Image Title

Search Results for Ravi Srinivasan:

Ravi Srinivasan, Forcepoint & Rohit Gupta, AWS | AWS re:Invent 2019


 

>>LA from Las Vegas. It's the cube covering AWS reinvent 2019 brought to you by Amazon web services and along with its ecosystem partners. >>Hey, welcome back to Vegas baby. This is the cubes coverage of AWS reinvent 19 this is day three. John Walls is my cohost Jay. Welcome back to Vegas baby Vegas. It's Vegas baby. And you know I'm looking out back. So this is not like a day three crowd. It's really not. Now you can kind of yell out in the hallway and your echo bounce around, but there are a lot of people still here, a lot of business still being done. There really are. There's no shortage of that. And because we're live on the queue, what happens in Vegas doesn't stay in Vegas. So we're happy to welcome a couple of new guests to the queue that are going to share all these great things about security and teach us to, to my left is Robbie's sort of Austin VP of solutions and platform marketing from forest points and from AWS. >>Roe had gooped up global segment leader insecurity. Gentlemen, welcome. Thank you. Thanks for having us. So we can't go to any event without talking about security. It's, it's one of those topics that I think every generation understand when there are big breaches like Capitol one that happened recently or Facebook, even the older generations who are still in the workforce today, they understand it to some degree. The security is so complex. And, and Ravi, one of the things I know that's most challenging about security, especially cyber, is humans are 90 plus percent of the problem. It's human errors, right? Talk to us about Forcepoint. I love the tagline, human centric cybersecurity. How can you help us humans fix all of the errors that we're causing? Or can you, Doug, good question. It's, it's the cat and mouse game, right? Uh, so Forcepoint is a purpose belt, a user and data protection company, right? >>And we're focused on the digital identities and the behavior of their cyber behavior to be able to understand that and then protect, um, data and the users as well. So that's what we refer to as human centric cybersecurity. And how long have you guys been working on this? Oh, we've been working on this for decades. It's the problem with traditional security was all infrastructure centric, guns, guards and Gates and magic will happen. And then turns out those bad actors figure out the guns, guards and Gates and always looking to compromise users and their access. And so independent of whether the attack is external or internal, it's that compromise that that's the focus. And so when you focus on the compromise, that's where we focused on in terms of how to help companies with security. So, so what, what does that connection between behavior in between operations? >>I mean, so what are you looking for in terms of what that user's doing correctly or incorrectly? I mean, what kind of markers do you have? What kind of signs do you get? And in what corrective measures can you put into the process that automatically will correct or at least address that? Yeah, so let me take an example. Right? Um, so if I'm a developer, I'm building using Amazon's awesome services, putting a lot of content in there. I use get hub as a storage. I put a lot of information in there and I'm doing that quickly to get my project done. Right. As I do that and I launched that application, then security comes along after after fact and says, well, let's put security design a day and then how do we protect the data? That model is breaking. Why is it breaking? Because companies are saying users are no longer coming just from the enterprise. >>They're working from home, they're working from the Starbucks and they're accessing the same data and bad actors follow that too. What do they do? They follow the users and go, I can then pretend to be Ravi and get access to the data. And that's how you see a lot of the breaches. So what we're looking at is the behavior of Ravi as an employee. I engage with my mobile device, with my laptop, I get access. I work from eight to five, I'm in Austin most of the times. So the markers are user related, device related, and also context. It's like, why am I logging in from Austin? And at the same time also seeing a login from China that doesn't look right. So that's, that's an example of a behavior. So what's the red flag that goes up there? And you mentioned China, that's an extreme example, but I'm sure there are some more subtle or some not quite as obvious. >>I mean, what exactly is that, that prophylactic measure that that comes in that's automated that says, wait a minute, I don't think this is Ravi, although it's in Denver or it's on this server, whatever month. You know what I mean? Absolutely. So again, the context is built out of three things, users, devices and the environment. Right? By triangulating on those three things, you can actually capture very subtle needle in the haystack of being able to say, look, this is Robbie's behavior. So we're going to let him access get hub. We're going to let him access all the resources on Amazon, but as soon as we see deviations from that, we're going to throw a yellow flag. We're going to ask them to login with a multifactor authentication or some, some other additional form of engaging. Then if we still see more deviations, then we say the word, I'm actually blocked that and I can safely block it because I know that this is not Ravi anymore. Right. And that's how we've seen a lot of organizations use behavior at the heart of their security posture. >>So Rohit, before we went live, you, you told John and me that you've been in security for a thousand years. So one of the biggest challenges though besides people is, is being reactive. And when companies have to be reactive to security events, whether they're ostensible or, or more subtle like John talked about, that can potentially be catastrophic. Can you just talk to us a little bit about some of the historical changes say in the last few years that you've seen where companies, there's no time to go from react to be reactive. How are companies leveraging technologies like Forcepoint and AWS to go from reactive to predictive to eventually prescriptive? >>Yes, that's a good question. And firstly, it's a dozen years, not a thousand years, but, uh, it feels like that sometimes. Uh, so what we have found is that the cloud actually has helped companies become more secure because security is about visibility and control. And what the cloud does is provide better visibility than was available before because you have things like cloud trail that are showing any event that is happening in the system that you could actually use to figure out what happened before and then you can learn from that quickly and take action to fix it. So that's where the control part comes in. Over time you will get better at understanding the signals, as Robbie was saying, and you can be more predictive or you can take action much faster. And even if you don't completely solve the problem right away, you are able to react much faster. So the damages is minimal. Right? And so we've seen that change happened over the years. Companies are using automation that the cloud brings and coupled with the visibility to really gain control back. >>You know, there, there's um, I don't know if you'd call it a natural tension, but there's certainly some friction. Speed. Security, right? I want to go, go, go, go, go. I want to stop, stop, stop. So I've stopped. Right? So I mean our, our, our, our, they to take years, you know, cat and mouse are the, are they natural enemies or friction or can they be complimentary now in such a way because of what you are developing are the tools that we do have at our disposal now, can you address both? It's very, very interesting. The, when you started with an infrastructure centric security, when you put guns, guards and Gates, they were that tension, right? But when you start to change the conversation about, look, we're not about stopping progress, we want the developers to use the data, but we want them to do use it securely, right? And as you start to think about that approach, then security can actually be an enabler for digital transformation. Just as Amazon is talking today or throughout the last three days about how you've lots of services and enabling digital transformation. That's really our focus too, is how to enable that securely. How to enable users to be able to touch the data wherever it is, but secure that along the value chain >>is security. Is this question for both of you and Rohit? Let's start with you. Where is security and terms of the conversation as Andy Jassy talked about on Tuesday when he was talking about business, true business transformation gotta start at the top, you to have that senior exec level initiative sponsorship that's pushed down into the organization is security at that. I imagine it is at that senior level. Talk to us about how you've seen that evolve and how it is really a cornerstone to digital transformation. >>Yeah. I think security used to be an afterthought. The developers were not concerned about it. They don't teach security or at least they didn't teach security in college and computer science courses. It was not even that important. It's gone from that to an hour board level and perhaps even a regulatory level of discussion where it is being addressed by much higher authorities then even the board of the company. Right. So yes, it has definitely gone from a backroom operation that people didn't care about to something that is really very important and as Ravi said, you can move fast and stay secure. You almost have no choice because you have to move fast, right? Figuring out how to be secure in that environment and you don't do not want to end up in the news ultimately. And so that is why it is a conversation that is elevated. Now to the board level. >>Do you see that, speaking of ending up in the news, and there's a couple of folks whose boobs are here that have been in the news recently for significant breaches, human caused, is that when that becomes a sensational story, is that a facilitator of more conversations of customers coming? And maybe, maybe Ravi, I'll start with you. Customers coming to Forcepoint going, gosh, you know what, here's another example of a breach that affected millions and millions. We need to get our hands around this in a better way so that we can really use that data for competitive advantage to those, those news breaking stories, good for business. >>So we get invited to a lot of board level conversations. Our leaders get invited to speak to boards and the two common questions they get asked is, am I going to be the next target? Right? And then most importantly, the second one is how am I doing against my peer group? Right? And so when it comes to that conversation, as you as rotors, there's describing it, organizations are saying, look, I've gotta be able to run my business and I need to run it securely in order to do that. If I can answer those two questions, I'm not going to worry about the threats and attacks and what happened to in the news. I'm more focused on how can I get this new project deployed, security connected? How do I do this new mobile application? Get that and to protect the data, right? So that's the conversation that boards want to know. >>So they do want the reference point, for sure. Can we, you know, at least it's talk about the headlines and we all see that almost to the point that we're kind of numb to it, right? We're almost desensitized. Another hack, another breach or whatever. So we've, in a way, our mindset is, or Facebook that it happens. Can we get to the different, flip that paradigm to where we almost take for granted that it won't happen, that that are our guide. Our guards are that good. I mean, what does it take to get to that point to where we don't accept preachers and we look at them as an anomaly rather than for kind of the cost of doing business. I mean that's, that's been the central focus for us with the human centric cybersecurity. We're saying if you take, uh, any breach and their story reads, breach happened and then you get all the other what they did after effect, right? >>And then they'd tell you a story that happened that the bad actor or the compromise was happened over some period of time, whether it was months to detecting bad things. Ex-post is hard. But what we are focused on when you look at human centric security as we're saying, the time to steal data is in minutes, but the indicators that it takes to steal that data has been building up. So we're saying if we can use behavior to show that buildup, then we could block it before a breach happens. So it's kind of like a slow drip in your ceiling, right? You see it there, go and go ahead. Don't wait for the ceiling to collapse. Right? You've got a ring that's growing there, so do something about it. Exactly how to identify it. >>Last question as we look at, one of the other things that Andy showed on Tuesday is that 97% of it spend is still on prem. We know that there's a lot of hybrid cloud out there in those types of environments which are becoming more and more the norm. How do you help customers manage all of that data regardless of what's on from what's in the cloud and how things are moving in a secure way. >>And that's where for us the partnership is critical and we see the partnership with Amazon to be very strategic in the fact that Amazon's building up awesome set of foundational controls. That's great. We'll let the developers use that, right? And now as enterprises connect with their data, data is on prem and in the cloud and everywhere in between. How do you then implement security that's closest to where the data sits? So we were leverage a lot of the security controls that Amazon provides. And in addition to that, we then offer more of a unified policy control to provide that control wherever the data sits, whether it's on the end point in line or in the cloud. >>Exciting stuff. Well guys, thank you for joining John and me on the program, giving us more information on, on cybersecurity and some of the opportunities that businesses have to actually use that as an advantage. We appreciate your time. Thank you. Thank you for the time for John Walls. I'm Lisa Martin. You're watching the Q for Vegas. Re-invent 19 thanks for watching.

Published Date : Dec 6 2019

SUMMARY :

AWS reinvent 2019 brought to you by Amazon web services And you know I'm looking out back. How can you help us humans fix all of the errors that we're causing? And so when you focus on the compromise, that's where we I mean, so what are you looking for in terms of what that user's doing correctly or And that's how you see a lot of We're going to let him access all the resources on Amazon, but as soon as we see deviations So one of the biggest challenges though besides people is, is being reactive. that are showing any event that is happening in the system that you could actually use to So I mean our, our, our, our, they to take years, you know, it is really a cornerstone to digital transformation. care about to something that is really very important and as Ravi said, you can move fast and We need to get our hands around this in a better way so that we can really use that data for competitive advantage And so when it comes to that conversation, as you as rotors, there's describing it, I mean that's, that's been the central focus for us with the And then they'd tell you a story that happened that the bad actor or the compromise was happened How do you help customers manage all of that data regardless And in addition to that, we then offer more of a unified policy control to on cybersecurity and some of the opportunities that businesses have to actually use that as an advantage.

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
JohnPERSON

0.99+

AmazonORGANIZATION

0.99+

Lisa MartinPERSON

0.99+

John WallsPERSON

0.99+

RobbiePERSON

0.99+

Andy JassyPERSON

0.99+

TuesdayDATE

0.99+

VegasLOCATION

0.99+

AustinLOCATION

0.99+

StarbucksORGANIZATION

0.99+

Ravi SrinivasanPERSON

0.99+

millionsQUANTITY

0.99+

RaviPERSON

0.99+

97%QUANTITY

0.99+

AWSORGANIZATION

0.99+

two questionsQUANTITY

0.99+

DougPERSON

0.99+

DenverLOCATION

0.99+

Las VegasLOCATION

0.99+

AndyPERSON

0.99+

FacebookORGANIZATION

0.99+

JayPERSON

0.99+

RohitPERSON

0.99+

bothQUANTITY

0.99+

RoePERSON

0.99+

LALOCATION

0.99+

Rohit GuptaPERSON

0.99+

eightQUANTITY

0.99+

90 plus percentQUANTITY

0.99+

three thingsQUANTITY

0.98+

a dozen yearsQUANTITY

0.98+

ForcepointORGANIZATION

0.98+

ChinaLOCATION

0.97+

oneQUANTITY

0.97+

second oneQUANTITY

0.97+

two common questionsQUANTITY

0.97+

fiveQUANTITY

0.97+

todayDATE

0.96+

day threeQUANTITY

0.95+

RaviORGANIZATION

0.93+

a dayQUANTITY

0.93+

an hourQUANTITY

0.91+

decadesQUANTITY

0.88+

firstlyQUANTITY

0.88+

19 thanksQUANTITY

0.79+

last three daysDATE

0.76+

a lot of peopleQUANTITY

0.74+

a thousand yearsQUANTITY

0.73+

yearsDATE

0.71+

coupleQUANTITY

0.7+

couple of new guestsQUANTITY

0.7+

GatesPERSON

0.67+

a minuteQUANTITY

0.66+

lastDATE

0.65+

InventEVENT

0.65+