Nimrod Vax, BigID | AWS re:Invent 2020 Partner Network Day
>> Announcer: From around the globe, it's theCUBE. With digital coverage of AWS re:Invent 2020. Special coverage sponsored by AWS global partner network. >> Okay, welcome back everyone to theCUBE virtual coverage of re:Invent 2020 virtual. Normally we're in person, this year because of the pandemic we're doing remote interviews and we've got a great coverage here of the APN, Amazon Partner Network experience. I'm your host John Furrier, we are theCUBE virtual. Got a great guest from Tel Aviv remotely calling in and videoing, Nimrod Vax, who is the chief product officer and co-founder of BigID. This is the beautiful thing about remote, you're in Tel Aviv, I'm in Palo Alto, great to see you. We're not in person but thanks for coming on. >> Thank you. Great to see you as well. >> So you guys have had a lot of success at BigID, I've noticed a lot of awards, startup to watch, company to watch, kind of a good market opportunity data, data at scale, identification, as the web evolves beyond web presence identification, authentication is super important. You guys are called BigID. What's the purpose of the company? Why do you exist? What's the value proposition? >> So first of all, best startup to work at based on Glassdoor worldwide, so that's a big achievement too. So look, four years ago we started BigID when we realized that there is a gap in the market between the new demands from organizations in terms of how to protect their personal and sensitive information that they collect about their customers, their employees. The regulations were becoming more strict but the tools that were out there, to the large extent still are there, were not providing to those requirements and organizations have to deal with some of those challenges in manual processes, right? For example, the right to be forgotten. Organizations need to be able to find and delete a person's data if they want to be deleted. That's based on GDPR and later on even CCPA. And organizations have no way of doing it because the tools that were available could not tell them whose data it is that they found. The tools were very siloed. They were looking at either unstructured data and file shares or windows and so forth, or they were looking at databases, there was nothing for Big Data, there was nothing for cloud business applications. And so we identified that there is a gap here and we addressed it by building BigID basically to address those challenges. >> That's great, great stuff. And I remember four years ago when I was banging on the table and saying, you know regulation can stunt innovation because you had the confluence of massive platform shifts combined with the business pressure from society. That's not stopping and it's continuing today. You seeing it globally, whether it's fake news in journalism, to privacy concerns where modern applications, this is not going away. You guys have a great market opportunity. What is the product? What is smallID? What do you guys got right now? How do customers maintain the success as the ground continues to shift under them as platforms become more prevalent, more tools, more platforms, more everything? >> So, I'll start with BigID. What is BigID? So BigID really helps organizations better manage and protect the data that they own. And it does that by connecting to everything you have around structured databases and unstructured file shares, big data, cloud storage, business applications and then providing very deep insight into that data. Cataloging all the data, so you know what data you have where and classifying it so you know what type of data you have. Plus you're analyzing the data to find similar and duplicate data and then correlating them to an identity. Very strong, very broad solution fit for IT organization. We have some of the largest organizations out there, the biggest retailers, the biggest financial services organizations, manufacturing and et cetera. What we are seeing is that there are, with the adoption of cloud and business success obviously of AWS, that there are a lot of organizations that are not as big, that don't have an IT organization, that have a very well functioning DevOps organization but still have a very big footprint in Amazon and in other kind of cloud services. And they want to get visibility and they want to do it quickly. And the SmallID is really built for that. SmallID is a lightweight version of BigID that is cloud-native built for your AWS environment. And what it means is that you can quickly install it using CloudFormation templates straight from the AWS marketplace. Quickly stand up an environment that can scan, discover your assets in your account automatically and give you immediate visibility into that, your S3 bucket, into your DynamoDB environments, into your EMR clusters, into your Athena databases and immediately building a full catalog of all the data, so you know what files you have where, you know where what tables, what technical metadata, operational metadata, business metadata and also classified data information. So you know where you have sensitive information and you can immediately address that and apply controls to that information. >> So this is data discovery. So the use case is, I'm an Amazon partner, I mean we use theCUBE virtuals on Amazon, but let's just say hypothetically, we're growing like crazy. Got S3 buckets over here secure, encrypted and the rest, all that stuff. Things are happening, we're growing like a weed. Do we just deploy smallIDs and how it works? Is that use cases, SmallID is for AWS and BigID for everything else or? >> You can start small with SmallID, you get the visibility you need, you can leverage the automation of AWS so that you automatically discover those data sources, connect to them and get visibility. And you could grow into BigID using the same deployment inside AWS. You don't have to switch migrate and you use the same container cluster that is running inside your account and automatically scale it up and then connect to other systems or benefit from the more advanced capabilities the BigID can offer such as correlation, by connecting to maybe your Salesforce, CRM system and getting the ability to correlate to your customer data and understand also whose data it is that you're storing. Connecting to your on-premise mainframe, with the same deployment connecting to your Google Drive or office 365. But the point is that with the smallID you can really start quickly, small with a very small team and get that visibility very quickly. >> Nimrod, I want to ask you a question. What is the definition of cloud native data discovery? What does that mean to you? >> So cloud native means that it leverages all the benefits of the cloud. Like it gets all of the automation and visibility that you get in a cloud environment versus any traditional on-prem environment. So one thing is that BigID is installed directly from your marketplace. So you could browse, find its solution on the AWS marketplace and purchase it. It gets deployed using CloudFormation templates very easily and very quickly. It runs on a elastic container service so that once it runs you can automatically scale it up and down to increase the scan and the scale capabilities of the solution. It connects automatically behind the scenes into the security hub of AWS. So you get those alerts, the policy alerts fed into your security hub. It has integration also directly into the native logging capabilities of AWS. So your existing Datadog or whatever you're using for monitoring can plug into it automatically. That's what we mean by cloud native. >> And if you're cloud native you got to be positioned to take advantage of the data and machine learning in particular. Can you expand on the role of machine learning in your solution? Customers are leaning in heavily this year, you're seeing more uptake on machine learning which is basically AI, AI is machine learning, but it's all tied together. ML is big on all the deployments. Can you share your thoughts? >> Yeah, absolutely. So data discovery is a very tough problem and it has been around for 20 years. And the traditional methods of classifying the data or understanding what type of data you have has been, you're looking at the pattern of the data. Typically regular expressions or types of kind of pattern-matching techniques that look at the data. But sometimes in order to know what is personal or what is sensitive it's not enough to look at the pattern of the data. How do you distinguish between a date of birth and any other date. Date of birth is much more sensitive. How do you find country of residency or how do you identify even a first name from the last name? So for that, you need more advanced, more sophisticated capabilities that go beyond just pattern matching. And BigID has a variety of those techniques, we call that discovery-in-depth. What it means is that very similar to security-in-depth where you can not rely on a single security control to protect your environment, you can not rely on a single discovery method to truly classify the data. So yes, we have regular expression, that's the table state basic capability of data classification but if you want to find data that is more contextual like a first name, last name, even a phone number and distinguish between a phone number and just a sequence of numbers, you need more contextual NLP based discovery, name entity recognition. We're using (indistinct) to extract and find data contextually. We also apply deep learning, CNN capable, it's called CNN, which is basically deep learning in order to identify and classify document types. Which is basically being able to distinguish between a resume and a application form. Finding financial records, finding medical records. So RA are advanced NLP classifiers can find that type of data. The more advanced capabilities that go beyond the smallID into BigID also include cluster analysis which is an unsupervised machine learning method of finding duplicate and similar data correlation and other techniques that are more contextual and need to use machine learning for that. >> Yeah, and unsupervised that's a lot harder than supervised. You need to have that ability to get that what you can't see. You got to get the blind spots identified and that's really the key observational data you need. This brings up the kind of operational you heard cluster, I hear governance security you mentioned earlier GDPR, this is an operational impact. Can you talk about how it impacts on specifically on the privacy protection and governance side because certainly I get the clustering side of it, operationally just great. Everyone needs to get that. But now on the business model side, this is where people are spending a lot of time scared and worried actually. What the hell to do? >> One of the things that we realized very early on when we started with BigID is that everybody needs a discovery. You need discovery and we actually started with privacy. You need discovery in route to map your data and apply the privacy controls. You need discovery for security, like we said, right? Find and identify sensitive data and apply controls. And you also need discovery for data enablement. You want to discover the data, you want to enable it, to govern it, to make it accessible to the other parts of your business. So discovery is really a foundation and starting point and that you get there with smallID. How do you operationalize that? So BigID has the concept of an application framework. Think about it like an Apple store for data discovery where you can run applications inside your kind of discovery iPhone in order to run specific (indistinct) use cases. So, how do you operationalize privacy use cases? We have applications for privacy use cases like subject access requests and data rights fulfillment, right? Under the CCPA, you have the right to request your data, what data is being stored about you. BigID can help you find all that data in the catalog that after we scan and find that information we can find any individual data. We have an application also in the privacy space for consent governance right under CCP. And you have the right to opt out. If you opt out, your data cannot be sold, cannot be used. How do you enforce that? How do you make sure that if someone opted out, that person's data is not being pumped into Glue, into some other system for analytics, into Redshift or Snowflake? BigID can identify a specific person's data and make sure that it's not being used for analytics and alert if there is a violation. So that's just an example of how you operationalize this knowledge for privacy. And we have more examples also for data enablement and data management. >> There's so much headroom opportunity to build out new functionality, make it programmable. I really appreciate what you guys are doing, totally needed in the industry. I could just see endless opportunities to make this operationally scalable, more programmable, once you kind of get the foundation out there. So congratulations, Nimrod and the whole team. The question I want to ask you, we're here at re:Invent's virtual, three weeks we're here covering Cube action, check out theCUBE experience zone, the partner experience. What is the difference between BigID and say Amazon's Macy? Let's think about that. So how do you compare and contrast, in Amazon they say we love partnering, but we promote our ecosystem. You guys sure have a similar thing. What's the difference? >> There's a big difference. Yes, there is some overlap because both a smallID and Macy can classify data in S3 buckets. And Macy does a pretty good job at it, right? I'm not arguing about it. But smallID is not only about scanning for sensitive data in S3. It also scans anything else you have in your AWS environment, like DynamoDB, like EMR, like Athena. We're also adding Redshift soon, Glue and other rare data sources as well. And it's not only about identifying and alerting on sensitive data, it's about building full catalog (indistinct) It's about giving you almost like a full registry of your data in AWS, where you can look up any type of data and see where it's found across structured, unstructured big data repositories that you're handling inside your AWS environment. So it's broader than just for security. Apart from the fact that they're used for privacy, I would say the biggest value of it is by building that catalog and making it accessible for data enablement, enabling your data across the board for other use cases, for analytics in Redshift, for Glue, for data integrations, for various other purposes. We have also integration into Kinesis to be able to scan and let you know which topics, use what type of data. So it's really a very, very robust full-blown catalog of the data that across the board that is dynamic. And also like you mentioned, accessible to APIs. Very much like the AWS tradition. >> Yeah, great stuff. I got to ask you a question while you're here. You're the co-founder and again congratulations on your success. Also the chief product officer of BigID, what's your advice to your colleagues and potentially new friends out there that are watching here? And let's take it from the entrepreneurial perspective. I have an application and I start growing and maybe I have funding, maybe I take a more pragmatic approach versus raising billions of dollars. But as you grow the pressure for AppSec reviews, having all the table stakes features, how do you advise developers or entrepreneurs or even business people, small medium-sized enterprises to prepare? Is there a way, is there a playbook to say, rather than looking back saying, oh, I didn't do with all the things I got to go back and retrofit, get BigID. Is there a playbook that you see that will help companies so they don't get killed with AppSec reviews and privacy compliance reviews? Could be a waste of time. What's your thoughts on all this? >> Well, I think that very early on when we started BigID, and that was our perspective is that we knew that we are a security and privacy company. So we had to take that very seriously upfront and be prepared. Security cannot be an afterthought. It's something that needs to be built in. And from day one we have taken all of the steps that were needed in order to make sure that what we're building is robust and secure. And that includes, obviously applying all of the code and CI/CD tools that are available for testing your code, whether it's (indistinct), these type of tools. Applying and providing, penetration testing and working with best in line kind of pen testing companies and white hat hackers that would look at your code. These are kind of the things that, that's what you get funding for, right? >> Yeah. >> And you need to take advantage of that and use them. And then as soon as we got bigger, we also invested in a very, kind of a very strong CSO that comes from the industry that has a lot of expertise and a lot of credibility. We also have kind of CSO group. So, each step of funding we've used extensively also to make RM kind of security poster a lot more robust and invisible. >> Final question for you. When should someone buy BigID? When should they engage? Is it something that people can just download immediately and integrate? Do you have to have, is the go-to-market kind of a new target the VP level or is it the... How does someone know when to buy you and download it and use the software? Take us through the use case of how customers engage with. >> Yeah, so customers directly have those requirements when they start hitting and having to comply with regulations around privacy and security. So very early on, especially organizations that deal with consumer information, get to a point where they need to be accountable for the data that they store about their customers and they want to be able to know their data and provide the privacy controls they need to their consumers. For our BigID product this typically is a kind of a medium size and up company, and with an IT organization. For smallID, this is a good fit for companies that are much smaller, that operate mostly out of their, their IT is basically their DevOps teams. And once they have more than 10, 20 data sources in AWS, that's where they start losing count of the data that they have and they need to get more visibility and be able to control what data is being stored there. Because very quickly you start losing count of data information, even for an organization like BigID, which isn't a bigger organization, right? We have 200 employees. We are at the point where it's hard to keep track and keep control of all the data that is being stored in all of the different data sources, right? In AWS, in Google Drive, in some of our other sources, right? And that's the point where you need to start thinking about having that visibility. >> Yeah, like all growth plan, dream big, start small and get big. And I think that's a nice pathway. So small gets you going and you lead right into the BigID. Great stuff. Final, final question for you while I gatchu here. Why the awards? Someone's like, hey, BigID is this cool company, love the founder, love the team, love the value proposition, makes a lot of sense. Why all the awards? >> Look, I think one of the things that was compelling about BigID from the beginning is that we did things differently. Our whole approach for personal data discovery is unique. And instead of looking at the data, we started by looking at the identities, the people and finally looking at their data, learning how their data looks like and then searching for that information. So that was a very different approach to the traditional approach of data discovery. And we continue to innovate and to look at those problems from a different perspective so we can offer our customers an alternative to what was done in the past. It's not saying that we don't do the basic stuffs. The Reg X is the connectivity that that is needed. But we always took a slightly different approach to diversify, to offer something slightly different and more comprehensive. And I think that was the thing that really attracted us from the beginning with the RSA Innovation Sandbox award that we won in 2018, the Gartner Cool Vendor award that we received. And later on also the other awards. And I think that's the unique aspect of BigID. >> You know you solve big problems than certainly as needed. We saw this early on and again I don't think that the problem is going to go away anytime soon, platforms are emerging, more tools than ever before that converge into platforms and as the logic changes at the top all of that's moving onto the underground. So, congratulations, great insight. >> Thank you very much. >> Thank you. Thank you for coming on theCUBE. Appreciate it Nimrod. Okay, I'm John Furrier. We are theCUBE virtual here for the partner experience APN virtual. Thanks for watching. (gentle music)
SUMMARY :
Announcer: From around the globe, of the APN, Amazon Partner Great to see you as well. So you guys have had a For example, the right to be forgotten. What is the product? of all the data, so you know and the rest, all that stuff. and you use the same container cluster What is the definition of Like it gets all of the automation of the data and machine and need to use machine learning for that. and that's really the key and that you get there with smallID. Nimrod and the whole team. of the data that across the things I got to go back These are kind of the things that, and a lot of credibility. is the go-to-market kind of And that's the point where you need and you lead right into the BigID. And instead of looking at the data, and as the logic changes at the top for the partner experience APN virtual.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
AWS | ORGANIZATION | 0.99+ |
Nimrod Vax | PERSON | 0.99+ |
Nimrod | PERSON | 0.99+ |
Amazon | ORGANIZATION | 0.99+ |
John Furrier | PERSON | 0.99+ |
Palo Alto | LOCATION | 0.99+ |
Tel Aviv | LOCATION | 0.99+ |
2018 | DATE | 0.99+ |
Glassdoor | ORGANIZATION | 0.99+ |
BigID | TITLE | 0.99+ |
200 employees | QUANTITY | 0.99+ |
iPhone | COMMERCIAL_ITEM | 0.99+ |
BigID | ORGANIZATION | 0.99+ |
Apple | ORGANIZATION | 0.99+ |
SmallID | TITLE | 0.99+ |
GDPR | TITLE | 0.99+ |
four years ago | DATE | 0.98+ |
billions of dollars | QUANTITY | 0.98+ |
Redshift | TITLE | 0.98+ |
CloudFormation | TITLE | 0.97+ |
both | QUANTITY | 0.97+ |
DynamoDB | TITLE | 0.97+ |
single | QUANTITY | 0.97+ |
CNN | ORGANIZATION | 0.97+ |
this year | DATE | 0.97+ |
EMR | TITLE | 0.97+ |
one thing | QUANTITY | 0.97+ |
One | QUANTITY | 0.96+ |
one | QUANTITY | 0.96+ |
each step | QUANTITY | 0.95+ |
Amazon Partner Network | ORGANIZATION | 0.95+ |
three weeks | QUANTITY | 0.95+ |
APN | ORGANIZATION | 0.95+ |
20 years | QUANTITY | 0.95+ |
S3 | TITLE | 0.94+ |
Athena | TITLE | 0.94+ |
office 365 | TITLE | 0.94+ |
today | DATE | 0.93+ |
first name | QUANTITY | 0.92+ |
smallIDs | TITLE | 0.91+ |
Gartner Cool Vendor | TITLE | 0.91+ |
Kinesis | TITLE | 0.91+ |
20 data sources | QUANTITY | 0.9+ |
RSA Innovation Sandbox | TITLE | 0.88+ |
CCP | TITLE | 0.88+ |
Invent 2020 Partner Network Day | EVENT | 0.88+ |
smallID | TITLE | 0.88+ |
more than 10, | QUANTITY | 0.88+ |
Macy | ORGANIZATION | 0.86+ |
Dr. Ellison Anne Williams, Enveil | RSAC USA 2020
>> Narrator: Live from San Francisco. It's the theCUBE covering RSA Conference 2020 San Francisco, brought to you by SiliconAngle Media. >> Alright, welcome to theCUBE coverage here at RSA Conference in San Francisco and Moscone Halls, theCUBE. I'm John Furrier, the host of theCUBE, in a cyber security is all about encryption data and also security. We have a very hot startup here, that amazing guest, Dr. Ellison Anne Williams, CEO and Founder of Enveil just recently secured a $10 million Series A Funding really attacking a real problem around encryption and use. Again, data ,security, analytics, making it all secure is great. Allison, and thanks for coming on. Appreciate your time. >> Thanks for having me. >> So congratulations on the funding before we get started into the interview talking about the hard news, you guys that are around the funding. How long have you guys been around? What's the funding going to do? What are you guys doing? >> Yeah, so we're about three and a half years old as a company. We just announced our Series A close last week. So that was led by C5. And their new US Funds The Impact Fund and participating. Other partners included folks like MasterCard, Capital One Ventures, Bloomberg, Beta 1843, etc. >> So some names jumped in C5 led the round. >> For sure. >> How did this get started? What was the idea behind this three years you've been actually doing some work? Are you going to production? Is it R&D? Is it in market? Give us a quick update on the status of product and solution? >> Yeah, so full production. For production of the product. We're in fact in 2.0 of the release. And so we got our start inside of the National Security Agency, where I spent the majority of my career. And we developed some breakthroughs in an area of technology called homomorphic encryption, that allows you to perform computations into the encrypted domain as if they were in the unencrypted world. So the tech had never existed in a practical capacity. So we knew that bringing seeds of that technology out of the intelligence community and using it to seed really and start the company, we would be creating a new commercial market. >> So look at this, right? So you're at the NSA, >> Correct >> Your practitioner, they're doing a lot of work in this area, pioneering a new capability. And did the NSA spin it out did they fund it was the seed capital there or did you guys bootstrap it >> No. So our seed round was done by an entity called Data Tribe. So designed to take teams in technologies that were coming out of the IC that wanted to commercialize to do so. So we took seed funding from them. And then we were actually one of the youngest company ever to be in the RSA Innovation Sandbox here in 2017, to be one of the winners and that's where the conversation really started to change around this technology called homomorphic encryption, the market category space called securing data in use and what that meant. And so from there, we started running the initial version of a product out in the commercial world and we encountered two universal reaction. One that we were expecting and one that we weren't. And the one that we were expecting is that people said, "holy cow, this actually works". Because what we say we do keeping everything encrypted during processing. Sounds pretty impossible. It's not just the math. And then the second reaction that we encountered that we weren't expecting is those initial early adopters turned around and said to us, "can we strategically invest in you?" So our second round of funding was actually a Strategic Round where folks like Bloomberg beta,Thomson Reuters, USA and Incue Towel came into the company. >> That's Pre Series A >> Pre Series A >> So you still moving along, if a sandbox, you get some visibility >> Correct. >> Then were the products working on my god is you know, working. That's great. So I want to get into before I get into some of the overhead involved in traditionally its encryption there always has been that overhead tax. And you guys seem to solve that. But can you describe first data-at-rest versus data-in-motion and data-in-user. data at rest, as means not doing anything but >> Yeah, >> In flight or in you so they the same, is there a difference? Can you just tell us the difference of someone this can be kind of confusing. >> So it's helpful to think of data security in three parts that we call the triad. So securing data at rest on the file system and the database, etc. This would be your more traditional in database encryption, or file based encryption also includes things like access control. The second area, the data security triad is securing data- in- transit when it's moving around through the network. So securing data at rest and in transit. Very well solution. A lot of big name companies do that today, folks like Talus and we partner with them, Talus, Gemalto, etc. Now, the third portion of the data security triad is what happens to that data when you go use or process it in some way when it becomes most valuable. And that's where we focus. So as a company, we secure data-in-use when it's being used or processed. So what does that mean? It means we can do things like take searches or analytics encrypt them, and then go run them without ever decrypting them at any point during processing. So like I said, this represents a new commercial market, where we're seeing it manifest most often right now are in things like enabling secure data sharing, and collaboration, or enabling secure data monetization, because its privacy preserving and privacy enabling as a capability. >> And so that I get this right, the problem that you solved is that during the end use parts of the triad, it had to be decrypted first and then encrypted again, and that was the vulnerability area. Look, can you describe kind of like, the main problem that you guys saw was that-- >> So think more about, if you've got data and you want to give me access to it, I'm a completely different entity. And the way that you're going to give me access to it is allowing me to run a search over your data holdings. We see this quite a bit in between two banks in the areas of anti-money laundering or financial crime. So if I'm going to go run a search in your environment, say I'm going to look for someone that's an EU resident. Well, their personal information is covered under GDPR. Right? So if I go run that search in your environment, just because I'm coming to look for a certain individual doesn't mean you actually know anything about that. And so if you don't, and you have no data on them whatsoever, I've just introduced a new variable into your environment that you now have to account for, From a risk and liability perspective under something like GDPR. Whereas if you use us, we could take that search encrypt it within our walls, send it out to you and you could process it in its encrypted state. And because it's never decrypted during processing, there's no risk to you of any increased liability because that PII or that EU resident identifier is never introduced into your space. >> So the operating side of the business where there's compliance and risk management are going to love this, >> For sure. >> Is that really where the action is? >> Yes, compliance risk privacy. >> Alright, so get a little nerdy action on this one. So encryption has always been an awesome thing depending on who you talk to you, obviously, but he's always been a tax associate with the overhead processing power. He said, there's math involved. How does homeomorphic work? Does it have problems with performance? Is that a problem? Or if not, how do you address that? Where does it? I might say, well, I get it. But what's the tax for me? Or is your tax? >> Encryption is never free. I always tell people that. So there always is a little bit of latency associated with being able to do anything in an encrypted capacity, whether that's at rest at in transit or in use. Now, specifically with homomorphic encryption. It's not a new area of encryption. It's been around 30 or so years, and it had often been considered to be the holy grail of encryption for exactly the reasons we've already talked about. Doing things like taking searches or analytics and encrypting them, running them without ever decrypting anything opens up a world of different types of use cases across verticals and-- >> Give those use case examples. What would be some that would be low hanging fruit. And it would be much more higher level. >> Some of the things that we're seeing today under that umbrella of secure data sharing and collaboration, specifically inside of financial services, for use cases around anti-money laundering and financial crimes so, allowing two banks to be able to securely collaborate with with each other, along the lines of the example that I gave you just a second ago, and then also for large multinational banks to do so across jurisdictions in which they operate that have different privacy and secrecy regulations associated with them. >> Awesome. Well, Ellison, and I want to ask you about your experience at the NSA. And now as an entrepreneur, obviously, you have some, you know, pedigree at the NSA, really, you know, congratulations. It's going to be smart to work there, I guess. Secrets, you know, >> You absolutely do. >> Brains brain surgeon rocket scientist, so you get a lot of good stuff. But now that you're on the commercial space, it's been a conversation around how public and commercial are really trying to work together a lot as innovations are happening on both sides of the fence there. >> Yeah. >> Then the ICC and the Intelligence Community as well as commercial. Yeah, you're an entrepreneur, you got to go make money, you got shareholders down, you got investors? What's the collaboration look like? How does the world does it change for you? Is it the same? What's the vibe in DC these days around the balance between collaboration or is there? >> Well, we've seen a great example of this recently in that anti-money laundering financial crime use case. So the FCA and the Financial Conduct Authority out of the UK, so public entity sponsored a whole event called a tech spread in which they brought the banks together the private entities together with the startup companies, so your early emerging innovative capabilities, along with the public entities, like your privacy regulators, etc, and had us all work together to develop really innovative solutions to real problems within the banks. In the in the context of this text spread. We ended up winning the know your customer customer due diligence side of the text brand and then at the same time that us held an equivalent event in DC, where FinCEN took the lead, bringing in again, the banks, the private companies, etc, to all collaborate around this one problem. So I think that's a great example of when your public and your private and your private small and your private big is in the financial services institutions start to work together, we can really make breakthroughs-- >> So you see a lot happening >> We see a lot happening. >> The encryption solution actually helped that because it makes sense. Now you have the sharing the encryption. >> Yeah. >> Does that help with some of the privacy and interactions? >> It breaks through those barriers? Because if we were two banks, we can't necessarily openly, freely share all the information. But if I can ask you a question and do so in a secure and private capacity, still respecting all the access controls that you've put in place over your own data, then it allows that collaboration to occur, whereas otherwise I really couldn't in an efficient capacity. >> Okay, so here's the curveball question for you. So anybody Startup Series today, but you really got advanced Series A, you got a lot of funding multiple years of operation. If I asked you what's the impact that you're going to have on the world? What would you say to that, >> Over creating a whole new market, completely changing the paradigm about where and how you can use data for business purposes. And in terms of how much funding we have, we have, we've had a few rounds, but we only have 15 million into the company. So to be three and a half years old to see this new market emerging and being created with with only $15 million. It's really pretty impressive. >> Yeah, it's got a lot of growth and keep the ownership with the employees and the founders. >> It's always good, but being bootstrap is harder than it looks, isn't it? >> Yeah. >> Or how about society at large impact. You know, we're living global society these days and get all kinds of challenges. You see anything else in the future for your vision of impact. >> So securing data and your supplies horizontally across verticals. So far we've been focused mainly on financial services. But I think healthcare is a great vertical to move out in. And I think there are a lot of global challenges with healthcare and the more collaborative that we could be from a healthcare standpoint with our data. And I think our capabilities enable that to be possible. And still respecting all the privacy regulations and restrictions. I think that's a whole new world of possibility as well. >> And your secret sauce is what math? What's that? What's the secret sauce, >> Math, Math and grit. >> Alright, so thanks for sharing the insights. Give a quick plug for the company. What are you guys looking to do? Honestly, $10 million in funding priorities for you and the team? What do you guys live in to do? >> So priorities for us? privacy is a global issue now. So we are expanding globally. And you'll be hearing more about that very shortly. We also have new product lines that are going to be coming out enabling people to do more advanced decisioning in a completely secure and private capacity. >> And hiring office locations DC. >> Yes. So our headquarters is in DC, but we're based on over the world, so we're hiring, check out our web page. We're hiring for all kinds of roles from engineering to business functionality >> And virtual is okay virtual hires school >> Virtual hires is great. We're looking for awesome people no matter where they are. >> You know, DC but primary. Okay, so great to have you gone. Congratulations for one, the financing and then three years of bootstrapping and making it happen. Awesome. >> Thank you. >> Thank you for coming ,appreciate it. So keep coming to your RSA conference in Moscone. I'm John Furrier. Thanks for watching more after this short break (pop music playing)
SUMMARY :
brought to you by SiliconAngle Media. I'm John Furrier, the host of theCUBE, in a cyber security So congratulations on the funding before we get started So that was led by C5. and start the company, we would be creating And did the NSA spin it out did they fund it And the one that we were expecting is that people said, And you guys seem to solve that. In flight or in you so they the same, is there So securing data at rest on the file system and that you guys saw was that-- So if I'm going to go run a search in your environment, say who you talk to you, obviously, but he's always been a tax the reasons we've already talked about. And it would be much more higher Some of the things that we're seeing today under that Well, Ellison, and I want to ask you about your experience so you get a lot of good stuff. Is it the same? So the FCA and the Financial Conduct Authority out of the Now you have the sharing the encryption. private capacity, still respecting all the access controls So anybody Startup Series today, but you really got advanced So to be three and a half years old to see this new market Yeah, it's got a lot of growth and keep the ownership with You see anything else in the future for your vision of And still respecting all the privacy regulations and Math and grit. Alright, so thanks for sharing the insights. We also have new product lines that are going to be coming the world, so we're hiring, check out our web page. We're looking for awesome people no matter where they are. Okay, so great to have you gone. So keep coming to your RSA conference in Moscone.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
FCA | ORGANIZATION | 0.99+ |
MasterCard | ORGANIZATION | 0.99+ |
Bloomberg | ORGANIZATION | 0.99+ |
National Security Agency | ORGANIZATION | 0.99+ |
Gemalto | ORGANIZATION | 0.99+ |
Talus | ORGANIZATION | 0.99+ |
$10 million | QUANTITY | 0.99+ |
Allison | PERSON | 0.99+ |
Financial Conduct Authority | ORGANIZATION | 0.99+ |
Ellison | PERSON | 0.99+ |
John Furrier | PERSON | 0.99+ |
Thomson Reuters | ORGANIZATION | 0.99+ |
FinCEN | ORGANIZATION | 0.99+ |
15 million | QUANTITY | 0.99+ |
Capital One Ventures | ORGANIZATION | 0.99+ |
Moscone | LOCATION | 0.99+ |
two banks | QUANTITY | 0.99+ |
NSA | ORGANIZATION | 0.99+ |
UK | LOCATION | 0.99+ |
DC | LOCATION | 0.99+ |
2017 | DATE | 0.99+ |
San Francisco | LOCATION | 0.99+ |
C5 | ORGANIZATION | 0.99+ |
ICC | ORGANIZATION | 0.99+ |
three parts | QUANTITY | 0.99+ |
GDPR | TITLE | 0.99+ |
last week | DATE | 0.99+ |
first | QUANTITY | 0.99+ |
SiliconAngle Media | ORGANIZATION | 0.99+ |
One | QUANTITY | 0.99+ |
Enveil | ORGANIZATION | 0.99+ |
Ellison Anne Williams | PERSON | 0.99+ |
both sides | QUANTITY | 0.98+ |
second area | QUANTITY | 0.98+ |
second round | QUANTITY | 0.98+ |
three years | QUANTITY | 0.98+ |
one | QUANTITY | 0.98+ |
EU | ORGANIZATION | 0.98+ |
RSA Conference | EVENT | 0.98+ |
Beta 1843 | ORGANIZATION | 0.98+ |
today | DATE | 0.97+ |
second reaction | QUANTITY | 0.97+ |
third portion | QUANTITY | 0.97+ |
Moscone Halls | LOCATION | 0.97+ |
one problem | QUANTITY | 0.96+ |
Series A | OTHER | 0.95+ |
RSA | EVENT | 0.94+ |
two universal reaction | QUANTITY | 0.94+ |
USA | ORGANIZATION | 0.94+ |
$15 million | QUANTITY | 0.93+ |
around 30 or so years | QUANTITY | 0.93+ |
USA | LOCATION | 0.92+ |
three and a half years old | QUANTITY | 0.91+ |
Data Tribe | ORGANIZATION | 0.9+ |
Francisco | LOCATION | 0.89+ |
about three and a half years old | QUANTITY | 0.87+ |
a second ago | DATE | 0.87+ |
Intelligence Community | ORGANIZATION | 0.86+ |
RSA Innovation Sandbox | ORGANIZATION | 0.86+ |
RSA Conference 2020 San | EVENT | 0.85+ |
theCUBE | ORGANIZATION | 0.82+ |
2.0 | QUANTITY | 0.82+ |
Pre Series A | OTHER | 0.76+ |
EU | LOCATION | 0.72+ |
Incue Towel | ORGANIZATION | 0.69+ |
one of the winners | QUANTITY | 0.67+ |
RSAC | ORGANIZATION | 0.66+ |
2020 | DATE | 0.6+ |
US Funds The Impact Fund | OTHER | 0.59+ |
Narrator | TITLE | 0.56+ |
Dr. | PERSON | 0.5+ |
Ambuj Kumar, Fortanix | CUBEConversation, August 2018
(upbeat digital music) >> Hey welcome back, get ready. Jeff Frick here with theCUBE. We're in our Palo Alto studio for a Cube Conversation. Again, we love talking with little companies, emerging companies, kind of maybe technology you haven't heard of before and we're excited to have our next guest 'cause he's right in the heart of security space, which is always a hot topic, continues to be a hot topic and will never go away 'cause the bad guys they just keep working hard to try to break everything that we create. So our next guest is Ambuj Kumar, the co-founder and CEO of Fortanix. Ambuj welcome. >> Thank you, Jeff. >> So give, for the people who aren't familiar with Fortanix kind of the basic 101. >> Yeah, so if you look at all the security today, it falls into three categories. One is protecting your data address. So what that means is, if somebody steals your laptop, how do you protect your hard drive from getting exposed? >> Right. >> So we use encryption for that. Similarly, we also use encryption to secure our data in use. So we connect to some bank website and our data goes encrypted through TELUS and so what that means is if somebody's doing wiretapping our data is protected. However once the applications start to run, whether it's in your data center or public cloud, then the data applications are being exposed. So to fix that Runtime vulnerabilities what the industry has done so far is to secure the infrastructure, try to secure the infrastructure and that is $80 billion per year industry. But we have failed to that because infrastructure is just so vastly complex. So what we do is we use something called Runtime encryption and idea is that your data and applications remain encrypted, so even when people who are running your cloud they're untrusted and they want to get your data, they can't do anything with it. >> So, a lot of stuff there to unpack. So first off we know the perimeter systems don't work anymore. >> Yeah >> I mean you got to put them up they do some level of stuff But you can't secure the perimeter anymore. So it is all this kind of working your security >> Yeah and the encryption all the way through the process. But this is pretty interesting I've never heard of encryption actually at Runtime, I mean it begs the question, you know how does the microprocessor run the encrypted data? >> That's right So it's a long research problem in security. People had been working on something called Fully homomorphic encryption and the idea is that: Can I take my program encrypted data encrypted and run in totally untrusted environment and give you the result that you can decrypt. Chances are that you can do that with very simple programs, like if you're adding some numbers, multiplying those numbers and even in those cases slow by many orders of magnitude. So what normally some operations takes one second will it will take three years. >> Okay >> Not good. >> Laughs >> So what we do is we use some new instructions from Intel called Software Guard Extension, Intel SGX and your data and your programs, they get decrypted in a secure region of CPU So all the memory, all the operating systems accessible things, anything that can be touched by any other process, they only can look at encrypted stuff. Your data get decrypted right when instructions are working on them and at that point it is accessible only to your write process. >> Right. >> So you use this hardware capability to accelerate the encryption decryption. So we can provide all the benefits of fully owned morphic encryption at a performance that is totally acceptable to our customers. >> So let me make sure I understand, So it decrypts it literally at the last possible obviously not second >> Yeah but last possible (laughs) in microprocessor time >> Yeah cycle, runs that process and then is write only to the output of that process. And is that immediately encrypted again >> Exactly >> On the write side as well? >> Yeah Yeah, exactly. Exactly. >> (laughs) So you mentioned the Intel instructions So is this relatively new, the SGX? >> Yeah, so we were first vendor to commercialize Intel SGX, its a new technology, but it's coming in all their CPU's so right now it's in all client CPU's, and some of the data centers CPU's But five years from now all the CPU's you will get from Intel will hopefully have this technology >> Right So obviously Skylake >> Yeah Skylake has it and all newer architecture. >> Wow So a little bit more about the company How long you guys been around, how long you been working on this problem you know funding kind of give us the overview on the company. >> Yeah >> So I have been working on encryption for last seven years the company was founded two years ago >> Okay >> We are funded by some well known security VC's including Foundation Capital and NeoTribe Ventures >> Okay >> We are widely recognized as the pioneers in this field that we are creating Runtime encryption. Recognized by Gartner's Cool Vendor we came number two in RSA Innovation Sandbox you know hundreds of security companies. We have several S&P 500 customers already so we are deployed in their products and environment, we are securing trillions of dollars of assets in realtime. Our goal is to convince CIA to run their most prestigious most sensitive applications on some untrusted cloud in some enemy country. >> Laughs >> It's a long shot >> Are you doing like a POC of something like that with them? Are you in active conversations or is that more of kind of a philosophical goal? >> I cannot confirm of deny that >> Okay, fair enough >> But that's our goal. And until we achieve that, we have something to keep working on. >> Okay. And then where do you guys sit kind of in the world of public clouds with AWS and Azure and Google versus either private (mumbles) or multiple clouds inside the company or you know some of these other kind of options like we hear like the Equinix which I think is one of the places >> Yeah >> How's that work? >> Yeah So our goal is to extricate security from infrastructure So in the end, our goal is that infrastructure will provide you compute cycles and the security will come from the customers, end customers who are developing the applications and deploying the applications. >> Right >> So its cloud agnostic security so meaning that we will go after on-prem customers, we'll go after public cloud, colo and all of that >> Right >> So in the meantime for our go-to market what we did was we partnered with two of really well known strong forces in the industry, one is IBM Cloud >> Yeah where IBM is putting this servers and running our technology and with Equinix, which is world's largest data provider and so if you are in any of the public cloud, if you are in IBM cloud you get our security by default so you are continuous running encryption >> Right >> Isolated from all the threats that might be there, or if you are in some other public cloud you can use it Equinix colo so if you have some applications that you don't want to be hacked you can use our SAS service to run those applications encrypted. >> Right And of course Equinix has got the direct connect to all the public clouds >> Yeah >> So minimum latency integration >> Couple of milliseconds. >> with all the other stuff >> in the public cloud. >> Yeah exactly. So what's the expense, both kind of the overhead expense on the computing side to do this when it's done properly and then what's the expense to run this is this something that is expensive can only be used for the most critical applications, or do you see this several times being more general purpose execution? >> So its will be used to secure anything that you don't want to be hacked and the cost of using Runtime encryption is minimal so I expect it to be wisely adopted and we make it really easy for developers and security organizations to use this technology. So you have to bring in your container and then Fortanix process attaches to your container you don't need to recompile your source code we never get to look at your source code there's no binary transfers nothing like that. And then so it's a simple millisecond long process and we give you modified container and now you can take this modified container run on any cloud you want and if it runs it runs securely. From that point onwards. >> Right And today you just have to make sure its got right microprocessor >> Yeah and in the future hopefully that will be more general purpose. >> Yeah >> Alright So what's next? What are you working on, what's a priority for the balance of 2018? >> Yeah, so we have lots of integration work going on VIA World is coming next week We have support for something called Kermit that allows you to secure your estorial box v send et cetera with Fortanix. Now we are also running integration with some data bases some multi party computers and things like that. So our goal is to make our technology more widely available to a large variety of customers. >> Alight, well Ambuj very interesting story, Encryption at Runtime so >> Yeah >> So we look forward to watching the story unfold. >> Awesome, yeah This is a decade long journey and I think when we have done infrastructure security will be irrelevant. So its going to be very exciting for all the parties involved. >> Alright, we'll keep eye, thanks for stopping by. >> Thanks >> Alrighty, Ambuj Kumar You're watching theCube from our Palo Alto studios See you next time. And thanks for watching. (epic orchestra music)
SUMMARY :
you haven't heard of before So give, for the people who aren't familiar Yeah, so if you look at all the security today, So we connect to some bank website So first off we know the perimeter systems But you can't secure the perimeter anymore. I mean it begs the question, you know and give you the result that you can decrypt. So all the memory, all the operating systems So you use this hardware capability and then is write only to the output of that process. Yeah, exactly. Yeah So a little bit more about the company you know hundreds of security companies. And until we achieve that, or you know some of these other kind So in the end, our goal is that infrastructure that you don't want to be hacked on the computing side to do this when it's done properly So you have to bring in your container and in the future hopefully that allows you to secure So its going to be very exciting See you next time.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Jeff | PERSON | 0.99+ |
Jeff Frick | PERSON | 0.99+ |
Ambuj Kumar | PERSON | 0.99+ |
2018 | DATE | 0.99+ |
Fortanix | ORGANIZATION | 0.99+ |
August 2018 | DATE | 0.99+ |
three years | QUANTITY | 0.99+ |
Palo Alto | LOCATION | 0.99+ |
CIA | ORGANIZATION | 0.99+ |
AWS | ORGANIZATION | 0.99+ |
IBM | ORGANIZATION | 0.99+ |
two | QUANTITY | 0.99+ |
NeoTribe Ventures | ORGANIZATION | 0.99+ |
hundreds | QUANTITY | 0.99+ |
Equinix | ORGANIZATION | 0.99+ |
next week | DATE | 0.99+ |
one second | QUANTITY | 0.99+ |
trillions of dollars | QUANTITY | 0.99+ |
two years ago | DATE | 0.99+ |
Gartner | ORGANIZATION | 0.99+ |
Ambuj | PERSON | 0.99+ |
Foundation Capital | ORGANIZATION | 0.98+ |
ORGANIZATION | 0.98+ | |
Skylake | TITLE | 0.97+ |
both | QUANTITY | 0.97+ |
Intel | ORGANIZATION | 0.97+ |
today | DATE | 0.97+ |
first | QUANTITY | 0.97+ |
one | QUANTITY | 0.96+ |
first vendor | QUANTITY | 0.94+ |
One | QUANTITY | 0.93+ |
Couple of milliseconds | QUANTITY | 0.93+ |
five years | QUANTITY | 0.92+ |
VIA World | ORGANIZATION | 0.92+ |
Fortanix | TITLE | 0.9+ |
SGX | COMMERCIAL_ITEM | 0.88+ |
three categories | QUANTITY | 0.88+ |
$80 billion per year | QUANTITY | 0.82+ |
S&P 500 | ORGANIZATION | 0.82+ |
Software Guard Extension | TITLE | 0.76+ |
second | QUANTITY | 0.71+ |
theCUBE | ORGANIZATION | 0.69+ |
RSA Innovation Sandbox | ORGANIZATION | 0.69+ |
theCube | ORGANIZATION | 0.67+ |
last seven years | DATE | 0.66+ |
IBM Cloud | ORGANIZATION | 0.6+ |
number two | QUANTITY | 0.6+ |
Azure | TITLE | 0.57+ |
TELUS | ORGANIZATION | 0.56+ |
companies | QUANTITY | 0.56+ |
Kermit | TITLE | 0.56+ |
101 | QUANTITY | 0.54+ |
Vendor | ORGANIZATION | 0.51+ |
Conversation | EVENT | 0.49+ |
Cube | COMMERCIAL_ITEM | 0.48+ |
Fortanix | LOCATION | 0.41+ |