going to work out well or it's not going to work out at all. Unfortunately, you know, Rohit head is a professional he's a great speaker and it worked out. And so he tied these three examples. So it was tiger king for Netflix, at World War II, analyzing airplane damage and a great organization in India that pivoted from sewing into creating masks and other supplies for the pandemic. He wove those three examples through with resiliency and showed adaptation. And I thought it was really really well done first of all. But as a cloud guy, I was really excited as well that that first example was Netflix. And he was referencing a chaos monkey, which is a chaos engineering tool, which I don't think a lot of security people are exposed to. So we use it very often in cloud building where essentially this tool will purposely blow up things in your environment. So it will down services. It will cut your communications off because the idea is you need to figure out how to react to these things before they happen for real. And so getting keynote time for a tool like that a very modern cloud tool, I thought was absolutely fantastic. Even if that's, you know, not so well known or not a secret in the cloud world anymore, it's very commonly understood, but getting a security audience exposure to that was great. And so you know, Rohit is a pro and it was a good kickoff and yeah, very upbeat, a lot of high energy which was great for virtual keynote. Cause sometimes that's what's really missing is that energy. >> Yeah, we like Rohit too. He's got some, he's got charisma. He also has his hand on the pulse. I think the chaos monkey point you're making is as a great call out because it's been around the DevOps community. But what that really shows I think and puts an exclamation point around this industry right now is that DevSecOps is here and it's never going away and cloud native and certainly the pandemic has shown that cloud scale speed data and now distributed computing with the edge, 5G has been mentioned, as you said, this is a real deal. So this is DevOps. This is infrastructure as code and security is being reinvented in it. This is a killer theme and it's kind of a wake-up call. What's your reaction to that? what's your take? >> Yeah, it absolutely is a wake-up call and it actually blended really well into a Rohit second point, which was around using data. And I think, you know, having these messages put out to the, you know, what is the security conference for the year always, is really important because the rest of the business has moved forward and security teams have been a little hesitant there, we're a little behind the times compared to the rest of the business who are taking advantage of these cloud services, taking advantage of data being everywhere. So for security professionals to realize like hey there are tools that can make us better at our jobs and make us, you know, keep or help us keep pace with the business is absolutely critical because like you said, as much as you know I always cringe when I hear the term DevSecOps, it's important because security needs to be there. The reason I cringe is because I think security should be built into everything. But the challenge we have is that security teams are still a lot of us are still stuck in the past to sort of put our arms around something. And you know, if it's in that box, I'm good with it. And that just doesn't work in the cloud. We have better tools, we have better data. And that was really Rohit's key message was those tools and that data can help you be resilient, can help your organization be resilient and whether that's the situation like a pandemic or a major cyber attack, you need to be flexible. You need to be able to bounce back. >> You know, when we actually have infrastructure as code and no one ever talks about DevOps or DevSecOps you know, we've, it's over, it's in the right place, but I want to get your thoughts and seeing if you heard anything about automation because one of the things that you bring up about not liking the word DevSecOps is really around, having this new team formation, how people are organizing their developers and their operations teams. And it really is becoming programmable and that's kind of the word, but automation scales it. So that's been a big theme this year. What are you hearing? What did you hear on the keynote? Any signs of reality around automation, machine learning you mentioned data, did they dig into automation? >> Automation was on the periphery. So a lot of what they're talking about only works with automation. So, you know, the Netflix shout out for chaos monkey absolutely as an automated tool to take advantage of this data, you absolutely need to be automated but the keynote mainly focused on sort of the connectivity and the differences in how we view an organization over the last year versus moving forward. And I think that was actually a bit of a miss because as you rightfully point out, John, you need automation. The thing that baffles me as a builder, as a security guy, is that cyber criminals have been automated for years. That's how they scale. That's how they make their money. Yet we still primarily defend manually. And I don't know if you've ever tried to beat, you know the robots that are everything or really complicated video games. We don't tend to win well when we're fighting automation. So security absolutely needs to step up. The good news is looking at the agenda for the week, taking in some talks today, while it was a bit of a miss and the keynote, there is a good theme of automation throughout some of the deeper dive sessions. So it is a topic that people are aware of and moving forward. But again, I always want to see us move fast. >> Was there a reason Chuck Robbins headlines or is that simply because there are a big 800 pound gorilla in the networking space? You know, why Cisco? Are they relevant security? Is that signaling that networking is more important? As of 5G at the edge, but is Cisco the player? >> Obviously Cisco has a massive business and they are a huge player in the security industry but I think they're also representative of, you know and this was definitely Chuck's message. They were representative of this idea that security needs to be built in at every layer. So even though, you know I live on primarily the cloud technologies dealing with organizations that are built in the cloud, there is, you know, the reality of that we are all connected through a multitude of networks. And we've seen that with work from home which is a huge theme this year at the conference and the improvements in mobility with 5G and other connectivity areas like Edge and WiFi six. So having a big network player and security player like Cisco in the keynote I think is important just because their message was not just about inclusion and diversity for skills which was a theme we saw repeated in the keynote actually but it was about building security in from the start to the finish throughout. And I think that's a really important message. We can't just pick one place and say this is where we're going to build security. It needs to be built throughout all of our systems. >> If you were a Cicso listening today what was your take on that? Were you impressed? Were you blown away? Did you fall out of your chair or was it just right down the middle? >> I mean, you might fall out of your chair just cause you're sitting in it for so long taken in a virtual event. And I mean, I know that's the big downside of virtual is that your step counter is way down compared to where it should be for these conferences but there was nothing revolutionary in the opening parts of the keynote. It was just, you know sort of beating the drum that has been talked about, has been simmering in the background from sort of the more progressive side of security. So if you've been focusing on primarily traditional techniques and the on-premise world, then perhaps this was a little a bit of an eye-opener and something where you go, wow, there's, you know there's something else out here and we can move things forward. For people who are, you know, more cloud native or more into that automation space, that data space this is really just sort of a head nodding going, yeap, I agree with this. This makes sense. This is where we all should be at this point. But as we know, you know there's a very long tail insecurity and insecurity organizations. So to have that message, you know repeated from a large stage like the keynote I think was very important. >> Well you know, we're going to be, theCUBE will be onsite and virtual with our virtual platform for Amazon web services reinforced coming up in Houston. So that's going to be interesting to see and you compare contrast like an AWS reinforce which is kind of the I there I think they had the first conference two years ago so it's kind of a new conference. And then you got the old kind of RSA conference. The question I have for you, is it a just a position of almost two conferences, right? You got the cloud native AWS, which is really about, oh shared responsibility, et cetera, et cetera a lot more action happening there. And you got this conference here seem come the old school legacy players. So I want to get your thoughts on that. And I want to get your take on just just the cryptographers panel, because, you know, as I'm not saying this as a state-of-the-art that the old guys saying get off my lawn, you know crypto, we're the crypto purists, they were trashing NFTs which as you know, is all the rage. So I, and Ron rivers who wrote new co-create RSA public key technology, which is isn't everything these days. Is this a sign of just get off my lawn? Or is it a sign of the times trashing the NFTs? What's your take? >> Yeah, well, so let's tackle the NFTs then we'll do the contrast between the two conferences. But I thought the NFT, you know Ron and Addie both had really interesting ways of explaining what an NFT was, because that's most of the discussion around the NFT is exactly what are we buying or what are we investing in? And so I think it was Addie who said, you know it was basically you have a tulip then you could have a picture of a tulip and then you could have something explaining the picture of the tulip and that's what an NFT is. So I think, you know, but at the same time he recognized the value of potential for artists. So I think there was some definitely, you know get off my lawn, but also sort of the the cryptographer panels is always sort of very pragmatic, very evidence-based as shown today when they actually were talking about a paper by Schnorr who debates, whether RSA or if he has new math that he thinks can debunk RSA or at least break the algorithm. And so they had a very logical and intelligent discussion about that. But the cryptographers panel in contrast to the rest of the keynote, it's not about the hype. It's not about what's going on in the industry. It's really is truly a cryptographers panel talking about the math, talking about the fundamental underpinnings of our security things as a big nerd, I'm a huge fan but a lot of people watch that and just kind of go, okay now's a great time to grab a snack and maybe move those legs a little bit. But if you're interested in the more technical deeper dive side, it's definitely worth taking in. >> Super fascinating and I think, you know, it's funny, they said it's not even a picture of a tulip it's s pointer to a picture of a tulip. Which is technically it. >> That was it. >> It's interesting how, again, this is all fun. NFTs are, I mean, you can't help, but get an Amber by decentralization. And that, that wave is coming. It's very interesting how you got a decentralization wave coming, yet a lot of people want to hang on to the centralized view. Okay, this is an architectural conflict. Is there a balance in your mind as a techie, we look at security, certainly as the perimeter is gone that's not even debate anymore, but as we have much more of a distributed computing environment, is there a need for some sensuality and or is it going to be all decentralized in your opinion? >> Yeah that's actually a really interesting question. It's a great set up to connect both of these points of sort of the cryptographers panel and that contrast between newer conferences and RSA because the cryptographers panel brought up the fact that you can't have resilient systems unless you're going for a distributed systems, unless you're spreading things out because otherwise you're creating a central point of failure, even if it's at hyper-scale which is not resilient by definition. So that was a very interesting and very valid point. I think the reality is it's a combination of the two is that we want resilient systems that are distributed that scale up independently of other factors. You know, so if you're sitting in the cloud you're going multi-region or maybe even multicloud, you know you want this distributed area just for that as Verner from AWS calls it, you know, the reduced blast radius. So if something breaks, not everything does but then the challenge from a security and from an operational point of view, is you need that central visibility. And I think this is where automation, where machine learning and really viewing security as a data problem, comes into play. If you have the systems distributed but you can provide visibility centrally which is something we can achieve with modern cloud technologies, you kind of hit that sweet spot. You've got resilient underpinnings in your systems but you as a team can actually understand what's going on because that was a, yet another point from Carmela and from Ross on the cryptographers panel when it comes to AI and machine learning, we're at the point where we don't really understand a lot of what's going on in the algorithm we kind of understand the output and the input. So again, it tied back to that resiliency. So I think that key is distributed systems are great but you need that central visibility and you only get there through viewing things as a data problem, heavy automation and modern tooling. >> Great great insight, Mark. Great, great call out there. And great point tied in there. Let me ask you a question on your take on the keynote in the conference in general as first day gets going. Do you see this evolving from the classic enterprise kind of buyer supplier relationship to much more of a CSO driven or CXO driven? I need to start building about my teams. I got to start hiring developers, not so much in operation side. I mean, I see InfoSec is these industries are not going away. People are still buying tools and stacking up the tool shed but there's been a big trend towards platforms and shifting left from a developer CICB pipeline standpoint which speaks to scale on the cloud native side and that distributed side. So is this conference hitting that Mark, or you still think there are more hardware and service systems people? What's the makeup? What's the take? >> I think we're definitely starting to a shift. So a great example of that is the CSA. The Cloud Security Alliance always runs a day one or day zero summit at RSA. And this year it was a CSO executive summit. And whereas in previous years it's been practitioners. So that is a good sign I think, that's a positive sign to start to look at a long ignored area of security, which is how do we train the next generation of security professionals. We've always taken this traditional view. We've, you know, people go through the standard you get your CISSP, you hold onto it forever. You know, you do your time on the firewall, you go through the standard thing but I think we really need to adjust and look for people with that automation capability, with development, with better business skills and definitely better communication skills, because really as we integrate as we leave our sort of protected little cave of security, we need to be better business people and better team players. >> Well Mark, I really appreciate you coming on here. A cube alumni and a trusted resource and verified, trusted contributor. Thank you for coming on and sharing your thoughts on the RSA conference and breaking down the keynote analysis, the RSA conference. Thanks for coming on. >> Thank you. >> Well, what we got you here to take a minute to plug what you're doing at Lacework, what you're excited about. What's going on over there? >> Sure, I appreciate that. So I just joined Lacework, I'm a weekend. So I'm drinking from the fire hose of knowledge and what I've found so far, fantastic platform, fantastic teams. It's got me wrapped up and excited again because we're approaching, you know security from the data point of view. We're really, we're born in the cloud, built for the cloud and we're trying to help teams really gather context. And the thing that appealed to me about that was that it's not just targeting the security team. It's targeting builders, it's targeting the business, it's giving them that visibility into what's going on so that they can make informed decision. And for me, that's really what security is all about. >> Well, I appreciate you coming on. Thanks so much for sharing. >> Thank you. >> Okay CUBE coverage of RSA conference here with Lacework, I'm John Furrier. Thanks for watching. (upbeat music)

Published Date : May 17 2021

SUMMARY :

We're breaking down the Happy to be here. You know, one of the things Mark and it really hits at the core They're out in the wild, as you said, It was pointed out, you know, and you had a bunch of because the idea is you need to figure out and certainly the pandemic has shown And I think, you know, having and that's kind of the word, but the keynote mainly focused on sort of from the start to the finish throughout. So to have that message, you know and you compare contrast and then you could have and I think, you know, it's funny, as the perimeter is gone it's a combination of the two in the conference in general So a great example of that is the CSA. and breaking down the keynote Well, what we got you So I'm drinking from the Well, I appreciate you coming on. Okay CUBE coverage of RSA

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
Mark NunnikhovenPERSON

0.99+

John FurrierPERSON

0.99+

MarkPERSON

0.99+

CiscoORGANIZATION

0.99+

JohnPERSON

0.99+

AddiePERSON

0.99+

$2 billionQUANTITY

0.99+

May 27DATE

0.99+

LaceworkORGANIZATION

0.99+

RonPERSON

0.99+

SchnorrPERSON

0.99+

Chuck RobbinsPERSON

0.99+

May 2021DATE

0.99+

RohitPERSON

0.99+

Symphony Technology GroupORGANIZATION

0.99+

ChuckPERSON

0.99+

IndiaLOCATION

0.99+

HoustonLOCATION

0.99+

AWSORGANIZATION

0.99+

17 talksQUANTITY

0.99+

CarmelaPERSON

0.99+

SeanPERSON

0.99+

DellORGANIZATION

0.99+

NetflixORGANIZATION

0.99+

twoQUANTITY

0.99+

CICBORGANIZATION

0.99+

AmazonORGANIZATION

0.99+

48 panelsQUANTITY

0.99+

World War IIEVENT

0.99+

RossPERSON

0.99+

first dayQUANTITY

0.99+

todayDATE

0.99+

three examplesQUANTITY

0.99+

RSAEVENT

0.99+

3000 personQUANTITY

0.99+

Cloud Security AllianceORGANIZATION

0.99+

first exampleQUANTITY

0.99+

last yearDATE

0.99+

two conferencesQUANTITY

0.98+

Ron riversPERSON

0.98+

CSAORGANIZATION

0.98+

two years agoDATE

0.98+

InfoSecORGANIZATION

0.98+

this yearDATE

0.98+

RSAORGANIZATION

0.98+

RowanPERSON

0.98+

oneQUANTITY

0.97+

second pointQUANTITY

0.97+

Palo Alto CaliforniaLOCATION

0.97+

bothQUANTITY

0.97+

DevSecOpsTITLE

0.95+

pandemicEVENT

0.95+

800 poundQUANTITY

0.94+

LaPERSON

0.92+

Bill Mann, Styra | CUBE Conversation, July 2020


 

(upbeat music) >> Narrator: From the Cube Studios in Palo Alto in Boston, connecting with thought leaders all around the world. This is the Cube Conversation. >> Welcome to this Cube Conversation. I'm Lisa Martin, excited to talk to the CEO of Styra, Bill Mann today. Bill, welcome to the Cube. >> Hi Lisa, how are you doing? >> I'm doing well. I should say welcome back. You've been on the Cube at a previous company, but we're excited to talk to you today about Styra, what's going on? So let's go ahead and start informing our audience who Styra is and what you do? >> Sure, so who Styra is and what do we do? So Styra is a company that's focused on reinventing policy and authorization in the cloud native stack. We're the company that created an open source project called Open Policy Agent, it's part of CNCF. And on top of Open Policy Agent, we built a control plane, a management plane to help organizations really put OPA into production and operationalized OPA. >> An OPA is Open Policy Agent. That's what the company actually developed with CNCF, correct? >> So, we actually founded Open Policy Agent and then we contributed Open Policy Agent to CNCF. And the real goal of contributing the Open Policy Agent to CNCF was we believe that we want to get authorization defacto in the market, right? And the only way to get something out there that everybody uses is to put it into the open source and having an entity like the CNCF supporting the project. So, really it's about getting everybody, all enterprises and vendors to use Open Policy Agent as a way of solving authorization for the cloud native environment. >> So you say Styra is reinventing policy and authorization for cloud native applications, your target audience, security folks, developer folks, what changes has cloud native brought to security and development teams? >> Sure, so what changes has cloud native brought to security and development teams? So fundamentally there've been three changes in the marketplace. One, as you know we're shifting from this monolithic architecture of building applications to now this new distributed architectures of kubernetes, microservices and Deep-coupled architecture. So fundamentally the way we build applications is fundamentally changed because everybody wants to have scale up and scale down and so forth. Second, the way we actually developed software, we've moved now to a DevOps model where we're doing more things earlier on in the cycle so we can innovate faster and we're producing code on an hourly basis versus when I joined the industry which was probably three releases a year. And then thirdly which is kind of a major topic that all of us kind of understand is our focus on privacy and security is higher than it's been before. And if these applications are going to be way more complex and more distributed and we're going to innovate faster than the way we focus on security and privacy has to be done differently as well. And if we don't do it differently, then we're going to have to all the breaches that we had in the previous generation of the app stack. >> And we don't want that, but you're right privacy and security are increasing concerns in any environment. How do you help address those and also with the thought of privacy and security are going to be concerned for quite a long time? >> Yeah, so let me take a step back. So how do we address privacy and security? So, at a fundamental level, authorization is a foundational part of security and authorization has never really been solved or re-imagined ever for the last 50 years or so. Every application developer or security vendor has built authorization into their own stack and done it in a very proprietary way. And it's been locked away within these applications and these stacks and so forth. So what happens now when you've got a highly distributed environment is that you've got so many moving parts, you still need to apply authorization. So, the way we've tackled it is by building Open Policy Agent. And there's three fundamental kind of tenants around Open Policy Agent that make it really ideal for this cloud native environment. Number one, it's policy as code and everything in the market now, everything is as code. You buy infrastructure as code. So this is now policy as code. So you can describe in a declarative model, how you want the policy for a system to be developed and you can use the language called Rego to do that. Second is the fact that all the cloud native projects out there which are all developed based upon open source technologies, kubernetes, microservices, envoy, SDO, cafco, all these kinds of buzzwords you hear in the marketplace, they all integrate with Open Policy Agent already. And then thirdly the architecture of Open Policy Agent is that it's distributed, which means that it's ideally suited for this distributed architecture for cloud native. And those are the three kind of characteristics of Open Policy Agent leading to developers loving it. And when I say they love it, we've got hundreds and thousands of users of Open Policy Agent. When you go to the CNCF shows co op con earlier this year and there's two more coming this year. There's many, many talks on it. You've got cloud vendors like Google and Microsoft adopting Open Policy Agent, got a lot of enterprises adopting Open Policy Agent. So, that's really fundamentally what we've built is we've built an authorization architecture for this new world to really address the security and privacy concerns, which have always existed and I'm going to be more exponential in this new world. >> And I think you've also built a community around OPA. Can you share a little bit of information about that and how they help with the co-development and even some of the other things that you're commercializing? >> Sure, yeah. So, now what have we done in from a community point of view with Open Policy Agents? So yeah, the community is a integral part of any open source project and we're lucky to have a great community. We've got a great community of enterprise users of Open Policy Agents and vendors as well, vendors like Microsoft and Google who are now contributing to OPA and building it up. And for me, the most important part of a community is that you learn how enterprises are using your software and they share ideas and they share use cases and you're able to innovate really, really fast. And what we've learned from that is the use cases that they use Open Policy Agent for, for instance, one of the major use cases for Open Policy Agent is for kubernetes Admission Control. So, essentially we can test the configuration of an application which is described in a file called YAML before it goes into production. So, think of it as pre-production tests, but companies are using it for microservices and applications and data and so forth. So, it helps us understand what they're using it for, but also we use it to help us develop our commercial product, which is the management control plane for OPA. So, we learn about what they're missing in the open source project that we can use to build our commercial product >> which is ready for enterprise use. >> So you've had a lot of success with OPA. Talk to me about Styra DAS and why the need for that? >> Sure, so why do we need Styra DAS recognizing that OPA is very, very successful. So, the fundamental difference is OPA is a very focused on developers and it's very focused on an environment for an individual node or cluster, but it doesn't have all the enterprise features necessary for a real enterprise to go into production. So what we notice is companies use OPA for pre-production, but when they want to go into production, they need a user interface. They need a way to author policies, distribute policies, monitor policies, do impact analysis and a whole bunch of other features and capabilities that are needed for enterprise deployments and so forth. So that's a fundamental difference between OPA and the commercial product. The commercial product is really operationalizing in OPA for an enterprise deployment. >> So the relationship between Styra and OPA seems very collaborative to me that what you just described with the commercial product of Styra DAS is really one that was developed based on what the OPA community and Styra have learned together? >> Correct, Yes. So, OPA was created by the CTO, the founders of the company saw early on several years ago, the need for distributed architectures and the need for unified policy so they left and created OPA. And from day one they wanted to get OPA into everybody's hands. That's why they contributed it to open source as part of CNCF. And then the next kind of strategy is to focus on the control apps aspects, the enterprise aspect. So yes, the same team that created OPA is the same team that's creating the Styra DAS commercial offering as well. >> So from the enterprise perspective, talk to me about some of the companies that you're talking to. I imagine any organization that's focused on cloud native, but any industry in particular that you see is really kind of leading edge right now? >> Yeah, so which industries are we talking to in terms of using Styra DAS and OPA? What we've actually found it's across the board. And we've seen in the early days that financial services and high tech were using OPA, but now it's really across the board. So it's all verticals really. And what we've noticed is any organization which is going through a cloud transformation project where they're either building new applications based upon cloud native app stacks like kubernetes and microservices and so forth or shift to the cloud are the companies that are also adopting OPA and the Styra DAS product, right? Because it's all part of the same solution set. And what we're noticing now and this is a fundamental difference is platform architects and developers are kind of prime to use these technologies. They learn about these technologies by going to the conferences and unlike the past which was very much top down selling from the sea level down, this is very much bottomed up. So developers learn about OPA from going to the conferences. They use it within their own environment and then they tell their management that, "Look, we're using OPA already. "We're missing these capabilities," or they come to us and we educate them about the Styra DAS product and so forth. So it's a very different sales model as well and that's why it's very important for ourselves and any open source company to really keep developers happy and provide a solution, that's meeting their requirements. >> On that side with so many of us and developers included working from home for the past nearly four months. We now are doing things like this virtual conversations, virtual events, how is Styra helping to continue to feed and educate those developers so that they can understand how you can impact their job functions and how they can then elevate you guys up the stack. >> Sure, so what's changed over the last three months or so in the market as a consequence of COVID-19 and from an educational point of view. So, what we've seen is fundamentally in the early days of COVID-19 everybody was kind of get the head around how to work from home and so forth, but what we've seen across the all verticals is developers have now really focused on educating themselves and just as a data point and the audience that we get to the OPA website is as high as it's ever been for the last three months. And what we're doing as a company is a lot of training sessions, video content, write-ups, blogs and so forth, right? And really helping the community learn about OPA and how to solve these kind of fundamental problems around policy and authorization within the environment. We've also been helped by the community as well. So there's been talks about a number of companies, Microsoft, Google, Palo Alto had a talk and many many companies are talking about OPA now and I love it because ultimately being an open source company and building a project which we want to become defacto, we want to raise the bar for security across the world, right? And if we can do that then it's going to be an achievement for us and it's very gratifying knowing that we're really fixing security problems for organizations because ultimately we always want to be able to use an application or a banking service and not worry about privacy and security concerns and that's ultimately what we're all after. But this is such a fundamental component that once we want to have developers learn this now because if they can incorporate this into the DevOps app stack then in future years when these applications are built and they're exposed there'll be more secure. >> And so it sounds like maybe there's even more engagement now during COVID when everybody is at home. Tell me about some of the things that are coming down the pipe for Styra in light of all of this exciting collaboration with the community. >> Sure, yeah. There's definitely been way more collaboration as a consequence of COVID-19. People are at home and they're focusing and they're going through learning sessions and browsing the website going through the video content and so forth. So what we're engaging as much as we have ever been, in fact I would argue that we're engaging even more so now, because it's just a different environment to work in. And what we're focused on now is really adding more features to the Styra DAS product, just to step back for a second, Open Policy Agent works across the cloud native stack and Styra DAS has been focused first on the kubernetes use case and now it also supports microservices as well. And then what we're continuing to do is add more of those enterprise features into Styra DAS and move up and up across the stack. But it is all driven by developers that we're talking to on a daily basis and that's leading to where the project is moving forward and the development for the roadmap and so forth. >> And Styra DAS was only launched in 2019, is that correct? >> 2019 yes, that's correct. That's correct. Yes, time flies, right? So, yes. >> A lot of change and a lot of development in a short period of time. >> That's right and 2019 was a big year for us, right? We started last 2019 with a soft launch at the RSA conference and we finished 2019 with series a funding led by Xcel. And yeah, it's great to see how the commercial product has been gaining traction in the marketplace as well as OPA as well and I think it's a combination of events. One, the fact that cloud native is now really well understood. Second, the fact that kubernetes at the beginning of 2019, it was still, "What does kubernetes mean, "is it going into production?" Now kubernetes is absolutely going into production and there's such a desire for organizations to make sure that security and policy and compliance are resolved before applications go into production otherwise we're going to have the same kind of challenges we had with previous app stacks. >> Well, the momentum is certainly with you. I can definitely hear that in your voice bell. Thank you so much for joining me talking about Styra, how you're reinventing policy and authorization for cloud native applications. >> Thank you, Lisa. >> For my guest Bill Mann, I'm Lisa Martin. You're watching the Cube Conversation. Thanks for your time. (upbeat music)

Published Date : Jul 8 2020

SUMMARY :

This is the Cube Conversation. the CEO of Styra, Bill Mann today. You've been on the Cube in the cloud native stack. An OPA is Open Policy Agent. and having an entity like the Second, the way we actually and also with the thought and everything in the market and even some of the other things And for me, the most and why the need for that? and the commercial product. the founders of the company and the need for unified policy So from the enterprise perspective, and the Styra DAS product, right? for the past nearly four months. and the audience that we that are coming down the pipe for Styra and browsing the website So, yes. a lot of development at the RSA conference and we finished 2019 Well, the momentum Thanks for your time.

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
GoogleORGANIZATION

0.99+

MicrosoftORGANIZATION

0.99+

Lisa MartinPERSON

0.99+

Bill MannPERSON

0.99+

LisaPERSON

0.99+

CNCFORGANIZATION

0.99+

2019DATE

0.99+

July 2020DATE

0.99+

Bill MannPERSON

0.99+

hundredsQUANTITY

0.99+

Palo AltoLOCATION

0.99+

StyraORGANIZATION

0.99+

BillPERSON

0.99+

SecondQUANTITY

0.99+

OPATITLE

0.99+

todayDATE

0.99+

Palo AltoORGANIZATION

0.99+

Open Policy AgentTITLE

0.99+

twoQUANTITY

0.99+

XcelORGANIZATION

0.99+

three changesQUANTITY

0.99+

BostonLOCATION

0.98+

DevOpsTITLE

0.98+

OneQUANTITY

0.98+

this yearDATE

0.98+

Styra DASTITLE

0.97+

oneQUANTITY

0.97+

Cube StudiosORGANIZATION

0.97+

Styra DASORGANIZATION

0.96+

firstQUANTITY

0.96+

RegoTITLE

0.96+

thousandsQUANTITY

0.94+

StyraPERSON

0.93+

COVID-19OTHER

0.92+

Cube ConversationTITLE

0.92+

earlier this yearDATE

0.92+

three releases a yearQUANTITY

0.92+

CubeORGANIZATION

0.91+

several years agoDATE

0.9+

Open Policy AgentsTITLE

0.89+

three kindQUANTITY

0.87+

COVID-19TITLE

0.86+

last three monthsDATE

0.85+

COVIDTITLE

0.84+

secondQUANTITY

0.84+

last 50 yearsDATE

0.83+

thirdlyQUANTITY

0.82+

Corey Williams, Idaptive | CUBE Conversation, April 2020


 

(bright music) >> Narrator: From the Cube studios in Palo Alto in Boston, connecting with thought leaders all around the world, this is a Cube Conversation. >> Hey, welcome back everybody, Jeff Frick here with the cube. We're at our Palo Alto studio today. And we're kind of taking advantage of this opportunity to reach out to the community, as we're going through this COVID crisis, to talk to leaders, get their tips and tricks and advice. As you know, everyone is going through this thing together. It's really a unique situation that everybody has a COVID story, where were you in March of 2020. So we're excited to have our next guest. He's Corey Williams. He's the VP of strategy and marketing for Idaptive. Cory, great to see you. >> Hey, great to see you. Thanks for having me, Jeff. >> Absolutely, I was just thinking the last time that we saw, was late February, it was February 25th. At the RSA conference, 40,000 people I think was the last big show, that I attended for sure, and kind of snuck in, before everything got shut down. It's just amazing, you know, kind of how quick this light switch moment happened to really force first, everybody home, and then you know, kind of all these collateral impacts of that in terms of digital transformation. >> Yeah, it is amazing. I remember that RSA show very well, shaking dozens of people's hands, eating from a buffet, sitting in a crowded room. It's amazing how quickly things have transformed, and how our mindset about, just about everything, but especially what we do for a living and how we interact with each other, had just changed overnight. >> Yeah and it's fascinating too, because when the stay at home, what started to come out, you know, nobody really had time to plan. And you know, and I would argue even if you had, I don't know, six months to plan, nine months to plan, a year to plan, for kind of this cutover, it would still have been a difficult situation. So just to be, you know, kind of thrown in and it's ready said go. Here we are, really unique challenge for people, but also for the infrastructure providers, also for the technology providers, in the space that you operate in, which is security, very different challenge and it wasn't, you know, we're going to plan and get everybody's VPN is all hooked up and configured and tested. It's like, don't come to the office tomorrow. >> Yeah and it literally happened that quickly. It wasn't a matter of being able to plan this, like a normal transition. But it was literally, today we're working in the office, tomorrow, please don't come in, we'll let you know when it's going to change. And I think it really did catch a lot of companies off guard, even those that were used to supporting a remote workforce at least in part. >> Yeah, because it's interesting people been talking about new way to work and work from home and this for a very long time. But you know, this was an incredible forcing function. So let's talk about you know, kind of what you do for the people that aren't familiar with Idaptive. Give us kind of the quick, the quick overview. >> Sure, Idaptive is what's called an identity and access management company. What we do is we make it easier for end users to get access to all their applications, and for organizations to provide that access in more secure manner. As you know, all these cloud applications and devices that we need to have access to, are typically just secured by a password and they all have different passwords, and those passwords often get reused and shared among different employees, and it creates a big problem, for not only for the security of the company, but even for the IT Helpdesk who's got to support account lockouts and password resets and so, Idaptive is one of the leaders in this space. >> As you talk about the password reset and I didn't think really kind of from the IT support side if you don't have a teenager hopefully close by in the room you know, that creates all kinds of challenges, but it's real and the password situation was bad before. Now as you said we've got all kinds of internal applications, you've got all types of access control to your inside stuff, you have all your cloud applications. A lot of times you said passwords are stored in queues or they're stored in caches, or they're stored in your Chrome browser. You guys have written extensively about passwords and getting kind of past passwords to better ways to authenticate people, whenever you can actually written quite a bit recently on blog posts. Talk about your kind of strategy and how you help customers kind of rethink access. >> Yeah, there's sort of two main strategies that I've been writing about. And then our company has been talking to our customers about. The first one we call Next-Gen Access, which is essentially a combination or layers of technology like Single sign-on, multi-factor authentication, provisioning, and analytics provide some user behavior and risk. All of that is intended to provide a more secure experience where we can put additional factors besides just a password, in front of the user, but only do it, when the risk is high, so that we can preserve the user experience. And so that we call a Next-gen access approach. But ultimately, the reason you want to do that is to arrive at a zero trust state of mind. That sort of approach allows you to say that, hey, I've verified every user, that is on my network. I know the device they're using is something that I trust and is in good shape. And I've limited their access to just what they need in order to do their job. >> Now, do you find that most people in this situation are still accessing via a VPN or some secure network or as most of it, you know, it's public internet access, and you're relying really on the applications and the access and the protocols and the two factor to make sure people can only get what they're supposed to get? >> Yeah, I think you kind of bring up a good point. The vast majority of businesses are what I've referred to hybrid enterprises, they still have on-premise applications, they still have their own applications that they build. But they also are in the process of adopting cloud applications like Office 365. And you know, all of the different kind of productivity apps, that are very popular. And so most companies are stuck in this situation where they can't simply be completely virtual company overnight. They still have to provide access to on-premise systems and applications in order to do their business. And so many of them just had the option of saying, okay, here's VPN access for everyone. But as as we know, VPN access is a very blunt instrument. First of all you have it has to be able to scale to a lot of users. Second of all, it gives you access to the whole network from a remote location, both of which are situations that are difficult, especially when you have to turn it on overnight. >> You're right. So you and one of the articles that I saw in getting ready for this, has some really specific as straightforward advice to people, to help them enable their remote workers. I wonder if you could go through some of those key points with us? >> Sure, I think, you know, when you think about remote access or having a remote workforce, you think about a few different things. One is be able to provide them easy kind of friction, free discovery of their applications and providing access. So, having something like a portal of all the applications that you're supposed to have access to whether they're on-premise or in the cloud, and have one click access to those protected in a way that is common to all those applications, using something like a second factor of authentication. That provides some of the immediate convenience of getting people up and productive, even if they're outside the network at home. The second thing we think about is, how do we give access to those on-premise applications? You can use VPN, it's quick, I can tell you that our customers are telling us two things. One is they didn't prepare for that much capacity. So their VPN connections don't scale. So they're having to ration the use of it, which limits the productivity. But also, they haven't necessarily rolled out multi-factor authentication to all of these users who don't typically use VPN. And so they are forced with either having to dial down, the security level, or to scramble and try to find a way to secure that access. So in my writings, we've been talking about providing alternatives to a VPN, something like an application gateway, which would can give you access to just the apps you need, without having to have full network access, and having those apps just be published through the gateway. >> So there's really some kind of creative ways to restructure the access beyond just simply having better access more secure access and as you said VPN and multi-factor cause in fact, you might not be able to implement those things just in the timely manner which you have, as we said, this was a light switch moment. >> Yeah I think definitely the it's something to think about in these emergency light switch moments, what is the easiest way and there's three parties involved. You've got the security folks who are concerned about maintaining a level of continuity with the access to their data. But you also have the end user and they have to do their job. It has to be easy enough for them to be able to do, without having to have a lot of special training. And let's not forget the IT Helpdesk, either. They are getting overwhelmed with requests for about basic technology use and about getting access to the basic resources. The last thing you want to do is pile on a whole bunch of new lockouts. And, you know, barriers have been put in front of users, that can overwhelm them. So you kind of have to think about all three parties, when you're developing a solution for remote workforce. >> All right, and I presume the bad guys are not taking holiday, seeing this opportunity as again, we're constantly talking about this increasing attack surface. It just got a whole lot bigger for the bad guys. >> It certainly did. I mean, if you think about the attack surface, it used to be that if they could get past your network barrier, then they were in. And so he was very concentrated around securing the network. As you start adopting more mobile and cloud applications, now your attack surface becomes all the resources are out in the cloud. Now, when you take all of your workers and disperse them to home, each one of their own systems and networks becomes an extension of that attack surface. And so anything you can do to narrow and lessen the attack surface by making sure you have good user verification, device validation, and other layers of intelligence to help you monitor that access. It reduces the scope to everyone on Earth, from any device on Earth, to just the people that you you trust and if identified, and that's why we talked to our our customers about is putting these layers in that can balance that security, but also provide a more friction free user experience and that's the real trick. >> All right, so I'm just curious to get your take you've been in the business for a long time. And kind of the state of passwords, you know, is this just something we're stuck with forever? Do you see in the not too distant future? Or medium future? Passwords going away? I mean, we've got biometric stuff now, you can touch your phone, you can read your iris, but those things can be spoofed as well. Where do you see, you know, kind of the passwords evolving and what's going to take its place? >> You know, it's a little bit like the clothes in the back of my closet, you can never quite get rid of everything. And I think passwords are will always be with us in some form, because they're baked into technology that's been around forever. As a side note, you've probably heard about these IRS checks going out. And there being problems in some states because these stimulus checks are dependent on systems that were built 50 years ago. And so technology kind of lives forever in some form. So we can't necessarily get rid of passwords, but there are two things we can do, one is we can never depend on passwords alone to secure access, we can layer on, multi-factor authentication and artificial intelligence to determine risk level and put an additional set of factors in front of the user. But we can also develop new applications and technologies, with more of what is being known as a password list experience, which is sort of an ideal thing. And we have some experience with modern technology like facial recognition on our iPhone or a fingerprint on our PC. Those types of experiences can be built in and before COVID happened, I'd say that one of the big trends of 2020 was this idea of password list access. And we have actually recently announced some of our own password capabilities, but it was a hot trending topic. And I think will continue to be because not only is it a more secure experience, but it's also much easier for end users and they would prefer to have a one click access rather than having to remember a complex string that they have changed in 90 days. >> I was going to say, do you think it's an accelerant? Or in terms of having this alternative access method? Or is it a pullback because people are hunkering down, but it sounds on those two attributes, that it's a better thing. >> I think definitely in >> The more secure that seems pretty straightforward. >> Yes, I think definitely, in the medium and long term, this will accelerate the trend. In the short term, yes. Everything is being focused on just enabling those remote users. There was a actually a recent survey done by Mayfield, with their collection of CSOs and CTOs, asking them what the top priorities were in the short term. And of course, the number one priority for IT leaders is enabling that remote workforce. But number two in the short term is actually security enabling that says not only enabling users to work from home productively, but making sure that security is keeping track. So I don't think they've lost sight even in the short term, although I think they're focused on very tactical goals related to scaling out the solutions and supporting their end users. In the medium term and in the long term, this is going to have lasting effects. We know that the remote workforce trend was accelerated and there's no turning back. Companies are going to be more remote, they're going to be more comfortable with remote models. And so having better stronger, better experiences and stronger authentication experiences will be part of how we do things going forward. >> Well, Cory, in everywhere we go, security has to get baked into everything. So it's no longer a bolt in is, as you well know, and so it's not surprising that that's right in there with supporting those remote people cause they got access to the keys to the kingdom. You just can't let that get out there. So give you the final word once we come out of COVID and in terms of, you know, looking directly at what that's driving in terms of priorities. What are some of the other priorities that you hope to get back to, once we kind of get through this period? >> Well, I mean, I think clearly, we're seeing the effect on certain industries like travel and hospitality and others, we certainly and we tell,, we certainly hope that those businesses are able to come back strong. So those are some of the things we're looking forward to. But we know a lot of our customers are really wanting to not just respond to the current activities that are happening, but they want to build their businesses. They want to build better user experiences, they want to put out new digital experiences. We know from the survey as well, from Mayfield that increasing acceleration towards adopting cloud, and towards the digital transformation of user and business processes is going to be key. And so that's what we see the future is not just in providing security to prevent the bad guy, but to enable these new digital experiences and to accelerate these trends like move to cloud, identity and access management is fundamental to all of those efforts. And we see that as being a very positive thing. And hopefully this will end up serving as a catalyst to spurred and acceleration of those adoptions. >> Well, I think there's no doubt about it. I mean, we're not going to go back and the longer this thing goes on, the more new habits are formed, and people aren't just going to want to go back to the old ways. So I think there's no doubt about it. And I really appreciate you sharing your insights. Again, Cory has written a ton of stuff. There's blogs all over the place, do a quick search on Cory Williams with an E, and you'll find some of his blog posts and thanks for taking a few minutes with us here today, Cory. >> You bet, thank you, Jeff. >> All right, he's Corey, I'm Jeff. You're watching the cube. We're in our Palo Alto studios. Stay safe out there, and we'll see you next time. Thanks for watching. (bright music)

Published Date : Apr 15 2020

SUMMARY :

Narrator: From the Cube studios in Palo Alto in Boston, As you know, everyone is going through this thing together. Hey, great to see you. and then you know, kind of all these collateral impacts and how our mindset about, just about everything, So just to be, you know, kind of thrown in Yeah and it literally happened that quickly. So let's talk about you know, kind of what you do and for organizations to provide that access in the room you know, that creates all kinds of challenges, And I've limited their access to just what they need and applications in order to do their business. So you and one of the articles that I saw and have one click access to those protected cause in fact, you might not be able and they have to do their job. All right, and I presume the bad guys to just the people that you you trust and if identified, And kind of the state of passwords, you know, to secure access, we can layer on, I was going to say, do you think it's an accelerant? they're going to be more comfortable with remote models. and in terms of, you know, looking directly at what that's and business processes is going to be key. and people aren't just going to want Stay safe out there, and we'll see you next time.

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
Corey WilliamsPERSON

0.99+

JeffPERSON

0.99+

Jeff FrickPERSON

0.99+

CoreyPERSON

0.99+

March of 2020DATE

0.99+

CoryPERSON

0.99+

nine monthsQUANTITY

0.99+

six monthsQUANTITY

0.99+

EarthLOCATION

0.99+

April 2020DATE

0.99+

February 25thDATE

0.99+

Palo AltoLOCATION

0.99+

iPhoneCOMMERCIAL_ITEM

0.99+

tomorrowDATE

0.99+

two attributesQUANTITY

0.99+

Cory WilliamsPERSON

0.99+

90 daysQUANTITY

0.99+

Office 365TITLE

0.99+

IdaptiveORGANIZATION

0.99+

todayDATE

0.99+

BostonLOCATION

0.99+

OneQUANTITY

0.99+

2020DATE

0.99+

ChromeTITLE

0.99+

40,000 peopleQUANTITY

0.99+

one clickQUANTITY

0.99+

two thingsQUANTITY

0.99+

three partiesQUANTITY

0.98+

bothQUANTITY

0.98+

MayfieldORGANIZATION

0.98+

late FebruaryDATE

0.98+

50 years agoDATE

0.98+

oneQUANTITY

0.98+

first oneQUANTITY

0.98+

two factorQUANTITY

0.97+

FirstQUANTITY

0.96+

zeroQUANTITY

0.96+

SecondQUANTITY

0.96+

CubeORGANIZATION

0.96+

each oneQUANTITY

0.96+

second thingQUANTITY

0.95+

RSAEVENT

0.94+

a yearQUANTITY

0.93+

dozens of peopleQUANTITY

0.87+

IdaptivePERSON

0.86+

two main strategiesQUANTITY

0.84+

COVIDOTHER

0.83+

second factorQUANTITY

0.83+

RSA conferenceEVENT

0.8+

Next-GenOTHER

0.79+

firstQUANTITY

0.77+

twoQUANTITY

0.74+

MayfieldLOCATION

0.72+

COVIDEVENT

0.65+

genOTHER

0.59+

COVIDTITLE

0.53+

numberQUANTITY

0.52+

HelpdeskORGANIZATION

0.49+

articlesQUANTITY

0.48+

Pete Gerr, Dell EMC | RSAC USA 2020


 

>> Announcer: Live from San Francisco, it's theCUBE covering RSA Conference 2020 San Francisco, brought to you by SiliconANGLE Media. >> Okay, welcome back, everyone, to CUBE's coverage here in San Francisco at RSA Conference 2020. I'm John Furrier, your host. You know, cybersecurity industry's changing. Enterprises are now awake to the fact that it's now a bigger picture around securing the enterprise, 'cause it's not only the data center. It's cloud, it's the edge, a lot of great stuff. We've got a great guest here from Dell EMC. Peter Gerr's a consultant, cyber resilience solutions and services marketing at Dell EMC. Great to see you. >> You too, John. >> Thanks for coming on. >> Good to see you again, thank you. >> So, you know, I was joking with Dave Volante just this morning around the three waves of cloud, public cloud, hybrid cloud, multicloud. And we see obviously the progression. Hybrid cloud is where everyone spends most of their time. That's from ground to cloud, on-premises to cloud. So pretty much everyone knows-- >> Peter: On-ramp, kind of. >> That on-prem is not going away. Validated by all the big cloud players. but you got to nail the equation down for on-premises to the cloud, whether it's, I'm Amazon-Amazon, Azure-Azure, whatever, all those clouds. But the multicloud will be a next generation wave. That as an industry backdrop is very, very key. Plus AI and data are huge inputs into solving a lot of what is going to be new gaps, blind spots, whatever insecurity. So I got to, you know, Dell has a history with huge client base, traditional enterprises transforming. You're in the middle of all this, so you got the airplane at 30,000 feet and the companies have to swap out their engines and reboot their teams, and it's a huge task. What's going on with cyber and the enterprises? What are some of the key things? >> Well, so I like to keep it pretty simple. I've been in this industry over 20 years and I've really consistently talked about data as the global currency, right? So it's beautifully simple. Whatever industry you're in, whatever size company you're in, enterprise or even now small to medium businesses, their businesses are driven by data. Connectivity to that data, availability of the data, integrity of the data, and confidentiality of the data. And so sort of the area of the world that I focus upon is protecting customers' most valuable data assets, now, whether those are on-prem, in the cloud, or in a variety of modalities, and ensuring that those assets are protected and isolated from the attack surface, and then ability to recover those critical assets quickly so they can resume business operations. That's really the area that I work in. Now, that data, as you pointed out, it could start on-prem. It could live in multicloud. It can live in a hybrid environment. The key is really to understand that not all data is created equally. If you were to have a widespread cyber attack, really the key is to bring up those critical applications systems and data sets first to return to business operations. >> Yeah, it's funny-- >> Peter: It's really challenging >> You know, it's not funny, it's actually just ironic, but it's really kind of indicative of the society now is that EMC was bought by Dell Storage and the idea of disruption has always been a storage concept. We don't want a lot of disruption when we're doing things, right? >> Peter: None, we can't, yeah. >> So whether it's backup and recovery or cyber ransomware, whatever it is, the idea of non-disruptive operations-- >> Absolutely. >> Has been a core tenant. Now, that's obviously the same for cyber, as you can tell. So I got to ask you, what is your definition and view of cyber resilience? Because, well, that's what we're talking about here, cyber resilience. What's your view on that? >> So when we started developing our cyber recovery solution about five years ago, we used the NIST cybersecurity framework, which is a very well-known standard that defines really five pillars of how organizations can think about building a cyber resilience strategy. A cyber resilience strategy really encompasses everything from perimeter threat detection and response all the way through incident response after an attack and everything that happens in between, protecting the data and recovering the data, right? And critical systems. So I think of cyber resilience as that holistic strategy of protecting an organization and its data from a cyber attack. >> That's great insight. I want to get your thoughts on how that translates into the ecosystem, because this is an ecosystem around cyber resilience. >> Peter: Absolutely. >> And let's just say, and you may or may not be able to comment on this, but RSA is now being sold. >> Peter: Yeah, no, that's fair. >> So that's going out of the Dell family. But you guys have obviously VMware and Secureworks. But it's not just you guys. It's an ecosystem. >> It really is. >> How does Dell now without, with and without RSA, fit into the ecosystem? >> So as I mentioned, cyber resilience is really thought of as a holistic strategy. RSA and other Dell assets like Carbon Black fit in somewhere in that continuum, right? So RSA is really more on threat detection and response, perimeter protection. The area of the business that I work on, data protection and cyber recovery, really doesn't address the prevention of attacks. We really start with the premise that preventing a cyber attack is not 100% possible. If you believe that, then you need to look at protecting and recovering your assets, right? And so whether it's RSA, whether it's Carbon Black, whether it's Secureworks, which is about cyber incident and response, we really work across those groups. It's about technology, processes, and people. It's not any one thing. We also work outside of the Dell technologies umbrella. So we integrate, our cyber recovery solution is integrated with Unisys Stealth. So there's an example of how we're expanding and extending the cyber recovery solution to bring in other industry standards. >> You know, it's interesting. I talk to a lot of people, like, I'm on theCube here at RSA. Everyone wants better technology, but there's also a shift back to best-of-breed, 'cause you want to have the best new technology, but at the same time, you got to have proven solutions. >> Peter: That's the key. >> So what are you guys selling, what is the best-of-breed from Dell that you guys are delivering to customers? What are some of the areas? >> So I'm old EMC guy myself, right? And back from the days of disaster recovery and business continuity, right? More traditional data protection and backup. The reality is that the modern threats of cyber hackers, breaches, insider attacks, whatever you like, those traditional data protection strategies weren't built to address those types of threats. So along with transformation and modernization, we need to modernize our data protection. That's what cyber recovery is. It's a modern solution to the modern threat. And what it does is it augments your data, excuse me, your disaster recovery and your backup environment with a purpose-built isolated air gap digital vault which is built around our proven Data Domain and PowerProtect DD platforms that have been around for over a decade. But what we've done is added intelligence, analytics, we've hardened that system, and we isolate it so customers can protect really their most valuable assets in that kind of a vault. >> So one of things I've been doing some research on and digging into is cyber resilience, which you just talked about, cyber security, which is the industry trend, and you're getting at cyber recovery, okay? >> Peter: Correct. >> Can you talk about some examples of how this all threads together? What are some real recent wins or examples? >> Sure, sure. So think of cyber recovery as a purpose-built digital vault to secure your most valuable assets. Let me give you an example. One of our customers is a global paint manufacturer, okay? And when we worked with them to try to decide what of their apps and data sets should go into this cyber recovery vault, we said, "What is the most critical intellectual property "that you have?" So in their case, and, you know, some customers might say my Oracle financials or my Office 365 environment. For this customer it was their proprietary paint matching system. So they generate $80 to $100 million every day based upon this proprietary paint matching system which they've developed and which they use every day to run their business. If that application, if those algorithms were destroyed, contaminated, or posted on the public internet somewhere, that would fundamentally change that company. So that's really what we're talking about. We're working with customers to help them identify their most critical assets, data, systems, applications, and isolate those from the threat vector. >> Obviously all verticals are impacted by cyber security. >> Every vertical is data-driven, that's right. >> And so obviously the low-hanging fruit, are they the normal suspects, financial services? Is there a particular one that's hotter than, obviously financial services has got fraud and all that stuff on it, but is that still number one, or-- >> So I think there's two sides to the coin. One, if you look at the traditional enterprise environments, absolutely financial services and healthcare 'cause they're both heavily regulated, therefore that data has very high value and is a very attractive target to the would-be hackers. If you look on the other end of the spectrum, though, the small to medium businesses that all rely on the internet for their business to run, they're the ones that are most susceptible because they don't have the budgets, the infrastructure, or the expertise to protect themselves from a sophisticated hacker. So we work across all verticals. Obviously the government is also very susceptible to cyber threats. But it's every industry, any business that's data-driven. I mean, everyone's been breached so many times, no one even knows how many times. I got to ask you about some cool trends we're reporting on here. Homomorphic encryption is getting a lot of traction here because financial services and healthcare are two-- >> Peter: Homomorphic? >> Homomorphic, yeah. Did I say that right? >> It's the first time I've ever heard that term, John. >> It's encryption at in use. So you have data at rest, data in flight, and data in use. So it's encryption when you're doing all your, protecting all your transactional data. So it's full implementation with Discovery. Intel's promoting it. We discovered a startup that's doing that, as well. >> Peter: Yeah, that's new for me, yeah. >> But it allows for more use cases. But data in use, not just motion, or in-flight, whatever they call it. >> Peter: I get it, yeah, static. >> So that's opening up these other thing. But it brings up the why, why that's important, and the reason is that financial services and healthcare, because they're regulated, have systems that were built many moons ago or generations ago. >> Absolutely. >> So there was none of these problems that you were mentioning earlier, like, they weren't built for that. >> Correct. >> But now you need more data. AI needs sharing of data. Sharing is a huge deal. >> Real-time sharing, too, right? >> Real-time sharing. >> And I think that's where the homomorphic encryption comes in. >> That's exactly right. So you mentioned that. So these industries, how can they maintain their existing operations and then get more data sharing? Do you have any insight into how you see that? Because that's one of those areas that's becoming like, okay, HIPAA, we know why that was built, but it's also restrictive. How do you maintain the purity of a process-- >> If your infrastructure is old? That is a challenge, healthcare especially, because, I mean, if I'm running a health system, every dollar that I have should really go into improving patient care, not necessarily into my IT infrastructure. But the more that every industry moves towards a real-time data-driven model for how we give care, right, the more that companies need to realize that data drives their business. They need to do everything they can to protect it and also ensure that they can recover it when and if a cyber attack happens. >> Well, I really appreciate the insight, and it's going to be great to see Dell Technologies World coming up. We'll dig into a lot of that stuff. While we're here and talking us about some of these financial services, banking, I want to get your thoughts. I've been hearing this term Sheltered Harbor being kicked around. What is that about? What does that mean? >> Sheltered Harbor, you're right, I think you'll hear a lot more about it. So Sheltered Harbor is a financial industries group and it's also a set of best practices and specifications. And really, the purpose of Sheltered Harbor is to protect consumer and financial institutions' data and public confidence in the US financial system. So the use case is this. You can imagine that a bank having a cyber attack and being unable to produce transactions could cause problems for customers of that bank. But just like we were talking about, the interconnectedness of the banking system means that one financial institution failing because of a cyber attack, it could trigger a cascade and a panic and a run on the US financial banks and therefore the global financial system. Sheltered Harbor was developed to really protect public confidence in the financial system by ensuring that banks, brokerages, credit unions are protecting their customer data, their account records, their most valuable assets from cyber attack, and that they can recover them and resume banking operations quickly. >> So this is an industry group? >> It's an industry group. >> Or is it a Dell group or-- >> No, Sheltered Harbor is a US financial industry group. It's a non-profit. You can learn more about it at shelteredharbor.org. The interesting thing for Dell Technologies is we're actually the first member of the Sheltered Harbor solution provider program, and we'll be announcing that shortly, in fact, this week, and we'll have a cyber recovery for Sheltered Harbor solution in the market very shortly. >> Cyber resilience, great topic, and you know, it just goes to show storage is never going away. The basic concepts of IT, recovery, continuous operations, non-disruptive operations. Cloud scale changes the game. >> Peter: It's all about the data. >> It's all about the data. >> Still, yes, sir. >> Thanks for coming on and sharing your insights. >> Thank you, John. >> RSA coverage here, CUBE, day two of three days of coverage. I'm John Furrier here on the ground floor in Moscone in San Francisco. Thanks for watching (electronic music)

Published Date : Feb 28 2020

SUMMARY :

brought to you by SiliconANGLE Media. It's cloud, it's the edge, the three waves of cloud, and the companies have and confidentiality of the data. and the idea of disruption Now, that's obviously the same and everything that happens in between, into the ecosystem, and you may or may not be So that's going out of the Dell family. and extending the cyber recovery solution but at the same time, The reality is that the modern threats So in their case, and, you know, Obviously all verticals are data-driven, that's right. or the expertise to protect themselves Did I say that right? It's the first time I've So you have data at rest, data But data in use, not just motion, and the reason is that financial that you were mentioning earlier, But now you need more data. the homomorphic encryption comes in. So you mentioned that. the more that companies need to realize and it's going to be great to see So the use case is this. of the Sheltered Harbor and you know, it just goes to show and sharing your insights. I'm John Furrier here on the ground floor

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
Pete GerrPERSON

0.99+

Peter GerrPERSON

0.99+

$80QUANTITY

0.99+

AmazonORGANIZATION

0.99+

JohnPERSON

0.99+

Dave VolantePERSON

0.99+

DellORGANIZATION

0.99+

John FurrierPERSON

0.99+

PeterPERSON

0.99+

two sidesQUANTITY

0.99+

100%QUANTITY

0.99+

Sheltered HarborORGANIZATION

0.99+

$100 millionQUANTITY

0.99+

San FranciscoLOCATION

0.99+

Dell EMCORGANIZATION

0.99+

30,000 feetQUANTITY

0.99+

three daysQUANTITY

0.99+

RSAORGANIZATION

0.99+

MosconeLOCATION

0.99+

OracleORGANIZATION

0.99+

twoQUANTITY

0.99+

Dell TechnologiesORGANIZATION

0.99+

shelteredharbor.orgOTHER

0.99+

Unisys StealthORGANIZATION

0.99+

CUBEORGANIZATION

0.99+

OneQUANTITY

0.99+

RSA Conference 2020EVENT

0.99+

this weekDATE

0.99+

SiliconANGLE MediaORGANIZATION

0.99+

VMwareORGANIZATION

0.99+

five pillarsQUANTITY

0.98+

Office 365TITLE

0.98+

EMCORGANIZATION

0.98+

over 20 yearsQUANTITY

0.98+

SecureworksORGANIZATION

0.98+

bothQUANTITY

0.97+

first timeQUANTITY

0.97+

USLOCATION

0.97+

Dell Technologies WorldORGANIZATION

0.97+

oneQUANTITY

0.96+

Dell StorageORGANIZATION

0.95+

HIPAATITLE

0.95+

NISTORGANIZATION

0.95+

RSA Conference 2020 SanEVENT

0.94+

this morningDATE

0.91+

over a decadeQUANTITY

0.9+

one thingQUANTITY

0.9+

AzureORGANIZATION

0.89+

RSACORGANIZATION

0.84+

first memberQUANTITY

0.84+

BlackOTHER

0.84+

firstQUANTITY

0.83+

five years agoDATE

0.81+

day twoQUANTITY

0.79+

Carbon BlackORGANIZATION

0.78+

IntelORGANIZATION

0.76+

three wavesEVENT

0.71+

DiscoveryORGANIZATION

0.7+

RSATITLE

0.7+

Sheltered HarborOTHER

0.68+

PowerProtectORGANIZATION

0.65+

many moonsDATE

0.64+

Vittorio Viarengo, McAfee | RSAC USA 2020


 

>> Announcer: Live from San Francisco, it's theCUBE covering RSA Conference 2020, San Francisco. Brought to you by SiliconANGLE Media. >> Welcome back everybody, Jeff Frick with theCUBE. We're at RSA 2020. It's day four, it's Thursday. This is a crazy long conference, 40,000 people. Even with the challenges presented by coronavirus, and there's a lot of weird stuff going on, the team pulled it together, they went forward. And even though there was drops out here and there, I think all in all, most people will tell you, it's been a pretty successful conference. And we're excited to be joined by really one of the top level sponsors here, that's still here and still doing good things. It's Vittorio Viare... Viarengo, sorry, the new interim CMO of McAfee. >> Yeah. >> Vittorio, I just call you Vittorio all the time. I never look past your first name. Great to see you. >> Likewise. It's always a pleasure to be here with an institution of Silicon Valley-- >> Oh thank you, thank you. So interim CMO, I always think of like interim football coaches that they get pulled in halfway through the season, so the good news is you kind of got the job and all the responsibilities. The bad news is, you still have that interim thing, but you don't care, you just go to work, right? >> Now whenever you have an interim job, you have to just do the job and then that's the best way to operate. >> Yeah, so again, I couldn't help but go back and look at that conversation that we had at Xerox Parc, which is interesting. That's pretty foundational, everything that happens in Silicon Valley, and so many discoveries up there. And you touched on some really key themes in the way you manage your teams, but I think they're really much more valuable, and worth bringing back up again. And the context was using scrum as a way to manage people, but more importantly, what you said is it forced you as a leader to set first priorities and have great communication; and to continually do that on this two week pace, to keep everybody moving down the road. I think that is so powerful and so lacking unfortunately, in a lot of organizations today. >> Yeah, look, I think that when you hire smart people, if you just make sure that they understand what their priorities are, and then remove the obstacle and get out of the way, magical things happen. And I give you example that is very close to your heart. When I took over a great team at Skyhigh, that got bought by McAfee, they had content marketing down to a science, but they were lacking videos. So I brought that in. I said, "Guys, people watch videos, "people engage with videos, "we need to start telling the story through videos." And I started pushing, pushing, pushing, and then I pulled back, and these guys took it to a whole new level. And then they're doing videos, they're very creative, they are crisp. And I'm like, "Yeah, my job is done." >> It is really wild how video has become such an important way for education. I mean it used to be... I remember the first time I ever saw an engineer use Google to answer a question on writing code. I had never seen that before. I'm not a coder. Wow, I thought it was just for finding my local store or whatever. And now to see what really... I think YouTube has pushed people to expect that the answer to any question should be in a video. >> So, yesterday literally, somebody from a company I don't even know stopped me and said, "I watch you to videos on container. "Thank you very much." I was like, "What, you?" And the genesis of that was the sales people ask me, "Hey, we're selling container security and all that," but I don't even understand what containers are. Okay, sure. So I shot a video and I'm the CMO, I was the vice president. I think you have to put your face on your content. It doesn't matter how senior you are, you're not in a corner office, you're down there with the team. So I got into the studio, based on my background at VMware, I knew virtual machine, and I said, "Okay, how do you explain this "to somebody who's not technical?" And next thing you know, it makes its way out there, not just to our sales force, but to the market at large. That's fantastic. >> Right, and let me ask you to follow up on that because it seems like the world is very divergent as to those who kind of want their face, and more their personality to be part of their business culture and their business messaging, and those that don't. And you know, as part of our process, we always are looking at people's LinkedIn, and looking at people's Twitter. I get when people don't have Twitter, but it really surprises me when professionals, senior professionals within the industry aren't on LinkedIn. And is just like, wow! That is such a different kind of world. >> LinkedIn right now is... and I'm stealing this from Gary on the Chuck, as a big believer in this. LinkedIn right now is like Facebook 10 years ago. You get amazing organic distribution, and it's a crime not to use it. And the other thing is if you don't use it, how are you going to inspire your team to do the right thing? Modern marketing is all about organic distribution with a great content. If you're not doing it yourself... I grew up in a bakery. I used to look at my mom, we have a big bakery. We had eight people working, and I said, "Ma, why are you workin' so hard? "Your first day, last hour?" And she said, "Look, you cannot ask your people, "to work harder than you do." That was an amazing lesson. So it's not just about working hard, and harder than your team, it's about are you walking the walk? Are you doing the content? Are you doing the modern marketing things that work today, if you expect your people to also do it? >> Yeah, it's just funny 'cause, when we talk to them, I'm like, "If you don't even have a LinkedIn account, "we shouldn't even be talking to you "because you just won't get what we do. "You won't see the value, you won't understand it "and if you're not engaging at least "a little bit in the world then..." And then you look at people say like Michael Dell, I'll pick on or Pat Gelsinger who use social media, and put their personalities out there. And I think it's, people want to know who these people are, they want to do business with people that they they like, right? >> Absolutely. You know what's the worst to me? I can tell when an executive as somebody else manages their account, I can tell from a mile away. That's the other thing. You have to be genuine. You have to be who you are on your social and all your communication because people resonate with that, right? >> Right. All right, so what are you doing now? You got your new title, you've got some new power, you've got a great brand, leading brand in the industry, been around for a while, what are some of your new priorities? What's some of the energy that you're bringing in and where you want to to go with this thing? >> Well, my biggest priority right now is to get the brand and our marketing to catch up with what the products and the customers are already which is, Cloud, Cloud, Cloud. So when we spun off from Intel two years ago, we had this amazing heritage in the endpoint security. And then we bought Skyhigh, and Skyhigh was transformational for us because it became the foundation for us to move to become a cloud-first organization. And is in the process of becoming a cloud-first organization, and creating a business that is growing really fast. We also brought along the endpoint, which now is all delivered from the Cloud, to the cloud-first open unified approach, which is exciting. >> And we see Edge is just an extension of endpoints, I would assume. It just changes the game. >> Yeah, so if you think about today modern work gets done with the backend in the Cloud, and accessing those backends from the device, right? >> Right. >> And so, our strategy is to secure data where modern work gets done, and it's in the device, in the Cloud, and on the edge. Because data moves in and out of the Cloud, and that's kind of the edge of the Cloud. That's what we launched this week at RSA we launched Unified Cloud Edge, which is our kind of a, Gartner call's it SaaS-y, so that we are kind of the security. We believe we have the most complete and unified security part of the SaaS-y world. >> Okay, I just laugh at Gartner and the trough of disillusion men and Jeff and I always go back to a Mars law. Mar does not get enough credit for a Mars law. We've got a lot of laws, but Mars law, we tend to overestimate in the short term, the impact of these technologies, and they completely underestimate really the long tail of this technology improvements, and we see it here. So let's shift gears a little bit. When you have your customers coming in here, and they walk into RSA for the first time, how do you tell people to navigate this crazy show and the 5,000 vendors and the more kind of solutions and spin vocabulary, then is probably save for anyone to consume over three days? >> Look, security is tough because you look around and say, "You have six, 700 vendors here." It's hard to stand out from the crowd. So what I tell our customers is use this as a way to meet with your strategic vendors in the booth upstairs. That's where you conduct business and all that. And I walk around to see from the ground up, send your more junior team out there to see what's happening because some of these smaller companies that are out here will be the big transformational companies or the future like Skyhigh was three four years ago, and now we're part of McAfee, and leading the charge there. >> Yeah, just how do you find the diamond in the rough, right? >> Yeah. >> 'Cause there's just so much. But it's still the little guys that are often on the leading edge and the bleeding edge, of the innovation so you want to know what's going on so that you're kind of walking into the back corners of the floor as well. >> That's why I am lifelong learner, so I go around to see what people do from a marketing perspective because, the last thing I want to do, I want to become obsolete. (Jeff laughs) And the way you don't become obsolete is to see what the new kids on the block do and steal their ideas, steal their tactics take them to the next level. >> Right, so I want to ask you a sensitive question about the conference itself and the coronavirus thing and we all saw what happened in Mobile World Congress. I guess it just got announced today that Facebook pulled F8, their developer conference. We're in the conference business. You go to a lot of conferences. Did you have some thought process? There were some big sponsors that pulled out of this thing. How did you guys kind of approach the situation? >> It's a tough one. >> It's a really tough one. >> It's a very tough one 'cause last thing you want to do is to put your employees and your customers at risk. But the way we looked at it was there were zero cases of coronavirus in San Francisco. And we saw what the rest of the industry was doing, and we made the call to come here, give good advice to our employees, wash their hands, and usual and this too will pass. >> Yeah, yeah. Well Vittorio, it's always great to catch up with you. >> Likewise. >> I just loved the energy, and congratulations. I know you'll do good things, and I wouldn't be at all surprised if that interim title fades away like we see with most great coaches. >> Good. >> So thanks for stopping by. >> My pleasure. >> All right, he's Vittorio, I'm Jeff. You're watching theCUBE, we're at RSA 2020 in San Francisco. Thanks for watching, we'll see you next time. (upbeat music)

Published Date : Feb 28 2020

SUMMARY :

Brought to you by SiliconANGLE Media. and there's a lot of weird stuff going on, Vittorio, I just call you It's always a pleasure to be here so the good news is you kind of got the job you have to just do the job in the way you manage your teams, And I give you example that is very close to your heart. that the answer to any question should be in a video. I think you have to put your face on your content. Right, and let me ask you to follow up on that And the other thing is if you don't use it, "we shouldn't even be talking to you You have to be who you are and where you want to to go with this thing? and our marketing to catch up with what the products It just changes the game. and it's in the device, in the Cloud, and on the edge. security part of the SaaS-y world. and the 5,000 vendors and the more kind of solutions That's where you conduct business and all that. and the bleeding edge, of the innovation And the way you don't become obsolete is to see and we all saw what happened in Mobile World Congress. 'cause last thing you want to do Well Vittorio, it's always great to catch up with you. I just loved the energy, Thanks for watching, we'll see you next time.

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
Jeff FrickPERSON

0.99+

Pat GelsingerPERSON

0.99+

JeffPERSON

0.99+

Michael DellPERSON

0.99+

FacebookORGANIZATION

0.99+

YouTubeORGANIZATION

0.99+

San FranciscoLOCATION

0.99+

McAfeeORGANIZATION

0.99+

VittorioPERSON

0.99+

Silicon ValleyLOCATION

0.99+

SkyhighORGANIZATION

0.99+

GartnerORGANIZATION

0.99+

ThursdayDATE

0.99+

Vittorio ViarengoPERSON

0.99+

yesterdayDATE

0.99+

GaryPERSON

0.99+

two weekQUANTITY

0.99+

40,000 peopleQUANTITY

0.99+

first timeQUANTITY

0.99+

RSA Conference 2020EVENT

0.99+

IntelORGANIZATION

0.99+

LinkedInORGANIZATION

0.99+

eight peopleQUANTITY

0.99+

RSAORGANIZATION

0.99+

Mobile World CongressEVENT

0.99+

six, 700 vendorsQUANTITY

0.98+

todayDATE

0.98+

SiliconANGLE MediaORGANIZATION

0.98+

RSA 2020EVENT

0.98+

first dayQUANTITY

0.98+

10 years agoDATE

0.98+

5,000 vendorsQUANTITY

0.98+

this weekDATE

0.98+

over three daysQUANTITY

0.97+

coronavirusOTHER

0.97+

ViarengoPERSON

0.97+

oneQUANTITY

0.96+

firstQUANTITY

0.96+

two years agoDATE

0.96+

VMwareORGANIZATION

0.96+

GoogleORGANIZATION

0.95+

TwitterORGANIZATION

0.94+

theCUBEORGANIZATION

0.93+

three four years agoDATE

0.91+

MarORGANIZATION

0.91+

zero casesQUANTITY

0.89+

Xerox ParcORGANIZATION

0.84+

first nameQUANTITY

0.83+

MarsLOCATION

0.79+

Vittorio ViarePERSON

0.79+

RSAC USA 2020ORGANIZATION

0.78+

Cloud EdgeTITLE

0.77+

day fourQUANTITY

0.76+

first organizationQUANTITY

0.72+

a mileQUANTITY

0.64+

RSATITLE

0.63+

F8COMMERCIAL_ITEM

0.62+

ChuckPERSON

0.54+

levelQUANTITY

0.52+

McAfeePERSON

0.49+

EdgeTITLE

0.44+

MarsTITLE

0.43+

Stephen Chin, JFrog | RSAC USA 2020


 

>> Narrator: Live from San Francisco, it's theCube covering RSA Conference 2020 San Francisco brought to you by Silicon Angle Media. >> Hey welcome back here ready Jeff Frick here with theCube. We're at the RSA Conference downtown San Francisco, about 40,000 people In the year we're going to know everything with the benefit of fine sight. It's not really working out that way. So we're still going out to the events, getting the smartest people we can find, bringing them to you. We're excited to have our very next guest. He's Steve Chin, the senior director of developer relations for JFrog. Steve, great to meet you. >> Thanks very much for having me here at the conference. >> Absolutely so for people that don't know JFrog, give him kind of the one on one. >> So I think the simplest way to describe our company is where the database of DevOps >> The database of DevOps. (laughs) I don't know that that would be the simplest way, >> But basically when companies want to deliver software faster, when they're looking at how to speed up their feature development, how to respond quicker to security, we provide a end-to-end DevOps platform, the JFrog platform, which accomplishes this for companies. >> Okay so a lot of people know about DevOps. A lot of people have experienced with rapid iteration on their apps. I don't know why they have to keep uploading updates all the time. There's a ton of great benefits to that and this really revolutionize the software industry. That said, the other kind of theme here at RSA and a lot of the security conferences is you can no longer bolt security on. It can no longer be a moat around the castle. It can no longer be a firewall on the edge of the network that it has to be baked in all the way through the product. And that goes right back to kind of what you guys do. And on the DevOps, how do devs who didn't necessarily get trained on security don't necessarily want to know about security and probably would prefer not to have to deal they probably liked the better when they could just push it off, but kind of like they used to push it off to prod. That's not the way anymore they have to bake it in. So how do you help them do that? What do you kind of see in terms of trends in the space? >> Yeah, so I think what we're seeing in the industry is that companies want to deliver, they need to deliver software more quickly and more rapidly. Just based on user requirements. So if you think about your phone, your car, like pretty much everything is updating constantly and it's not even a choice anymore. Updates get pushed to you because you need new features. You also need security fixes for things. And this is happening weekly, daily, hourly. As new threats are exposed and for companies, the standard processes which might have been used in the past to type security or reviews to run a complicated scanners to have like different checkpoints that doesn't work in an environment where you're continuously deploying. And really if you think about it, the only way you can accomplish rapid iteration, high security is to be doing security scanning as a part of your workflow. As a part of your DevOps workflow and shifting left. So going towards the developers and giving them more tools, which give them information about potential security risks. So as an example, developers code and an IDE or some sort of visual environment. And if you can present the information up front right there and tell them, "Hey, this open source library "you're using it has a security vulnerability, "there's a new version you should upgrade." Or "Hey this component that has an incompatible license. "Like this doesn't meet our security requirements." Those sort of things if they're caught while you're developing new features, it saves time and money there. But it delays potential slippage, risks, pushback from the security team at the other end. The next step is when they check in code or when they're executing a build. You want to be scanning up front scan the bills, scan the binary's really far up the chain. And that way you're catching security vulnerabilities during the iterative development process. By the time you get to like QA to stage to production, security vulnerabilities shouldn't be a surprise. They should be something which the teams up front know about. They're addressing and you're using tools which are designed in that workflow to really give early, often feedback to the teams up the chain and see it's the only way like all the large companies doing continuous deployments. This is how you have to approach it. You use multiple techniques, you use binary scatters, you use source code scanners even runtime scanners and you make sure you shift as much left as possible, which is exactly what the JFrog platform enables development teams to do. >> So what percentage roughly is just making sure you've got the first thing that you described that you've got the right libraries that you're using the right tools that have already gone through some security protocol check versus just writing in a bad sequence of steps or that API call or opening up some hole via just bad code choices. Yeah so I think increasingly as companies depends more on third party libraries, open source libraries. if you think about your average application, you're bundling in hundreds of different components and libraries which you have relatively little control over. And a simple way to look at this as if you created a Docker container today, you loaded up with a bunch of DB and packages, maybe a few application bundles within a few days, at the end of a month, that will be full of security vulnerabilities. So that container you build one month ago, it will be full which is outdated. You'll have hundreds of security vulnerabilities >> Just because validated patches or because people see it in attacking? >> Well the thing is you constantly have folks releasing new software, identifying vulnerability risks, patching those risks. And if you don't stay current, if you're not constantly updating your software to stay up with the latest security patches, you're putting your customers and your own business at risk. So I think today that is the number one issue with software is we all depend on open source libraries and components which are used by a lot of companies are constantly being improved and then patched. And the most important thing is knowing when their security vulnerability is identifying the risk of how those impact your customers and then patching as quickly as possible. >> And then the other piece of it is just API is to lots of other people, software that I don't necessarily have access to rights to. So the fact that so much of this stuff is all tied together. Now an attendant just opens up kind of a whole another layer of a potential attack surface. So have you seen things change in kind of IOT as kind of OT and IT come together with IOT and a lot of those OT devices, we're not necessarily set up for patching, they weren't necessarily set up with easy to get into operating systems or maybe too easy to get into operating systems. How are you seeing kind of all the growth that's happening there impact this conversation? >> Yeah, so I think especially with edge devices, I think what we've realized is that edge devices which aren't being updated or insecurity devices. So if you don't have a plan for how you update a new patch and you address security vulnerabilities in your edge devices, they're subject to the same risks. If they're running a variant of Linux, then they're running open source software. They're running a bunch of libraries. If they're on the network, they're open to network attacks. And we have even more complicated edge devices rolling around the roads now. There were some critical security patches and several of the self driving cars with braking systems, with obstacle avoidance systems. So if you don't have an aggressive plan on how you're patching your edge devices you reached the same sort of challenge. And what that involves again is identifying what libraries and components you depend upon, assessing the security risks, which those pose and then having a distribution plan. How do you go from your systems through builds, through deployments and then do the edge distribution to all the devices to get critical security updates to your end users as quickly as possible. >> I'm just curious who do you see on the teams that ultimately has responsibility that this is ready to go or not go. 'Cause we've seen too many instances of stuff that gets shipped that's not ready to go. I can certainly see the pressure to get stuff shipped and somebody says, well, that's okay, we'll just get that patch out. We'll get that patch out next week or we'll get that patch out sometime down the road. And we've seen a ton of things go out that are super easily hacked children's toys and some of these things that have all kinds of really bad implications to it. Is there somebody usually on the team that's, that needs to give the stamp of approval? Is it more of kind of a broad? >> Yes I think the traditional approach is having somebody within the company responsible for security, but increasingly to effectively address security, it needs to be the ownership of the whole team from end to end to make it successful. So the more the security team can be an ally of the QA team of the development team, of the DevOps team rather than being the gatekeeper, they want to be the ally of those teams. Then the more successful it is. So arming the other teams in your company with knowledge about security risks, arming with tools which provide visibility into different security vulnerabilities. That's the way which you have a end-to-end secure product because when you get to the release, if the security team holds up the release, you're either making a bad decision or a bad decision. Catching it up front. When you're building features, then you actually can address it and build the right security into your product, which is much better for your customers and your company. >> Well, Steve, interesting conversation, interesting times. The DevOps and the rapid deploy is certainly the way it is that we're here. So being able to effectively bake that security is only a good thing, but really a necessary thing. >> Well, this was great chatting with you and the conference here is great to see all of these folks focused on improving security and taking us to the next generation with more secure edge devices. >> I don't think there'll be any shortage of need for security professionals anytime soon. All right well thanks again Steve. >> All right, thank you. All right Steve, I'm Jeff Frick. You're watching theCube. We're at the RSA Conference in downtown San Francisco. Thanks for watching. We'll see you next time. (upbeat music)

Published Date : Feb 28 2020

SUMMARY :

brought to you by Silicon Angle Media. We're at the RSA Conference downtown San Francisco, give him kind of the one on one. I don't know that that would be the simplest way, the JFrog platform, which accomplishes this for companies. and a lot of the security conferences is you can no longer By the time you get to like QA to stage to production, So that container you build one month ago, Well the thing is you constantly have folks releasing So the fact that so much of this stuff is all tied together. So if you don't have a plan for how you update a new patch I can certainly see the pressure to get stuff shipped That's the way which you have a end-to-end secure product The DevOps and the rapid deploy is certainly the way and the conference here is great to see all of these folks I don't think there'll be any shortage of need We're at the RSA Conference in downtown San Francisco.

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
Steve ChinPERSON

0.99+

StevePERSON

0.99+

Jeff FrickPERSON

0.99+

Stephen ChinPERSON

0.99+

Silicon Angle MediaORGANIZATION

0.99+

next weekDATE

0.99+

LinuxTITLE

0.99+

one month agoDATE

0.98+

San FranciscoLOCATION

0.98+

hundredsQUANTITY

0.98+

first thingQUANTITY

0.98+

todayDATE

0.98+

RSAORGANIZATION

0.98+

JFrogPERSON

0.97+

JFrogTITLE

0.96+

about 40,000 peopleQUANTITY

0.96+

RSA ConferenceEVENT

0.95+

FranciscoLOCATION

0.95+

USALOCATION

0.94+

DevOpsTITLE

0.94+

RSACORGANIZATION

0.93+

theCubeORGANIZATION

0.89+

JFrogORGANIZATION

0.85+

RSA Conference 2020 SanEVENT

0.85+

DevOpsORGANIZATION

0.83+

hundreds of security vulnerabilitiesQUANTITY

0.82+

different componentsQUANTITY

0.66+

number one issueQUANTITY

0.65+

a monthQUANTITY

0.65+

daysQUANTITY

0.63+

2020DATE

0.59+

NarratorTITLE

0.51+

tonQUANTITY

0.5+

Rose Ross, Tech Trailblazer | RSAC USA 2020


 

>> Narrator: Live from San Francisco. It's theCUBE. Covering RSA conference 2020 San Francisco. Brought to you by SiliconANGLE Media. (upbeat music) >> Hey, welcome back, everybody. Jeff Rick here with theCUBE. We're at RSA 2020, Moscone and beautiful San Francisco's day four I think Thursday already. This is a crazy conference Monday, Tuesday, Wednesday, Thursday, and Friday. I don't think we'll be here for tomorrow. It's been a pretty full slate. As it is, we're excited to have our next guest. She is Rose Ross, the founder and chief trailblazer, for Tech Trailblazers. Rose. Great to meet you. >> It's great to be here too. >> Absolutely. So what are the Tech Trailblazers? >> So the Tech Trailblazers are an awards lead platform, which recognizes the creme de la creme of the enterprise Tech startup landscape. >> Jeff: Okay. >> So we cover the categories from AI through to storage, but obviously security is a big part of that and we find that security and cloud are usually our most popular awards to be entered into. >> Okay, and I assume you're, really recognizing the individuals more than the companies, >> We do both. >> Or is it more of the companies? You do both. >> We do the Tech category so they can compare like for like apples with apples, pears with pears, security startups with security startups. And then we also acknowledge and recognize some of the key players in those startups. So we have a female trailblazers and a male trailblazer each year . >> Okay, and how long have you been doing this? >> This is our eighth edition. >> The eighth edition. >> Started for a while. 2012 was our first outing. >> Okay, And you said you just gave out this year's Awards on Monday? >> That's right. We announced it. Yeah, day one of RSA. >> Right, so give us some of the highlights. Who were some of the special people that you called out this year? >> Some of the special people, I actually sat down with one of the special people just now interviewed CEO of Shift-left who is our security trailblazer this year. Manish Gupta and yeah, we spent some time chatting about his journey and his challenges and his successes. And finding out more about the technology itself. So. >> And so what are the criteria to win? >> So we kind of look at a number of elements. We have an independent body of judges who are from the analyst community, from the blogger community from industry itself. So we have CSOs, CIOs, and just people who understand the Technology really, at both the technical level and what is needed by the marketplace. So we look at a number of things. One is obviously innovation. If you're looking at the startup world, you want to look at people who are bringing new and exciting things that are needed by companies, to either secure them or store their data or analyze their data. But we also look at how they're doing in the market. So, we'll be looking at what their go to market strategy is, how they're engaging with the end user community, that type of stuff. >> Okay. And at what stage in their growth are they generally you know, kind of coming into your radar? >> So we sort of do the cutoff for a start up as being having not celebrated their sixth birthday yet. >> Six birthday okay. >> Right, so and have not gone beyond Series C funding. >> Okay. >> So you wanted to keep it on the the newer end of the startup spectrum. We also have a special award for those that have not received any VC funding whatsoever. So they're either growing organically or privately funded. That could be seed capital, you know, crowdfunding, whatever that might be. And they have to be two years or younger, and they are all fire starters. >> And those are fire starters. So those are probably it's just really a function of life, 'cause I would imagine the vast majority of the companies that you recognize, eventually get VC funding if you're playing in this crazy technology space. >> It certainly helps to get to where you want to go. Accelerate, put a bit more fuel in the tank. >> So you also announced in your press release the incredible amount of money (laughs) your award winners have raised over time. Do you tell us a little bit more about that? >> Well, yeah, with RSA this week, we thought it'd be a great time to reflect back on what our security trailblazers had done over these eight editions. And obviously, it's a little bit early for expecting additional fundraising from Shift-left, 'cause they literally got the award on Monday. >> Great. >> But hopefully, if you look at the history of it all, we look at the people who've received the accolade over the last eight editions, nearly all of them have been within their first two years. Most of them have done at least one round of funding, but have usually gone on to do another significant round of funding within 12 months of having one, we'd love to take all the credit for that, but I think you really need to put that on the team. >> Jeff: Right. >> And acquisitions have also been quite prevalent. So we looked at the numbers just before RSA, and it was 72 722 million of the disclosed raised, and just in the security, >> Right. >> Space. Unfortunately, or very fortunately for one of our winners, ZeroFOX, they just peeped in with raising 74 million last Friday, which we didn't include. So if we put the undisclosed it would definitely over 800 million now. So well done to the ZeroFOX guys. >> Right, so how did you get involved in this? >> It was an idea that I had. My my other life is a Tech PR person. And we were working on a campaign for a show somewhat like RSA in the UK. And we thought it would be a great idea to run a startup competition to highlight some new entrants to the market. Unfortunately, they didn't think it was a fit for what they wanted to do, but it was such a compelling idea. I've worked with startups all my life and one of the challenges was always with them, particularly in the early stages to get recognition and to get coverage. So we thought we can do something about this. And I thought, well, nobody's going to listen to a PR person. They aren't interested in what I think. I'm not an expert on who's great in this space. So I spoke to Joe Bagley, who's the CTO of Amir for VMware, who's somebody I've worked with a lot over the years. And I said, Look, Joe, if I run something like this, would you come on board as a judge? And he said, Absolutely, I think it's a brilliant idea. And luckily, many other amazing judges has followed in his footsteps. So it's thanks to them, so. >> How many judges are there? >> We have around 40. I mean, we have a number of what a number of categories. So we want a specialist in those areas. Some cover multiple light cloud and security or Cloud and Storage. But obviously, when you look at AI and blockchain and all these other categories, you need people who really understand that space. >> And what's the process kind of how big is the top of the funnel when he started? And then how do you kind of whittle it down to the end when you said 1212 categories, so 12 winners per year about? >> Yeah. So we started off as obviously people enter usually through their PR team or their marketing team, or pull together the information that we request, which is quite a lengthy process, it's a big commitment of time. But not huge, but we do want to get to a certain amount of detail, to make a decision and give the judges something to work with. Then for that period, we then put out the judges to create the shortlist. So they will come back they will score on a number of elements, which are things like innovation and the maturity of the technology, then go to market attractiveness and their own personal view of how exciting and it is intuitive and how trailblazing it actually is. >> Right. >> Then we put it out to a public vote, but also the judges then take the shortlist and take another look at everybody. >> And it gets a public vote too? >> Yes, it does. >> It so does. Do the judges ever meet with the the nominees or is it all done based on the application the application packet that you put together and any other independent information they find on their own? >> Well, we still would encourage. I know the judges do like to reach out to people. And I know that obviously there are relationships because of the nature of the types of judges. >> Jeff: Sure. >> Obviously, we've got people in industry within the vendor community, analysts and bloggers, so they will have people that they know. So I always encourage people, if they say, you know, what would you do? I said, Well, if I was you, I would also reach out to the judges in your area, and just make them aware of who you are. And if they have other questions that they should you know, set up a briefing or something. >> Right. So it's really interesting concept to get the pub into the startup world because it's really, as you know, being in PR, you know, it's really hard to get elevated above the noise, if you will. And you know, we're sitting here surrounded by I don't even know how many thousands of vendors are in this hall. >> The early stage has 51 just as a starter. >> 51 in the early stage expo. >> Yes. >> Which hall is that? >> It's up on the second floor. >> On the second floor. Then there's little like corners of cubbies have of not even 10 by 10s. But you know the kind of the classic kiosks. So, when you're talking to two small companies, regardless of whether they go for the word, what do you tell them as a PR pro? What do you tell them as someone who's, you know, kind of seeing the challenges of trying to raise your profile as a small company? Do you stick to your knitting? Do you in a try to get a high profile? When you know, what are some of the tips and tricks that help little companies rise above the den, if you will, in this great space. >> Validation is always very important. Talk to the influencers in your space, talk to the analysts in your space, the bloggers in your space, and get that feedback and integrate it into your plan of how you create your message. And I think that's one of the hard things, a lot of startups particularly in the technology space, particularly enterprise Tech, they really in the weeds with what's amazing about their products and why they put it together. But you really have to put that into very simple terms. >> Jeff: Right. >> I mean, if you look at someone like RSA, we have got, you know, a lot of buzzwords kicking around here. You do have to try and put that into the deeds and requirements of the end user community. That's always got to be your lens on things >> Right. >> really. >> And you also you always have the vendor viability issues, you know, with your top and even if your Tech relatively inexpensive, maybe as a PLC or this or that, it still takes an investment from your potential customers to put it in and take that risk. And, you know, that's a much bigger hurdle to overcome often than simply the pricing or the structure of the deal. Not a easy, not an easy path. >> It has to be a partnership. I mean, one of the things we were advocating a couple years ago is that the bigger organizations really should have somebody who has a role of being a Chief Collaboration Officer for those smaller companies to engage with them. Because even the procurement process can obviously kill you. >> A little kill a little company, right? Even the pre sales, just having meetings and meetings and meetings and meetings and meetings and meetings to talk about the meetings that you're going to have to maybe eventually (laughs) get to somebody who can make a decision. >> Yeah, Its tough. >> Very cool. >> So, any kind of significant changes in the programme over time? Are you pretty much at the same place you were eight years ago? Or do you see this expanding into different categories? How do you see, you know, kind of the evolution of the Trailblazer? >> Well, we like to review everything and we listened to our judges, we listened to people in the marketplace. I mean, I had a great meeting yesterday with somebody in banking, who works with an awful lot of startups. And there is some really good news coming through that. The enterprise Tech VC community, there's a lot more of an appetite. They're starting to see the value more and more of investing in that type of longer longer term, because you can actually scale beyond where you can do sometimes with a consumer Technology. >> Right >> The potential unicorn sometimes don't quite make it. Those horses aren't always that reliable in the race. >> (laughs) Sometimes too much money is not a good thing that is for sure. >> Yeah. >> Or is good for you? It's a great way I know, I think the kind of the award format is a great way to shine a little bit of extra light on some of these companies that are really struggling to get noticed. It's a really difficult process for a startup, especially in such a deep Technology field. Something is so mission critical that people it's just not that easy for people to give you a try and give you a trial. Takes a lot of investment. So good work and look forward >> Thank you. to continuing to see the winners, raise lots of money and have success. >> Right, absolutely. Thank you, Jeff. >> All right Rose thanks again. She's Rose, I'm Jeff. You're watching theCUBE. We're at RSA 2020. Thanks for watching, we'll see you next time. (upbeat music)

Published Date : Feb 28 2020

SUMMARY :

Brought to you by SiliconANGLE Media. She is Rose Ross, the founder and chief trailblazer, So what are the Tech Trailblazers? So the Tech Trailblazers are an awards lead platform, So we cover the categories from AI through to storage, Or is it more of the companies? We do the Tech category so they can compare Started for a while. Yeah, day one of RSA. that you called out this year? Some of the special people, I actually sat down So we look at a number of things. are they generally you know, So we sort of do the cutoff for a start up as being having So you wanted to keep it on the the newer end that you recognize, eventually get VC funding It certainly helps to get to where you want to go. So you also announced in your press release we thought it'd be a great time to reflect back on what but I think you really need to put that on the team. and just in the security, So if we put the undisclosed and one of the challenges was always with them, But obviously, when you look at AI and blockchain innovation and the maturity of the technology, but also the judges then take the shortlist the application packet that you put together I know the judges do like to reach out to people. and just make them aware of who you are. into the startup world because it's really, as you know, kind of seeing the challenges of trying to raise your profile of how you create your message. we have got, you know, And you also you always have the vendor viability issues, I mean, one of the things we were advocating Even the pre sales, just having meetings and meetings and we listened to our judges, Those horses aren't always that reliable in the race. that is for sure. it's just not that easy for people to give you a try to continuing to see the winners, Right, absolutely. Thanks for watching, we'll see you next time.

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
RosePERSON

0.99+

JeffPERSON

0.99+

Jeff RickPERSON

0.99+

Joe BagleyPERSON

0.99+

Rose RossPERSON

0.99+

second floorQUANTITY

0.99+

12 winnersQUANTITY

0.99+

two yearsQUANTITY

0.99+

UKLOCATION

0.99+

MondayDATE

0.99+

72 722 millionQUANTITY

0.99+

JoePERSON

0.99+

1212 categoriesQUANTITY

0.99+

ZeroFOXORGANIZATION

0.99+

eighth editionQUANTITY

0.99+

FridayDATE

0.99+

74 millionQUANTITY

0.99+

Manish GuptaPERSON

0.99+

tomorrowDATE

0.99+

bothQUANTITY

0.99+

first two yearsQUANTITY

0.99+

yesterdayDATE

0.99+

VMwareORGANIZATION

0.99+

San FranciscoLOCATION

0.99+

sixth birthdayQUANTITY

0.99+

each yearQUANTITY

0.99+

WednesdayDATE

0.99+

TuesdayDATE

0.99+

SiliconANGLE MediaORGANIZATION

0.99+

2012DATE

0.99+

over 800 millionQUANTITY

0.99+

eight years agoDATE

0.99+

ThursdayDATE

0.99+

eight editionsQUANTITY

0.99+

last FridayDATE

0.99+

this yearDATE

0.98+

Tech TrailblazersORGANIZATION

0.98+

oneQUANTITY

0.98+

OneQUANTITY

0.98+

10sQUANTITY

0.98+

RSA 2020EVENT

0.98+

12 monthsQUANTITY

0.97+

Six birthdayQUANTITY

0.97+

RSAORGANIZATION

0.97+

AmirORGANIZATION

0.97+

thousandsQUANTITY

0.96+

first outingQUANTITY

0.96+

this weekDATE

0.96+

10QUANTITY

0.95+

RSACORGANIZATION

0.95+

ShiftORGANIZATION

0.94+

two small companiesQUANTITY

0.94+

around 40QUANTITY

0.93+

couple years agoDATE

0.91+

MosconeLOCATION

0.91+

Series COTHER

0.91+

Tech TrailblazerORGANIZATION

0.87+

RSA conference 2020EVENT

0.87+

leftORGANIZATION

0.78+

theCUBEORGANIZATION

0.76+

one roundQUANTITY

0.72+

51QUANTITY

0.72+

2020ORGANIZATION

0.71+

CEOPERSON

0.69+

TrailblazerORGANIZATION

0.64+

day oneQUANTITY

0.61+