Richard Leitao, DISH Network & Satish Iyer, Dell Technologies | MWC Barcelona 2023
>> theCUBE's live coverage is made possible by funding from Dell Technologies, creating technologies that drive human progress. (upbeat music) >> Hey everyone, guys and gals, good to see you. It's theCUBE live in Barcelona at MWC23. Lisa Martin here with Dave Vellante on day one of four days of wall to wall CUBE coverage. Dave, today is ecosystem day. We've had some great conversations about why the open ecosystem is so important and some of the key players in it. >> Well and I'm in search of disruptors, so I'm looking for, okay, who are the network operators that are going to actually lean into the future and drive it and challenge the existing incumbents. We'll talk about that today. >> And we're going to be talking about that next. We've got one of our alumni back with us. Satish Iyer is here, the Vice President of Emerging Services at Dell. Great to have you back on the program. >> Thank you. >> Richard Leitao is with us as well, the Vice President of National Development at DISH Network. Welcome. >> Pleasure to be here. >> So, lots of, this is day one, the theme is velocity. I feel like the day has gone by so quickly. But Dell and DISH have partnered together on a multi-year initiative to build your nationwide cloud-native 5G network that's going to cover a lot of the US. Talk a little bit about that partnership, we'll get both of your perspectives. Richard, we'll start with you. >> Sure. So thank you again for having me. So DISH had the opportunity of, of going through this experience, of innovating once more. For the ones that know DISH, DISH is a company that was founded in 1980 by an innovator, a disruptor. Of course, in the course of the next 40 years, we had the opportunities of even disrupting ourselves. We launched our first satellite TV service. We then launched the first streaming, video streaming platform, disrupting our own satellite business. And since 2008, we have been acquiring Spectrum and, you know, Spectrum, the most valuable asset of a wireless operator. We felt that this was the right opportunity, having 5G , having O-RAN, and we decided to go full in in a greenfield project building national network, 5G O-RAN cloud-based network, one of a kind network in in the US and, and most of all, using O-RAN, it's very important to us, what, what it can bring and it can bring to DISH but to the entire ecosystem of, of this sector in the US. >> Satish, talk a little bit about the partnership from Dell's perspective and some of the unique advantages that Dell is delivering to DISH. >> Oh absolutely. Again, like Richard was saying, I mean the telecom network is being desegregated as we speak. You know, companies like DISH and everybody else is looking at what are the best-in-class technologies we can bring to the table. I would like to say that, you know, the cloud is coming to the telco world, right? A lot of us have seen the tremendous transformation in the cloud world in the last few years. Now, you know, DISH is a big enterprise company. As you know, you know, we are pretty strong within the cloud space and enterprise space. So what we try to work with DISH is Dell, is to bring to DISH is, you know, that notion of cloud scale and the cloud ecosystem into telecom, right? By means best-in-class infrastructure products, best-in-class software products, to allow somebody like DISH to innovate and incre, you know, basically expand and build their O-RAN network. So it's absolutely important for us as we build and get into the telecom space to work with somebody like DISH who's also disrupting as a carrier in that space. >> So it's early days for Open RAN but you've decided, "okay, we're all in". >> Yeah. >> Right? So (chuckling) you burn the bridge, as they say, "go for it". (Lisa chuckles) So when you talk to most people, they say, "okay, it's, it's, it's, it's immature." It's got to be able to get to the levels of, of the, the the hardened stack reliability. But of course it brings the advantage of flexibility and speed. Are you optimizing for one or the other right now? How are you dealing with that balance? >> Well, it, it's, it's not mature in the sense that most of operators that think about it, they have a legacy network. And in order to go full in on the O-RAN side, they need to scrap a lot of things that they have and honestly, they don't want, and it doesn't make sense. So being a greenfield operator, give us that advantage. Give us the advantage and, and desegregation, it's all about chip sets, boxes and software and the chip sets part and what I like the most in desegregation is the time of innovation. The time that we can use new chip sets coming into the market, the size of the boxes that we are using. Obviously our footprint onsite is much smaller than traditional carriers or proprietary systems. So all of that Dell has been critical in supporting us. Supporting us having the best chip sets, having the smallest footprint and, you know, the software, the cycle of innovation is much faster than in proprietary systems. So ma-, it's maturing. I'm glad to say that probably two years ago here O-RAN was more like a, a pilot type of technology. It is not, we are live, we are live for more than 30 million customers in the US and, you know, the performance levels are very similar to traditional networks. >> So you don't just buy a nationwide cloud-native 5G network out of the box, you got to- >> No, you don't. >> You got to build it. So I'm curious as to what Dell's role is in that, in that build out. >> Right? >> How and how, I'm really curious how to, how you would grade Dell but we'll get there. >> Yeah, I mean, look, yes, you don't. So I think the, the, the first and foremost is again, as, as we, Dell, comes into the telco space, one of the things we have to look at is to understand what makes Dell better in the enterprise space, right? It is the best-in-class infrastructure. It is the software ties together. As you talk about desegregated networks, it's important to understand lot of these piece parts have to still be touched together, right? So I think the integration and integration aspects becomes really key which is really Dell is very good at. So one of the things we are working really closely with DISH Tech, you know Richard was alluding to, is bringing all, not just bringing all the software and hardware assets together, but how do you continuously innovate and keep fixing things faster, right? So in the old days, traditional ways, you have a software stack, it takes you 18 months, 20 months to actually get an upgrade done. Here we have continuously CI/CD pipelines where if you want to a change done within, within a week's or within a few days, where we can actually go and test and make sure these things work. So I think a lot of the best enterprise software practices, cloud practices, combined with whatever needs for telco, actually is what makes it very unique. >> I, I saw that this started out as an FCC compliance initiative that turned into a partnership, obviously a very successful one. Richard, talk about what DISH saw in Dell that really made it the right choice, knowing you have choices, you have options. >> You know, we saw the capability to execute, but we also saw the capability to innovate. From an execution level, at the end of the day, like we were talking, we started the project in the middle of COVID, and we had the first mandate to cover 20% of the US population by June, 2022. And now we have a second one, 70% of US population by June 2023. At the beginning of the project, it was all about availability of materials, logistics, how to distribute, how to transport material. So Dell has a world-class supply chain, we felt that working with Dell through all these challenges made things easier. So from an execution perspective, whenever you need to build a network and you, you are building thousands of sites, you need to have materials, you need to distribute them and you need to install them. Dell helped us across the board. Our expectations obviously will change. We have a network, we want to cooperate with Dell in many other areas. We want to, you know, leverage on Dell ability to reach the enterprise market, to have private 5G offers. So hopefully this collaboration will endure in time and, and, you know, will change and evolve in time. >> And it's a big bet. I mean, it's not like a single, it's not like a little transaction that you guys are doing. I feel like, you know Michael Dell and Eric Carlson had dinner and they said, "okay, we're going to, we're going to partner up and this is going to be a multi-decade partnership. You had to be transparent, "Hey, we're new at this, even though we're really good at enterprise tech and so you're going to, obviously if you take a chance on us, here's what we promise you." >> Absolutely. >> And vice versa, you guys had to say, "all right, hey, we're willing to roll the dice because we're trying to change the world." So what was that dynamic like? I mean, how did, I'm curious as to this has to be a lot of different levels, engineering, senior management, board level discussions. >> You know, we felt a huge buy-in from Dell on the Open RAN concept. >> Right. >> Yeah, okay. >> And, you know, edge computing and, and the ability to get us the best product and evolve the best product, Intel is is critical in all these offerings. Intel has a great relationship with Dell. Dell helped us. Dell sponsored the DISH program and some of these suppliers, So it was definitely good to have their support and the buy-in on the O-RAN concept. We felt it from day one and we felt secure on that. >> Yeah, I mean, I, to add to that, I mean, you know DISH was very instrumental in driving, dictating and executing to our roadmap, right? They're one of the key, I mean, since they are out there and they're really turning in a way, it's important that a customer who's actually at the out front of innovation, helps us drive our own roadmap. So to Richard's point, a lot of our product roadmaps, in terms of what have you built and all that, was based on what DISH thinks as going to be market-based requirements. They also helped us a lot in the integration aspects. Like I said, one of the things about open desegregation of these networks is there is a lot of integration because, you know, there is, it's not a one, one monolithic pipe smokestack anymore. You are picking up best-in-class pieces, bits and pieces and tying it together. And it's important to understand when you tie it together things will go wrong, right? So there is a lot of learnings from an integration standpoint. Supportability, deployment, one of the things Richard talked about was supply chain, you know. Other Dell's ability to, lot of these deployments, a lot of these configs in the factory, right, in the second part. So especially a lot of these partnerships started during COVID time and as you all know, you know what we went through two years ago. So we had to make sure that lot of these things are done in one place and a factory, and not done in the field because we couldn't do a lot of these things. So there's a lot of, lot of experimentation, lot of, lot, lot of innovation on that. >> So it's 2030, what's this look like? What's the vision if we can work backwards from there? Well, a, a great network coverage to the entire country, bringing new services to enterprises, to verticals, bringing value add to customers and, you know, technology cycles, they are lasting much less than they were. I cannot even say what will happen in three years. 2030, I mean, I know, I know somebody has a vision for 2030. That's another thing. (everyone laughs) >> A lot of it is "build it and they will come", right? >> Yeah. >> I mean it really is right? You put that network in place and then innovation happens on top. That's the best thing. >> Yeah. And look and and I think the biggest people think about Open RAN in terms of cost, which, you know, you, you have some things in cost that you appreciate in Open RAN. The footprint, the the possibility to diversify suppliers and and have more competition. But for me, Open RAN is about innovation and cycles of innovation. I used to work for Nokia, I used to work for Alcatel. I knew from the generation of an idea to an execution and having a feature delivered to a certain customer, it, it took months. We want innovation to take weeks. We are innovating at the speed, speed of the cloud. We are cooperating with new players, players on the cloud and, and we expect things to happen much faster than they traditionally happen on the telecom sector. >> Move fast and break things. >> Well, we also expect that speed- >> Break and fix. (everyone laughs) >> Yeah, thank you for that. >> But speaking of speed, your customers expect that, right? They expect the service to be up 24/7. They expect to be able to access whatever content they want, whenever they want from wherever they are. So comment, Richard, in our last few minutes here of, of how the, the Dell partnership is helping DISH to really deliver the excellent customer experience that your customers just expect that you're going to deliver. >> Well by setting up the system, number one, we are leveraging on a number of services. And I mentioned the supply chain, but in reality Dell made much more than that for our 20% milestone and is supporting our 70% milestone by installing, testing, verifying most of our data center equipment. We found that this offering from Dell was really addressing some of our needs because, you know, we, we believe they know a lot in this area and they, they can provide the best advice and the best speed to market in, in terms of having this equipment. Because we are working on a time clock, we need to have this done as soon as possible. You know for the future, I hope that they can help us in driving more services. I hope they can bring all the infrastructure that we need to offer to our customers. And, you know, we keep committed to O-RAN. O-RAN is really important. We are not compromising that. And I think the future is bright for both of us. >> Yeah, and Dell learns from the experience. >> Exactly. >> Absolutely. >> There's got to be a catalyst for expanding your roadmap and vision in telecom. >> Yeah, I mean, like you said, I mean, you asked a 2030 question and I think that, you know, know six, seven years from now I think people should look at what DISH and Dell and say they were the trailblazers of make, bringing Open RAN to the market and making 5G a reality. I mean, you talk about 5G, but every 5G is on a different stages. I do think that this combination, this partnership has the best chance to be the first ones to actually have a truly Open RAN network to be successful in commercial. >> Awesome guys. Trailblazers, Dell and DISH. Well, we look forward to watching this story unfold. Thank you- >> Thank you. >> for joining Dave and me on the program today talking about what you're doing together. We appreciate it. >> Thanks for having us. >> Our pleasure. >> Thank you, bye. >> For our guests and for Dave Vellante, I'm Lisa Martin. You're watching theCUBE live from Barcelona at MWC23. We'll be back after a short break, so we'll see you soon.
SUMMARY :
that drive human progress. and some of the key players in it. and challenge the existing incumbents. Great to have you back on the program. the Vice President of National I feel like the day So DISH had the opportunity of, of some of the unique advantages is to bring to DISH is, you know, So it's early days for Open RAN But of course it brings the advantage of the US and, you know, So I'm curious as to what Dell's role is how you would grade Dell So one of the things we made it the right choice, in the middle of COVID, that you guys are doing. I mean, how did, I'm curious as to on the Open RAN concept. and the ability to get us the best product and not done in the field because What's the vision if we can That's the best thing. in cost that you appreciate in Open RAN. Break and fix. They expect the service to be up 24/7. And I mentioned the supply from the experience. There's got to be a has the best chance to be the first ones Well, we look forward to me on the program today break, so we'll see you soon.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Dave Vellante | PERSON | 0.99+ |
Richard | PERSON | 0.99+ |
Lisa Martin | PERSON | 0.99+ |
DISH | ORGANIZATION | 0.99+ |
Dell | ORGANIZATION | 0.99+ |
Richard Leitao | PERSON | 0.99+ |
Alcatel | ORGANIZATION | 0.99+ |
Dave Vellante | PERSON | 0.99+ |
Dave | PERSON | 0.99+ |
June, 2022 | DATE | 0.99+ |
Satish Iyer | PERSON | 0.99+ |
20 months | QUANTITY | 0.99+ |
June 2023 | DATE | 0.99+ |
1980 | DATE | 0.99+ |
DISH Tech | ORGANIZATION | 0.99+ |
2008 | DATE | 0.99+ |
18 months | QUANTITY | 0.99+ |
Barcelona | LOCATION | 0.99+ |
US | LOCATION | 0.99+ |
FCC | ORGANIZATION | 0.99+ |
2030 | DATE | 0.99+ |
Lisa | PERSON | 0.99+ |
Dell Technologies | ORGANIZATION | 0.99+ |
DISH Network | ORGANIZATION | 0.99+ |
both | QUANTITY | 0.99+ |
70% | QUANTITY | 0.99+ |
20% | QUANTITY | 0.99+ |
Nokia | ORGANIZATION | 0.99+ |
second part | QUANTITY | 0.99+ |
Eric Carlson | PERSON | 0.99+ |
telco | ORGANIZATION | 0.98+ |
two years ago | DATE | 0.98+ |
first | QUANTITY | 0.98+ |
today | DATE | 0.97+ |
one | QUANTITY | 0.97+ |
first streaming | QUANTITY | 0.97+ |
more than 30 million customers | QUANTITY | 0.97+ |
three years | QUANTITY | 0.96+ |
Vice President | PERSON | 0.96+ |
four days | QUANTITY | 0.96+ |
Richard Hartmann, Grafana Labs | KubeCon + CloudNativeCon NA 2022
>>Good afternoon everyone, and welcome back to the Cube. I am Savannah Peterson here, coming to you from Detroit, Michigan. We're at Cuban Day three. Such a series of exciting interviews. We've done over 30, but this conversation is gonna be extra special, don't you think, John? >>Yeah, this is gonna be a good one. Griffon Labs is here with us. We're getting the conversation of what's going on in the industry management, watching the Kubernetes clusters. This is large scale conversations this week. It's gonna be a good one. >>Yeah. Yeah. I'm very excited. He's also got a fantastic Twitter handle, twitchy. H Please welcome Richie Hartman, who is the director of community here at Griffon. Richie, thank you so much for joining us. Thanks >>For having me. >>How's the show been for you? >>Busy. I, I mean, I, I, >>In >>A word, I have a ton of talks at at like maintain a thing and like the covering board searches at the TLC panel. I run forme day. So it's, it's been busy. It, yeah. Monday, I didn't have to run anything. That was quite nice. But there >>You, you have your hands in a lot. I'm not even gonna cover it. Looking at your bio, there's, there's so many different things that you're working on. I know that Grafana specifically had some announcements this week. Yeah, >>Yeah, yeah. We had quite a few, like the, the two largest ones is a, we now have a field Kubernetes integration on Grafana Cloud. So our, our approach is generally extremely open source first. So we try to push stuff into the exporters, like into the open source exporters, into mixes into things which are out there as open source for anyone to use. But that's little bit like a tool set, not a ready made solution. So when we talk integrations, we actually talk about things where you get this like one click experience, You log into your Grafana cloud, you click, I have a Kubernetes, which probably most of us have, and things just work like you in just the data. You have to write dashboards, you have to write alerts, you have to write everything to just get started with extremely opinionated dashboards, SLOs, alerts, again, all those things made by experts, so anyone can use them. And you don't have to reinvent the view for every single user. So that's the one. The other is, >>It's a big deal. >>Oh yeah, it is. Yeah. It is. It, we, we has, its heavily in integrations course. While, I mean, I don't have to convince anyone that perme is a DD factor standard in everything. Cloudnative. But again, it's, it's, it's sometimes a little bit hard to handle or a little bit not easy to get into. So, so smoothing this, this, this path onto onboarding yourself onto this stack and onto those types of solutions. Yes. Is what a lot of people need. Course, if you, if you look at the statistics from coupon, and we just heard this in the governing board session yesterday. Yeah. Like 60% of the people here are first time attendees. So there's a lot of people who just come into this thing and who need, like, this is your path. This is where you should be going. Or at least if you want to go, go there. This is how to get there. >>Here's your runway for takeoff. Yes. Yeah. I think that's a really good point. And I love that you, you had those numbers. I was curious. I, I had seen on Twitter, speaking of Twitter, I had seen, I had seen that, that there were a lot of people here coming for the first time. You're a community guy. Are we at an inflection point where this community is about to continue to scale? >>That's a very good question. Which I can't really answer. So I mean, >>Obviously I bet you're gonna try. >>I covid changed a few things. Yeah. Probably most people, >>A couple things. I mean, you know, casually, it's like such a gentle way of putting that, that was >>Beautiful. I'm gonna say yes, just to explode. All these new ERs are gonna learn Prometheus. They're gonna roll in with a open, open metrics, open telemetry. I love it, >>You know, But, but at the same time, like Cuban is, is ramping back up. But if you look at the, if you look at the registration numbers between Valencia Andro, it was more or less the same. Interesting. Which, so it didn't go onto this, onto this flu trajectory, which it was on like, up to, up to 2019. I expect this to take up again. But also with the economic situation, everything, I, I don't think >>It's, I think the jury's still out on hybrid. I think there's a lot, lot more hybrid. Let's see how the projects are gonna go. That's what I think it's gonna be the tell sign. How many people are in participating? How are the project's advancing? Some of the momentum, >>I mean, from the project level, Most of this is online anyway. Of course. That's how open source, right. I've been working for >>Ages. That's >>Cause you don't have any trouble budget or, or any office or, It's >>Always been that way. >>Yeah, precisely. So the projects are arguably spearheading this, this development and the, the online numbers. I I, I have some numbers in my head, but I'm, I'm not a hundred percent certain to, but they're higher for this time in Detroit than in volunteer as far somewhere. Cool. So that is growing and it's grown in parallel, which also is great. Cause it's much more accessible, much more inclusive. You don't have to have a budget of at least, let's say, I don't know, two to five k to, to fly over the pond and, and attend this thing. You can just do it from your home. So that is, that's a lot more inclusive. And I expect this to, to basically be a second more or less orthogonal growth, growth path. But the best thing about coupon is the hallway track. I'm just meeting people, talking to people and that kind of thing is not really possible with, >>It's, it's great to see people >>In person. No, and it makes such a difference. I mean, yeah. Even and interviewing people in person too. I mean, it does a, it's, it's, and, and this, this whole, I mean cncf, this whole community, every company here is community first. It's how these projects come to be. I think it's awesome. I feel like you got something you're saying to say, Johnny. >>Yeah. And I love some of the advancements. Rich Richie, we talked last time about, you know, open telemetry, open metrics. You're involved in dashboards. Yeah. One of the themes here is ease of use, simplicity, developer productivity. Where do you see the ease of use going from a project standpoint? For me, as you mentions everywhere, it's pretty much, it is, it's almost all corners of the world. Yep. And new people coming in. How, how are you making it easier? What's going on? Give us the update on that. >>So we also, funnily enough at precisely this topic in the TC panel just a few hours ago, about ease of use and about how to, how to make things easier to, to handle how developers currently, like if they just want to get into the cloud native seen, they have like, like we, we did some neck and math, like maybe 10 tools at least, which you have to be somewhat proficient in to just get started, which is honestly horrendous. Yeah. Course. Like with a server, I just had my survey install my thing and it runs, maybe I need a database, but that's roughly it. And this needs to change again. Like it's, it's nice that everything is, is un unraveled. And you have, you, you, you, you don't have those service boundaries which you had before. You can do all the horizontal scaling, you can do all the automatic scaling, all those things that they're super nice. But at the same time, this complexity, which used to be nicely compartmentalized, was deliberately broken up. And so it's becoming a lot harder to, to, like, we, we need to find new ways to compartmentalize this complexity back to, to human understandable levels again, in particular, as we keep onboarding new and new and new, new people, of course it's just not good use of anyone's time to, to just like learn the basics again and again and again. This is something which should be just compartmentalized and automated away. We're >>The three, We were talking to Matt Klein earlier and he was talking about as projects become mature and all over the place and have reach and and usage, you gotta work on the boring stuff. Yes. And when it's boring, that means you have success. Yes. But then you gotta work on the plumbing. What are some of the things that you guys are working on? Because people are relying on the product. >>Oh yeah. So for with my premises head on, the highlight feature is exponential or native or spars. Histograms. There's like three different names for one single concept. If you know Prometheus, you ha you currently have hard bucket boundaries where I say my latency is lower equal two seconds, one second, a hundred milliseconds, what have you. And I can put stuff into those histogram buckets accordingly to those predefined levels, which is extremely efficient, but like on the, on the code level. But it's not very nice for the humans course you need to understand your system before you're able to, to, to choose good cutoff points. And if you, if you, if you add new ones, that's completely fine. But if you want to actually change them, course you, you figured out that you made a fundamental mistake, you're going to have a break in the continue continuity of your observability data. And you cannot undo this in, into the past. So this is just gone native histograms. On the other hand, allow me to, to, okay, I'm not going to get get into the math, but basically you define a single formula, which there comes a good default. If you have good reasons, then you can change it. But if you don't, just don't talk, >>The people are in the math, Hit him up on Twitter. Twitter, h you'll get you that math. >>So the, >>The thing is people want the math, believe me. >>Oh >>Yeah. I mean we don't have time, but hit him up. Yeah. >>There's ProCon in two weeks in Munich and there will be whole talk about like the, the dirty details of all of the stuff. But the, the high level answer is it just does what people would expect it to do. And with very little overhead, you become, you get highly, highly or high resolution histograms, which is really important for a lot of use cases. But this is not just Prometheus with my open metrics head on the 2.0 feature, like the breaking highlight feature of Open Metrics 2.0 will be you guested precisely the same with my open telemetry head on. Low and behold the same underlying technology is being put or has been put into open telemetry. And we've worked for month and month and month and even longer between all different projects to, to assert that we have one single standard which is actually compatible with each other course. One of the worst things which you can have in the cloud ecosystem is if you have soly different things and they break in subtly wrong ways, like it's much better to just not work than to break in a way, which is just a little bit wrong. Of course you won't figure this out until it's too late. So we spent, like with all three hats, we spent insane amounts of time on making this happen and, and making this nice. >>Savannah, one of the things we have so much going on at Cube Con. I mean just you're unpacking like probably another day of cube. We can't go four days, but open time. >>I know, I know. I'm the same >>Open telemetry >>Challenge acceptance open. >>Sorry, we're gonna stay here. All the, They >>Shut the lights off on us last night. >>They literally gonna pull the plug on us. Yeah, yeah, yeah, yeah. They've done that before. It's not the first time we go until they kick us out. We love, love doing this. But Open telemetry is got a lot of news too. So that's, We haven't really talked much about that. >>We haven't at >>All. So there's a lot of stuff going on that, I won't call it boring. That's like code word's. That's cube talk for, for it's working. Yeah. So it's not bad, but there's a lot of stuff going on. Like open telemetry, open metrics, This is the stuff that matters cuz when you go in large scale, that's key. It's just what, missing all the, all the stuff. >>No, >>What are we missing? What are people missing? What's going on in the show that you think that's not actually being reported on? I mean it's a lot of high web assembly for instance got a lot >>Of high. Oh yeah, I was gonna say, I'm glad you're asking this because you, you've already mentioned about seven different hats that you wear. I can only imagine how many hats are actually in your hat cabinet. But you, you are someone with your, with your fingers in a lot of different things. So you can kind of give us a state of the union. Yeah. So go ahead. Let's talk about >>It. So I think you already hit a few good points. Ease of use is definitely one of them. And, and improving the developer experience and not having this like a value of pain. Yeah. That is one of the really big ones. It's going to be interesting cause it is boring. It is janitorial and it needs a different type of persona. A lot of, or maybe not most, but a large fraction of developers like the shiny stuff. And we could see this in Prometheus where like initially the people who contributed this the most where like those restless people who need to fix that one thing, this is impossible, are going to do it. Which changed over the years where the people who now contribute the most are off the janitorial. Like keep things boring, keep things running, still have substantial changes. But but not like more on the maintenance level. >>Yeah. The maintainers. I was just gonna bring that >>Up. Yeah. On the, on the keep things boring while still pushing 'em forward. Yeah. And the thing about ease of use is a lot of this is boring. A lot of this is strategy. A lot of this is toil. A lot of this takes lots of research also in areas where developers are not really good at, like UX for example, and ui like most software developers are really bad at those cause they just think differently from normal humans, I guess. >>So that's an interesting observation that you just made. I we could unpack that on a whole nother show as well. >>So the, the thing is this is going to be interesting for the open source scene course. This needs deliberate investment by companies who assign people to those projects and say, okay, fix that one thing or make it easier to use what have you. That is a lot easier with, with first party products and projects from companies cuz they can invest directly into the thing and they see much more of a value prop. It's, it's kind of normal by now to, to allow developers or even assigned developers onto open source projects. That's not so much the case for the tpms, for the architects, for the UX and your I people like for the documentation people that there's not as much awareness of that this is also driving value for everyone. Yes. And also there's not much as much. >>Yeah, that's a great point. This whole workflow production system of open source, which has grown and keeps growing and we'll keep growing. These be funded. And one of the things we were talking earlier in another session about is about the recession potentially we're hitting and the global issues, macroeconomics that might force some of these projects or companies not to get VC >>Funding. It's such a theme at the show. So, >>So to me, I said it's just not about VC funding. There's other funding mechanisms that's community oriented. There's companies participating, there's other meccas. Richie, if you could have your wishlist of how things could progress an open source, what would you want to see happen in terms of how it's, how things are funded, how things are executed. Cuz developers are going to run businesses. Cuz ultimately if you follow digital transformation to completion, it and developers aren't a department serving the business. They are the business. And that's coming fast. You know, what has to happen in your opinion, if you had the wish magic wand, what would you, what would you snap your fingers to make happen? >>If I had a magic wand that's very different from, from what is achievable. But let, let's >>Go with, Okay, go with the magic wand first. Cause we'll, we'll, we'll we'll riff on that. So >>I'm here for dreams. Yeah, yeah, >>Yeah. I mean I, I've been in open source for more than two, two decades, but now, and most of the open source is being driven forward by people who are not being paid for those. So for example, Gana is the first time I'm actually paid by a company to do my com community work. It's always been on the side. Of course I believe in it and I like doing it. I'm also not bad at it. And so I just kept doing it. But it was like at night on the weekends and everything. And to be honest, it's still at night and in the weekends, but the majority of it is during paid company time, which is awesome. Yeah. Most of the people who have driven this space forward are not in this position. They're doing it at night, they're doing it on the weekends. They're doing it out of dedication to a cause. Yeah. >>The commitment is insane. >>Yeah. At the same time you have companies mostly hyperscalers and either they have really big cloud offerings or they have really big advertisement business or both. And they're extracting a huge amount of value, which has been created in large part elsewhere. Like yes, they employ a ton of developers, but a lot of the technologies they built on and the shoulders of the giants they stand upon it are really poorly paid. And there are some efforts to like, I think the core foundation like which redistribute a little bit of money and such. But if I had my magic wand, everyone who is an open source and actually drives things forwards, get, I don't know, 20% of the value which they create just magically somehow. Yeah. >>Or, or other companies don't extract as much value and, and redistribute more like put more full-time engineers onto projects or whichever, like that would be the ideal state where the people who actually make the thing out of dedication are not more or less left on the sideline. Of course they're too dedicated to just say, Okay, I'm, I'm not doing this anymore. You figure this stuff out and let things tremble and falter. So I mean, it's like with nurses and such who, who just like, they, they know they have something which is important and they keep doing it. Of course they believe in it. >>I think this, I think this is an opportunity to start messaging this narrative because yeah, absolutely. Now we're at an inflection point where there's a big community, there is a shared responsibility in my opinion, to not spread the wealth, but make sure that it's equally balanced and, and the, and I think there's a way to do that. I don't know how yet, but I see that more than ever, it's not just come in, raid the kingdom, steal all the jewels, monetize it, and throw some token token money around. >>Well, in the burnout. Yeah, I mean I, the other thing that I'm thinking about too is it's, you know, it's, it's the, it's the financial aspect of this. It's the cognitive load. And I'm curious actually, when I ask you this question, how do you avoid burnout? You do a million different things and we're, you know, I'm sure the open source community that passion the >>Coach. Yeah. So it's just write code, >>It's, oh, my, my, my software engineering days are firmly over. I'm, I'm, I'm like, I'm the cat herer and the janitor and like this type of thing. I, I don't really write code anymore. >>It's how do you avoid burnout? >>So a i I didn't curse ahead burnout a few years ago. I was not nice, but that was still when I had like a full day job and that day job was super intense and on top I did all the things. Part of being honest, a lot of the people who do this are really dedicated and are really bad at setting boundaries between work >>And process. That's why I bring it up. Yeah. Literally why I bring it up. Yeah. >>I I I'm firmly in that area and I'm, I'm, I don't claim I have this fully figured out yet. It's also even more risky to some extent per like, it's, it's good if you're paid for this and you can do it during your work time. But on the other hand, if it's so nice and like if your hobby and your job are almost completely intersectional, it >>Becomes really, the lines are blurry. >>Yeah. And then yeah, like have work from home. You, you don't even commute anything or anymore. You just sit down at your computer and you just have fun doing your stuff and all of a sudden it's deep at night and you're still like, I want to keep going. >>Sounds like God, something cute. I >>Know. I was gonna say, I was like, passion is something we all have in common here on this. >>That's the key. That is the key point There is a, the, the passion project becomes the job. But now the contribution is interesting because now yeah, this ecosystem is, is has a commercial aspect. Again, this is the, this is the balance between commercialization and keeping that organic production system that's called open source. I mean, it's so fascinating and this is amazing. I want to continue that conversation. It's >>Awesome. Yeah. Yeah. This is, this is great. Richard, this entire conversation has been excellent. Thank you so much for joining us. How can people find you? I mean, I give em your Twitter handle, but if they wanna find out more about Grafana Prometheus and the 1700 things you do >>For grafana grafana.com, for Prometheus, promeus.io for my own stuff, GitHub slash richie age slash talks. Of course I track all my talks in there and like, I don't, I currently don't have a personal website cause I stop bothering, but my, like that repository is, is very, you find what I do over, like for example, the recording link will be uploaded to this GitHub. >>Yeah. Great. Follow. You also run a lot of events and a lot of community activity. Congratulations for you. Also, I talked about this last time, the largest IRC network on earth. You ran, built a data center from scratch. What happened? You done >>That? >>Haven't done a, he even built a cloud hyperscale compete with Amazon. That's the next one. Why don't you put that on the >>Plate? We'll be sure to feature whatever Richie does next year on the cube. >>I'm game. Yeah. >>Fantastic. On that note, Richie, again, thank you so much for being here, John, always a pleasure. Thank you. And thank you for tuning in to us here live from Detroit, Michigan on the cube. My name is Savannah Peterson and here's to hoping that you find balance in your life this weekend.
SUMMARY :
We've done over 30, but this conversation is gonna be extra special, don't you think, We're getting the conversation of what's going on in the industry management, Richie, thank you so much for joining us. I mean, I, I, I run forme day. You, you have your hands in a lot. You have to write dashboards, you have to write alerts, you have to write everything to just get started with Like 60% of the people here are first time attendees. And I love that you, you had those numbers. So I mean, I covid changed a few things. I mean, you know, casually, it's like such a gentle way of putting that, I love it, I expect this to take up again. Some of the momentum, I mean, from the project level, Most of this is online anyway. So the projects are arguably spearheading this, I feel like you got something you're saying to say, Johnny. it's almost all corners of the world. You can do all the horizontal scaling, you can do all the automatic scaling, all those things that they're super nice. What are some of the things that you But it's not very nice for the humans course you need The people are in the math, Hit him up on Twitter. Yeah. One of the worst things which you can have in the cloud ecosystem is if you have soly different things and Savannah, one of the things we have so much going on at Cube Con. I'm the same All the, They It's not the first time we go until they Like open telemetry, open metrics, This is the stuff that matters cuz when you go in large scale, So you can kind of give us a state of the union. And, and improving the developer experience and not having this like a I was just gonna bring that the thing about ease of use is a lot of this is boring. So that's an interesting observation that you just made. So the, the thing is this is going to be interesting for the open source scene course. And one of the things we were talking earlier in So, Richie, if you could have your wishlist of how things could But let, let's So Yeah, yeah, Gana is the first time I'm actually paid by a company to do my com community work. shoulders of the giants they stand upon it are really poorly paid. are not more or less left on the sideline. I think this, I think this is an opportunity to start messaging this narrative because yeah, Yeah, I mean I, the other thing that I'm thinking about too is it's, you know, I'm, I'm like, I'm the cat herer and the janitor and like this type of thing. a lot of the people who do this are really dedicated and are really Yeah. I I I'm firmly in that area and I'm, I'm, I don't claim I have this fully You, you don't even commute anything or anymore. I That is the key point There is a, the, the passion project becomes the job. things you do like that repository is, is very, you find what I do over, like for example, the recording link will be uploaded Also, I talked about this last time, the largest IRC network on earth. That's the next one. We'll be sure to feature whatever Richie does next year on the cube. Yeah. My name is Savannah Peterson and here's to hoping that you find balance in your life this weekend.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Richie Hartman | PERSON | 0.99+ |
Richie | PERSON | 0.99+ |
Matt Klein | PERSON | 0.99+ |
Savannah Peterson | PERSON | 0.99+ |
Richard Hartmann | PERSON | 0.99+ |
Richard | PERSON | 0.99+ |
Amazon | ORGANIZATION | 0.99+ |
John | PERSON | 0.99+ |
Grafana Labs | ORGANIZATION | 0.99+ |
Prometheus | TITLE | 0.99+ |
Rich Richie | PERSON | 0.99+ |
60% | QUANTITY | 0.99+ |
Griffon Labs | ORGANIZATION | 0.99+ |
two seconds | QUANTITY | 0.99+ |
one second | QUANTITY | 0.99+ |
Munich | LOCATION | 0.99+ |
20% | QUANTITY | 0.99+ |
10 tools | QUANTITY | 0.99+ |
Detroit | LOCATION | 0.99+ |
Monday | DATE | 0.99+ |
Detroit, Michigan | LOCATION | 0.99+ |
Grafana | ORGANIZATION | 0.99+ |
yesterday | DATE | 0.99+ |
Grafana Prometheus | TITLE | 0.99+ |
three | QUANTITY | 0.99+ |
five k | QUANTITY | 0.99+ |
first time | QUANTITY | 0.99+ |
two | QUANTITY | 0.98+ |
next year | DATE | 0.98+ |
both | QUANTITY | 0.98+ |
one | QUANTITY | 0.98+ |
this week | DATE | 0.98+ |
two decades | QUANTITY | 0.98+ |
one single concept | QUANTITY | 0.98+ |
GitHub | ORGANIZATION | 0.98+ |
2019 | DATE | 0.98+ |
Grafana cloud | TITLE | 0.98+ |
One | QUANTITY | 0.97+ |
last night | DATE | 0.97+ |
Savannah | PERSON | 0.97+ |
ORGANIZATION | 0.96+ | |
earth | LOCATION | 0.96+ |
four days | QUANTITY | 0.96+ |
over 30 | QUANTITY | 0.95+ |
Johnny | PERSON | 0.95+ |
one click | QUANTITY | 0.95+ |
Grafana Cloud | TITLE | 0.95+ |
CloudNativeCon | EVENT | 0.94+ |
few hours ago | DATE | 0.93+ |
2.0 | OTHER | 0.93+ |
Griffon | ORGANIZATION | 0.93+ |
hundred percent | QUANTITY | 0.92+ |
two weeks | QUANTITY | 0.92+ |
one thing | QUANTITY | 0.91+ |
grafana grafana.com | OTHER | 0.9+ |
more than two | QUANTITY | 0.89+ |
three different names | QUANTITY | 0.88+ |
two largest | QUANTITY | 0.88+ |
promeus.io | OTHER | 0.86+ |
a hundred milliseconds | QUANTITY | 0.86+ |
few years ago | DATE | 0.86+ |
single formula | QUANTITY | 0.85+ |
first | QUANTITY | 0.83+ |
Con. | EVENT | 0.83+ |
IRC | ORGANIZATION | 0.82+ |
Kubernetes | TITLE | 0.81+ |
seven different hats | QUANTITY | 0.8+ |
one single standard | QUANTITY | 0.79+ |
Valencia Andro | ORGANIZATION | 0.79+ |
NA 2022 | EVENT | 0.77+ |
Open Metrics 2.0 | OTHER | 0.74+ |
KubeCon + | EVENT | 0.7+ |
Matthew Jones & Richard Henshall | AnsibleFest 2022
>>Hey everyone. Welcome back to the Cube's coverage of Ansible Fest 2022. We are live in Chicago. This is day two of Waldo Wall coverage on the cube. John Fhrer here with me. Lisa Martin. John, today's a big news day. Yeah, >>Big time. I mean, we got the chief architect on this segments to be great. We have the lead product management. All the new stuff coming out really is a game changer. It's very cool and relevant. Very key to be relevant. And then, and being a part of the future. This is a changeover you see in the NextGen Cloud developer environment. Open source all coming together. So Ansible we've been covering for many, many years. We've always said they're in the middle of all the action and you're starting to see the picture. Yes. For me. So we're looking forward to a great segment. >>Yes. We've got two alumni back with us to unpack the news and all the great stuff that's going on here. Richard Hensel joins us Senior manager, Ansible Product Management, and Matthew Jones here, fresh from the keynote stage, Chief architect of Ansible Automation. Guys, great to have you on the program. Thanks >>For having us. Good to be here. >>So this morning was all about event driven Ansible. Unpack that. Talk about the impact that this is gonna have, The excitement, the buzz that you've heard on the show floor today. >>Yeah. You know, it's, it's exciting. We've been working on this for a while. We've been really excited to show this off because it's something that feels like the natural evolution of the platform and where it's going. Really being able to connect the automation with the sources of data and the actions that we know people want to use. We, we came into this knowing everybody here at this conference, this is something that everybody will be able to use. >>Talk about the innovations strategy. Cause we've always had these great conversations with Ansible. Oh yeah. The, the practitioners, they're, they're building the product with you. You guys are very hardcore on that. No secret. This is different. This is like a whole nother level of opportunity that's gonna take the, the community to new heights in terms of what they do in their job and free them up to do more creative development. >>Yeah, you're exactly right. You know, we, we know that people need to bring that sort of reactive and active automation to it. We've, we've done a lot of work to bring automation to everybody, to the masses. Now we need to meet them at the place where they are, where the, the where, where they have to do the most work and, and act in the most strategic and specific ways. >>All right. So now before we get into some of the deep dive, cause a ton of questions. This is really exciting product. Take a minute to explain what was the key announcement? Why, what specifically does this mean for the audience, watching customers and future customers? What's the big deal? To take a minute to explain what was announced. >>So this is about the, the evolution and the maturity of the automation that our users are doing. So, you know, you think about provisioning servers, you know, configuring networks, all that sort of, the stuff that we've established and everybody's been doing for a number of years. And then you go, Well, I've invested in that. I've done the heavy lifting, I've done the things that cost me agility. I think that cost me time. Well now I need to go further. So what can I go further into? And you move further at the stacks. You move away from the infrastructure, please. You move away from infrastructure as code. You move towards through configures code, up to officer's code. And you start to get into, well, I've got, I've got road tasks, I've got repetitive actions that I'm doing. I've got investigations, I've got remediations, I've got responses. >>Well, there's work that I do on a daily basis that is toil. Right. It's not efficient work. Right. Actually, we doing valuable work in the operation space as much as you were doing in, in the build space. And how do we move them up into that space? And it's, this is all based off observation. You can do this today, but how do we make it easier? We've gonna make it easier for them to do that and get, it's all about success. It's about the outcomes we're gonna drive users towards. They need to be successful as quickly as possible. How do we make that >>Happen? And Matt, I remember we talked in 2019 with Ansible, the word platform where we say, Hey, you know, platforms are super important. It's not a tool, tools and platforms as distinctions. You mentioned platform. This is now platform. A lot of people put a lot of work in into this Yeah. Claim what went on behind the scenes. So >>You're exactly right. And we've spent the last couple of years really taking that disparate set of tools that, that we've invested a lot of time in building that platform. It's been exciting to see it come together. We always knew that we wanted to capture more of, more of where people find automation and find they need automation, not just out on the edge, on the end of the, of the, of the actions and tasks that they need to do. They've got a lot of things coming in, a lot of things that they need to take care of. And the community is really what drives this for us. People who have been doing this for years and they've been asking us, Meet me halfway. Give me something. Give me a part of this platform and a capability that enables me to do this. So I I feel like we've done that and you did >>It. Yeah, exactly. For step one. >>And that must feel pretty good too, to be able to deliver what, you know, the masses are looking for and why they're looking >>For it. Yeah. This was, there was no question that we knew this was gonna deliver the kind of real value that people were looking for. >>Take us through the building blocks real quick. I know on stage you went through it in detail. What should people know about the core building blocks of, of this particular event driven >>Piece? Yeah. You know, I think the most important thing to understand at the, at the outset is the sources of data and events that come in. It's really easy to get lost in the details. Like, what do you mean a source? But, you know, we've shown examples using Kafka, but it's not just Kafka, right? It's, it's, it's web hooks, it's CI systems, it's any, any place that you can imagine an evict coming from your monitoring platforms. You can bring those together under the same umbrella. We're not requiring you to pick one or choose or what's your favorite one. You can bring, you can use them all and and condense them down into the, into the same place. >>There's a lot of data events everywhere now. There's more events. Yeah. Is there a standard interface? Is what's the, is there any kind of hook in there? Is what's, what's gonna limit? Or is there any limits? >>I I don't think there is a limit. I, you know, it's, and we can't even imagine where events and data are gonna come from, but we know we need to get them into the system in a way that makes the most sense for the, the customers. And then that, that drives through into the rule books. Like, okay, we have the data now, but what do we do with that data? How do we translate that into, into the action? What are the rules that need to follow? It's giving the, the, the person who is automating, who understands the data that's coming in and understands the task that they need to take. The, the rules are where they map those into it. And then the last part, of course is the playbook, the automation itself, which they already know. They're already experts in the system. So we've, we've, we've built this like eight lane highway. They get some right end of those actions. >>Let's talk about Richard, let's unpack those actions and the really kind of double click on the business outcomes that this is actually gonna enable organizations and any industry to achieve. >>Yeah, so >>I mean, it's, it, like Matt said, it's really hard to encapsulate everything that we see as possible. But if you just think about what happens when a system goes down, right? At that point in time, I'm potentially not making money, right? I'd say it's costing me time, it's costing me, that's a business impact. If I can speed up how quick I can resolve that problem, if I can reduce time in there, that's customer improvement, that's custom satisfaction. That's bottom line money for businesses, right? But it's also, it's also satisfaction for the users. You know, they're not involved in having the stressful get online, get quickly, activate whatever accounts you need to do, go and start doing discovery. You can detect a lot of that information for the discovery use case that we see, respond to an event, scan the system for that same logic that you would normally do as a user, as a human. >>And that's why the rules are important to add into ed. It's like, how do I take that human, that brain part that I would say, well, if I see this bit, oh, I'll go and have a look in this other log file. If I see this piece, I'll go and do something different. How do we translate that into Ansible so that you've got that conditional logic just to be able to say, if this do that, or if I see these three things, it means a certain outcome has happened. And then again, that defined, that's what's gonna help people like choose where it becomes useful. And that's how we, that's how we take that process >>Forward. I'm sure people are gonna get excited by this. I'm not sure the community already knows that, but as it's gonna attract more potential customers, what's different about it? Can you share the differentiation? Like wait minute, I already have that already. Do they have it already? What's different? What makes this different? What's, what's in it for them? >>Yeah. When we step up into a customer situation, an enterprise, an organization, what's really important becomes the, the ability to control where you do some of that work. So the control and the trust, You know, would you trust an automatic system to go and start making changes to hundreds of thousands of devices? And the answer is often not, not straight away. So how do we put this sort of sep the same separation of duties we have between dev and ops and all the nice structures we've done over the last number of years, and actually apply that to that programmatic access of automation that other systems do. So let's say a AIML systems that are detecting what's going on, observability platforms are, are much more intru or intrusive is the wrong word. They're much more observable of what's going on in the systems, right? But at the same time you go, I wanna make sure that I know that any point in time I can decide what, what is there and what can be run and who can run it and when they can run it. And that becomes an important dimension. >>The versatility seems like a big deal too. They can, Yeah. Any team could get >>Involved. And, and that's the, the same flexibility and the same extensibility of Ansible exists in this use case, right? The, the, the ability to take any of those tasks you wanna do in action, string them together, but what the way that it works for you, not the way that it works that we see, but the way that you see and you convert your operational DNA into how you do that automation and how that gets triggered as you see fit. >>Talk about this both of you. I'd like to get your perspectives on event driven Ansible as part of the automation journey that businesses are on. Obviously you can look at different industries and different businesses are, are at different places along that journey, but where does this fit in and kind of plugin to accelerating that journey? That's, >>That's a good question. You know, sometimes this ends up being like that last mile of we've adopted this automation, we've learned how to write automation. We even understand the things that we would need to automate, but how do we carry it over that last topic and connect it to our, our knowledge systems, our data stores, our data lakes, and how do we combine the expertise of the systems that we're managing with this automation that we've learned? Like you, you mentioned the, the, the community and the, the coalescing of data and information, the, the definition of the event rules and, and the event driven architecture. It lives alongside the automation that you've developed in the exact same place where you can feel that trust and ubiquity that we keep talking about. Right? It's there, it's certified. And we've talked a lot about secure supply chain recently. This gives you the ability to sign and certify that the rules and actions that we're taking and the sources that we're communicating with works exactly the same way. Yeah. And >>There's something we didn't, we didn't correlate this when we first started doing the work. We were, we were, we observe teams doing self-healing and you know, extending Ansible. And then over the last 18 months, what we've also seen is this movement, this platform engineering movement, the SRE teams becoming much more prominent. And this just nicely sits in as a type of use case for that type of transformation. You know, we've gotta remember that Ansible at is heart is also a transformative tool. Is like, how do you teach this behavior to a bunch of people? How do you upscale a larger base of engineers with what you want to be able to do? And I think this is such an important part that we, we just one say we stumbled into it, but it was a very, very nice, >>It was a natural progression. >>Exactly. >>Yeah. Yeah. Tom, Tom, when we were talking about Tom yesterday, Tom Anderson and he said, You guys bring up the SRE to you guys when you come on the cube. This is exactly a culture shift that we're talking about. I mean, SRE is really his legacy with Google. We all know that. Everyone kind of knows that, but it's become like a job title. Well they kind of, what does that even mean now if you're not Google, it means you're running stuff. DevOps has become a title. Yeah. So what that means is that's a cultural shift, not so much semantics Yeah. On title. This is kind of what you guys are targeting here, enabling people to run platforms, engineer them. Yeah. Like an architect and enable more co composability coding. >>And, and it's, so that's, that distinction is so important because one of the, you know, we see many customers come from different places. Many users from, you know, all the legacy or heritage of tools that have existed. And so often those processes are defined by the way that tool worked. Right? You had no other way that, that, and the, and it's, it happened 10 years ago, somebody implemented it, that's how it now works. And then they come and try and take something new and you go, well, you can't let the tool define your process. Now your culture and your objective has to define the process. So this is really, you know, how do we make sure we match that ability by giving them a flexible tool that let's say, Well what are you trying to achieve? I wanna achieve this outcome. That's the way you can do it. I >>Mean, that's how we match basically means my mind to get your reaction. It means I'm running stuff at scale. Yep. Engineer, I'm engineering and infrastructure at scale to enable, >>I'm responsible for it. And it's, it's my, it's my baby. It's my responsibility to do that. And how do we, how do we allow people to do that better? And you know, it, it's about, it's about freeing people up to focus on things that are really important and transformative. We can be transformative. And we do that by taking away the complexity and making things work fast. >>And that's what people want. People in their daily jobs want to be able to deliver value to the organization. You wanna feel that. But something Richard that you were talking about that struck me a couple minutes ago is, was a venture of an Ansible. There's employee benefits, there's customer benefits, Those two are ex inextricably linked. But I liked how you were talking about what it facilitates for both Yes. And all the way to the customer satisfaction, brand reputation. That's an important Yeah. Element for any brand to >>Consider. And that, I mean, you know, think about what digital transformation was all about. I mean, as we evolve past all these initial terms that come about, you know, we actually start getting to the meat of what these things are. And that is it connecting what you do with actually what is the purpose of what your business is trying to achieve. And you can't, you can't almost put money on that. That's, that's the, that's the holy grail of what you're trying to get to. So how, you know, and again, it just comes back to how do we facilitate, how do we make it easy? If we don't make it easier, we're not doing it right. We've gotta make it easier. >>Right. Well, exciting news. I want to get your guys' reaction and if you don't mind sharing your opinion or your commentary on what's different now with Ansible this year than just a few years ago in terms of the scope of what's out there, what's been built, what you guys are doing for the, for the customer base and the community. What's changed? Obviously the people's roles looked that they're gonna expand and have more, I say more power, you know, more keys to the kingdom, however you wanna look at it. But things have changed. What's changed now from a few years >>Ago. It's, you know, it, it's funny because we've spent a lot of time over the last couple years setting up the capabilities that you're seeing us deliver right now. Right. We, we look back two or three years ago and we knew where we wanted to be. We wanted to build things like eda. We wanted to invest in systems like Project Wisdom and the, the types of content, the cloud journey that, that now we're on and we're enabling for folks. But we had to make some really big changes. And those changes take time and, and take investment. The move into last year, John, we talked about execution environments. Yeah. And separating the control plane from the execution plane. All of that work that we did and the investment into the platform and stability of the platform leads us now into what >>Cap. And that's architectural decision. That's the long game in mind. Exactly. Making things more cohesive, but decoupled, that's an operating system kind of thinking. >>It, it totally is. It's a systems engineering and system architecture thinking. And now we can start building on top of these things like what comes after ed, what does ED allow us to do within the platform? All of the dev tools that we focused on that we haven't spent a lot of time talking about that from the product side. But being, coming in with prescriptive and opinionated dev tools, now we can show you how to build it. We can show you how to use it and connect it to your systems. Where can we go next? I'm really excited. >>Yeah. Your customer base two has also been part of from the beginning and they solve their own problems and they rolled it up, grow with it, and now it's a full on platform. The question I then ask is, okay, you believe it's a platform, which it is, it's enabling. What do you guys see as that possible dots that could connect that might come on top of this from a creativity standpoint, from an ecosystem standpoint, from an Ansible standpoint, from maybe Red Hat. I mean, wisdom shows that you can go into the treasure trove of IBM's research, pull out some AI and some machine learning. Both that in or shim layered in whatever you do. >>I mean, what I'm starting to see much more, especially as I, the nice thing about being here is actually getting face to face with customers again and you know, actually hearing what they're talking about. But you know, we've moved away from a Ansible specific story where I'm talking about how I, I was always, I was looking to automate, I was looking to go to Ansible. Well now I've got the automation capability. Now we've enhanced the automation. Capabil wisdom enhances the automation capability further. What about all those, those broader set of management solutions that I've got that I would like to start connecting to each other. So we're starting to take the same like, you know, you mentioned as then software architecture, software design principles. We'll apply those same application design principles, apply them to your IT management because we've got data center with the pressures on there. We've got the expansion into cloud, we've got the expansion to the edge, right? Each adding a new layer of complexity and a new layer of, you know, more that you have to then look after. But there's still the same >>Number of people. So a thousand flower blooms kind of situation. >>Exactly. And so how do I, how do I constrain, how do I tame it, right? How do I sit there and go, I, I can control that now I can look after that. I contain that. I can, I can deal with what I wanna do. So I'm focusing on what's important and we are getting stuff done. >>We, we've been quoting Andy Grove on the cube lately. Let chaos, rain and then rain in the chaos. Yes. Right? I mean that's kind of every inflection point has complexity before it gets simpler. >>Yeah, that's right. >>Yeah. You can't, there's answer that one. That's >>Perfectly. >>Yeah. Yeah. What do you expect to see chief ar you gotta have the vision. What's gonna pop out? What's that low, low hanging fruit? What's gonna bloom first? What do you think's gonna come? >>I, you know, my overarching vision is that I just want to be able to automate more. Where, where can we bring back, So edge cloud, right? That's obvious, but what things run in the cloud and and on the edge, right? Devices, you heard Chad in the keynote this morning talk about programmable logic controllers, sensors, fans, motors, things like that. This is the, the sort of, this is the next frontier of automation is that connecting your data centers and your systems, your applications and needs all the way out to where your customers are. Gas stations, point of sale systems. >>It's instant. It's instant. It is what it is. It's like just add, Just >>Add faster and bigger. Yeah. >>But what happens if, I'll give you a tease. What I think is, is what happens if this happens? So I've got much more rich feature, rich diverse set of tools looking after my systems, observing what's going on. And they go through a whole filtering process and they say such and such has happened, right? Wisdom picks that up and decides from that natural language statement that comes outta the back of that system. That's the task I think is now appropriate to run. Where do you run that? You need a secure execution capability. Pass that to an support, that single task. And now we run inside the automation platform at any of those locations that you just mentioned, right? Stitching those things together and having that sequence of events all the way through where you, you predefine what's possible. You know, you start to bias the system towards what is your accepted standard and then let those clever systems do what you are investing in them for, which is to run your IT and make it >>Easier. Rich here was on earlier, I said, hey, about voice activated it. Provision the cluster. Yeah. >>Last question guys, before we run out of time for this. For customers who take advantage of this new frontier, how can they get started with the bench of an what's? >>That's a good question. You know, we, we've engaged our community because they trust us and we trust them to build really good products. ansible.com/events. Oh man, >>I did have the, I >>Had the cup, the landing page. >>Find somebody find that. >>Well it's on GitHub, right? GitHub It is. >>Yeah it >>Is. Absolutely ansible.com. It's probably a link somewhere if I on the front page. Exactly. On GitHub. The good code too. >>Right? Exactly. And so look at there, you can see where we're going on our roadmap, what we're capable of today. Examples, we're gonna be doing labs and blogs and demonstrations of it over the next day, week, month. Right. You'll be able to see this evolve. You get to be the, the sort of vanguard of support and actions on this and >>Cause we really want, we really want users to play with it, right? Of course. We've been doing this for a while. We've seen what we think is right. We want users to play with it. Tell us whether the syntax works, whether it makes sense, how does it run, how does it work? That's the exciting part. But at the same time, we want the partners, you know, we, we don't know all the technologies, right? We want the partners that we have that work with us already in the community to go and sort of, you know, do those integrations, do those triggers to their systems, define rules for their stuff cuz they'll talk to their customers about it as >>Well. Right? Right. It'll be exciting to see what unfolds over the next six to nine months or so with the partners getting involved, the community getting involved. Guys, congratulations on the big announcements. Sounds like a lot of work. I can tell. We can tell. Your excitement level is huge and job well done. Thank you so much for joining us on the Cube. Thank you very much. Thank you. Our pleasure. Just All right, for our guests and John Furrier, I'm Lisa Martin. You're watching The Cube Live from Chicago, Ansible Fest 22. John and I will be right back with our next guest of Stay tuned.
SUMMARY :
Welcome back to the Cube's coverage of Ansible Fest 2022. This is a changeover you see in the NextGen Cloud Guys, great to have you on the program. Good to be here. Talk about the impact that this is gonna have, The excitement, the buzz that you've heard on the show and the actions that we know people want to use. that's gonna take the, the community to new heights in terms of what they do in their job and we need to meet them at the place where they are, where the, the where, where they have Take a minute to explain what was the key announcement? And you start to get into, well, I've got, I've got road tasks, I've got repetitive actions Actually, we doing valuable work in the operation space as much as you were doing in, in the build space. we say, Hey, you know, platforms are super important. on the end of the, of the, of the actions and tasks that they need to do. It. Yeah, exactly. For it. I know on stage you went through it in detail. it's any, any place that you can imagine an evict coming from your monitoring platforms. There's a lot of data events everywhere now. What are the rules that need to follow? outcomes that this is actually gonna enable organizations and any industry to achieve. You can detect a lot of that information for the discovery And that's how we, that's how we take that process Can you share the differentiation? So the control and the trust, You know, would you trust an automatic system to go and start making The versatility seems like a big deal too. The, the, the ability to take any of those tasks you wanna do in action, string them together, Obviously you can look at different industries and different businesses the exact same place where you can feel that trust and ubiquity that we keep talking we were, we observe teams doing self-healing and you know, extending Ansible. This is kind of what you guys are targeting That's the way you can do it. Mean, that's how we match basically means my mind to get your reaction. And you know, it, it's about, But something Richard that you were talking about that struck me a couple minutes ago is, So how, you know, and again, it just comes back to how do we facilitate, how do we make it easy? and have more, I say more power, you know, more keys to the kingdom, however you wanna look at it. And separating the control plane from the execution plane. That's the long game in mind. and opinionated dev tools, now we can show you how to build it. I mean, wisdom shows that you can go Each adding a new layer of complexity and a new layer of, you know, more that you have to then look So a thousand flower blooms kind of situation. I, I can control that now I can look after that. I mean that's kind of every inflection point has complexity before it gets simpler. That's What do you think's gonna come? I, you know, my overarching vision is that I just want to be able to automate more. It is what it is. Yeah. And now we run inside the automation platform at any of those locations that you Provision the cluster. Last question guys, before we run out of time for this. trust us and we trust them to build really good products. Well it's on GitHub, right? It's probably a link somewhere if I on the front page. And so look at there, you can see where we're going on our roadmap, what we're capable of But at the same time, we want the partners, you know, we, we don't know all the technologies, It'll be exciting to see what unfolds over the next six to nine months or so with the partners
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
John Furrier | PERSON | 0.99+ |
John | PERSON | 0.99+ |
Chicago | LOCATION | 0.99+ |
Lisa Martin | PERSON | 0.99+ |
Matt | PERSON | 0.99+ |
Richard | PERSON | 0.99+ |
Richard Hensel | PERSON | 0.99+ |
Tom Anderson | PERSON | 0.99+ |
Matthew Jones | PERSON | 0.99+ |
2019 | DATE | 0.99+ |
Richard Henshall | PERSON | 0.99+ |
John Fhrer | PERSON | 0.99+ |
IBM | ORGANIZATION | 0.99+ |
Tom | PERSON | 0.99+ |
last year | DATE | 0.99+ |
Ansible | ORGANIZATION | 0.99+ |
yesterday | DATE | 0.99+ |
Andy Grove | PERSON | 0.99+ |
two | DATE | 0.99+ |
both | QUANTITY | 0.99+ |
Chad | PERSON | 0.99+ |
Ansible Automation | ORGANIZATION | 0.99+ |
two | QUANTITY | 0.99+ |
Kafka | TITLE | 0.99+ |
ORGANIZATION | 0.99+ | |
ansible.com/events | OTHER | 0.99+ |
GitHub | ORGANIZATION | 0.98+ |
today | DATE | 0.98+ |
Both | QUANTITY | 0.98+ |
Each | QUANTITY | 0.98+ |
three years ago | DATE | 0.97+ |
two alumni | QUANTITY | 0.97+ |
The Cube Live | TITLE | 0.97+ |
single task | QUANTITY | 0.97+ |
three things | QUANTITY | 0.97+ |
10 years ago | DATE | 0.96+ |
Ansible Fest 2022 | EVENT | 0.95+ |
this year | DATE | 0.95+ |
Ansible Fest | EVENT | 0.94+ |
few years ago | DATE | 0.92+ |
first | QUANTITY | 0.91+ |
hundreds of thousands of devices | QUANTITY | 0.91+ |
this morning | DATE | 0.88+ |
nine months | QUANTITY | 0.88+ |
AnsibleFest | EVENT | 0.87+ |
last 18 months | DATE | 0.87+ |
last couple years | DATE | 0.86+ |
DevOps | TITLE | 0.84+ |
ansible.com | OTHER | 0.82+ |
couple minutes ago | DATE | 0.79+ |
day two | QUANTITY | 0.78+ |
thousand flower blooms | QUANTITY | 0.76+ |
Waldo Wall | PERSON | 0.73+ |
step one | QUANTITY | 0.73+ |
last couple of years | DATE | 0.73+ |
Red Hat | ORGANIZATION | 0.71+ |
Cube | ORGANIZATION | 0.7+ |
one | QUANTITY | 0.69+ |
NextGen | ORGANIZATION | 0.66+ |
SRE | TITLE | 0.62+ |
2022 | DATE | 0.6+ |
questions | QUANTITY | 0.58+ |
next day | DATE | 0.57+ |
six | QUANTITY | 0.57+ |
years | QUANTITY | 0.54+ |
double | QUANTITY | 0.52+ |
Richard Hummel, Netscout | Threat Report Episode 1
>>Kicking things off for Netscout's latest threat intelligence reports. I'm Lisa Martin with Richard Hummel manager of threat intelligence at NetScout. We're going to be talking about DDoSs for hire. It's a free for all Richard, welcome to the program. >>Thanks for having me. At least that's always a pleasure to do interviews with you here on acuity. >>Likewise. So, which are the dark web is a dangerous place. We know that we're adversaries own and operate DDoS for hire platforms and botnets to launch everything from free tests to high powered multi-vector attacks. What did you find? What kind of attacks are being launched on the dark web, >>Sadly, any and every type of attack you. And I think you put it eloquently that it's free a little while ago. I got a question come in from a media journalists that I was talking to and they asked me what is the average cost of a DDoS attack? And my gut reaction was mad, 10, 20 USD. I even asked another reporter later on, what do you think it costs? And he came out with two or 300 USD. And so that was kinda my expectations. Well, just because of that question, I broke up my lab and I said, you know what? I'm just going to kind of sleuth a little bit. And so I started logging in, I started looking at these underground platforms and I spend time on 19 of hundreds. There's a website out there that lists all with like three or 400 of these things, but I just chose the top 19. >>And when I started looking at these, every platform that I evaluated had some form of free attacks during launch. And these are the typical for your five attacks like NTP, cl doubt, DNS amplification. These are the, the rope or routine types of attacks we see in the DDoS threat landscape and it's free. And then it scales from there. You have $5 entry fees to do trials. You have a week trial, you can go all the way up to 6,500 USD. And the adversary reports to launch one terabit per second attack with that costs. There's another one that says, Hey, we have 150,000 button-up nodes. He has $2,500, and then you can launch it from this platform. And they also have customization. They have these little sliders on there. You can go in and say, you know what? I have five targets. I want to launch 10 attacks at once. I want it to last this many minutes. These are the vectors I want to use. And then it just tells you here's what you got to pay. Now, it used to be, you needed to have a crypto wallet to even launch a DDoS attack. Well, that's no longer the case. Second. It used to be crypto currency. Well, now they take PayPal. They take wire transfers. They do Western union transfers. And so yeah, this barrier to entry, it doesn't exist anymore. >>Wow. The evolution of data also attacks the low barrier to entry. The customization. You mentioned that you researched the top 19 validated DDoS for hire services. You guys captured the types of attacks, reported number of users and the costs to launch what you went through. What are some of the things that really stuck out to you that you found? >>I think the biggest thing, the biggest outlier that I saw with a lot of these things is that this, the sheer amount of attacks or tech types that they purport to launch that combined with one other metric that I'll, I'll tell you in just a minute. But when I started adding all of these out, I came out with a list of something like 450 different line items. This is taking the attack types from all 19 of these platforms and putting it into a spreadsheet. And then when I actually got rid of the duplicates and I started looking at each one of these to see, did they call it this? And then this one called it, this, there was still 200 different types of attacks. And these attacks are not just your typical volume metric things or your typical like botnet net related things. I mean, they're going after applications. >>They're going after capture pages. They're going after some website based anti DDoSs stuff. They're going after specific games, grand theft, auto Counter-Strike, all of these things. And they have specific attacks designed to overwhelm those layers. And you can actually see in some of the, the, the news or the update boxes they have on their platforms that they put rolling updates similar to like what you would see with Microsoft update. Here's what changed. And so they'll list, oh, we added this capture bypass, or we tweak this bypass, or guess what? We added a new server. And now you have this, this more power to launch bigger attacks. The other thing that really surprised me was the sheer number of users and attacks that they put for it to have and have launched. So across these 19 platforms, I counted over 1 million registered users. Now it could be that multiple users are registered across multiple platforms. >>And so maybe that's a little redundant, but a million or 19. And then the attacks, just whatever they showed in their platform. Now, I don't know what time segment that says it could be all time. It could be a certain snapshot, whatever, 19 of several hundred of these things, more than 10 million attacks. Now, if we look at 2020, we saw 10 million attacks on the whole year, 2021, we saw 9.7 million. So you can just see it. I mean, we're not seeing the whole breadth of the threat landscape. We see about a third probably of the world's internet traffic. And so if what they say is true, there's a lot more attacks out there than even. We talk about >>A lot more attacks than, than are even uncovered. That's shocking. The evolution of DDoSs is, is also quite shocking. One of the things I noticed in the first half 2021 threat intelligence report that NetScout published was some of the underground services offer blacklists or delisting services to prevent attacks. And I thought that sounds like a good thing, but what does that really mean? >>So actually, when we were writing the last chart report, a colleague of mine role in Dobbins had actually talked about this and he's like, Hey, I saw this thing where it's this quasi illegal organization. And they were talking about listing you as this. And they actually turn around and sell these lists. And so I started researching that a little bit. And what it turns out is these organizations, they report to be VPN services. Yeah. And they also say, you know what, we're offer these kinds of lists or block lists. We offer this VPN service, but we are also collecting your IP address. And so if you don't want us to basically resell that to somebody else, or if you want us to add that so that people can attack you based on what they're seeing on the VPN, then you can pay us money and you can do like different tiers of this. >>You can say, block me for a week or a block me for a lifetime and all of these different platforms. I wouldn't say all of them, probably four of the 19 that I looked at had this service. Now as a user, I'm not going to go to every single DDoS for hire platform. I'm not going to purchase the VPN from every single one of these. I'm not going to go and add myself to their denialist across all of these things. That's, that's kind of way too much work for one. And the cost is going to be in the thousands, if not tens of thousands, as you start to add all of these things together. And so they, they report to do something good and in turn, take your information and sell it. And what's worse is they actually assign your username or your handle or your gamer tag to that IP address. >>And so now you have this full list of IPS with gamer tags. And so an adversary Alto that has no qualms or scruples about launching DDoS attacks can then purchase that list. And guess what, Hey, this, this gamer over here who has this gamer tag, he always tells me I don't, I don't want to face them anymore. So anytime I see him in a match, I'm going to go over here to this DDoS for hire platform. And I'm going to just launch attack against him, try to knock them off of them. And so that's the kind of shady business practices that we're seeing here in the underground forums. >>Well, I knew that wasn't a good, I knew that you would actually give me the skinny on what that was. So another thing that I was wondering if it was a good, you know, despite this, you talked about the incredible diversity of these platforms, the majority of attack types that you sign are recognized and mitigated by standard defensive practices. Is that another good, bad disguise as good? >>No, in this case, it is very much good. So I, as far as I've seen, there's not a single DDoS attack type from a Google stressor service to date that you can't mitigate using preparation and your, your typical DDoSs platforms, mitigation protection systems. And even, even the bandwidth, the throughput, what some people call the size or the speed of attacks. We don't really see anything in the terabit per second range from these services. Now they'll, they'll boast about having the capability to do X number of packets per second, or this size of an attack. And so some of them will even say that, Hey, you pay us this money and we're going to give you a one terabit per second attack to date in the four years that I've been here on NetScout. And even some of my colleagues who've been around the space for decades. >>They have yet to see an attack source from one of these details for higher platforms that exceed one terabit per second in bandwidth or volume. And so they might talk a big game. They might boast about these things, but oftentimes it's, it's smoke and mirrors. It's a way to get people into their platforms to purchase things. If I had to pick kind of an average volume or size of attacks for these beer stressors on the high-end, I would say around the 150 to 200 gigabit per second. Now they're a small organization that might seem huge, but to a service provider, that's, that's probably a drop in the bucket and they can easily saturate that across their network, or observe, absorb that even without the top of the line mitigation services. So just being able to have something in place, understand how adversaries are launching these attacks, what attack vectors they are, you know, do some research. >>We have this portal called ominous threat horizon, where you can actually go in there and into your industry segment and your country. And you can just look to see, are there attacks against people like me in my country? And so, but understanding if you are the target of attacks, which it's not, if it's a win, then you can understand, okay, I need to probably have provisions in place for up to this threshold and ensure there's a tax that will exceed that. But at least you're doing due diligence to have some measure of protection, understanding that these are the typical kinds of attacks that you can expect. >>Yeah. That due diligence is key. Richard, thanks for joining me talking about DDoSs for hire a lot of interesting things there that was uncovered in a moment. Richard and I are going to be back to talk about the rise of server class bot net armies.
SUMMARY :
We're going to be talking about DDoSs for At least that's always a pleasure to do interviews with you here on acuity. What did you find? And I think you put it eloquently that it's And the adversary reports to launch one terabit per second attack with that costs. What are some of the things that really stuck out to you that you found? And then this one called it, this, there was still 200 different And you can actually see in some of the, the, the news or the update boxes they have on their And so if what they say is And I thought that sounds like a good thing, And so if you don't want us to basically resell that to somebody else, or if you want us And the cost is going to be in the thousands, if not tens of thousands, as you start to add all of these things together. And so now you have this full list of IPS with gamer tags. the majority of attack types that you sign are recognized and mitigated by standard And so some of them will even say that, Hey, you pay us this money and we're going to give you a one terabit per second attack to date And so they might And you can just look to see, are there attacks against people like me in my country? Richard and I are going to be back to talk
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Richard | PERSON | 0.99+ |
two | QUANTITY | 0.99+ |
Lisa Martin | PERSON | 0.99+ |
Richard Hummel | PERSON | 0.99+ |
10 | QUANTITY | 0.99+ |
Richard Hummel | PERSON | 0.99+ |
9.7 million | QUANTITY | 0.99+ |
$5 | QUANTITY | 0.99+ |
150,000 | QUANTITY | 0.99+ |
$2,500 | QUANTITY | 0.99+ |
19 | QUANTITY | 0.99+ |
three | QUANTITY | 0.99+ |
19 platforms | QUANTITY | 0.99+ |
2020 | DATE | 0.99+ |
PayPal | ORGANIZATION | 0.99+ |
10 attacks | QUANTITY | 0.99+ |
NetScout | ORGANIZATION | 0.99+ |
2021 | DATE | 0.99+ |
Microsoft | ORGANIZATION | 0.99+ |
five attacks | QUANTITY | 0.99+ |
tens of thousands | QUANTITY | 0.99+ |
a week | QUANTITY | 0.99+ |
thousands | QUANTITY | 0.99+ |
Second | QUANTITY | 0.99+ |
Netscout | ORGANIZATION | 0.99+ |
300 USD | QUANTITY | 0.99+ |
ORGANIZATION | 0.99+ | |
a million | QUANTITY | 0.99+ |
five targets | QUANTITY | 0.99+ |
One | QUANTITY | 0.99+ |
Counter-Strike | TITLE | 0.99+ |
Western union | ORGANIZATION | 0.98+ |
more than 10 million attacks | QUANTITY | 0.98+ |
10 million attacks | QUANTITY | 0.98+ |
one | QUANTITY | 0.97+ |
four years | QUANTITY | 0.97+ |
each one | QUANTITY | 0.96+ |
450 different line items | QUANTITY | 0.96+ |
200 different types | QUANTITY | 0.96+ |
over 1 million registered users | QUANTITY | 0.95+ |
decades | QUANTITY | 0.95+ |
single | QUANTITY | 0.94+ |
one terabit per second | QUANTITY | 0.94+ |
20 USD | QUANTITY | 0.94+ |
up to 6,500 USD | QUANTITY | 0.9+ |
200 gigabit per second | QUANTITY | 0.88+ |
half 2021 | DATE | 0.86+ |
one other | QUANTITY | 0.85+ |
19 of these platforms | QUANTITY | 0.85+ |
about a third | QUANTITY | 0.84+ |
second | QUANTITY | 0.81+ |
four | QUANTITY | 0.81+ |
one terabit per second attack | QUANTITY | 0.8+ |
first | QUANTITY | 0.77+ |
Threat Report | TITLE | 0.77+ |
hundreds | QUANTITY | 0.74+ |
400 of these | QUANTITY | 0.72+ |
top 19 validated | QUANTITY | 0.71+ |
hundred | QUANTITY | 0.66+ |
Episode 1 | OTHER | 0.55+ |
a minute | QUANTITY | 0.54+ |
Dobbins | ORGANIZATION | 0.53+ |
150 | QUANTITY | 0.53+ |
r attacks | QUANTITY | 0.52+ |
Richard Hummel, Netscout Episode 3
>>All right. Let's kick things off. I'm Lisa Martin with Richard Hummel manager of threat intelligence at NetScout. We're going to be talking about the vertical industries where attackers really zeroed in for DDoSs attacks. Richard. This is some interesting findings in the second half of 20 21, 20 21. >>It is in it's unfortunate because I never liked to see individuals or organizations specifically targeted by DDoS attacks and often this kind of individualistic targeting isn't so individual. And what I mean by that is DDoS attacks. Almost always have some form of ripple effects. It collateral damage that extends far beyond who the adversary is going after. We've got an example of this. There's there's been a lot of reports recently about, uh, various void providers, um, starting in Eastern Europe and expanding even to north America and various other parts of the world that have reported this DDoS extortion campaign or crew or whoever it might be copycatting as our eval, which is a notable ransomware group that all those publicly no, no that they were successful. Well, these guys are, are copycatting that unfortunately they've been very successful in some of these attacks and some of the companies have gone on record saying that, look, this didn't just impact us. >>They didn't just take our services offline. None of our customers could make calls. They could not do the reputation damage alone. How many of you users or subscribers did they lose as a result of them not being able to meet phone calls, how much revenue loss during that time period that they're losing out on. I go back all the way back to last year, and we saw something similar with another DDoSs extortion campaign against the New Zealand stock exchange. It was down for almost four days. Just think about the sheer amount of revenue loss and just all of the things that domino effect from there, right? It's not just the exchange commission that had problems. It's not just them. It's all of the stockholders and anybody that couldn't make a trade. And so yes, adversaries absolutely single out organizations, but the damage that it causes to those around them can be astronomical. >>Right? The downstream effects are just go, as you said, the ripple effect just goes on and on. And on. One of the things that I found interesting in the second half of 2021 threat intelligence report was that telecommunications verticals, which are usually a popular target for attackers actually saw fewer attacks in second half. Why is that? What are your thoughts there? >>So I think a lot of this goes back to why we saw a decrease in the second half of the year. Yeah. That decrease is almost exclusively attributed to a decrease in DNS amplification in CLD, DNS being like the predominant, uh, the us attack factor for many, many years, uh, TCP attacks, these direct path attacks that we talked about in our last segment, where they are direct from button ads or they're source from high powered, we're seeing a rebalancing, the scales here. So we're seeing about equal parts of both of these kinds of attacks now versus the reflection amplification that the amplification stuff being predominant. Um, and so that's one of the reasons why we saw that decrease. And when we look at the telecommunications and wired it and wireless, um, these are your consumers. These are your gamers. These are just individuals sitting at home, minding their own business that are getting DDoS attack. >>Then we've talked about it on previous interviews that we've done, that gamers are predominantly the targets of DDoS attacks. And so if we're seeing a decrease in like the preferred method for these attacks to occur, naturally, we're going to see a decrease in some of the attacks against these consumers. But what's notable here in, in telecommunication is considered like this big umbrella, right? You have wired, you have wireless, you have mobile, you have satellite, you have all other telecommunications, which is where your work providers fall. Um, so most of them we saw decreases, but in wireless and all other telecommunications now wireless, remember this 5g advent, and then the other telecommunications with this digital extortion stuff against the void providers. Those are two areas where we saw increases wireless, saw 32% increase and all other telecommunications think void saw at 93% increase. And so we are seeing some increases here, but the higher kind of frequency or attack counts in the wired, um, in a mobile, those saw decreases. >>Let's talk about 5g where, you know, everybody is so excited about it. The adoption is coming. What's going to be the amplification implication of 5g in terms of feeling increased attacks, >>Just the sheer volume. I mean, when we start to introduce 5g, now we're talking about every single device that we have potentially having its own space on the internet. You may have high bandwidth, high throughput capacity. And so we're not talking about just in the home, right. 5g is going to be everywhere. So now just take all of your IOT devices that maybe either be isolated to your home network are now going to be across the entire globe, outside the home on 5g networks that have the capability to launch really fast, really, really potent attacks. And so just the, the footprint really of what we've got to think about from a security perspective and from a defense perspective, it's going to flip things on its head quite a bit, because you're going from here's everything that I'm going to secure inside. My let's just use the castle representation again, everything's inside the castle. >>I put my boundaries in place. I've got my firewalls. I've got my IDs is I've got my access control lists. So anything outside of my sphere or my domain is irrelevant because I don't care about it. Well, 5g is going to blast that away because not only do you not have it on prem anymore, everything starts to get its own direct connection to the internet. How do you secure 5g? Does your organization have that in practice? I mean, ISP is, are still rolling 5g out and are still trying to figure things out as they go, how much more do enterprises and others that are gonna be consumers of this need to figure out how we're going to secure against these. And so, yeah, it's gonna introduce a whole new realm of how we need to think about security, >>A whole new realm, lots to consider there. Another thing besides the wireless telecommunications that that report uncovered was that closely related related software and computer and manufacturing verticals also saw massive increases in attacks. Why talk to us about that? >>You know, I think it's a logical progression of attacks. Um, the last report we put out, we talked about the conduct of the supply chain and what we meant by that was how do we communicate? How do we talk to each other? How do we get into our work, uh, assets? We use a VPN, we use DNS servers. We use internet exchanges to resolve our websites, adversaries increase the tax against those. And that was kind of like the connectivity piece. Well, let's, let's take a step back. What do you need to be able to get online? You need a computer, you need software and you need the ability to store some of this data on your computer. So what we saw 606% increase in attacks against software publishers, 260 and 253% increases against computer manufacturing, computer storage manufacturing together. To me, these are the digital supply chain. >>These are the things that allow us to do what we need to do. And so it's almost like a natural progression. And we see this a lot with DDoS extortion. So take the Lazarus Paramatta guys. We talked about last time, you know, they've initially started against financial organizations going after banks. Then they moved to the stock markets and they moved to insurance brokerages accounts. They moved to travel exchanges, currency exchanges, and they started this domino effect that, you know what, let's go where the money is. Maybe we'll get a payday that didn't work so slowly. They started to expand. Eventually LBA started targeting anybody and everybody in every single industry in vertical. And so what we see here is kind of like a logical progression of, you know, what our, to the supply chain attacks didn't work. And there's a good reason for them because these devices that they're going after are usually very, very secure. And so DDoS attacks, they can absorb them. They can mitigate them that they just bounce off. So can we succeed by going a little bit more upstream or downstream? However you want to look at this by targeting the actual manufacturers themselves, the people who create the software, we need to be able to conduct our business. And so that's kind of the logical progression of what we're seeing here. >>So Richard, how can companies prepare, defend against the attacks against the digital supply chain? That's pretty critical >>Preparation. Preparation is the key. And if we follow best current or best industry practices, um, there's this 80 20 rule that a colleague of mine likes to use. If you do 80% of the recommended things, the best current practices, it solves 80% of your problem and not just for the DDoS problem, but also for things like ransomware, various other, it's really that 20% in there that you have to worry about. And that's going to be being aware, knowing the adversaries are actually going after software publishers who would have funk it. Right. Who would think that they're actually going after the manufacturer of the applications that I'm using to talk to you right now, Lisa, right. Yeah. And so these are the kinds of things that people just aren't always aware of. And so making sure that we're cognizant of the actual targets of these attacks, and then from there, figuring out is there is our business involved in any kind of, of the software publishing. >>Should we be concerned about that? And if not, what about where we're getting our software from? Do they have to worry about this? Is there a risk for them not being able to deliver something to us because they're under bombardment by detail sometimes. And so it's just being aware and taking steps to be able to handle prepare. And I will say it again. You must have some sort of DDoS protections in place. It's not when, or it's not, if it's when you're going to get attacked and everybody, even if you are not the direct target, there's collateral damage as we talked about in the last segment. >>Yep. It's a matter of, if not, when, and that's something that businesses of any size in any industry have to be prepared for, as you said, preparation is really number one. Richard, thank you for sharing some of the really interesting findings and the verticals that have saw massive increases in the second half of 2021. And we look forward to what you're going to uncover next. >>Absolutely. Thanks again for having me. It's been a pleasure. >>Likewise. We want to thank you for watching the program today. Remember all these videos are available@thecubedotnetandyoucancheckoutthenewsfromtodayonsiliconangledotcomandofcoursenetscout.com many thanks to NetScout for making this program possible and sponsoring the cube. This is Lisa Martin signing off. Thanks for watching and bye for now.
SUMMARY :
This is some interesting findings in the second half of 20 21, 20 21. And what I mean by that is DDoS attacks. but the damage that it causes to those around them can be astronomical. One of the things that I found interesting in the second half of 2021 threat intelligence report Um, and so that's one of the reasons why we saw that decrease. And so we are seeing some increases here, but the higher kind of frequency or attack What's going to be the amplification implication of 5g in terms of feeling increased And so we're not Well, 5g is going to blast that away because not only do you not have it on prem Why talk to us about need the ability to store some of this data on your computer. And so that's kind of the logical progression of what we're seeing here. And that's going to be being aware, knowing the adversaries And so it's just being aware and in any industry have to be prepared for, as you said, preparation is really number one. It's been a pleasure. many thanks to NetScout for making this program possible and sponsoring the cube.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Richard | PERSON | 0.99+ |
Richard Hummel | PERSON | 0.99+ |
Lisa Martin | PERSON | 0.99+ |
32% | QUANTITY | 0.99+ |
Lisa | PERSON | 0.99+ |
NetScout | ORGANIZATION | 0.99+ |
80% | QUANTITY | 0.99+ |
last year | DATE | 0.99+ |
93% | QUANTITY | 0.99+ |
260 | QUANTITY | 0.99+ |
north America | LOCATION | 0.99+ |
253% | QUANTITY | 0.99+ |
20% | QUANTITY | 0.99+ |
second half | QUANTITY | 0.99+ |
606% | QUANTITY | 0.99+ |
two areas | QUANTITY | 0.99+ |
one | QUANTITY | 0.99+ |
both | QUANTITY | 0.99+ |
Eastern Europe | LOCATION | 0.99+ |
today | DATE | 0.97+ |
One | QUANTITY | 0.97+ |
LBA | ORGANIZATION | 0.96+ |
Lazarus Paramatta | ORGANIZATION | 0.96+ |
5g | ORGANIZATION | 0.92+ |
Netscout | TITLE | 0.91+ |
four days | QUANTITY | 0.89+ |
second half of 2021 | DATE | 0.89+ |
single device | QUANTITY | 0.81+ |
rule | QUANTITY | 0.79+ |
New Zealand | LOCATION | 0.76+ |
20 21 | DATE | 0.74+ |
single industry | QUANTITY | 0.73+ |
second half of | DATE | 0.72+ |
second | QUANTITY | 0.7+ |
half of the year | DATE | 0.7+ |
80 | QUANTITY | 0.68+ |
20 | OTHER | 0.66+ |
5g | QUANTITY | 0.63+ |
prem | ORGANIZATION | 0.56+ |
2021 | DATE | 0.54+ |
5g | OTHER | 0.47+ |
DDoSs | TITLE | 0.46+ |
Episode 3 | OTHER | 0.44+ |
Richard Hummel, Netscout Episode 2
>>Kicking things off I'm Lisa Martin with Richard Hummel manager of threat intelligence at NetScout in this segment, we're going to be talking about the rise of server class bot net armies. Richard. Good to see you >>Again, Lisa, as always >>Likewise, so botnet armies, it sounds a bit ominous, especially given the current global climate. Now the first botnets came in the early 1990s. Those were comprised of servers followed over the years by PCs and then it botnets. But recently in the second half of 2021, what have you seen with respect to botnets and the armies? >>Yeah, so I think it's important for us to look at the history of where did we come from? How did we get here? What kind of kicked off this phenomena of botnets specifically DDoSs related botnets and bonnets have existed for a long time. Lisa, you mentioned it in the nineties, and then we move into kind of the two thousands and talking about IOT devices entering the scene. And then 2013, you start to see, hear more about these IOT botnets and in their surge, but then it wasn't until 2016, when the Mariah code was publicly released. And we all heard about the dine attacks at the time, which were record-breaking oh man, we launched this 600 gigabit per second attack using an IOT button and the world's is on fire and everything's going to burn down. And that was kind of the feeling at the time. >>Uh, little did we know that IOT based botnets typically have limits? And the reason for that as an IOT device itself, doesn't have a whole lot of processing capability. Often they're sitting in home networks, home networks that maybe don't have high bandwidth high throughput. Now that is changing, right? The world is adopting this 5g. And even for jeez, you're using mobile hotspots and now IOT devices being directly connected to 5g networks, you're talking about much more bandwidth throughput capabilities. However, they're still limited to what that device is capable of doing. And so an IOT device itself probably can't generate a whole lot of throughput or bandwidth, but what happens if you're able to compromise really high powered devices, such as routers or even server grade routers or even servers themselves sitting in data centers. So inter kind of what we're seeing the second half of the year, I think a lot of us heard about some of the recent attacks with the nearest bottleneck taking down notable websites and Maris is a little bit different because it uses what's called HTTP pipeline. >>And essentially what that does is the bot itself will take all of its butted nodes. And in today is sitting on Microtech routers using a old vulnerability from 2018 managed to be able to compromise these things. And it will generate a bunch of these HTTP requests and then it will release the gate. And so all of these requests essentially flood a web server and the web server just can't handle it. So maybe the first few thousand it can process, but eventually it starts to slow, slow down before it completely chokes off. And so that's kind of how that attack works. Now, the Maris button itself leveraging these Microtech routers. And again, like I said, a vulnerability from 2018 that a lot of these used to compromise these routers on, but what was notable about that vulnerability is that you could force the router itself to give you the username and password, and even patching those routers in, unless you explicitly change the usernames and passwords and those persistent the patch. >>And so inter a new button that called the Venice that also takes advantage of this same existing vulnerability, but leveraging these credentials that then are able to compromise. So now you have two botnets operating on these Microtech riders that often sit in high bandwidth, high throughput networks, being able to launch these really fast potent attacks. Now into the third one here, getting a ride. This is a version of Mariah that has been forked and now uses your vulnerability or an exploit against get servers and where to compromise server grade hardware. So if it wasn't bad enough that you have these high powered routers. Now you're talking about a server that maybe it has a TIG 10 gig interface. What happens if you get a hundred or even a thousand of these things launching a really fast attack? And so, yes, it's the rise of a server class button at army and army I think is very apt here. >>Um, often we think about button ads and we used to use the term zombies or zombie network and ever really heard that too much lately because zombie is basically these things exist. They're kind of out there. They don't really get initiated until they're used, but in the DDoSs world, these botnets are typically always active. So I don't really consider them zombies, um, because they're always brute forcing, and they're always trying to propagate and they're doing this automatically. And so a lot of times when we see these connections coming into like things like our honeypot, these are Muray or Satoria Lucifer GAF kit XR DDoSs I could go on, right? There's a lot of these different IOT botnets out there, but more and more they're turning towards these more high powered hardware in these servers in order to up the potency of their attacks. >>Let's talk about speed for a second. You mentioned the new server class, Mariah botnets. One of the things that the report uncovered was that online criminals were able to really quickly employ them to launch attacks that were details had talks that were pretty vicious. Why were they able to do that so quickly? >>The ecosystem and the criminal underground is so fast. It's so rapid. They have no red tape. You know, let's look at it from a defensive standpoint, there's a new hardware software that rolls out. There's a new patch that rolls out. What do we have to do? We have to go through this process of validating, testing it against our network, figuring out is it going to tip anything over? Maybe we deploy a first to a staging environment. Then we have to get executive bless off and approval. It has to evaluate this. We have to go to industry standards, okay, is it meeting these benchmarks? And we have this whole process, right? And sometimes even for critical patches, it can take us months to be able to roll these out for deployment. Adversaries have none of that. They have no, they have no oversight. A new vulnerability comes out. New capability comes out new exploits, come out the very next day, we're seeing this in metal split modules. A couple of days later, we're seeing it in Mariah and various other IOT flavors of Mauer. And so these guys have super fast, rapid adoption of new things that are coming out with zero overhead. And so they can implement this in practice very, very quickly, not just in bots, but even in DDoS for hire platforms. They're starting to use these kinds of novel attack vectors very, very quickly after they'd been uncovered or reveal >>No overhead, no red table. That must be like another thing that I noticed in the report in the second half of 2021 was that NetScout saw the first known terabit class direct path DDoSs attack terabit class. What's the significance of that. >>And so the significance here is, like I said, with IOT, achieving those kinds of levels is very, very difficult because IOT devices cannot gen up to that amount of bandwidth. But with these botnets existing on segments of the internet that have one gig or even 10 gig of capacity and the power by which to generate enough traffic to achieve those volumes. So it's, it's something we've never seen before, even going all the way back to the diner tacks with the IOT and marae, we were talking to hundreds of thousands of devices here contributing to that 600 gigabit per second range. That was a lot by those standards, right. And I would say that we probably have more button that's existing today, but the more fragmented, right? So you might have 30,000 over here. You might have 50,000 over here. Maybe you have a hundred thousand over here. Um, and so a lot of these botnets are a little bit smaller, but now if we can do 10,000 routers with one particular button ad that has the capacity to do one gig each, I mean, we're talking massive amounts of traffic here. And so that's really, it, that's the evolution that we're seeing. And I think that the, the advent and introduction of 5g more and more across the world is going to make this exponentially worse in terms of what botnets are capable of launching. >>Let's dig into that in about a minute or so. The significance of 5g, you know, we were talking about that as so much opportunity that that's going to unlock, but is that potentially going to be a bad thing? >>It could be in the DDoSs world. Um, we have some statistics actually, where we're already starting to see more attacks against the wireless. And so wireless is in, uh, it used to be Latin time would have a lot of wireless and mobile type stuff because a lot of gamers over there use mobile hotspots, but we're seeing them move over to the lad time. And in fact, globally, we saw 32% increase in wireless attacks. And I believe firmly that a lot of that is attributed to this rollout of 5g across the world. >>Interesting. We'll have to keep our eye on that. Well, I'm sure not Scott. Well, another thing, if we think about one of the things that we've been through the last couple of years in the pandemic, the adoption and the embracing of this hybrid work model, that we're many of us still in, what does NetScout expect to see with respect to expansion of botnets into our homes, into our residences. >>That is the key question there, because what, what happened when COVID kicked off, everybody took their corporate machines. We took all of our devices that were sitting inside a corporate office. We went home, we went home behind routers that have no firewall that had no IDs to have no IPS. In fact, most of us probably don't even know how to log into our routers to change things. And so they're using your default usernames and passwords, or maybe you haven't patched it, or there's no auto patching setup. So you are taking all of your essential vital components for working in you're leaving the castle. And now you are out in an open field and adversaries have free reign to do whatever they want. Couple that with the fact that a lot of us don't even care about the security of our IOT devices, uh, I always like to use this example of Christmas day. >>You get these cool new gadgets and tech devices. And for me, that's pretty much all I get because I love tech. And if you see this now I've got four monitors, plus my laptop and all kinds of stuff here on my desktop. But when I get a new device on Christmas morning, it's not my first instinct or gut reaction to get online and change my default using passwords, or to make sure it's patched or to update it. Now, sometimes those are being forced now, which is awesome. We need to do more of that, but it's not your first reaction, but we know that as soon as an IOT device goes online, you have about five minutes at most before you start getting inundated with, through forcing attempts. And so, yeah, the, the global work from home has really changed how we need to think about security and how organizations and enterprises really should consider how they secure those at-home devices versus being inside the enterprise. >>A lot to think about Richard. And if you're not thinking about it first on Christmas day, then I certainly am not thinking about it. Thanks so much for talking to us about what you guys uncovered with respect to that armies. A lot of interesting evolution there, and the fact that there's no red tape. Wow. What an environment in a moment, Richard and I are going to be back to talk about the vertical industries where attackers zeroed in for DDoSs attacks. You're watching the cube, the leader in tech enterprise coverage.
SUMMARY :
Good to see you But recently in the second half of 2021, what have you seen with respect to botnets And then 2013, you start to see, hear more about these IOT botnets and And the reason for that as an IOT device itself, doesn't have a whole lot of processing capability. And so all of these requests essentially flood a And so inter a new button that called the Venice that also takes advantage of this same And so a lot of times when we see these connections coming into like things like our honeypot, these are Muray One of the things that the report And so these guys have super fast, What's the significance of that. And so that's really, it, that's the evolution that we're seeing. much opportunity that that's going to unlock, but is that potentially going to be a bad thing? And I believe firmly that a lot of that is attributed to this rollout of 5g across the world. We'll have to keep our eye on that. And so they're using your default usernames and passwords, or maybe you haven't patched it, or there's no auto patching setup. And if you see this now I've got four monitors, plus my laptop and all kinds of stuff here on my desktop. Thanks so much for talking to us about what you guys uncovered with respect to that armies.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Richard | PERSON | 0.99+ |
Richard Hummel | PERSON | 0.99+ |
Lisa Martin | PERSON | 0.99+ |
50,000 | QUANTITY | 0.99+ |
30,000 | QUANTITY | 0.99+ |
Lisa | PERSON | 0.99+ |
10 gig | QUANTITY | 0.99+ |
2016 | DATE | 0.99+ |
2013 | DATE | 0.99+ |
one gig | QUANTITY | 0.99+ |
10,000 routers | QUANTITY | 0.99+ |
NetScout | ORGANIZATION | 0.99+ |
two botnets | QUANTITY | 0.99+ |
Scott | PERSON | 0.99+ |
first | QUANTITY | 0.99+ |
third one | QUANTITY | 0.99+ |
2018 | DATE | 0.99+ |
early 1990s | DATE | 0.99+ |
Microtech | ORGANIZATION | 0.99+ |
first botnets | QUANTITY | 0.99+ |
600 gigabit | QUANTITY | 0.98+ |
first reaction | QUANTITY | 0.98+ |
first instinct | QUANTITY | 0.98+ |
today | DATE | 0.98+ |
One | QUANTITY | 0.96+ |
one | QUANTITY | 0.96+ |
first few thousand | QUANTITY | 0.96+ |
second half of 2021 | DATE | 0.96+ |
a hundred | QUANTITY | 0.96+ |
Christmas | EVENT | 0.95+ |
two thousands | QUANTITY | 0.95+ |
nineties | DATE | 0.95+ |
5g | QUANTITY | 0.93+ |
Muray | ORGANIZATION | 0.93+ |
about five minutes | QUANTITY | 0.93+ |
pandemic | EVENT | 0.91+ |
A couple of days later | DATE | 0.91+ |
next day | DATE | 0.89+ |
about a minute | QUANTITY | 0.87+ |
a thousand | QUANTITY | 0.87+ |
one particular button | QUANTITY | 0.86+ |
last couple of years | DATE | 0.85+ |
Netscout | TITLE | 0.85+ |
Couple | QUANTITY | 0.85+ |
hundreds of thousands of devices | QUANTITY | 0.84+ |
second range | QUANTITY | 0.84+ |
32% increase | QUANTITY | 0.83+ |
Mariah | TITLE | 0.83+ |
Satoria | ORGANIZATION | 0.82+ |
600 gigabit per second attack | QUANTITY | 0.82+ |
four monitors | QUANTITY | 0.81+ |
Christmas day | EVENT | 0.77+ |
hundred thousand | QUANTITY | 0.77+ |
a second | QUANTITY | 0.76+ |
Mariah | PERSON | 0.73+ |
half | QUANTITY | 0.65+ |
of the year | DATE | 0.64+ |
each | QUANTITY | 0.61+ |
Latin | LOCATION | 0.61+ |
second | DATE | 0.58+ |
zero | QUANTITY | 0.51+ |
Mauer | ORGANIZATION | 0.49+ |
Episode | QUANTITY | 0.46+ |
Maris | ORGANIZATION | 0.45+ |
Lucifer | COMMERCIAL_ITEM | 0.42+ |
COVID | EVENT | 0.41+ |
2 | OTHER | 0.38+ |
5g | OTHER | 0.36+ |
Richard Potter, Peak | AWS re:Invent 2021
>>Hello from Las Vegas. It's the cube live at AWS reinvent 2021, Lisa Martin and Dave Nicholson here. We're in our fourth day, Dave, we have two live sets of the kid. There's a dueling set right across from us, kind of like dueling pianos, only a little bit louder. We have had about a hundred guests on the program at AWS reinvent this year. And we're pleased to welcome back. One of our alumni, Richard Potter joins us the CEO of peak. Richard. Welcome back to the cube. >>Great to be here. Talk to >>Us. So we haven't seen you in a couple of years. Talk to us about what's going on at pink. I know there's some news. >>Yeah, yeah. Loads of things going on at peak. I mean, we've been growing really quick. So since the last time you saw us, which was yeah, in London a few years ago, uh, we've grown to be the, sort of essentially the global leader in decision intelligence systems. Um, us as an AI company, we specialize in putting artificial intelligence right into the heart of how companies run their businesses and make their day-to-day decisions, which is why we call it decision intelligence. We think it's the biggest thing in software and, uh, probably the biggest new category of software. Um, we will see this decade. So it's super exciting to be in that position and great to be back chatting to you guys on the cube. When were you based founded? We were founded in 2016. Uh, and, uh, yeah. And you can probably tell by my accent English company headquartered in Manchester, but we're global. Now we have operations in India. We have a couple of development centers in India. We have a growing customer base in Asia and a growing customer base in the U S as well. Uh, so yeah, we're kind of international, but born out of, uh, Northern English roots. >>I like it. Talk to me about back in 2016, what were some of the gaps in the market that you saw from a, because you know, as, as here we are in almost 20, 22, every company is a data company. They have to be being able to extract intelligence timely hard. What gaps did you see back in 2016 >>Back then a read on the market was really simple, which was the companies that are going to harness data to run themselves well, we'll win, but the most companies were struggling to make that change to be data-driven. So our rich was, you know, as founders, there's three of us who started the business was trying to explore that problem. Like what, what, what stops companies running on data? And there's loads of reasons, right? Tech ones, uh, skills, ones, even just like business people using data in their day-to-day decision-making rather than say their gut-feel, which I think is also a data-driven decision. They just don't understand that necessarily. Uh, so we really honed in on that problem and we grew quite quickly to be the leading business in that sort of applied data space in the UK, you know, a market leader in, uh, helping companies perform better with data. And over time that has taken us on this journey to be the sort of global leader in decision intelligence, which is really cool. But the itch we were scratching was that, Hey, you know, there's something in this, we think companies that do this and do it well are gonna win, but no one's doing it. So why is that? And then, and then we've built software that effectively responds to that opportunity. >>You mentioned harnessing data. Yeah. How do you balance the harnessing of data successfully with being harnessed by data? Because, because if you're talking about the concept of Dai yeah. Who's making the decision. If the machine is making the decision, I better trust it. Why should I trust it? So how do you, how do you strike that balance to get people to trust what you're doing? The work you're doing for them behind the scenes? Yeah, >>I think it's, it's really important that humans trust the machines that they're working alongside. And I think that's the big change we're seeing, right? So this is a new industrial revolution, the intelligence era that we're in, but all previous industrial revolutions have all amplified human potential. They've amplified like a physical potential, whether it was, you know, machinery, steam, power and so on, or computers have amplified our cognitive capability, but humans have always controlled those machines. If you think about it now in the intelligence era, our machines can think with us, they can think alongside us. So we have to learn how to, as people, how to co-exist with those machines and then let those machines amplify us and essentially make us superhuman and what we do. And that's a part of the challenge we face at peak as to how do we make, how do we humanize that? >>How do we make it such that everyone trusts the machine? Uh, and we always have that human in the loop is the way we think about it. Uh, decision intelligence empowers us to be awesome at our jobs, make the great decisions all the time. If we trust the machine so much that we just want it to make the decision for us, we can let it, but we're always in control and we're in control of how it thinks and what it does. And it's our job as a software company to build software that lets you understand why that recommendation or that decision is being suggested to you. So I think, I think the coexistence of our machines alongside people in a new way that a human to machine interface is going to completely change with artificial intelligence and decision intelligence and, and us as people we're going to have to relearn how we, how we work with our technology. >>You just mentioned a couple of really good words in terms of, of the people, part of people, process and technologies, amplify and empower. Those are two things that stuck out at me is that's what you're giving people in any, whether they're an operations or finance or marketing, it's the amplification to do their jobs, empowering them to do their jobs with data that will help make them more skilled and better able to make decisions that benefit themselves, the company. >>That's exactly right. Yeah, because if you, if you redact doing business to its basics, it's, it's actually just making decisions, right. Companies are make great decisions. They win and those decisions could be anything, you know, they could be product decisions, they could be pricing decisions, operational supply chain decisions, but it's a sequence of decisions that creates value for my company. And so that's why I believe this technology is so empowering because as people we're, we're actually great at making those decisions. What we're not great at is making those decisions 24 by seven really, really quickly, very consistently. So, you know, humans are awesome at forecasting. They're awesome at choosing pricing that would appeal to other people, but alongside this technology, we can have machines that do a lot of that thinking for us, speed us up and help us make more, um, quick, great consistently awesome decisions. And then that just makes us great at our jobs. If you're a marketeer or in finance or in supply chain, you, you become awesome. And I think that that, that empowerment is key to the sort of humanization of AI in business. And actually that's what it means in practice. It isn't AI coming for peoples' jobs or replacing jobs. It's it's AI helping us all be gray. And our companies grow faster with wider profit margins when we do that, which creates more jobs for people, which is really cool. >>So, um, we talk about people trusting machines to do things for them. Uh, it's, it's not necessarily a new concept. We just sort of take some of those things for granted. Um, I trust my refrigerator at home to measure the internal temperature and make adjustments as necessary. Turn the compressor on, turn the compressor off. And I'm sorry, I you're from England refrigerators, this thing, it's a box. We use it to refrigerate our beer, which I took to make it >>Cold, which I know. >>So it's kind of a, you know, got to love those cliches, but so can you give us an example of a situation where a customer is trusting something that it's gotten from DEI from peak, where if you, as the CEO heard that anecdotal story, you would be absolutely delighted. >>Well, I think the earth is loads of great examples of that. So, um, the reason we call it decision intelligence decision intelligence is because it's the, it's applying AI into the active decision making, right? Uh, artificial intelligence or machine learning is making a prediction or a categorization over a huge data set. Right? But that on its own is kind of useless. You need to take that prediction that forward looking view and then effectively infuse it with business logic constraints and like knowledge of how your company works to give you a recommendation. Right? So let's just say I'm a marketeer and I'm trying to work out who I should send a particular offer to on black Friday over email, or even not even over email over any channel. When, if I, if I was CEO and I heard one of my teams say, Hey, what I've done is I've used the decision intelligence platform to tell me who buy, who are my customers that are in market for X type of products at why kind of price and what channels do they like to be communicated to over? >>Uh, I would think that's awesome. And then that market here, we're typically infuse that message with the sort of language and content that would appeal to that customer. But they're using the artificial intelligence to be super targeted and really like deliver the message to that person in the way they want to consume it, which creates a really enjoyable experience as a customer. You don't feel spammed or you don't feel like it's effectively used. You feel like you're having a direct one-to-one personal communication with the brand or retailer. That's talking to you, which in itself creates loyalty and like increases the lifetime value of that relationship, which is great for the retailer. But I think using AI for those kinds of decisions is essentially like a great example of like amplifying the human potential of a marketing team for this. >>Absolutely. Because what we expect as consumers, regardless of what the product or service is, is that we want brands to know who we are, what we want. Don't if I just bought a tent on Amazon, don't show me more tests, show me other things that go with it. I want you to know that. And so we have this expectation that brands when whatever industry they're in, no, oh, Richard bought this. >>Exactly, exactly. So, and I think that it starts to really jar. Now you've got some retailers and brands doing this really well, and you get really enjoyable, uh, communications at the frequency you want with the offers and the promotions that were irrelevant to you. When you just start to get trapped, you know, effectively stalked around the internet for something you've already bought, it becomes really jarring and frustrating. And then that actually creates a negative brand effect for that particular brand. So it's super important that these retailers, CPG com everyone really moves to this way of thinking and tries to have a direct. And that's the beauty of AI and decision intelligence. I think for retail, if we get into retail specifically, it allows us to treat every individual customer individually because we can use the machine to make decisions on a per customer basis. And then our marketing can be amplified by that. Whereas in the past, we bucketed customers into groups and just treated them all the same, which does create a rather impersonal experience. >>Yeah. Which can be a negative for a brand, as you mentioned, but give them the ability to treat people individually, but at scale, and in real time, one of the things we learned in the pandemic is that real-time data access isn't no is not a nice to have. It's an essential one of the themes too, that Dave and I have been talking about the last few days is that we're hearing at re-invent is every company has to be a data company. Yep. Talk to me about with that in mind, are you talking to more chief data officers, chief digital officers, where are your customer conversations as we've we're in this explosion of data? >>It's a great question though. So if every company has to be a data company and a company that's powered by AI, that means you have to be talking to everyone really. So your chief data, chief chief information officers, chief data officers, CEO, CFOs, and every sort of head of business, head of line of business, it's really important. So what we do at peak is as a decision intelligence platform, peak itself, unifies everything you need in one cloud platform, into a single software product that gives you all the infrastructure for your technical teams to process data for your data scientists to create the intelligence, but then it gives you a place to work for your business teams. So unifies your whole business around a platform. And then that means our conversations. As you know, as the provider of that technology are with technical teams, they're with business teams, they're with business leaders because it has to permeate everything. So I think it's, I think that's the future companies will have to effectively run alongside they'll create their own intelligence, basically on a dedicated platform like peek. And that intelligence will then be distributed across the whole business, um, with w w you know, in the way we do it. So I think it's really cool and exciting. Yeah. >>Let let's say hypothetically, now this is something that would never happen, but just hypothetically say I'm an American goes to England to take over coaching, a British soccer, soccer, or football. Okay. I sounds crazy, but how would I, how would I use peak and Dai and BI to help improve my winning percentage if I cared about winning? Because it's possible that I would, I I'm really only interested in the personal development of my, of my team as individuals, but, but, but what would in athletics? Is that something that is a, >>I think possible? Yeah, for sure. I mean, you're seeing an explosion of data science and analytics and AI techniques being used in sport. Right. I mean, peak we're very much focused on the commercial application of AI with our platform. So we, we work with, uh, commercial businesses and so on, but in that space, yeah, absolutely. I mean, there's, if you think about it, what do you need to create that intelligence? You need data and you can see it on the back of every players share. They've got the little devices that are gathering data in training in matches, constantly monitored. Those data points, feed algorithms. Those algorithms can show us if a player is fatigued, you know, where they are, or they can even show us, uh, deep learning techniques can help us see patterns of play and understand like how should we better set our teams up? How should we get players to interact in for, you know, on a soccer field? Um, and yeah, and you're seeing premier league clubs use those sort of techniques all the time. We don't do that at peak, but yeah, I mean, I think, uh, I think those sort of things are readily available now for, uh, those kinds of clubs to do that kind of stuff. >>I think Dave is angling to be a consultant on Ted last. So I think what I'm hearing last question for you, you guys are from an AWS relationship perspective. Richard, you guys were announced just yesterday, you're named by AWS as an ISB partner, APN partner of the year for 2021 for UK. And I, congratulations. Talk to us a little bit about that. >>Yeah, it was really, I kind of, yeah, it's super exciting for us. It's a great recognition. Obviously they give one of those awards out every year, uh, as a global company, it's nice to have that sort of stamp of approval that AWS sees us as their independent software vendor partner of the year. It's a, it's a great recognition for us because we come from a heritage of, uh, starting peak as a consulting company, actually just to do whatever it took to help our customers be successful. And in doing that, we had an idea for a software platform. Uh, we got some venture funding to do that, and we've turned into a, you know, we became a software company a couple of years after we founded, uh, and to get to this point now a few years later where AWS are recognizing us as their software vendor partner of the year is, um, a huge team. Fantastic. It's a huge Testament to, uh, to our engineering teams and the, and the, and the technical teams at peak that we've built something so impactful. Yeah, >>Absolutely. That validation is really, really critical. And last question in our last 30 seconds or so what are some of the things on the roadmap that you're excited for for, for peak for 20 22, 22 >>Is going to be a huge year for us. Cause I think it's the year that, uh, our platform goes out there into the wild, into the mainstream. So we made a couple of big announcements in the last few weeks. Uh, we've launched some new products on the pig platform. So there's three big platform, product sets. Now, one very much geared around creating your AI ready data set. That's called doc, uh, one that's very much geared around creating your intelligence, which is factory. And then an area where our business like the business teams of our customers go to work, which is called work actually. So those three big feature sets are going to be available from January. And the platform is being totally opened up as a self-serve platform for anyone anywhere to build upon. So I think it's a huge moment for decision intelligence. Garner is saying decision intelligence is the big tech trend of next year. And we feel as the market leader, we've got the platform that can help everyone get on, get on that trend really. So I think we're really looking forward to 2022 and what it brings. And, um, we think that our platform and our company is in a great shape to help more and more businesses take that leap into being powered by decision Intel. >>It sounds exciting, Richard, so we'll have to follow up with you next year and see what's going on. We appreciate you joining us on the cube, talking about peep, what you're doing, your relationship with AWS and how impactful decision intelligence can be for everybody. We appreciate it. Thanks for Dave Nicholson. I'm Lisa Martin. You're watching the cube, the global leader in live tech coverage.
SUMMARY :
We have had about a hundred guests on the program at AWS reinvent this year. Great to be here. Us. So we haven't seen you in a couple of years. So since the last time you saw us, They have to be being able to extract intelligence timely But the itch we were scratching was that, Hey, you know, there's something in this, we think companies that do this and If the machine is making the decision, I better trust it. And that's a part of the challenge we face at peak as to how do we make, And it's our job as a software company to build software that lets you understand why it's the amplification to do their jobs, empowering them to do their jobs with data that will And I think that that, So, um, we talk about people trusting machines to do things for them. So it's kind of a, you know, got to love those cliches, but so can channels do they like to be communicated to over? And then that market here, we're typically infuse that message with the sort of And so we have this expectation that brands when So, and I think that it starts to really jar. Talk to me about with that in mind, are you talking to more chief across the whole business, um, with w w you know, in the way we do it. goes to England to take over coaching, a British soccer, soccer, Those algorithms can show us if a player is fatigued, you know, where they are, I think Dave is angling to be a consultant on Ted last. it's nice to have that sort of stamp of approval that AWS sees us as their independent are some of the things on the roadmap that you're excited for for, for peak for 20 22, 22 like the business teams of our customers go to work, which is called work actually. It sounds exciting, Richard, so we'll have to follow up with you next year and see what's going on.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Lisa Martin | PERSON | 0.99+ |
AWS | ORGANIZATION | 0.99+ |
Dave Nicholson | PERSON | 0.99+ |
Dave | PERSON | 0.99+ |
Richard Potter | PERSON | 0.99+ |
Asia | LOCATION | 0.99+ |
2016 | DATE | 0.99+ |
Richard | PERSON | 0.99+ |
India | LOCATION | 0.99+ |
January | DATE | 0.99+ |
London | LOCATION | 0.99+ |
Manchester | LOCATION | 0.99+ |
APN | ORGANIZATION | 0.99+ |
three | QUANTITY | 0.99+ |
Las Vegas | LOCATION | 0.99+ |
next year | DATE | 0.99+ |
2021 | DATE | 0.99+ |
U S | LOCATION | 0.99+ |
UK | LOCATION | 0.99+ |
England | LOCATION | 0.99+ |
fourth day | QUANTITY | 0.99+ |
2022 | DATE | 0.99+ |
two things | QUANTITY | 0.99+ |
Amazon | ORGANIZATION | 0.99+ |
yesterday | DATE | 0.98+ |
One | QUANTITY | 0.98+ |
24 | QUANTITY | 0.98+ |
seven | QUANTITY | 0.96+ |
black Friday | EVENT | 0.96+ |
one cloud platform | QUANTITY | 0.96+ |
one | QUANTITY | 0.95+ |
22 | QUANTITY | 0.94+ |
this year | DATE | 0.94+ |
pandemic | EVENT | 0.93+ |
about a hundred guests | QUANTITY | 0.93+ |
ISB | ORGANIZATION | 0.92+ |
single software product | QUANTITY | 0.91+ |
three big platform | QUANTITY | 0.91+ |
few years ago | DATE | 0.88+ |
Invent | EVENT | 0.87+ |
British | OTHER | 0.85+ |
two live sets | QUANTITY | 0.84+ |
English | OTHER | 0.83+ |
DEI | ORGANIZATION | 0.83+ |
few years later | DATE | 0.8+ |
Intel | ORGANIZATION | 0.78+ |
Ted | PERSON | 0.78+ |
Garner | PERSON | 0.78+ |
three big feature | QUANTITY | 0.77+ |
last few weeks | DATE | 0.76+ |
couple | QUANTITY | 0.62+ |
days | DATE | 0.61+ |
last | DATE | 0.61+ |
AWS reinvent | EVENT | 0.61+ |
20 | QUANTITY | 0.6+ |
30 seconds | QUANTITY | 0.54+ |
individual | QUANTITY | 0.53+ |
reinvent | EVENT | 0.53+ |
American | OTHER | 0.5+ |
Northern | LOCATION | 0.49+ |
years | QUANTITY | 0.48+ |
couple of years | DATE | 0.44+ |
peak | ORGANIZATION | 0.43+ |
22 | DATE | 0.38+ |
Avishek Kumar & Richard Goodwin | CUBE Conversation, October 2021
welcome everybody to this cube conversation my name is dave vellante and we're joined today by richard goodwin who's the group director of i.t at ultraleap and abhishek kumar who manages dell's power store product line just directs that product line along with several other lines for the company gentlemen welcome to the cube hey dave hi that's me so richard ultra leap very cool company tracks hand movements and so forth tell us about the company and the technology are really interested in how it's used yeah we have many uh product lines uh obviously we're very innovative uh innovative um and the organization was spun up from phd a number of phd students who were the co-founders for ultra leap and initially with mid-air haptics as many people may have seen but also hand tracking mid-air touch uh sense and feel uh so yeah it's it's it's quite impressive um what we have produced and the number of sectors and markets that we are in um and obviously to to push us to where we are we have relied upon lots of the dell technology both software and hardware and what's your role at the company i'm the group i t director and i'm responsible for the it and business platforms um all infrastructure network hardware software um and also the transition of those platforms to ensure that we're scalable and we are able to develop our software and hardware um as rapidly as possible awesome yeah a lot of data behind that too i bet um okay avashek you direct a number of products at dell across the portfolio unity extreme io the sc series and of course power vault it's quite the portfolio that you look after so let's get into the case study if we can a bit uh richard maybe you could paint a picture of of your environment uh some of the key applications that you're supporting and maybe what your infrastructure looks like give us a high level view sure uh so um pre uh powerschool we had um quite a a disparate uh architecture so um a fairly significant split and siding on the side of uh cloud uh not as hybrid as we would like and not uh not as much as on-prem as we would have liked and hey that has changed quite significantly um so we now have a number of servers and storage and storage arrays that we have on on-premise um and then we host ourselves so we are moving quite rapidly you know as a startup and then moving to a scale-up we needed that that scalability and that versatility and also the whole op-ex versus capex and also not being driven by lots of um sas products and architecture and infrastructure where we needed to be in control because of our development cycles and our products product development so wait okay so so too much cloud i'm hearing you run a little bit a dose of on-prem explain that a little bit more the cloud wasn't doing it for you in terms of your development cycle your control can you double click on that yeah some of the some of the control and you know there's always a balance because there's certain elements of uh our development cycles and our engineering uh software engineering where we need a very high parallelism uh for some of the work that we're doing which then you know the capex investment makes things very very challenging and not commercially the right thing to do however uh there are some of our information some of our ip um some of the secure things that we do we also do not want upgrades as an example or any outages or certain types of server and spec that we need to be quite bespoke and unique and that needs to be within our control got it okay thank you for that abhishek we're going to talk about powerstor today so set it up please tell us about powerstor what it is you know why it's important to this conversation sure so power store is a product that we launched may of 2020 roughly a little bit more than a year now and it's a brand new architecture that dell technologies released and at the end of the day i'll talk about a few unique aspects of the product but at the end of the day the where we start with it's a storage platform right so uh where we see similar to what richard is saying here uh uh in terms of being able to consolidate the customer's environment whether it is block file v-balls physical virtual environments uh and and it's as i said it's a brand new architecture where we leveraged pieces of existing products where it made sense uh and it's a it's we are using all the latest and greatest technologies delivering the best performance based data reduction uh and and where we see a lot of traction is the options that it brings to the table for our customers in terms of flexibility whether they want to add capacity compute uh whether in fact uh we have a apps on dev deployment model where customers can consolidate their compute as well on the storage platform if needed so a lot of innovation from a platform perspective itself and it's not just about the platform itself but what comes along with it right so we referred it as an ecosystem part of it where we work with ansible playbook csi plug-in you name it right and it's the storage platform by itself doesn't that doesn't stand by itself in a customer's environment there are other aspects of the infrastructure that it needs to integrate with as well right so if they're using ansible playbooks we want to make sure the integration is there got it and last perhaps uh not the least is uh the intelligence built into the platform right so as we are building these capabilities into the product uh there is intelligence built into the product as well as outside the product where things like cloud iq things like uh technologies built into power store itself makes it that much easier for the pro for the customers to manage the infrastructure and go from there thank you for that so richard what was the workload so actually you started with sort of a green field on-prem if i understand it correctly what was the workload that you were sort of building around or workloads sorry we had a um a number of different applications some of which we cannot really talk about too much um and then we engaged them regarding um the storage uh issue that we had and we engaged the our account lead accounting exec and a number of solution architects were working with us to ensure that we had the optimal solution dell were selected over the competitors there's a many reasons you know the new technology the deduplication the compression the data overall data reduction um and the guarantee uh that also came uh came with that the four to one data reduction guarantee which was significant to us because of the amount of data that we hold and we have you know as i mentioned we're pulling further further data of ours back um into our hosted environments which will end up on the power store especially with the deduplication that we're now getting we've now actually hit nine to one which is you know significant we were expecting four to one maybe five to one with some of the data types and what was excellent dell where that confident that they did not even review our data types prior and they were willing to stand by that guarantee of four to one and we've excelled that you know we've got significant different data types on on that array and we've hit nine to one and that's gradually grown over the last nine months you know we were kind of at six and we moved to seven and now we're hitting nine to one ratios that's great so you get a little free storage that's interesting what you're saying richard because i just assumed that a company that's guarantees four to one is going to say okay let us let us inspect your workload first and then and then we'll do the deal uh so avashek what's the tech behind that data reduction that you're able to with such confidence not have to and pre-inspect the workload in this case anyway yes sir so it goes back to the technologies that goes behind the product right so so we stand behind the technology and we want to make it simpler for our customers as well where again we don't want to spend weeks looking at all the data scanning all the data before giving the guarantee so we stand behind the technology where we understand that as the data is coming in we are always going to duplicate it we are always going to compress it there is technology within the product where we are offloading some of that to the uh outside the cpu so it is not impacting the performance that the applications are going to see so data reduction by itself is not going good enough performance by itself is not good enough both of them have to be together right so and that's what powerstroke brings to the table yeah thank you so richard i'm interested i mean i remember the power store announcement uh i sort of saw it leading up to it and one of the big thrusts from dell the way i phrase it is essentially trying to create a cloud-like experience on-prem so really focus on simplicity so my question to you is let's start with just the deployment you know how complicated was it to install what was that process like you know how many clicks not that you have to tell me how many clicks but you know what i'm asking is is how difficult was it to get from zero to you know up and running well we actually stepped down a very difficult challenge um we were in quite a difficult situation where we'd pretty much gone off of a cliff in terms of our iops performance um so the rfp was quite rapid and then we needed to get which whoever which vendor was successful we need to get that deployed rather rapidly and on the floor in our data center and server rooms uh which we did um and it was very very simplistic within three weeks of placing the order we had that array in our server rack and we had begun the migration it was very simple to set up um and the management of that array has been we we've seen a i think 40 reduction in terms of effort to be able to manage our storage because it is very self-contained um you know even from a reporting perspective the deployment the migration was all very very very simplistic and you know we we've done some works recently where we had to also um do some work on the array and some other migrations that we were doing and the resilience came came to came to the forefront of where you know the the dual architecture and no single point of failure enabled us to do some things that we needed to do quite rapidly because of the the dual nodes and the resilience within within the unit within the power store itself was considerable where we kept performance up it will also prioritize any disk rebuilds keeps the incoming ingest rates uh high and prioritizes the you know the workloads which is you know really impressive especially when we are moving so quickly with our technology we don't really have much time to you know micromanage the estate can you can you just repeat what you said on the percent reduction i think i heard you you cut out there a little bit a potent reduction on on management on on on the labor side yeah so our uh our lead storage engineer is estimated around 40 less management wow okay so that's that's good so actually i love this conversation because uh you know in the early days of automation people like ah that's my job provisioning luns i'm really good at it but i think people are realizing that it's actually you know not something that you want to be really good at it's something that you want to eliminate so now maybe it's a he that storage engineer got his or her nights and weekends back uh but but what do they do now when they get that extra time what do you what do you put them on you know more strategic initiatives or you know other other things in the to-do list what's that like the last thing uh you know any of my team whether it's the the storage leads or some of the infrastructure team that are also involved and engaged because you know the organization we have to be quite versatile as a team in our skill sets we don't want to be doing those bau uh mundane tasks even the storage engineer does not want to be you know allocating luns and allocating storage to physical servers vms etc we want all of that to be automated and that you know those engineers are now working on you know some of the cutting edge things that we're trying to do with machine learning is as an example um which is much more interesting it's what they want to be doing um you know that aids the obvious things like retention interest and personal development we don't want to be you know that base i.t infrastructure management is is not not where you know any of the engineers want to be in terms of the decision to go with dell power store i'm definitely hearing there was a relationship there was an existing relationship with dell i'm sure that played into it um there were many things so you know the relationship wasn't really part of this even though i mentioned the end user compute you know in any sector or anything that we're procuring we want best of breed and you know a best of set and that was done on you know cost is definitely a driver the technology you know is of interest to us we're a tech company new technology to us is also fascinating not only our own uh but also the storage guarantee the simplicity um the resilience with it within the uh unit also the ability which was key to us because of what we're trying to do with our hybrid model and bring bring back and repatriate some of the data as it were from the cloud we needed that ability to with ease to be able to scale up and scale out and the uh power stall gave us that when you say cost uh i want to dig into that price or you know the the the price tag or the the cost i mean when you do the business case and i wonder if we could add a little color to that yeah there's two elements to this so they're not either the cost and the price tag uh but then also cost of ownership and the comparisons that we were running against the other vendors but also the comparisons that we were running from a capex investment against opex and what we have in the cloud and also the performance you know the performance that we get from um the cloud and our cloud storage and the resilience within that and then also the initial price tag and then comparing the capex investment to the opex were all elements that were key to us making our decision and you know that there has to be some credit taken by the dow account team and that their relationship towards the final throws of that rfp you know were key initially not all we were just looking for the best possible storage uh solution for ultralite and to to determine that on your end was that like a feature because it's sometimes fuzzy what the business impact is going to be like that 40 you mentioned or the data reduction at nine to one when there's a promise of four to one did you what did you do did you kind of do a feature function analysis and sort of line that up and and say okay i'm gonna map that to our business pro our processes our i.t processes and try to predict what the impact would be is that how you did it or did you take a different approach we did so we did that obviously between vendors as you'd expect in an rfp but then also mapping to how that would impact the business and that that is not an easy and easy process to go through and we've seen more games even comparing one vendor to another some of that because of the the technology the terminology is very very different and sometimes you have to bring that upper level and also gain a much more detailed understanding which at times can be challenging but we did a very like for like comparison um and also lots of research but you're quite right the the the business analysis to what we needed um we had quite a good forecast uh and from some of our historical information and data and also our engineering and business and strategic roadmap we were able to map those two together not the easiest of experiences not one that i want to repeat but we got yeah a little bit of art and science involved avishak maybe you could talk about power store what you know give us the commercial what makes it different from other products in the market uh things like cloud iq uh maybe you could talk about that a little bit sure so uh so again from uh it's music to my ears when richard talks about the ease of deployment and the management because there is a lot of focus on that but even as i said earlier from a technology perspective a lot of goodness built in in terms of being able to consolidate uh customers environment into onto the platform so that's more from a storage point of view give the best performance give the best data reduction storage efficiencies uh the second part of course the the flexibility the options that power store gives to the customers in terms of sort of disaggregating the storage and the compute aspects of it so if as a customer i want to start with different points in terms of what our customer requirements are today but going forward as your requirements change from a compute capacity perspective you can use the scale up and scale out capabilities um and and then the intelligence built in right so as you scale out your cluster being able to move storage around right as needed uh being able to do that non-disruptively so instead of saying that mr customer your uh your storage is going to you're at 90 capacity being able to say that based on your historical trending uh we expect you run out of capacity in six months some small things like that right and of course uh if the uh the dial home the support assist capabilities are enabled cloud iq brings a lot of intelligence to the table as well in addition to that as i mentioned earlier there is apps on capability that gives another level of flexibility to the customers to integrate your storage infrastructure into a virtual environment if the customer chooses to do that and last but not the least it's not just about the product right so it's about the the programs that we have put around it anytime upgrade is a big differentiator for us where it's an investment protection program for customers where if they want to have the peace of mind in terms of three months nine months three years down the line if we come out with new technologies being able to be upgrade to that non-destructively is a big part of it as well so it's a peace of mind for the customers that yes i'm getting into the power store architecture today but going forward i am i'm protected from that point of view so anytime upgrade it's a new business program that we put around leveraging the architectural benefits of power store uh whether your computer requirement your storage requirements change your your you're covered from that point of view so again a very quick overview of uh of what power store is why it is different and again that's where that comes from thank you for that richard are you are you actively using cloud iq do you get what kind of value do you get from it not currently um however we have we have had plans to to do that the um uptake and how basically our our internal work node is not allowed us to to do that but one of the other key reasons for selecting powersupport was the the non-disruptive element you know with other sas products other providers and other issues that we have experienced that was one that was a a key decision for us from a um a power store perspective one of the other you know i i to go back to the conversation slightly with in terms of performance you know we are getting getting now you know there's a 400 percent speed of improvement of publishing uh we've got 80 percent faster code coverage and our firmware built 1 300 quicker than they were previously and the time savings of the storage engineer and you know as a director of it i often ask for certain reports from from the storage array when we're working out for um storage forecasts performance forecasts and you know when we're coming close to product releases and code drops um that we're trying to manage the the reporting on the power store is is impressive whereas previously my storage engineer would not be the uh the most happiest of people when i would be trying to pull you know month-end quarterly reports etc uh whereas now it's it's ease and we have live dashboards running we can easily extract that information i love that uh because you know so often we talk about the 40 reduction in it labor uh which okay that that's cool but then your cfo's gonna say yeah but it's not like we're getting rid of people we you know we're still spending that money and okay they're getting you're now into soft dollars but when you talk about 400 percent 18 1300 percent you're talking about business impact and that's telephone numbers to a cfo so i i love those metrics thank you for sharing yeah but when they obviously some of our dashboards when they're visualized that they are very hard-hitting you know the impact you know you're quite right to see if it does chase down you know the availability and the resource profile however we're on a huge upward trajectory so having the right resilience and infrastructure in places is exactly what we need and as i mentioned before those engineers are all reallocated to much more interesting work and you know the areas that will actually drive our business forward speaking of resilience are you doing any replication uh not currently however there uh we've actually got a meeting regarding this today with some of the dell's enterprise and some of their storage specialists in a couple of hours time actually because that is very high on the agenda for us to be able to replicate and have a high availability um cluster and another uh potentially power stone made because so i was going to ask you kind of where you want to take this thing i'm hearing you you're looking at cloud iq really try to exploit that so you got some headroom here in terms of the value that you can get out of this platform uh to to do replication faster recovery etc maybe protect against you know events guys thanks so much for your time really appreciate your insights and thank you for watching this cube conversation this is dave vellante and we'll see you next time you
SUMMARY :
i love that uh because you know so often
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Richard Goodwin | PERSON | 0.99+ |
richard goodwin | PERSON | 0.99+ |
80 percent | QUANTITY | 0.99+ |
October 2021 | DATE | 0.99+ |
400 percent | QUANTITY | 0.99+ |
abhishek kumar | PERSON | 0.99+ |
Avishek Kumar | PERSON | 0.99+ |
dave vellante | PERSON | 0.99+ |
three months | QUANTITY | 0.99+ |
nine months | QUANTITY | 0.99+ |
richard | PERSON | 0.99+ |
both | QUANTITY | 0.99+ |
two elements | QUANTITY | 0.99+ |
five | QUANTITY | 0.99+ |
seven | QUANTITY | 0.99+ |
40 | QUANTITY | 0.99+ |
one | QUANTITY | 0.99+ |
opex | ORGANIZATION | 0.99+ |
six months | QUANTITY | 0.99+ |
nine | QUANTITY | 0.98+ |
capex | ORGANIZATION | 0.98+ |
three weeks | QUANTITY | 0.98+ |
six | QUANTITY | 0.98+ |
four | QUANTITY | 0.98+ |
today | DATE | 0.98+ |
dell | ORGANIZATION | 0.97+ |
two | QUANTITY | 0.97+ |
powerstor | ORGANIZATION | 0.97+ |
second part | QUANTITY | 0.96+ |
three years | QUANTITY | 0.96+ |
dell power store | ORGANIZATION | 0.96+ |
zero | QUANTITY | 0.94+ |
dow | ORGANIZATION | 0.93+ |
ultraleap | ORGANIZATION | 0.92+ |
playbook | COMMERCIAL_ITEM | 0.91+ |
around 40 less | QUANTITY | 0.9+ |
90 capacity | QUANTITY | 0.9+ |
about 400 percent | QUANTITY | 0.84+ |
1 300 | QUANTITY | 0.84+ |
playbooks | COMMERCIAL_ITEM | 0.84+ |
ansible | ORGANIZATION | 0.79+ |
more than a year | QUANTITY | 0.79+ |
uh power | ORGANIZATION | 0.78+ |
18 1300 percent | QUANTITY | 0.78+ |
may of 2020 | DATE | 0.78+ |
couple of hours | QUANTITY | 0.76+ |
ultra leap | ORGANIZATION | 0.75+ |
single point | QUANTITY | 0.73+ |
dave | PERSON | 0.7+ |
power store | ORGANIZATION | 0.67+ |
powerstroke | ORGANIZATION | 0.65+ |
lot of data | QUANTITY | 0.61+ |
first | QUANTITY | 0.6+ |
i.t | ORGANIZATION | 0.59+ |
some | QUANTITY | 0.53+ |
Avishek and Richard V2
>> Welcome everybody to this cube conversation. My name is Dave Vellante and we're joined today by Richard Goodwin, who's the group director of IT at Ultraleap and Avishek Kumar, who manages Dell's Power Store, product line, he directs that product line along with several other lines for the company. Gentlemen, welcome to the cube. >> (Avishek) Hi Dave. >> (Richard) Hi >> (Dave) So Richard, Ultraleap, very cool company tracks hand movements, and so forth. Tell us about the company and the technology I'm really interested in how it's used. >> Yeah, we've had many product lines, obviously. We're very innovative, and the organization was spun up from a PhD, a number of PhD students who were the co-founders for Ultraleap, and initially with mid-air haptics, as you, as many people may have seen, but also hand tracking, mid-air touch, sense and feel. So, yeah, it's, it's, it's quite impressive what we have produced and the number of sectors and markets that we were in. And obviously to, to push us to where we are, we have relied upon lots of the Dao technology, both software and hardware. >> (Dave) And what's your role at the company? >> I'm the group IT director, I'm responsible for the IT and business platforms, all infrastructure, network, hardware, software, and also the transition of those platforms to ensure that we're scalable. And we are able to develop our software and hardware as rapidly as possible. >> (Dave) Awesome. Yeah, a lot of data behind that too I bet. Okay Avishek, you direct a number of products at Dell across the portfolio, Unity, Extreme IO, the SC series, and of course power vault. It's quite the portfolio that you look after. So let's get into the case study, if we can, a bit, Richard, maybe you could paint a picture of, of your environment, some of the key applications that you're supporting and maybe what your infrastructure looks like. Give us a high level view. >> Sure. So, pre Power Store, we had quite a disparate architecture, so a fairly significant split and siding on the side of the cloud, not as hybrid as we would like, and not, not as much as on-prem, as we would have liked, and hey, but that's changed quite significantly. So we now have a number of servers and storage and storage arrays that we have on, on-premise, and then we host ourselves. So we are moving quite rapidly, you know as a startup and then moving to a scale-up, we needed that, that scalability and that versatility, and also the whole OPEX versus CAPEX, and also not being driven by lots of SaaS products and architecture and infrastructure, where we needed to be in control because of our development cycles and our products, product development. >> (Dave) So wait, Okay, So, so, too much cloud. I'm hearing you wanted a little bit a dose of on-prem, explain that a little bit more, the cloud wasn't doing it for you in terms of your development cycle, your control. Can you double click on that? >> Yeah. Some of the, some of the control and you know, there's always a balance because there's certain elements of our development cycles and our engineering, software engineering, where we need a very high parallelism for some of the work that we're doing, which then, you know, the CAPEX investment makes things very, very challenging, not commercially the right thing to do. However, there are some of our information, some of IP, some of the secure things that we do, we also do not want upgrades as an example, or any advantages or certain types of server and spec that we need to be quite and unique and that needs to be within our control. >> (Dave) Got it, Okay. Thank you for that. Avishek, we're going to talk about Power Store today. So set it up, please, tell us about Power Store, what it is, you know, why it's important to this conversation. >> Sure. So Power Store is a product that we launched may of 2020, roughly a little bit more than a year now. And it's a brand new architecture that Dell technologies released. And at the end of the day, I'll talk about a few unique aspects of the product, but at the end of the day, where we start with, it's a storage platform, right? So where we see similar to what Richard is saying here, in terms of being able to consolidate the customer's environment, whether it is blog, file, WeVaults, physical, virtual environments, and, and it's, as I said, it's a brand new architecture where we leveraged pieces of existing products, where it made sense, we are using all the latest and greatest technologies delivering the best performance based data reduction. And where we see a lot of traction is the options that it brings to the table for our customers in terms of flexibility, whether they want to add capacity, compute, whether in fact, we have apps on the deployment model where customers can consolidate their compute as well on the static storage platform with needed. So a lot of innovation from a platform perspective itself, and it's not just about the platform itself, but what comes along with it, right? So we refer to it as an ecosystem, part of it, where we work with Ansible playbooks, CSI plugin, you name it, right. And it's the storage platform by itself, doesn't stand by itself in a customer's environment, there are other aspects of the infrastructure that it needs to integrate with as well. Right? So if they are using Ansible playbooks, we want to make sure the integration is there. >> (Dave) Got it. >> And last, but perhaps not the least is the intelligence built into the platform, right? So as we are building these capabilities into the product, there is intelligence built into the product, as well as outside the product where things like Cloud IQ, things like technologies built into power suit itself makes it that much easier for the customers to manage the infrastructure and go from there. >> (Dave) Thank you for that, So, Richard, what was the workload? So it actually, you started with the sort of a Greenfield on-prem. If I understand it correctly, what was the workload that you were sort of building around or workloads? >> So, we had a, a number of different applications. Some of which we cannot really talk about too much, but we had, we had a VxRail, we had a a smaller doubt array and we have lots of what we class as runners, Kubernetes cluster that we run and quite a few different VMs that run on our, on-prem server infrastructure and storage arrays and the issues that we began to hit because of the high IO, from some of our workloads, that we were hitting very high latency, which rapidly stopped, began to cause us issues, especially with some of our software engineering teams. And that is when we embarked upon a competitive RFP for Dell Power Store, Dell were already engaged from an end-user compute where they'd been selected as the end-user compute provider from a previous competitive RFP. And then we engaged them regarding the storage issue that we had and we engaged the, our account lead and count exec, and a number of solution architects were working with us to ensure that we have the optimal solution. Dell were selected over the competitors because of many reasons, you know, the new technology, the de-duplication, the compression, the data, overall data reduction, and the guarantee that also came, came with that, the four-to-one data reduction guarantee, which was significant to us because of their amounts of data that we hold. And we have, you know, as I've mentioned, we're pulling further, further data of ours back into our hosted environments, which will end up on the Power Store, especially with the de-duplication that we're now getting. We've actually hit nine-to-one, which is significant. We were expecting four-to-one, maybe five-to-one with some of the data types. And what was excellent that we were that confident that they did not even review our data types prior, and they were willing to stand by that guarantee of four-to-one. And we've excelled that, we've got significant different data types on, on that array, and we've hit nine-to-one and that's gradually grown over the last nine months, you know, we were kind of at the six then we moved to seven and now we're hitting nine-to-one ratio. >> (Dave) That's great. So you get a little free storage. That's interesting what you're saying, Richard, cause I just assumed that a company that guaranteed four-to-one is going to say okay, let us, let us inspect your workload first and then we'll do the deal. So Avishek, what's the tech behind that data reduction that you're able to, with such confidence, not have to pre inspect the workload in this case anyway. >> Yeah. So, it goes back to the technologies that goes behind the product, right? So, so we, we stand behind the technology and we want to make it simpler for our customers as well where, again we don't want to spend weeks looking at all the data, scanning all the data before giving the guarantee. So we stand behind the technology where we understand that as the data is coming in, we are always going to be de-duplicate it. We are always going to compress it. There is technology within the product where we are offloading some of that to the outside the CPU, so it is not impacting the performance that the applications are going to see. So a data reduction by itself is not good enough, performance by itself is not good enough. Both of them have to be together, right? So, and that's what Power Store brings to the table. >> (Dave) Thank you. So Richard, I'm interested. I mean, I remember the Power Store announcement of, sort of, saw it leading up to it. And one of the big thrusts from Dell was the way I phrase it is essentially trying to create a cloud like experience on-prem. So really focused on simplicity. So my question to you is, let's start with just the deployment. You know, how complicated was it to install? What was that process like? How many clicks, I mean, not that you have to tell me how many clicks, but you know, what I'm asking is, is how difficult was it to get from zero to, you know, up and running? >> Well, we actually stepped our very difficult challenge. We were in quite a difficult situation where we'd pretty much gone off the cliff in terms of our IOPS performance. So the RFP was quite rapid, and then we needed to get whoever which vendor was successful, we needed to get that deployed rather rapidly and on the floor in our data center and server rooms, which we did. And it was very very simplistic, within three weeks of placing the order, we had that array in our server rack and we'd begun the migration, it was very simple to set up. And the management of that array has been, we've seen say 40% reduction in terms of effort to be able to manage our storage because it is very self-contained, you know, even from a reporting perspective, the deployment, the migration was all very, very, very simplistic, and you know, we we've done some work recently where we had to also do some work on the array and some other migrations that we were doing and the resilience came, came to, came to the forefront of where the Juul architecture and no single point of failure enabled us to do some things that we needed to do quite rapidly because of the, the Juul norms and the resilience within, within the unit and within the Power Store itself was considerable where we, we kept performance up, it also prioritize any discreet rebuilds, keeps the incoming ingest rates high, and prioritizes the, you know, the workloads, which is really impressive, especially when we are moving so quickly with our technology. We don't really have much time to, you know, micromanage the estate. >> (Dave) Can you, can you just repeat what you said on the percent reduction? I think I heard you cut out there a little bit, a percent reduction on, on, on management, on, on, on the labor side. >> So our lead storage engineer is estimated around 40% less management. >> (Dave) Wow. Okay. So that's, that's good. So actually, I love this conversation because, you know, in the early days of automation, people like, ah, that's my job, provisioning LUNs. I'm really good at it, but I think people are realizing that it's actually not something that you want to be really good at. It's something that you want to eliminate. So, it now maybe it's that storage engineer got his or her nights and weekends back, but, but what do they do now when they get that extra time, what do you, what do you put them on? You know, no more strategic initiatives or, you know, other, other tech things on the to-do list. What's that like?. >> The last thing that, you know, any of my team, whether it's the storage leads or some of the infrastructure team that were also involved in engaged, cause you know, the organization, we have to be quite versatile as a team in our skillsets. We don't want to be doing those BAU mundane tasks. Even the storage engineer does not want to be allocating LUNs and allocating storage to physical servers, Vms, etc. We want all of that to be automated. And, you know, those engineers, they're working on some of the cutting edge things that we're trying to do with machine learning as an example, which is much more interesting. It's what they want to be doing. You know, that aides, the obvious things like retention, interest and personal development, we don't want to be, you know, that base IT infrastructure management, is not where any of the engineers wants to be. >> (Dave) In terms of the decision to go with Dell Power Store. I'm definitely hearing there was a relationship. There was an existing relationship with Dell. I'm sure that played into it. >> There were many things. So the relationship wasn't really part of this, even though I've mentioned the end-user compute in any sets or anything that we're procuring, we want best of breed, you know, best of sets. And that was done on, the cost is definitely a driver. The technology, you know, is a big trust to us, We're a tech company, new technology to us is also fascinating, not only our own, but also the storage guarantee, the simplicity, the resilience within, within the unit. Also the ability, which was key to us because of what we're trying to do with our hybrid model and bring, bring back repatriate some of the data as it were from the client. We needed that ability to, with ease, to be able to scale up and scale high, and the Power Store gave us that. >> (Dave) When you say cost, I want to dig into that price or you know, the price tag or the, the cost, I mean, when you do the business case. And I wonder if we could add a little color to that. >> (Richard) There's two elements to this, so they're not only the cost of the price tag, but then also cost of ownership and the comparisons that we were running against the other vendors, but also the comparisons that we were running from a CAPEX investment against OPEX and what we have in the cloud, and also the performance, performance that we get from the cloud and our cloud storage and the resilience within that. And then also the initial price tag, and then comparing the CapEx investments to the OPEX where all elements that were key to us making our decision. And I know that there has to be some credit taken by the Dell account team and that their relationship towards the final phrase of that RFP, you know, were key initially, not all, we were just looking for the best possible storage solution for Ultraleap. >> (Dave) And to determine that on your end, was that like a feature, because it's sometimes fuzzy what the business impact is going to be like that 40% you mentioned, or the data reduction at nine to one, when there's a promise of four to one, did you, what did you do? Did you kind of do a feature function analysis and sort of line that up and, and say, okay, I'm going to map that to our business processes our IT processes and try to predict what the impact would be. Is that how you did it? or did you take a different approach? >> (Richard) We did. So we did that, obviously between vendors usually expected an RFP, but then also mapping to how that would impact the business. And that is not an easy process to go through. And we've seen more gains even comparing one vendor to another, some of that because of the technology, the terminology is very very different and sometimes you have to bring that upper level and also gain a much more detailed understanding, which at times can be challenging, but we did a very like-for-like comparison and, and also lots of research, but you're quite right. The business analysis to what we needed. We had quite a good forecast and from summarized stock information data, and also our engineering and business and strategic roadmap, we were able to map those two together, not the easiest of experiences, not one that I want to repeat, but we, we got it. (Dave laughing) >> (Dave)Yeah, a little bit of art and science involved. Avishek, maybe you could talk about Power Store, what, you know, give us the commercial. What makes it different from other products in the market of things like cloud IQ? Maybe you could talk about that a little bit. >> Sure. So, so again, from a, it's music to my ears, when Richard talks about the ease of deployment and the management, because there is a lot of focus on that. But even as I said earlier, from a man technology perspective, a lot of goodness built-in, in terms of being able to consolidate a customer's environment, onto the platform. So that's more from a storage point of view that give the best performance, give the best data reduction, storage efficiencies. The second part, of course, the flexibility, the options that Power Store gives to the customers in terms of sort of desegregating the storage and the compute aspects of it. So if, as a customer, I want to start with different points in terms of what our customer requirements are today, but going forward as the requirements change from a compute capacity perspective, you can use a scale up and scale out capabilities, and then the intelligence built in, right? So, as you scale out your cluster, being able to move storage around right, as needed being able to do that non-disruptively. So instead of saying that Mr. Customer, your, your storage is going to you're at 90% capacity, being able to say that based on your historical trending, we expect you run out of capacity in six months, some small things like that, right? And of course, if the, the dial home, the support assist capabilities that enabled, cloud IQ brings a lot of intelligence to the table as well. In addition to that, as they mentioned earlier, there is apps on capability that gives another level of flexibility to the customers to integrate your storage infrastructure into a virtual environment, if the customer chooses to do that. And last but not the least, it's not just about the product, right? So it's about the programs that we have put around it, anytime upgrade is a big differentiator for us, where it's an investment protection program for customers, where if they want to have the peace of mind, in terms of three months, nine months, three years down the line, if we come out with new technologies, being able to be upgrade to that non-disruptively is a big part of it as well. It's a peace of mind for the customers that, yes I'm getting into the Power Store architecture today, but going forward, I'm protected from that point of view. So anytime upgrade, it's a new business program that we put around leveraging the architectural benefits of Power Store, whether your compute requirement, your storage requirements change, you're covered from that point of view. So again, a very quick overview of, of what Power Store is, why it is different. And again, that's where that comes from. >> (Dave) Thank you for that. Richard, are you actively using cloud IQ? Do you get the, what kind of value do you get from it? >> Not currently. However, we have, we have had plans to do that. The uptake and BCR, our internal Workload is not allowed us, to do that. But one of the other key reasons for selecting Power Store was the non-disruptive element, you know, with other SaaS products, other providers, and other issues that we have experienced. That was one, that was a key decision for us from a Power Store perspective. One of the other, you know, to go back to the conversation slightly, in terms of performance, we are getting, getting there. You know, there's a 400% speed of improvement of publishing. We've got an 80% faster code coverage. Our firmware builds a 1300% quicker than they were previously. and the time savings of the storage engineer and, you know, as a director of IT, I often asked for certain reports from, from the storage array, we're working at, for storage forecast, performance forecast, you know, when we're coming close to product releases, code drops that we're trying to manage, the reporting or the Power Store is impressive. Whereas previously my storage engineer would not be the, the most happiest of people when I would be trying to pull, you know, monthly and quarterly reports, et cetera. Whereas now it's, it's ease and we have live dashboards running and we can easily extract that information. >> (Dave) I love that because, you know, so often we talk about the 40% reduction in IT labor, which okay, that's cool. But then your CFO's going to say, yeah, but it's not like we're getting rid of people. We, you know, we're still spending that money and you're like, okay. You're now into soft dollars, but when you talk about 400%, 80%, 1300% of what you're talking about business impact and that's telephone numbers to a CFO. So I love those metrics. Thank you for sharing. >> Yeah. But what would, they obviously, it's sort of like dashboards when they visualize that they are very hard hitting, you know, the impact. You're quite right the CFO does chase down you know, the availability and the resource profile, however, we're on a huge upward trajectory. So having the right resilience and infrastructure in places is exactly what we need. And as I mentioned before, those engineers are all reallocated to much more interesting work and, you know, the areas that will actually drive our business forward. >> (Dave) Speaking of resilience, are you doing any replication? >> Not currently. However, we've actually got a meeting regarding this today with some of the enterprise and some of their storage specialists, in a couple of hours time, actually, because that is a very high on the agenda for us to be able to replicate and have a high availability cluster and another potentially Power Store need. >> (Dave) Okay. So I was going to ask you where you want to take this thing. I'm hearing, you're looking at cloud IQ, really try to exploit that. So you got some headroom here in terms of the value that you can get out of this platform to do replication, faster recovery, et cetera, maybe protect against, you know, events. Guys, Thanks so much for your time. Really appreciate your insights. >> (Richard) No problem. >> (Avishek) Thank you. >> And thank you for watching this cube conversation. This is Dave Vellante and we'll see you next time.
SUMMARY :
lines for the company. and the technology and markets that we were in. and also the transition So let's get into the case and siding on the side of the the cloud wasn't doing of the control and you know, you know, why it's important of the infrastructure that And last, but perhaps not the least is what was the workload that you regarding the storage issue that we had not have to pre inspect the that the applications are going to see. And one of the big thrusts from Dell was and the resilience came, came to, on the labor side. So our lead storage engineer It's something that you You know, that aides, the (Dave) In terms of the decision to go and the Power Store gave us that. the price tag or the, the cost, and the comparisons that we or the data reduction at nine to one, because of the technology, other products in the market that give the best of value do you get from it? One of the other, you know, (Dave) I love that because, you know, and the resource profile, the agenda for us to be able in terms of the value that you And thank you for watching
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Richard | PERSON | 0.99+ |
Dave Vellante | PERSON | 0.99+ |
Richard Goodwin | PERSON | 0.99+ |
40% | QUANTITY | 0.99+ |
Dell | ORGANIZATION | 0.99+ |
80% | QUANTITY | 0.99+ |
1300% | QUANTITY | 0.99+ |
400% | QUANTITY | 0.99+ |
Dave | PERSON | 0.99+ |
nine months | QUANTITY | 0.99+ |
90% | QUANTITY | 0.99+ |
three months | QUANTITY | 0.99+ |
three years | QUANTITY | 0.99+ |
Ultraleap | ORGANIZATION | 0.99+ |
seven | QUANTITY | 0.99+ |
two elements | QUANTITY | 0.99+ |
nine | QUANTITY | 0.99+ |
Both | QUANTITY | 0.99+ |
two | QUANTITY | 0.99+ |
Power Store | ORGANIZATION | 0.99+ |
one | QUANTITY | 0.99+ |
second part | QUANTITY | 0.99+ |
six | QUANTITY | 0.99+ |
today | DATE | 0.99+ |
six months | QUANTITY | 0.99+ |
OPEX | ORGANIZATION | 0.99+ |
three weeks | QUANTITY | 0.98+ |
both | QUANTITY | 0.98+ |
may | DATE | 0.98+ |
CapEx | ORGANIZATION | 0.98+ |
Store | ORGANIZATION | 0.97+ |
Avishek | ORGANIZATION | 0.96+ |
One | QUANTITY | 0.96+ |
four | QUANTITY | 0.95+ |
around 40% | QUANTITY | 0.95+ |
five | QUANTITY | 0.95+ |
CAPEX | ORGANIZATION | 0.94+ |
Dao | ORGANIZATION | 0.93+ |
Avishek | PERSON | 0.92+ |
more than a year | QUANTITY | 0.92+ |
Richard Henshall & Thomas Anderson, Red Hat | AnsibleFest 2021
(upbeat music) >> Welcome to AnsibleFest, 2021, the virtual version. This is The Cube and my name is Dave Volante. We're going to dig into automation and its continuing evolution. Tom Anderson is here. He's the vice president of Red Hat Ansible, the automation platform. And Richard Henshall is also here, Senior Manager of Ansible Product Management, of course, at Red Hat. Guys, welcome to the cube. Good to see you. >> Thanks for having us. >> Thank you for having us Dave. You're welcome, so Rich with this latest release of the Ansible Automation Platform, AAP, we'll get the acronyms out of the way. The focus seems to be an expanding the reach of automation and its potential use cases. I mean, I'll say automation everywhere, not to be confused with the RPA vendor, but the point is, you're trying to make it easier to automate things like provisioning, configuration management, application deployment, throw in orchestration and all these other IT processes. Now, you've talked about this theme in previous releases of AAP. So what's new in this release? What can customers do now that they couldn't do before? >> Yeah, it's a good question thank you. So, we look at this in two dimensions. So, the first dimension we have is like where automation can happen, right? So, you know, we always have traditional data center, clouds being been very prevalent for us for the last, you know, sort of five, 10 years in most people's view. But now we have the Edge, right? So now we have Edge computing, which is sometimes a lot more of the same, but also it comes with a different dynamic of how it has to be sort of used and utilized by different use cases, different industry segments. But then, while you expand the use cases to make sure that people can do automation where they need to do it and make sure if we don't close to the Edge or close to the data center, based on where the technology needs to be run, you also have to think about who's now using automation. So, the second dimension is making sure that different users can take access. You mentioned like application deployment, or infrastructure, or network configuration. We expand the number of different users we have that are starting to take advantage of Ansible. So how do we get more developers? How do we get into the developer workflow, into the development workflow, for how Ansible is created, as well as how we help with the operational, the posts deployment stage that people do operating automation, as well as then the running of Ansible Automation Platform itself. >> Excellent, okay. So, in thinking about some of those various roles or personas, I mean, I think about product leads. I would see developers, obviously you're going to be in there. Managers I would think want that view. You know the thrust seems to be, you're trying to continue to enhance the experience, for these personas and others, I suppose, with new tooling. Maybe you could add some color to that and what's happening in the market Tom if you take this and Rich chime in, what's happening in the market that makes this so important? Who are the key roles and personas that you're targeting? >> Yeah. So, there's a couple of things happening here. I mean, traditionally the people that had been using Ansible to automate their subsystems were the domain expert for that subsystem, right? I'm the storage operations team. I'm the network operations team. I'm using this tool to automate the tasks that I do day to day to operate my piece of the sub system. Now, what they're being asked to do is to expose that subsystem to other constituencies in the organization, right? So they had not, they're not waiting for a call to come in to say, can I have a network segment? Can I have this storage allocated to me? Can I deploy these servers so I can start testing or building or deploying my application. Those subsystems need to be exposed to those different audiences. And so the type of automation that is required is different. Now, we need to expose those subsystems in a way that makes those domain owners comfortable. So they're okay with another audience having access to their subsystem. But at the same time, they're able to ensure the governance and compliance around that, and then give that third-party that developer, that QE person, that man, that business, that line of business manager, whoever it might be, that's accessing that resource, a interface that is friendly and easy enough for them to do. It's kind of the democratization. I know it's a cliche, but the democratization of automated automation within organizations, giving them roles, specific experiences, of how they can access these different subsystems and speed their access to these systems and deploy applications. >> So if we could stay on that for a second, cause that's a complicated situation. You're now opening this up. You Richard mentioned the Edge. So you got to make sure that the person that's getting access has access, but then you also have to make sure that that individual can't screw it up, do things that you don't want that individual to do. And it's probably a whole other set of compliance issues and policy things that you have to bake in. Is that, am I getting that right? >> Yeah. And then that's the aspect of it. When you start to think, you know, Tom listed off there, you know, 10, you can just keep adding different sort of personas that individuals that work in roles, identify with as themselves. I'm a network person, I'm a storage person. To us they're all just Ansible users, right? There may be using a slightly different way, maybe using it slightly different places, but they're just an Ansible user, right? And so as you have, like those people that just like become organically, you've now got thousands potentially of Ansible users inside a large enterprise organization, or if you know, a couple of hundred if your smaller. But you're then go, well, what do I do with Ansible, right? And so at that point, you then start to say, now we try to look at it as what's their use of Ansible itself, because it's not just a command line tool. It's got a management interface, it's got analytics, we've got content management, we've got operational runtime, we've got responsiveness to, you know, disaster recovery scenarios for when, you know, when you need to be able to do certain actions, you may use it in different ways at different places. So we start, try and break out, what is the person doing with Ansible Automation Platform at this part of their workflow? Are they creating content, right? Are they consuming content, or are they operating that automation content for those other constituent users that Tom referred to. >> Yeah, that's really helpful because there's context, there are different roles, different personas need different contexts, you know, trying to do different things. Sometimes somebody just wants to see the analytics to make sure it's, you know, hey, everything's green, Oh, we got a yellow, versus, hey actually want to make some changes and I'm authorized to do so. Let's shift gears a little bit and talk about containers. I want to understand how containers are driving change for customers. Maybe what new tools you're providing to support this space? What about the Edge? Yeah, how real is that in terms of tangible pockets or patterns that you can identify that require new types of capabilities that you're delivering? Maybe you can help us unpack that a little bit. >> Okay so, I think there's two ways to look at containers, right? So the first is how are we utilizing the container technology itself, right? So containers are a package, right? So the amount of work we've been doing as Ansible's become more successful in the last couple of years, separating content out with Ansible collections. The ability to bring back manage, control a containerized runtime of Ansible so that you can lifecycle it, you can deploy it, it becomes portable. Edge is important there. How do I make sure I have the same automation running in the data center as the same automation running out on the Edge, if I'm looking at something that needs to be identical. The portability that the packaging of the container gives us, is a fantastic advantage, given you need to bring together just that automation you want. Smaller footprint, more refined footprint, lifecycle manage footprint. But at the same time, containers are also a very useful way of scaling the operation, right? And so as red hat puts things like Open Shift out in all these different locations, how can we leverage those platforms, to push the runtime of Ansible, the execution component, the execution plane of Ansible. How into anywhere that's hospitable for it to run? And as you move out towards Edge, as you move further away from the data center, you need a more ubiquitous sort of like run-time plane that you can put these things on. So they can just spin up when as, and when you need to. Potentially even at the end, actually being on the device, because at the same time with Edge, you also have different limits around how Edge works. It's not just about, hey I'm wifi points in an NFL stadium, actually, you're talking about I'm at the end of a 2000 mile, you know, piece of cable on an oil pipeline or potentially I'm a refinery out in the Gulf of Mexico. You know, you've got a very different dynamic to how you interact with that end point, than you do when it's a nice big controlled network, you know, powered location, which is well-governed and well-orchestrated. >> That's good. Thank you Rich. So Tom, think about automation, you know, back in the day, seems like a long time ago, but it really wasn't, automation used to scare some IT folks, because you know, sometimes it created unintended consequences or maybe it was a cultural thing and that you didn't want to automate themselves out of a job, but regardless. The cloud has changed that mindset, you know, showing us what's possible. You guys obviously had a big role in that, and the pandemic and digital initiatives, they really have made I call it the automation mandate. It was like the fourth March to digital, at least that's how I see it. I wonder if you could talk about, how you see your users approaching automation in as it relates to their business goals. Do you think automation is still being treated sometimes with trepidation or as a side project for some organizations or is it really continuing to evolve as a mainstream business imperative? >> Yes, so Dave we see it continuing to evolve as a strategic imperative for our customers. I mean, you'll, hear some of the keynote folks that are speaking here today. I've done an interview or doing an interview with Joe Mills from Discover, talking about extreme automation throughout Discovers organization. You'll hear representatives from JPMC talk about 22,000 JPMC employees contributing automation content in their environment, across 20 or 22 countries. I mean, just think about that scale, and the number of people that are involved in automation now and their tasks. So I think it's, I think we are, we have moved beyond or are moving beyond that idea that automation is just there to replace people's jobs. And it's much more about automation replacing the mundane, increasing consistency, increasing security, increasing agility, and giving people an opportunity to do more and more interesting stuff. So that's what we hear from our customers, this idea of them building. And it's not just the technology piece, but it's the cultural piece inside organizations where they're building these guilds or communities of practice, bringing people together to share best practices and experience with automation, so that they can feel comfortable learning from others and sharing with others and driving the organization forward. So we see a lot of that, and you'll hear a lot of that, at some of the Ansible Fest sessions this week. >> Well, I mean though I think that's a really important point. The last point you made about the skills, because I think you're right. I think we have moved beyond it's just job replacement. I don't know anybody who loves provisioning LUNs and say, oh, I'm the best in the world at that. It's just kind of something that was maybe important 10, 15, 20 years ago, but today, he should let the machines do that. So that's the whole skills transformation, is obviously a big part of digital transformation. Isn't it? >> It absolutely is. And frankly, we still hear, it's an impediment, that skills shortages are still an impediment to our customer success. They are still skilling up. I mean, honestly, that's one of the differentiators, for Ansible, as a language, a human readable language, that is easy to learn, easy to use, easy to share across an organization. So that's why you see job boards, and whatnot with so many opportunities that require or, or ask for Ansible skills out there. It's just a, it's become sort of a ubiquitous automation language in organizations, because it can be shared across lots of different roles. You don't have to be a Ruby software developer or a Python software developer to create automation with Ansible. You can be Tom Anderson or Rich Henshall. You don't have to, you don't have to be the, you know, the, the sharpest software developer in the world to take advantage of it. So anyway, that's one of the things that kind of overcoming some of the skills apprehension and bringing people into this, into the kind of new environment, of thinking about automation as code, not software code, but thinking of it like code. >> Got it. Guys we've got to leave it there, but Rich, how about you bring us home. We'll give you the last word. >> I mean, I think, you know what Tom just said there I think, about the skills side of things, is I think that the part that made it resonates the most. I mean I was a customer before I joined Red Hat, and trying to get large numbers of people, onto a same path, to try and achieve that outbound objective, that an organization has. The objective of an organization is not to automate, it's to achieve what is needed by what the automation facilitates. So how do we get those different groups to go from, Hey, this is about me, to this is actually about what we're trying to achieve as a business what we're trying to facilitate as a business, and how do we get those people easier access, a reduced barrier of entry to the skills they need to help make that successful, that compliments what they do, in their primary role, with a really strong secondary skill set that helps them do all the bits and pieces they need to do to make that job work. >> That's great, I mean you guys have done a great job, I mean it wasn't clear, you know, decade ago, or maybe half a decade ago, who was going to win this battle. Ansible clearly has market momentum and has become the leader. So guys congratulations on that and good job. Keep it going. I really appreciate your time. >> Thank you. >> Thank you. Thanks. >> Okay. This is the cubes, continuous coverage of Ansible Fest, 2021. Keep it right there for more content that educates and inspires. Thanks for watching. (upbeat music)
SUMMARY :
the automation platform. not to be confused with the RPA vendor, needs to be run, you You know the thrust seems to be, the tasks that I do day to So you got to make sure that the person or if you know, a couple to make sure it's, you know, I'm at the end of a 2000 mile, you know, and that you didn't want to automate and the number of people that are involved So that's the whole skills transformation, have to be the, you know, how about you bring us home. it's to achieve what is needed and has become the leader. Thank you. more content that educates
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Joe Mills | PERSON | 0.99+ |
Tom | PERSON | 0.99+ |
Tom Anderson | PERSON | 0.99+ |
Dave | PERSON | 0.99+ |
Dave Volante | PERSON | 0.99+ |
Richard Henshall | PERSON | 0.99+ |
Rich Henshall | PERSON | 0.99+ |
Ansible | ORGANIZATION | 0.99+ |
Richard | PERSON | 0.99+ |
JPMC | ORGANIZATION | 0.99+ |
Red Hat | ORGANIZATION | 0.99+ |
Discovers | ORGANIZATION | 0.99+ |
Discover | ORGANIZATION | 0.99+ |
two dimensions | QUANTITY | 0.99+ |
Gulf of Mexico | LOCATION | 0.99+ |
today | DATE | 0.99+ |
22 countries | QUANTITY | 0.99+ |
Python | TITLE | 0.99+ |
20 | QUANTITY | 0.99+ |
2021 | DATE | 0.99+ |
first | QUANTITY | 0.98+ |
decade ago | DATE | 0.98+ |
Thomas Anderson | PERSON | 0.98+ |
second dimension | QUANTITY | 0.98+ |
10 years | QUANTITY | 0.98+ |
two ways | QUANTITY | 0.98+ |
five | QUANTITY | 0.98+ |
Rich | PERSON | 0.98+ |
10 | DATE | 0.97+ |
thousands | QUANTITY | 0.97+ |
one | QUANTITY | 0.97+ |
Red Hat Ansible | ORGANIZATION | 0.97+ |
first dimension | QUANTITY | 0.97+ |
half a decade ago | DATE | 0.95+ |
Ruby | TITLE | 0.94+ |
this week | DATE | 0.94+ |
AnsibleFest | ORGANIZATION | 0.94+ |
fourth March | DATE | 0.92+ |
2000 mile | QUANTITY | 0.91+ |
15 | DATE | 0.91+ |
about 22,000 | QUANTITY | 0.9+ |
Ansible Fest | EVENT | 0.89+ |
10 | QUANTITY | 0.89+ |
20 years ago | DATE | 0.88+ |
Edge | TITLE | 0.86+ |
NFL | EVENT | 0.83+ |
Ansible Fest | EVENT | 0.82+ |
AnsibleFest 2021 | EVENT | 0.75+ |
a second | QUANTITY | 0.73+ |
last couple of years | DATE | 0.72+ |
Ansible Automation | ORGANIZATION | 0.65+ |
hundred | QUANTITY | 0.63+ |
AAP | TITLE | 0.57+ |
pandemic | EVENT | 0.51+ |
couple | QUANTITY | 0.51+ |
Avishek Kumar & Richard Goodwin
(happy techno music) >> Welcome everybody to this cube conversation. My name is Dave Vellante and we're joined today by Richard Goodwin. Who's the group director of IT at Ultra Leap and Avishek Kumar who manages Dell's power store product line and directs that product line along with several other lines for the company, gentlemen, welcome to the cube. >> Hi Dave >> Hi >> So Richard ultra leap, very cool company tracks, hand movements, and so forth. Tell us about the company and the technology, I'm really interested in how it's used. >> Yeah, we've had many product lines, obviously. We're at very innovative, um and the organization was spun up from PhD, a number of PhD students who were the co-founders for ultra leap. um And initially with mid-air haptics, um as you, as many people may have seen, but also hand tracking, mid-air had such a sense and feel. So, yeah, it's, it's, it's quite impressive what we have produced and the number of sectors and markets that we're in. Um And obviously to push us to, to where we are, we have relied upon lots of the Dell technology, both software and hardware. >> And what's your role at the company. >> Uh, I'm the group IT director, uh, I'm responsible for the it and business platforms or infrastructure network hardware software, and also the transparency of those platforms to ensure that we're scalable. And we are able to develop our software and hardware as rapidly as possible. >> Awesome. Yeah, a lot of data behind that too. I bet. Um okay Avishek, you direct a number of products at Dell across the portfolio, unity, extreme IO, the SC series, and of course, power vault. It's, it's quite the portfolio that you look after. So let's get into the case study. If we can, a bit, Richard, maybe you could paint a picture of, of your environment, some of the key applications that you're supporting and maybe what your infrastructure looks like. Give us a high level view. >> Sure. So pretty power store. We had quite a disparate architecture, so a fairly significant split and siding on the side of cloud, not as hybrid as we would like, and not, not as much as our on-prem as we would have liked and Hey, that, that has changed quite significantly. So we now have a number of servers and storage and storage arrays that we have on, on premise. And then we host ourselves. So we are moving quite rapidly, you know, as a, as a startup and then moving to a scale-up we needed that, that scalability and that versatility, and also the whole OPEX versus CapEx and, um, and also not being driven by lots of SaaS products and architecture and infrastructure where we needed to be in control because of our development cycles and our products, product development. >> So wait, oh okay. So, so too much cloud, you wanted to run a little bit of a dose of on-prem explain that a little bit more the cloud wasn't doing it for you in terms of your development cycle, your control, can you double click on that? >> Yeah. Some of the, some of the control and, you know, there's always a balance because there are certain elements of our development cycles and our engineering software engineering, where we need a very high parallelism for some of the work that we're doing, which then, you know, the CapEx investment makes things very, very challenging, not commercially that the right thing to do. However, there are some of our information, some of IP, some of the secure things that we do, we also do not want upgrades as an example, or any outages or certain types of server and spec that we need to be quite bespoke and unique, and that needs to be within our control. >> Got it, okay. Thank you for that. Avishek, we're going to talk about power store today. So set it up, please tell us about power store, what it is, you know, why it's important to this conversation. >> Sure, so power store store is a product that we launched may of 2020, roughly a little bit more than a year now. And it's a brand new architecture that Dell technologies released. And at the end of the day, I'll talk about a few unique aspects of the product, but at the end of the day, the, where we start with it's a storage platform, right? So where we see similar to what Richard is saying here, in terms of being able to consolidate the customer's environment, whether it is blog file, weevils, physical virtual environments, and, and it's, as I said, it's a brand new architecture where we leveraged pieces of existing products, where it makes sense and it's, we are using all the latest and greatest technologies delivering the best performance based data reduction and, and where we see a lot of traction is the options that it brings to the table for our customers in terms of flexibility, whether they want to add capacity compute, whether in fact, we have apps on the current model where customers can consolidate their compute as well on the static storage platform if needed. So a lot of innovation from a platform perspective itself, and it's not just about the platform itself, but what comes along with it, right? So we refer to it as an ecosystem, part of it, where we work with Ansible playbooks, CSI plugin, you name it, right. And it's, the storage platform by itself. Doesn't that, doesn't stand by itself in a customer's environment there are other aspects of the infrastructure that it needs to integrate with as well. Right? So if they're using Ansible playbooks, we want to make sure the integration is there. >> Got it. >> And last but not the least is the intelligence built into the platform, right? So as we are building these capabilities into the product, there is intelligence built into the product, as well as outside the product where things like cloud IQ, things like uh, um, technologies built into power suit itself makes it that much easier for the customers to manage the infrastructure and go from there. >> Thank you for that, so, Richard, what was the workload? So it actually, you started with sort of a Greenfield on prem. If I understand it correctly, what was the workload that you were sort of building around or workloads? >> Sorry, we had a, a number of different applications. Some of which we cannot really talk about too much, but we had, we had a VxRail, we had a, a smaller Dell array, and we have lots of what we classes, runners, cubeanetics cluster that we that we run and quite a few different VMs that run on our, on-prem server infrastructure and storage rates and the issues that we began to hit because of the high IO, from some of our, um, workloads that we were hitting very high latency, which rapidly stopped, began to cause us issues, especially with some of our software engineering teams. And that is when we embarked upon a competitive RFP for uh, Dell power store. Dell were already engaged from an end-user compute where they'd been selected as the end-user compute provider from a previous competitive RFP. And then we engaged them regarding the storage issue that we had, and we engaged the, our account leading count exec, and a number of solution architects were working with us to ensure that we have the optimal solution. Dell were selected over the competitors because of many reasons, you know, the, the, the new technology, the DG plication, the compression, that data overall data reduction, and the guarantee that also came, uh, came with that, with the four to one data reduction guarantee, which was significant to us because of the amount of data that we hold. Um, And we have, you know, as I mentioned, we're pulling further, further data of ours back into our hosted environments, which will end up on the power store, especially with the duplication that we're now getting. We've actually hit nine to one, which is significant. We were expecting four to one, maybe five to one with some of the data types. And what was excellent Dale were that confident that they did not even review our data types prior. And they were willing to stand by that guarantee of four to one and we've excelled that we've got different data types on, on that array, and we've hit nine to one and that's gradually grown over the last nine months. You know, we were kind of six them we moved to seven and now we're hitting nine to one ratios. >> That's great. So you get a little free storage. That's interesting what you're saying, Richard, cause I just assumed that a company that's guaranteed four to one is going to say, okay, let us, let us inspect your workload first and then we'll do the deal. So Avishek, what's the tech behind that data reduction that you're able to with such confidence, not have to pre inspect the workload in this case anyway. >> Yeah. So, so it goes back to the technologies that goes behind the product, right? So, so we, we stand behind the technology and we want to make it simpler for our customers as well. Where again, we don't want to spend weeks looking at all the data, scanning all the data before giving the guarantee. So we stand behind the technology where we understand that as the data is coming in, we are always going to be duplicated. We are always going to compress it. There is technology within the product where we are offloading some of that to the outside the CPU. So it is not impacting the performance that the applications are going to see. So a data reduction by itself is not going to get enough performance by itself is not good enough. Both of them have to be together. Right. So, and that's what powers to brings to the table. >> Yeah. Thank you. So Richard, I'm interested. I mean, I remember the power store announcement, sort of saw it leading up to it. And one of the big thrusts from Dell was the way I phrase it is essentially trying to create a cloud-like experience on-prem. So really focused on simplicity. So my question to you is, let's start with just the deployment. You know, how complicated was it to install? What was that process like? How many clicks, I mean, not that you have to tell me how many clicks, but you know, what I'm asking is, is how difficult was it to get from zero to, you know, up and running? >> Well, we actually sat down with a very difficult challenge. We were in quite a difficult situation where we'd pretty much got off of a cliff in terms of IOPS performance. So the RFP was quite rapid. And then we needed to get which, whoever, which vendor was successful, we need to get that deployed rather rapidly and on the floor in our data center and server rooms, which we did. And it was very, very simplistic within three weeks of placing the order. We had that array in our server rack and we'd begun the migration that it was very simple to set up. And the management of that array has been, we we've seen say 40% reduction in terms of effort it took to be able to manage our storage because it is very self-contained, you know, even from a reporting perspective, the deployment, the migration was all very, very, very simplistic. And, you know, we we've done some work recently where we had to also do some work on the array and some other migrations that we were doing and the resilience came, came to, came to the forefront of where the whole architecture and no single point of failure enabled us to do some things that we needed to do quite rapidly because of the, the jole notes and the resilience within, within the unit and within the power store itself was considerable where we, we kept performance up. People also prioritize any discreet rebuilds, keeps the incoming ingest rates high and prioritizes that, you know, the workloads, which is really impressive, especially when we are moving so quickly with our technology. We don't really have much time to, you know, micromanage the estate. >> Can you, can you just repeat what you said on the percent reduction? I think I heard you cut out there a little bit, a percent reduction on, on, on management, on, on, on the labor side. >> So our lead storage engineer is estimated around 40% less management. >> Wow. Okay. So that's, that's good. So actually, I, I love this conversation because, you know, in the early the days of automation, people are like, ah, that's my job provisioning, LUNs. I'm really good at it. But I think people are realizing that it's actually not something that you want to be really good at. It's something that you want to eliminate. So it now maybe it's a, that, storage engineer got his or her nights and weekends back, uh, but, but what do they do now when they get that extra time, what do you, what do you put them on? You know, no more strategic initiatives or, you know, other, other tech things in the to-do list, what's that like? >> You know, any of my team, whether it's the storage leads or some of the infrastructure team that are also involved in engaged, cause you know, the organization, we have to be quite versatile as a team in our skillsets. We don't want to be doing those BAU mundane tasks. Even the storage engineer does not want to be, you know, allocating Luns and allocating storage to physical servers, VMs, et cetera. We want all of that to be automated. And the, you know, those engineers, are they working on some of the cutting edge things that we're trying to do with machine learning as a, as an example, which is much more interesting, it's what they want to be doing. Um, you know, that aides, the obvious things like retention interest and personal development, we don't want to be, you know, that base IT infrastructure management is, is, is not, not where any of the engineers wants to be. >> In terms of the decision to go with Dell power store. I, I, I'm definitely hearing there was a relationship. There was an existing relationship with Dell. I'm sure that played into it. And you, you mentioned a couple of times that RFP, so, so you kind of lined up various various vendors. What can you tell us about that in, in addition to the relationship, what was it that led you to power store? >> Uh, there were many things saying, you know, the relationship wasn't really part of this, even though I've mentioned the end user compute in any sets or anything that we're procuring, we want best of breed and best of set, but, and there were four vendors that were engaged in the RFP and it was down selected to, two, and that was done on the cost is definitely a driver. The technology, you know, is a big trust to us. We're a tech company. New technology to us is also fascinating, not only our own but also the, the storage guarantee, the simplicity, the resilience within, within the unit. Also the, the ability which was key to us because of what we're trying to do with our hybrid model and bring, bring back and repatreize some of the data as it were um, from the client, we needed that ability to, with ease, to be able to scale up and scale out, and the power store gave us that. >> When you say cost of, I want to dig into that price or, you know, the, the, the, the price tag or the, the cost. I mean, when you do the business case, and I wonder if we could add a little color to that. >> Yeah, the, the, there there's two elements to this, so there's not even the cost of the price tag, but then also cost of ownership and the comparisons that we were running against the other vendors, but also the comparisons that we were running from a CapEx investment against OPEX and what we have in the cloud, and also the performance and performance that we get from the cloud and our cloud storage and a resilience within that, and then also the initial price tag, and then comparing the CapEx investments to the OPEX were all elements that were, were key to us making our decision. And you know that there has to be some credit taken by the Dell account team and their relationship towards the final phrase of that RFP, you know, were key, initially, not at all, we were just looking for the best possible storage solution for ultra-leap. >> And to, to determine that on your end, was that like a feature, because it's sometimes fuzzy what the business impact is going to be like that 40% you mentioned, or the data reduction at nine to one, when there's a promise of four to one, did you, what did you do? Did you kind of do a feature function analysis and sort of line that up and, and say, okay, I'm going to map that to our business, our processes, our IT processes, and try to predict what the impact would be. Is that how you did it, or did you take a different approach? >> We did. So we did that, obviously between vendors as you'd expected in RFP, but then also mapping to how that would impact the business. And that that is not an easy process to go through. We've seen more gains, even comparing one vendor to another, some of that because of the technology, the terminology is very, very different and sometimes you have to bring that up a level and also gain a much more detailed understanding, which at times can be challenging, but we did a very like-for-like comparison and, and also lots of research, but you're quite right. The, the, the business analysis to what we needed. We had quite a good forecast and from my supplier stock and information data, and also our engineering and business and strategic roadmap, we were able to map those two together, not the easiest of experiences, not one that I want to repeat, but we got through it. >> Yeah, a little bit of art and science involved. Avishek, maybe you could talk about power store, what, you know, give us the commercial. What makes it different from other products in the market? Things like cloud IQ, maybe you could talk about that a little bit. >> Sure, so, so again, from a, a it's music to my ears, when Richard talks about the ease of deployment and the management, because there is a lot of focus on that. But even as I said earlier, from a manned technology perspective, a lot of goodness built in, in terms of being able to consolidate a customer's environment into, onto the platform. So that's more from a storage point of view that will give the best performance, give the best data reduction, storage efficiencies. Um, the second part, of course, the flexibility, the options that power store it gives to the customers in terms of sort of desegregating the storage and the compute aspects of it. So if, as a customer, I want to start with different points in terms of what our customer requirements are today, but going forward as requirements changed from a compute capacity perspective, you can use a scale up and scale out capabilities, and then the intelligence built in, right? So as you scale out your cluster, being able to move storage around right, as needed being able to do that non-disruptively. So instead of saying that Mr. Customer you're, you're storage is going to, you're at 90% capacity, being able to say that based on your historical trending, we expect you run out of capacity in six months, some small things like that. Right. And of course, if the, the dial home, the support assist capabilities that are enabled, cloud IQ brings a lot of intelligence to the table as well. In addition to that, as they mentioned earlier, there is apps on capability that gives another level of flexibility to the customers to integrate your storage infrastructure into a virtual environment. If the customer chooses to do that. And last but not the least, it's not just about the product right? So it's about the programs that we have put around it. Any anytime I'll create is a big differentiator for us, where it's an investment protection program for customers, where if they want to have the peace of mind, in terms of three months, nine months, three years down the line, if we come out with new technologies, being able to be upgrade to that non-disruptively is a big part of it as well. It's a peace of mind for the customers that, yes, I'm getting into the power store architecture today, but going forward, I am I'm protected from that point. So anytime I upgrade, it's a new business program that we put around leveraging the architectural benefits of power stool, whether your compute requirements, your storage requirements change you're, you're, you're covered from that point of view. So again, very quick a overview of, of what power store is, why it is different, and again, that's where that comes from. >> Thank you for that. Richard, are you, are you actively using cloud IQ? Do you get, what kind of value do you get from it? >> Not currently. However, we have, we have had plans to do that. The uptake and BCR, our internal workload has not allowed us to do that, but one of the other key reasons for selecting power source was the, the non-disruptive element, you know, with other SaaS products, other providers, and other issues that we have experienced. That was one, that was a, a key decision for us from a, a power store perspective. One of the other, you know, I would like to go back to the conversation slightly, in terms of performance, we are getting, getting now, you know, there's a 400% speed of improvement of publishing. We've got an 80% faster code coverage. So our firmware builds a 1300% quicker than they were previously and, and the time savings of the storage engineer and, you know, as a, as director of IT, I often asked for certain reports from, from the storage array, when we're working out for, um, storage forecast, performance forecast. And, you know, when we're coming close to product releases, code drops that we're trying to manage, the reporting or the power stories is impressive. Whereas previously my storage engineer would not be the, the most happiest of people when I would be trying to pull, you know, monthly and quarterly reports, et cetera. Whereas now it's, it's easy and we have live dashboards running, and we can easily extract that information. >> I love that, because, you know, so often we talk about the 40% reduction in IT, labor, uh, which, which, okay, that's cool. But then your CFO's going to say, yeah, but it's not like we're getting rid of people. We, you know, we're still spending that money and you, okay. They're getting you're now into soft dollars, but when you talk about 400%, 18%, 1300% of what you're talking about, business impact and that's telephone numbers to a CFO. So I love those metrics. Thank you for sharing. >> Yeah. But what would, they, obviously, in some of our dashboards when they visualize that they are very hard hitting, you know, the impact that you're quite right that the CFO does chase down, you know, the availability and the resource profile, however, we're on a huge upward trajectory. So having the right resilience and infrastructure in places is exactly what we need. And as I mentioned before, those engineers are all reallocated to much more interesting work. And, you know, the, the areas that will actually drive our business forward. >> Speaking of resilience, are you doing any replication? >> Not currently. However, there, uh, we've actually got a meeting regarding this today with some of that was a surprise that some of their storage specialists in a couple of hours time, actually, because that is a very high on the agenda for us to be able to replicate and have a high availability cluster and another potentially power store name. >> So I was going to ask you kind of where you want to take this thing. I'm hearing you, you're looking at cloud IQ, really try to exploit that. So you've got some headroom here in terms of the value that you can get out of this platform to, to do replication, faster recovery, et cetera, maybe protect against, you know, events. Any other things that you would identify as things you would either want from Dell or things that you'd like to see this platform direction you'd like to see it take in the future? >> Uh, yeah. We, we actually had some discussions recently and we are actively involved in some of the power store roadmap, which is, which is really good for us because we get visibility. And we also get to feed back to Dell on some of the features that we would like to see. So one of the things that we're discussing is a virtual kind of power store is what we would like to see. So some of that resilience would be really useful for us to be able to fail over quite rapidly and have live access to you are sick of data rather than potentially having hole sites. And we're looking at some of the Dell service offerings, which are quite impressive and is currently ticking. You know, we're very early in the, in the stages of the discovery, but there's quite a few boxes being ticked. Currently. >> Guys, we got to leave it there. I love this example of where you've got infrastructure, really connecting directly to a fast growth company, helping it scale, guys, thanks so much for your time. Really appreciate your insights. >> Thank you >> And thank you And thank you for watching this cube conversation. This is Dave Volante, and we'll see you next time. (upbeat music)
SUMMARY :
Who's the group director and the technology, of the Dell technology, and also the transparency a number of products at Dell across the and also the whole OPEX the cloud wasn't doing it for of the control and, you know, store, what it is, you know, of the infrastructure that it needs the customers to manage what was the workload that you were And we have, you know, as I mentioned, So you performance that the applications So my question to you is, So the RFP was quite rapid. on the labor side. So our lead storage engineer is It's something that you want to eliminate. the organization, we have In terms of the decision and the power store gave us that. or, you know, the, the, and the comparisons that we or the data reduction at nine to one, some of that because of the technology, other products in the market? If the customer chooses to do that. what kind of value do you get from it? of the storage engineer and, you know, I love that, because, you know, so right that the CFO does chase the agenda for us to be able kind of where you want to take So one of the things that we're Guys, we got to leave it And thank you for watching
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Richard | PERSON | 0.99+ |
Richard Goodwin | PERSON | 0.99+ |
Dave Vellante | PERSON | 0.99+ |
Dave Volante | PERSON | 0.99+ |
Dell | ORGANIZATION | 0.99+ |
OPEX | ORGANIZATION | 0.99+ |
80% | QUANTITY | 0.99+ |
400% | QUANTITY | 0.99+ |
90% | QUANTITY | 0.99+ |
40% | QUANTITY | 0.99+ |
five | QUANTITY | 0.99+ |
nine months | QUANTITY | 0.99+ |
Dave | PERSON | 0.99+ |
four | QUANTITY | 0.99+ |
1300% | QUANTITY | 0.99+ |
two elements | QUANTITY | 0.99+ |
CapEx | ORGANIZATION | 0.99+ |
Ultra Leap | ORGANIZATION | 0.99+ |
three months | QUANTITY | 0.99+ |
six | QUANTITY | 0.99+ |
one | QUANTITY | 0.99+ |
Both | QUANTITY | 0.99+ |
seven | QUANTITY | 0.99+ |
three years | QUANTITY | 0.99+ |
18% | QUANTITY | 0.99+ |
nine | QUANTITY | 0.99+ |
today | DATE | 0.99+ |
second part | QUANTITY | 0.99+ |
two | QUANTITY | 0.99+ |
six months | QUANTITY | 0.99+ |
three weeks | QUANTITY | 0.98+ |
Avishek | ORGANIZATION | 0.98+ |
both | QUANTITY | 0.98+ |
around 40% | QUANTITY | 0.97+ |
Avishek Kumar | PERSON | 0.96+ |
ultra leap | ORGANIZATION | 0.96+ |
Dale | PERSON | 0.95+ |
more than a year | QUANTITY | 0.93+ |
One | QUANTITY | 0.92+ |
about 400% | QUANTITY | 0.89+ |
four vendors | QUANTITY | 0.87+ |
power store | ORGANIZATION | 0.87+ |
power store | ORGANIZATION | 0.87+ |
first | QUANTITY | 0.85+ |
Richard Hummel, NETSCOUT | CUBE Conversation
(melodic music) >> Welcome to this CUBE conversation, I'm Lisa Martin, Richard Hammel joins me next, manager of threat intelligence at NetScout. Richard, welcome back to theCUBE. >> Thanks Lisa it's nice to be back. Thank you for having me. >> We have a lot to talk about in the next 15 to 20 minutes. We're going to be talking about the NetScout threat intelligence report. The report covers the first half of 2021, January one to June 30th. Unprecedented events of 2020 Richard, spilling into 2021. How have the events of 2020 impacted the threat landscape? What are you seeing? >> I would say that it's significantly impacted it. The COVID pandemic and all that happened with remote work and education moving to remote, all of that had a hand in exponentially increasing the threat landscape that adversaries have at their disposal to compromise unknowing victims, to launch attacks. There's so much more that adversaries are able to really hook into. Just in the first half of 2021, we saw almost 5.4 million DDoS attacks. And if you go back to last year, we broke a record at 10 million, just over 10 million, and we're well on track to hit 11 million at the end of this year. So you can see how it's impacted. And even as much as some things are starting to tail off or taper off a little bit, as things start to get back to normal, we start to resume travel, we resume going to the office. There's still that tail end, we're still seeing this kind of heightened attack landscape, and there's lots of different phenomenon that's happening as a result, which we'll talk about throughout this interview. >> Yeah, we'll dissect that you said on pace for a record breaking 11 million DDoS attacks it by the end of 2021. One of the things I want to talk about is speed. I noticed in the report that seven attack vectors in seven months, which means that threat actors exploited, or weaponized seven, at least seven of the new DDoS specters in just seven months time. Why is that significant? >> You know, I'll even raise the ante a little bit just after the throw report. There's an eight factor. And so this is the nature that we're in. This is, the, really the age of innovation. And we've been in kind of an innovative space in the crime world for a couple of years now, where we continue to see this domino effect for lack of a better way of describing it, where it's just one after the next step to the next. And then you add in this compounding thing where you have more devices than ever before connected to the internet. And I have all that much more exposure for these things to take advantage of you. And so we see adversaries innovating. And one of the ways in which we see that is, they operate like a business enterprise. They have functional components for different things. And as you kind of fragments that business structure in the crime world, you get specialized areas for certain things. And so you have adversaries that are niche in a certain area, whether it's distribution of malware or it's launching a DDoS attack, or maybe it's just finding a reflectors amplifiers to launch those DDoS attacks, you have all of these kind of niche areas and the more you can consolidate or collapsed those different skillsets into different components, you're going to find it, it iterates a much more rapidly. It's the same thing that happens as entrepreneurs in the business enterprise. Do you outsource what you're not the expert at? And you outsource it to somebody who is an expert and we see the same phenomenon happening in the cyber-crime world. >> So the rate of discovery to weaponization is getting shorter. >> Super fast. And we've seen things weaponized, a short as one to two days from the time of proof of concept comes online to when an adversary adopts this into their tools or their toolkits. And so on most often, the way we see this adopted is maybe a bot picks it up. So you have like your Mariah's, your satory's, your dash, all these different IOT related bots out there that have capabilities, but then you also have these platforms called booter stressors. And adversaries, just continue to add vectors there. There's no reason to remove them because they're still effective. And so we see this continual add of new ways to compromise and new ways to attack somebody that just always goes up into the right. >> Up into the right, in some cases can be good, in this case, it's obviously it's a sign of distress. One of the things the report showed Richard, was the development of adaptive DDoS. Just the name adaptive leads me to think of evasive tactics, you know, that threat actors are employing, talk to us about adaptive DDoS and what the report showed for the first half of 2021. >> Sure. So the biggest thing we saw with adaptive DDoS and I have to preface this by one of the changes that we saw over the first half of 2021. Going into the first half of the year, DNS reflection amplification was kind of the predominant preferred method by adversaries. There's so many DNS servers out there. So it's something they're able to do. Well, we saw a different type of attack called TCP act floods actually surpassed that. And TCP act floods are a little bit different because it uses a different internet protocol. Now what's significant about TCP based connections is it's connection oriented. So requires what we would call a three-way handshake. So there's packets going to the target, they're coming back to the adversary, they're going to the target. And in most cases they're spoofing of IP addresses. So it never really goes to the actual adversary, but somebody else, right? And so it's much more process intensive or network intensive. And so you can basically launch these TCP floods, these scent attacks, these act floods, whatever they might be. And you're creating a bunch of different connections on that targeted entity and you're spoofing the source. So in other words, let's just say, I am victim one and there's an adversary out there that wants to target me. So they're going to actually spoof my IP address and they're going to send a bunch of these syn flood or a sin, you know, acts or TCPI floods or whatever they might be, to all these DNS servers around the world. And so they're all going to reply to their suppose source of those packets, which in fact, a spoofed, right? And so now you're getting all this flood attacks. And so what we're seeing here is a switch. We're moving from kind of the just connection list, the UDP based stuff the DNS reflection amplification to a more niche things such as TCP act floods. And it's the first time we've ever seen TCP act floods take first place. And what's notable about that is that there are certain types of DDoS mitigation that is susceptible to this kind of attack. And so what we see adversaries do is they'll watch that attack and the monitor did the, did my victim go down? If they didn't go down, they'll pivot, they'll try something else. Maybe they'll try typical volumetric attack. If that succeeds what, okay. We took one layer of the defense down. So is there anything else preventing us from taking our target offline? Well, maybe there's a second layer of defense. So now let's try this other thing and see if that works. And so we actually saw this successful against a commercial banks and payment card processors, where they used TCP act floods to bypass one layer. Then they use volumetric bypass the second, and then on a completely different target, we saw it in reverse. And so we see adversaries adapting to how we're putting our security posture is in place. What we're doing to defend our organizations and networks and adversaries are very quickly iterating and pivoting to follow what we're doing and overcome that. >> And when you say quickly, how quickly are we talking? Is this a matter of days? >> Well, in the case of the attacks that we're talking about, we're talking about seconds or minutes because they're actually launching the attack and they're sitting there watching to see if that goes down and if it doesn't go down, they can pivot really, really quickly and launch a secondary attack. And so in these cases it's really, really rapid and really fast. >> Wow. Another thing that I read in the report and that you sort of intimated a minute ago was the amount of collateral damage seems to also be expanding with what you're seeing in the threat landscape. Talk to us about the risks there and the collateral damage and get us some examples of that actually happening. >> So I think that the biggest example of this and this isn't actually DDoS related, but if you look at like the colonial pipeline incident that happened, right? So they didn't actually go after colonial pipeline. They went after a vendor that provides some sort of service to them. And that resulted in Colonial saying, "we got to shut down our pipeline "because now we can't build our customers." So that's like one aspect of collateral damage. Well, let's translate that to the DDoS world. What happens when a DNS server goes offline, that services 1000 different websites. Now you have all of these other websites that can't be accessed. Well, what happens if an adversary goes after a VPN for a prominent enterprise, they successfully take down that VPN concentrator, and now all of their remote workforce can no longer access those sources. In fact, there's something we're calling connectivity supply chain, which is what adversaries are moving to both in the corporate world, as well as commercial. VPNs increasingly used by gamers, for instance, to mask their IPS because DDoS attacks predominantly target gamers, 80, 85% of all attacks are against gamers. And so they're using VPNs to mask their source. Well, an adversary says, well, hey, I can't go after the individual because I don't know their IP, but I know what your VPN are using. So maybe if I target all the VPN nodes that are publicly available for that VPN concentrator or VPN service provider, now I can take them offline. But it as a consequence, you're not just taking off your individual target. You're taking off every single person that's using that VPN. >> Right. >> This is the collateral damage impact we're talking about. It can be very, very far reaching. >> You mentioned the conductivity supply chain. Let's go ahead and dissect that. Cause that was something else that the report showed was that there was vital components of what NetScout calls the conductivity supply chain, which you'll helped define, are under increasing attack, define the connectivity supply chain and tell us what the report is showing. >> So supply chain comes in many forms and fashion. You have your physical supply chain, you have your vendors that provide software. You have actual movers like such as semis and trains, and you have pipelines to get crude oil to places. All of these things are supply chain, but what's the underlying foundation behind these? How do all of these operate? And more and more in today's day and age, you rely on internet connectivity. You rely on that backbone to be able to operate your systems across a remote space, whether that's internationally, or if it's different countries, if it's just different states, you have to have some way of connecting all those things. And we're not often doing things physically in person there, right? We do this by remote access. We do this by having certain websites or controllers. And all of these things rely on a few critical things that if you were to take them offline, it would prevent you from doing this kind of management. So DNS servers, VPNs, I already talked about whether it's commercial or corporate to access your company's assets. And then you have internet exchanges. If any, one of these things went down from a DDoS attack, you're talking about massive collateral damage. And so what we're calling the conductivity supply chain is really just that, what connects all of us together? That's that's the internet and what makes the internet tick? And here at NetScout, we call ourselves guardians of the connected world. And though that might seem a little bit weird to say it that way. It's absolutely true because our primary goal, here at NetScout, is to make sure that organizations maintain that connection that allows them to really just live, breathe, survive, do their business, without that, you can't conduct business. >> Right? And we saw that the rapid pivot last year, and so many businesses and any, every industry had to rapidly pivot and shift to digital, but the risks as the innovation of technology, for use for good, continues do does it's innovation and use for adversarial things. Another thing that report showed, triple extortion. Talk about that. What you saw, what does that mean for businesses? >> So the triple extortion is three pronged attack. And, everybody here is going to know exactly what I'm talking about when I say ransomware, because ransomware is the biggest threat to the cyber world, really not even just the cyber world, just anybody that has a computer or device or anything, right? Whether it's a business, it's a user, it's a school, hospitals. Everybody is at risk for this and adversaries see the success that ransomware is having and more and more operators get involved in this. Well, what we're seeing here is that they are not satisfied with just encrypting your files and getting a one-time payment. No, they've got to take it a step further. And in fact, the double extortion has been ongoing since, as far back as 2013. When a popular, "Gameover Zeus" variant was distributing CryptoLocker ransomware. And so you have like your initial compromise and data theft and wire transfers of bank stuff followed by ransomware. I already stole your money from your bank. And now you're going to pay me a ransomware to decrypt your files. Well, let's move forward to today's day and age. And over the past year, one of the things we've seen is that adversaries are now adding a third tactics to this the DDoS. And so they will encrypt your files. They'll demand. Hey, you're going to pay us this amount of Bitcoin in order to decrypt your files. But you know, we're already in your system. So, you know, let's just steal your data. And then after you pay us for the decryption, we're going to hold your data hostage until you pay us again. Or maybe we're going to use that data as a lever to get you to pay that initial ransomware. Well, that's still not enough because more and more security researchers, like myself say don't pay. And I'm saying that right here, in plain English, do not pay the ransomware because it has detrimental effects. They, you don't even know if they're going to decrypt your files and you don't know if they're going to come back. Maybe you pay them. They never send you a decryption key. You pay them. And lo and behold, they're part of some terrorist organization. So now you're actually complicit in funding these guys, and the more success that these ransom operators have, the more they're going to do it. And so it has a lot of really negative consequences. Well, let's add another lever. Let's add DDoS to this. So it's not enough. We encrypted your files. It's not enough. We stole your data. Let's knock your network offline. So now you have no recourse whatsoever, except to pay us in order to resume services. And we're seeing at least four or five different ransomware groups of gangs actually use this triple extortion to go after their victims. And so it's something that we expect to see down the road and more and more operators continue to kind of adopt this. >> Lisa: Yeah. The report showed that there was a ransomware group that in the first half of 2021 alone, that vetted a hundred million dollars. So ransomware as a service, this is a big business. You say, don't pay, what can organizations do to defend themselves against triple extortion, even single or double? >> Yeah. So I mean, the thing is, preparation is key for a lot of this and not just for the ransomware piece and triple extortion, but DDoS in general preparation goes a long way to mitigating this potential threat. And one of the things we'd like to say here is that 80% of the things you can do to defend against ransomware also works for defending against DDoS. And the key word here is preparation. Making sure that you've done your, initial observations of your network. You understand what is in your network, every device, not just like the core critical systems, because there could be that IOT device sitting there on their fringe somewhere that has, for whatever reason, access to a system that if encrypted would cause detrimental harm to your company. So not only do you want to inventory your system, you also want to figure out, are they pastorally up to date? Do we allow on an authenticated logins? Are there using default usernames and passwords? In fact, the vast majority of ransomware today, the initial infection vector is either going to be some sort of spam messaging or brute forcing RDP, SSH, and Telnet, the tried and true methods that they've been using for five, six, seven years. They are still successful using to get into organizations. And so making sure that you're sufficiently locking those down. Specifically on the ransomware side, if you want to prevent those, not only are you going to do this preparation, but you're going to make sure that you isolate your critical systems. You shouldn't have everything connected to one spot. If somebody compromises one device, they should not be able to encrypt your entire network. They absolutely should never be able to encrypt your backup files and have backup files, right? So there's a lot of different things you can do here. And by practicing a lot of this preparation, this isolation, the segmenting of your networks, you're also helping in the DDoS space because if they go after one network asset, you'll have all this to fall back on. There was one significant difference between ransomware and DDoS. Ransomware, after you've been infected, unless you have backups or you pay the ransomware, your files are pretty much gone. Unless there's some decrypted that can be had, or the government has some sort of campaign that gets you the caption keys and they helped you with the decryption. So in those cases, if you get encrypted, there's often not a whole lot of recourse, unless you have prepared ahead of time. With DDoS, however, the vast majority, 99% of all DDoS attacks can be prevented if you have a mitigation and protection solution in place. And even if you get DDoS, oftentimes they're, short-lived in fact, the vast majority of DDoS attacks last less than 15 minutes. And so it's not like your stuff is going to be encrypted for days on end or weeks on end. You're going to get hits, you might go down for a period of time, but you can recover services. And during that recovery period, you can go and you can seek mitigation protection services. And so there's a big difference between DDoS and ransomware in that regard. >> That's a great way of describing that. And we've talked a lot about ransomware is it's been on the increase the last year and a half. We've talked about how it's not a matter of if we get attacked, it's a matter of when. But your distinction between ransomware and DDoS attacks show that both with preparation and the right tools, are preventable and recoverable provided organizations have put the proper tools and mechanisms in place to do that. And given how quickly we're seeing the adaptation of the threat actors, organizations, if they're not already on that preparation train, need to catch up. >> Absolutely. They need to get busy right away. There's there's really no delay. Like I said, like you said, it's not if, it's when. And so every single person, every organization, I would take a step further, not even organizations, every single individual that has a computer or some sort of internet connection at home needs to realize that they absolutely can be and are the target of these attacks. We've said it now for the past year and a half, that within five minutes of an IOT device going online, you're getting brute force attempts and that's any IOT device. That's something you connect that maybe you never even realize you can log into and change your password. Well, if it's online, then chances are somebody is trying to brute force that to access it and use it in the varies ways. >> And, and as we all sort of anticipate, we're going to be in this hybrid work environment, work from anywhere environment for quite a while longer. One last question want to ask you, when you talk about all the proliferation of IOT devices, and we're still on this work from anywhere situation, botnets? What are some of the things that the report showed and how can organizations protect all in a, you know, growing number of vulnerable IOT devices from botnets? >> So I think the biggest thing to protect against a IOT compromise is just simply patching up that your passwords Mariah has been out there for a long time, 2016. You know, we saw the dine attacks, but it's still using the same usernames and passwords. Sure, they add more to the list, but the predominant ones that are successful in compromised devices have been around for many years, but they're still successful at compromising these IOT devices. In fact, in the report, one of the things we wanted to show is actually, where are these botnets? How are they being used and specifically in a DDoS nature? And so we actually took all of the IP addresses that we're seeing from bots that are either coming back into our honeypot or things that we scan for. You know, and what we've determined. And that is that roughly 200 to 208,000 of the IP addresses. IP addresses that both we collected as well as a new partner of ours called Gray Noise. They've agreed to partner with us on this short report and you'll see that in the, in the report, if you actually read it. We took these lists of nodes and we compare that to what we're seeing in the DDoS attack landscape. And it turns out that approximately 200,000 of these contributed to more than 2.8 million DDoS attacks in the first half of 2021. Now there was 5.4 million tax total. So more than half of those had some form of DDoS botnet IOT representation. And so that should tell you that these botnets are huge and they're everywhere and they're active. And so the report actually walks you through where these are at, where the density zones are in clusters of these botnets, as well as what botnets in those high density zones are using to compromise other IOT devices. And so it's definitely a very informative read. And I think that you'll, you'll figure out that this isn't, something we talk about in the abstract, right? This is a botnet in my backyard, and I should absolutely be concerned of any IOT device in my home. >> Right. And the, the NetScout threat intelligence report, which Richard has just walked us through is not only available online. It's interactive. It's a great report. I've looked at the PDF, but Richard work in folks go to actually interact with the document and actually glean even more information about how they can prepare and defend. >> Yeah. So netscout.com/starreport. And as Lisa said, it is interactive. So you will need to sign up for the site and you can do both. You can either view the interactive webpage, or you can download the PDF, whatever your reading preference is. But I do encourage the interactive portion because for instance, like this botnet density map that I show, or that I that talked about, you can actually page through month over month to see where those density clusters are. And it is very souther animations. There's other maps in there so there's definitely a lot more value to perusing the interactive nature. >> A lot of granularity. Richard, thank you so much for joining me today, talking about what the first half of 2021 showed. And I can't wait to talk to you next year when we're going to be looking at the second half of the year where we are, with respect to that record, breaking 11 million DDoS attacks. Thank you for taking your time to explain the top trends in the report and for showing folks where they can go to interact with it. >> Well, thank you, Lisa. And thank you to theCUBE for hosting the interview. Definitely appreciate it. >> Our pleasure. For Richard Hammel, I am Lisa Martin, you're watching a CUBE conversation. (melodic music)
SUMMARY :
Welcome to this CUBE Thanks Lisa it's nice to be back. in the next 15 to 20 minutes. And if you go back to last year, One of the things I want and the more you can So the rate of And so on most often, the Just the name adaptive leads me to think And so they're all going to reply Well, in the case of the and that you sort of that to the DDoS world. This is the collateral damage that the report showed was You rely on that backbone to be able to but the risks as the And so you have like your that in the first half of 2021 alone, that 80% of the things you can and the right tools, that to access it and use that the report showed And so that should tell you I've looked at the PDF, and you can do both. And I can't wait to talk to you next year And thank you to theCUBE you're watching a CUBE conversation.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Richard Hammel | PERSON | 0.99+ |
Lisa Martin | PERSON | 0.99+ |
Richard | PERSON | 0.99+ |
Richard Hummel | PERSON | 0.99+ |
Richard Hammel | PERSON | 0.99+ |
Lisa | PERSON | 0.99+ |
2013 | DATE | 0.99+ |
5.4 million | QUANTITY | 0.99+ |
80% | QUANTITY | 0.99+ |
1000 different websites | QUANTITY | 0.99+ |
NetScout | ORGANIZATION | 0.99+ |
five | QUANTITY | 0.99+ |
seven | QUANTITY | 0.99+ |
10 million | QUANTITY | 0.99+ |
last year | DATE | 0.99+ |
99% | QUANTITY | 0.99+ |
2016 | DATE | 0.99+ |
next year | DATE | 0.99+ |
five minutes | QUANTITY | 0.99+ |
11 million | QUANTITY | 0.99+ |
one layer | QUANTITY | 0.99+ |
2021 | DATE | 0.99+ |
second layer | QUANTITY | 0.99+ |
two days | QUANTITY | 0.99+ |
seven months | QUANTITY | 0.99+ |
Gray Noise | ORGANIZATION | 0.99+ |
one device | QUANTITY | 0.99+ |
one-time | QUANTITY | 0.99+ |
June 30th | DATE | 0.99+ |
both | QUANTITY | 0.99+ |
single | QUANTITY | 0.99+ |
approximately 200,000 | QUANTITY | 0.99+ |
seven attack vectors | QUANTITY | 0.99+ |
today | DATE | 0.99+ |
Mariah | PERSON | 0.99+ |
one | QUANTITY | 0.99+ |
six | QUANTITY | 0.99+ |
January one | DATE | 0.98+ |
three-way | QUANTITY | 0.98+ |
One | QUANTITY | 0.98+ |
seven years | QUANTITY | 0.98+ |
less than 15 minutes | QUANTITY | 0.98+ |
11 million DDoS | QUANTITY | 0.98+ |
208,000 | QUANTITY | 0.98+ |
first | QUANTITY | 0.98+ |
end of 2021 | DATE | 0.97+ |
one spot | QUANTITY | 0.97+ |
One last question | QUANTITY | 0.97+ |
eight factor | QUANTITY | 0.97+ |
double | QUANTITY | 0.97+ |
over 10 million | QUANTITY | 0.97+ |
end of this year | DATE | 0.97+ |
first time | QUANTITY | 0.96+ |
COVID pandemic | EVENT | 0.96+ |
English | OTHER | 0.96+ |
second | QUANTITY | 0.95+ |
first half of 2021 | DATE | 0.95+ |
more than 2.8 million DDoS | QUANTITY | 0.95+ |
more than half | QUANTITY | 0.95+ |
netscout.com/starreport | OTHER | 0.94+ |
a minute ago | DATE | 0.94+ |
past year and a half | DATE | 0.94+ |
past year | DATE | 0.94+ |
CUBE | ORGANIZATION | 0.94+ |
one aspect | QUANTITY | 0.94+ |
three pronged attack | QUANTITY | 0.93+ |
CryptoLocker | TITLE | 0.9+ |
200 | QUANTITY | 0.89+ |
Richard Hummel & Roland Dobbins, NETSCOUT | CUBE Conversation, July 2021
(upbeat music) (air whooshing) >> Hi everybody. John Walls here continuing our Cube Conversations here focusing on NETSCOUT today and the drawing problem of ransomware. Obviously very much in the news these days for the couple of high profile cases. It is certainly an increasing challenge, but by no means a new phenomenon at all. With us to talk about this is Roland Dobbins who is the principal engineer of NETSCOUT's A-CERT team. And Ronald and good to see you today, sir. Thanks for joining us. >> Good to see you as well. And Richard Hummel who's Threat Intelligence research lead for the A-CERT Team. And Richard, thank you for being with us as well here on the Cube. >> Absolutely John, thanks for having us. >> Yeah, let's just jump right in here. Ransomware, obviously we're all well aware of a couple of high profile cases, as I alluded to. Let's talk about first, the magnitude and scale of the problem, as it currently exists. And Roland, I'm going to let you just set the table for us here. Let's talk about ransomware, where it was maybe four or five years ago, and then the challenge has become today? >> Actually, John, if you don't mind I'd really like to hand that one to my colleague, Richard because >> By all means, so Richard- he's really has an in-depth background there if that's okay. >> Richard, jump in on that. >> Absolutely. Yeah. And so (clears throat) I'll handle all the ransomware stuff, namely because I've been doing this for going on seven years now of looking specifically at ransomware. I started this right around the time I joined Eyesight Partners, you know leading premier provider of threat intelligence who was acquired by FireEye and now Mandiat, and now even a conglomerate that just acquired Mandia. So there's been a series of acquisitions here but the reality is this threat intelligence has been pervasive across all of these. And you can see that over time that value hasn't diminished. And you can see that by all of these acquisitions. that are like that's a really good example to show how valuable this is because everybody wants it. And the reality is back then I started tracking ransomware specifically looking at a lot of the CryptoLocker variance, things like CryptoWall, and TorrentLocker, and TeslaCrypt. And there's any number I could go on and on and on about all these different variations, and how ransomware came to be, and what you know, adversaries were using it for. But the reality is ransomware has been around for a long, long time and probably three or four years ago. There was this lull in time where people are like, hey we've got these initiatives like no ransomware.org. We've got the, you know, local law enforcement backing in a bunch of different countries. There's this big huge international effort to basically get rid of ransomware. And it's going to% be a thing of the past. And we very clearly see that is not the case. And now with ransomware, you have an evolution over time. It used to be you would have different flavors of ransomware where sometimes it would encrypt your files first and then it would reach back to the command control. Sometimes it would reach back first to get keys and then it would encrypt. Sometimes the encryptions were breakable, sometimes the keys were stored locally, but a lot of them more recent variants of ransomware are very well done. They're very sophisticated. They will encrypt your files and the keys themselves are held by the adversary. And so there's no way to just decrypt it. You can't create a decryptor like a lot of these security companies do you would actually have to get that key from the adversary or you would have to restore your systems from a backup. And so the history of ransomware is very long and varied. And you know one of the core topics we want to discuss today is ransomware isn't by itself anymore. It used to be like ransomware was the name that incited fear but these guys have evolved over time. And now ransomware operators are doing kind of this triple extortion. Where they will encrypt your files, they've already gained access to that system. So then they will exfiltrate sensitive data and they will have that as kind of a hostage and say, look you're going to pay us for this ransomware to decrypt your files, to get those back. But I'll guess what? We also have your sensitive data that we're going to post online and sell and on underground forms unless you pay us additional money. But now we even have a third stage here. And this is kind of where Roland's going to come in and talk about this is we have DDoS extortion. That is surging In fact, we did a survey of enterprise internet service providers. And when we asked them what was their biggest concerns in 2020 and going into 2021 about threats, and obviously ransomware was number one but DDoS extortion was number two. And so you have this one, two bang the adversaries are using to be able to extort payment from victims. And this has been going on for a number of years with this kind of double extortion. And now this triple extortion, in fact going all the way back to the CryptoLocker days you would have banking malware, like Gameover Zeus where they would get on your system, they would do wire transfers from your bank accounts. There was steal files. And then as a last hurrah they would deploy ransomware and encrypt all your files. And so not only did they steal all your money from the bank. Now, they're going to say, you got to pay us to actually do decrypt your files. So this idea of kind of a double tap has been going on for a long time. And more recently around September of last year we started to see this DDoS aspect part of these operations. And so, yeah, that's kind of the history of what we're dealing with here. >> And so, and DDoS distributed denial service, Ronald let you pick up the ball at this point then. Now this evolution you will the triple threat, you know first you were talking about in encryption, in public exposure. And now this DDoS stage, this pillar of the malfeasance, if you will what kind of headaches is this causing in terms of from an engineering perspective from your side of the fence when you're looking at what your clients are dealing with when all of a sudden they have this entirely new plethora of challenges that are confronting them. >> Sure. So DDoS goes back a long ways. So it actually goes back to the late 80s and the early ARPANET. And then we started to see non-monetary DDoS extortion in the early 1990s. And we started to see monetary DDoS extortion that kicked off around 1997. So with any, criminals are very, very adaptive. And so when new technologies come online and new ways that they can potentially exploit it for their gain, they will do so in many cases using old modalities just simply transliterated into the new technology space. And that's what we see with (indistinct) extortion. DDOS attacks are attacks against availability. So the idea is to disrupt the access, (indistinct) access to applications, services, servers, data content, infrastructure, those different types of things. And DDoS attacks can be motivated by pretty much any motivation you can think of. But there is a hard core of DDoS extortionists that we've seen over the years. And this Richard indicated what we started to see is a convergence between these sets of criminal specialties. And so a few years ago, we actually were disassembling a piece of ransomware and it turned out that it had some very basic DDoS attack capabilities coded into it. It was obviously a prototype, it hadn't been finished, but this showed that these criminals in the ransomware space were thinking about getting into DDoS. And now they've developed this methodology where like Richard said, they, number one, they encrypt the files. Number two, they'll threaten to leak information. And then they will DDoS the public facing infrastructure of the organizations to try and put additional pressure on them to pay. And especially now during the pandemic with this wholesale shift to remote work. The attackers for the first time have the ability not only to disrupt the online operations which is bad enough, but they can actually interfere with the ordinary work day activities of the first-line workforce of organizations. And so this really makes it even more potent. And the ransomware itself is interesting as well because it uses exploits, social engineering, along with technological exploits to exploit the confidentiality and the integrity of data, and to restrict that stuff which actually turns into an attack against availability. So it's kind of really a different form of DDoS attack and coupled out with a real DDoS attack, and it can be very, very challenging. But one thing John that we've seen is that organizations if they have prepared to deal with a DDoS attack in form an architectural perspective, from an operational perspective. If they have done the things they need to do, to be able to maintain availability, even in the face of attack. There are about 80% of where they need to be to be to able to withstand a ransomware attack. Conversely, if organizations have been doing a good job and ensuring that their systems are secured and if they do get hit somehow with ransomware that they have the ability to maintain operations and communications and recover, they're about 80% of where they need to be to be able to successfully withstand DDoS attacks. And so it turns out that even though these threats are major threats and they are something that organizations need to be aware of, the good news is that a lot of the planning, and resources, and organizational changes that need to be made to face these threats are in fact very similar. >> Yeah, but (indistinct) mean the challenge is, it's hard work, right? It, there's an enormous amount of preparations got to go into this, and pre-planning, pre-thought, and that's what NETSCOUT is all about obviously is trying to get people onto that journey and getting into this examination of their services, and their networks, and... The fact that this can happen on multiple layers, right? It could be application, be protocols, transport, network, whatever, you know just multiple ways that these DDoS attacks can occur. What kind of I'd say well, challenges again does that present in the fact that it is, there are many doors, right? That these attacks can happen from or where these attacks can come from. So how do you then talk to your client base about approaching this kind of examination and these prophylactic measures that you're suggesting that have to be done in order to minimize the damage? >> It's really about business continuity. Now business continuity planning, we used to be called "disaster recovery planning", right? Is something that organizations are very familiar with. It often has executive sponsorship and a lot of planning has gone into it. The thing is DDoS attacks, which were attacks against availability are in fact a manmade disaster, right? And they interrupt the continuity of business. Same thing with the ransomware, and so from an architectural standpoint, from the standpoint of rolling out new products and services, resiliency and to attack, and the ability to maintain availability and continue with operations in the face of attack is really really key for any organization today which has any kind of significant online presence. And that's really just about all of them. And so from a planning standpoint, it's imperative from an architectural standpoint whether we're talking about things like network infrastructure, or DNS, or software applications. It's important from an operational standpoint. So one of the things that we see for example is that many organizations don't really have a good communications plan. They don't have a good internal communications plan nor do they have a good external communications plan for communicating during an event. And they don't even have really a plan for dealing with an event that is disruptive to business continuity and operations. And so that is really key. Technology is important, but the most important aspect of this is the human factor, understanding the business, understanding the types of risks to the business's ability to execute on its mission and then doing the things from a technological perspective, from an operational perspective, and from a communications perspective to maintain operations, and communications throughout an event and to be able to emerge on the other side of that agenda successfully. >> So Richard you're in threat intelligence, right? Risk assessments. And as you said, you've been around this block for quite some time now. In terms of, I guess getting people's attention that has been accomplished now with obviously some, with some of these high profile cases. But what about that kind of work that you're doing in terms of trying to communicate these very threats to your client base or to prospective clients in terms of identifying their real vulnerabilities within their networks and then having them seriously address these. I mean, what's the difference maybe in the mindset now, as opposed to where maybe that conversation was being had a few years ago? >> I think the biggest difference here is a matter of when and not if. It used to be, you could say, "Oh I'm never going to get hit by ransomware or I'm never going to get DDoS attacked." But that is no longer the case. Roland made a really good point that just about every single business in the world now relies on internet connectivity in order to operate their business. If they don't have that then they're not going to be able to connect with their consumers, their shoppers, if they're a retail, right? If you're a bank, then you have to communicate with your individuals having accounts. And I mean, I have not gone to a physical bank in probably six years. And so that just underscores how important it is to have this internet connectivity. Now, with that comes risk. Not only do you risk the DDoS attacks because you're publicly exposed in an adversary where you can actually find your internet space by doing some forensics, such as network scanning, being able to walk that back like a passive DNS but their historical records use things like showdown to figure out what kind of devices you're running. So there's any number of ways that you can do that. But at the same time you're also exposing yourself to these ransomware operators and really any kind of crime ware operator out there, because they're going to exploit you over the internet. We actually did a case study probably two years ago. Looking at brute forcing on networks and looking at exploitation attempts to figure out like what is the Delta? If you have an online internet presence are you going to get attacked? And the answer was very shocking to us. Yes, you're going to get attacked. And also it's going to be in less than five minutes, from the time a brand new IOT device goes online to the time it starts getting brute force attacked. And within 24 hours you're going to get exploitation attempts from known vulnerabilities or devices that haven't been patched and things like that. And so the reality is not if you're going to get attacked, it's when? And so understanding that is the nature of the threat landscape right now and having this kind of security awareness. Actually another good point that Roland just brought up was that human element. The human element is kind of the linchpin for any security organization. And as part of my master's I had wrote a dissertation about, and I named it as such my professor didn't really care for this, but I said, "The humans are the weakest link." Because in the security posture, that is essentially true. If you don't have the expertise on a team you're not going to be able to get things configured properly. If you don't have the expertise you're not going to be able to respond properly. If you have individuals that aren't concerned about security, now you're going to have a bunch of gaps. Not only that, social engineering is still the number one method that adversaries use to get into organizations and that manipulates the human element. And so having the security awareness in what we do here, on this cube interview, the threat reports, we publish, the blogs that we do, all the threads summaries, all of that goes hand-in-hand with educating the general public and having security awareness pushed out as much as possible to every single person we can. And that's really the key, this preparation, this awareness of what adversaries are doing in order to defend against them. >> So Roland in your mind and you've already walked us through a little bit of this about certain steps and measures. Do you think that could be taken safeguards basically, that everybody should have in the place? What is the optimal scenario from an engineering perspective in terms of trying to prevent these kinds of intrusions, these kinds of attacks in terms of what are those basic pieces, these fundamental pieces as you see it now, understanding as Richard just told us that it's matter of not if, but when? >> Right. So availability, redundancy these have to be core architectural principles whether we're talking about network infrastructure, whether we're talking about important ancillary supporting services like DNS in terms of personnel, in terms of remote access. All of these different elements and many many more have to be designed from the out. All the services in the applications whether they're used internally, whether they are part of service delivery that an organization is doing across the internet, publicly there has to be redundancy and resiliency. There has to be a defense plan in order to defend these assets in these organizations against attack. Whether it's DDoS attack or whether it's a containment plan to deal with a ransomware that potentially gets let loose inside the enterprise network, there has to be a plan to contain it, and deal with it, and restore from backup. These plans have to be continuously updated because IT is not static. There are always noose and nance and changes this organizations provision new services offer new products, move into new markets and new new sub-specializations. And so the plans have to be consistently updated and they have to be rehearsed. You can't have a plan that just exists as pixels on a phosphorous somewhere. The plan has to be executed because you're going to find that there's some scenario, some service, or application, or operational process that needs to be updated or that needs to be included in the plan. And this has to be done regularly. Another key point is that you have to have people who are very skilled and who have both depth and breadth of understanding. And either you bring those people into your organization or you reach out and get that expertise from organizations who do in fact have that kind of expertise on tap and available. >> Well, is, you both certainly exhibit the depth and the breadth to fight this issue(chuckles) I certainly appreciate the time, the insights, and the warning is quite clear. Be prepared, do the hard work upfront. It could save you a lot of headache on the backside. And it is a matter of when and not if, these days. Richard Roland, thanks for being with us here on the Cube >> Thank you so much. >> Thank you so much. It's a pleasure. >> All right, talking about the triple threat of extortion, cyber extortion these days, and DDoS, the distributed denial of service in the growing problem. It is, but there is a way that you can combat it. And you just learned about that (indistinct) NETSCOUT here on the Cube. (upbeat music)
SUMMARY :
And Ronald and good to see you today, sir. Good to see you as well. And Roland, I'm going to let you just set By all means, so Richard- and how ransomware came to be, of challenges that are confronting them. of the organizations to try that have to be done in order and to be able to emerge And as you said, and that manipulates the human element. that everybody should have in the place? And so the plans have to of headache on the backside. Thank you so much. and DDoS, the distributed
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Richard | PERSON | 0.99+ |
Richard Hummel | PERSON | 0.99+ |
Ronald | PERSON | 0.99+ |
John | PERSON | 0.99+ |
Roland Dobbins | PERSON | 0.99+ |
Roland | PERSON | 0.99+ |
John Walls | PERSON | 0.99+ |
July 2021 | DATE | 0.99+ |
2020 | DATE | 0.99+ |
Mandiat | ORGANIZATION | 0.99+ |
2021 | DATE | 0.99+ |
Richard Roland | PERSON | 0.99+ |
NETSCOUT | ORGANIZATION | 0.99+ |
FireEye | ORGANIZATION | 0.99+ |
six years | QUANTITY | 0.99+ |
three | DATE | 0.99+ |
Mandia | ORGANIZATION | 0.99+ |
first time | QUANTITY | 0.99+ |
seven years | QUANTITY | 0.99+ |
two years ago | DATE | 0.99+ |
Eyesight Partners | ORGANIZATION | 0.99+ |
late 80s | DATE | 0.99+ |
today | DATE | 0.99+ |
less than five minutes | QUANTITY | 0.99+ |
early 1990s | DATE | 0.99+ |
third stage | QUANTITY | 0.98+ |
24 hours | QUANTITY | 0.98+ |
one | QUANTITY | 0.98+ |
first | QUANTITY | 0.98+ |
about 80% | QUANTITY | 0.98+ |
four | DATE | 0.98+ |
four years ago | DATE | 0.97+ |
both | QUANTITY | 0.96+ |
one thing | QUANTITY | 0.96+ |
CryptoLocker | TITLE | 0.94+ |
five years ago | DATE | 0.94+ |
pandemic | EVENT | 0.94+ |
triple | QUANTITY | 0.92+ |
1997 | DATE | 0.9+ |
Gameover Zeus | TITLE | 0.89+ |
first-line workforce | QUANTITY | 0.88+ |
two bang | QUANTITY | 0.87+ |
A-CERT | ORGANIZATION | 0.86+ |
few years ago | DATE | 0.85+ |
Number two | QUANTITY | 0.8+ |
September of last year | DATE | 0.76+ |
TeslaCrypt | ORGANIZATION | 0.75+ |
Roland | ORGANIZATION | 0.74+ |
single person | QUANTITY | 0.71+ |
double extortion | QUANTITY | 0.7+ |
double tap | QUANTITY | 0.7+ |
couple | QUANTITY | 0.7+ |
Cube | ORGANIZATION | 0.68+ |
Delta | ORGANIZATION | 0.66+ |
CERT | ORGANIZATION | 0.64+ |
TorrentLocker | TITLE | 0.62+ |
around | DATE | 0.62+ |
core topics | QUANTITY | 0.6+ |
CryptoLocker | ORGANIZATION | 0.6+ |
DDoS | OTHER | 0.55+ |
CryptoWall | ORGANIZATION | 0.53+ |
single | QUANTITY | 0.51+ |
ARPANET | ORGANIZATION | 0.51+ |
two | QUANTITY | 0.49+ |
Cube | COMMERCIAL_ITEM | 0.42+ |
Richard Hummel, NETSCOUT | CUBE Conversation, July 2021
(upbeat music) >> Hey, welcome to this Cube conversation with NetScout. I'm Lisa Martin. Excited to talk to you. Richard Hummel, the manager of threat research for Arbor Networks, the security division of NetScout. Richard, welcome to theCube. >> Thanks for having me, Lisa, it's a pleasure to be here. >> We're going to unpack the sixth NetScout Threat Intelligence Report, which is going to be very interesting. But something I wanted to start with is we know that and yes, you're going to tell us, COVID and the pandemic has had a massive impact on DDoS attacks, ransomware. But before we dig into the report, I'd like to just kind of get some stories from you as we saw last year about this time rapid pivot to work from home, rapid pivot to distance learning. Talk to us about some of the attacks that you saw in particular that literally hit close to home. >> Sure and there's one really good prime example that comes to mind because it impacted a lot of people. There was a lot of media sensation around this but if you go and look, just Google it, Miami Dade County and DDoS, you'll see the first articles that pop up is the entire district school network going down because the students did not want to go to school and launched a DDoS attack. There was something upwards of 190,000 individuals that could no longer connect to the school's platform, whether that's a teacher, a student or parents. And so it had a very significant impact. And when you think about this in terms of the digital world, that impacted very severely, a large number of people and you can't really translate that to what would happen in a physical environment because it just doesn't compute. There's two totally different scenarios to talk about here. >> Amazing that a child can decide, "I don't want to go to school today." And as a result of a pandemic take that out for nearly 200,000 folks. So let's dig into, I said this is the sixth NetScout Threat Intelligence Report. One of the global trends and themes that is seen as evidence in what happened last year is up and to the right. Oftentimes when we're talking about technology, you know, with analyst reports up and to the right is a good thing. Not so in this case. We saw huge increases in threat vectors, more vectors weaponized per attack sophistication, expansion of threats and IOT devices. Walk us through the overall key findings from 2020 that this report discovered. >> Absolutely. And if yo glance at your screen there you'll see the key findings here where we talk about record breaking numbers. And just in 2020, we saw over 10 million attacks, which, I mean, this is a 20% increase over 2019. And what's significant about that number is COVID had a huge impact. In fact, if we go all the way back to the beginning, right around mid March, that's when the pandemic was announced, attacks skyrocketed and they didn't stop. They just kept going up and to the right. And that is true through 2021. So far in the first quarter, typically January, February is the down month that we observe in DDoS attacks. Whether this is, you know, kids going back to school from Christmas break, you have their Christmas routines and e-commerce is slowing down. January, February is typically a slow month. That was not true in 2021. In fact, we hit record numbers on a month by month in both January and February. And so not only do we see 2.9 million attacks in the first quarter of 2021, which, I mean, let's do the math here, right? We've got four quarters, you know, we're on track to hit 12 million attacks potentially, if not more. And then you have this normal where we said 800,000 approximately month over month since the pandemic started, we started 2021 at 950,000 plus. That's up and to the right and it's not slowing down. >> It's not slowing down. It's a trend that it shows, you know, significant impact across every industry. And we're going to talk about that but what are some of the new threat vectors that you saw weaponized in the last year? I mean, you talked about the example of the Miami-Dade school district but what were some of those new vectors that were really weaponized and used to help this up and to the right trend? >> So there's four in particular that we were tracking in 2020 and these nets aren't necessarily new vectors. Typically what happens when an adversary starts using this is there's a proof of concept code out there. In fact, a good example of this would be the RDP over UDP. So, I mean, we're all remotely connected, right? We're doing this over a Zoom call. If I want to connect to my organization I'm going to use some sort of remote capability whether that's a VPN or tunneling in, whatever it might be, right? And so remote desktop is something that everybody's using. And we saw actors start to kind of play around with this in mid 2020. And in right around September, November timeframe we saw a sudden spike. And typically when we see spikes in this kind of activity it's because adversaries are taking proof of concept code, that maybe has been around for a period of time, and they're incorporating those into DDoS for hire services. And so any person that wants to launch a DDoS attack can go into underground forums in marketplaces and they can purchase, maybe it's $10 in Bitcoin, and they can purchase an attack. That leverage is a bunch of different DDoS vectors. And so adversaries have no reason to remove a vector as new ones get discovered. They only have the motivation to add more, right? Because somebody comes into their platform and says, "I want to launch an attack that's going to take out my opponent." It's probably going to look a lot better if there's a lot of attack options in there where I can just go through and start clicking buttons left and right. And so all of a sudden now I've got this complex multi-vector attack that I don't have to pay anything extra for. Adversary already did all the work for me and now I can launch an attack. And so we saw four different vectors that were weaponized in 2020. One of those are notably the Jenkins that you see listed on the screen in the key findings. That one isn't necessarily a DDoS vector. It started out as one, it does amplify, but what happens is Jenkins servers are very vulnerable and when you actually initiate this attack, it tips over the Jenkins server. So it kind of operates as like a DoS event versus DDoS but it still has the same effect of availability, it takes a server offline. And then now just in the first part of 2021 we're tracking multiple other vectors that are starting to be weaponized. And when we see this, we go from a few, you know, incidents or alerts to thousands month over month. And so we're seeing even more vectors added and that's only going to continue to go up into the right. You know that theme that we talked about at the beginning here. >> As more vectors get added, and what did you see last year in terms of industries that may have been more vulnerable? As we talked about the work from home, everyone was dependent, really here we are on Zoom, dependent on Zoom, dependent on Netflix. Streaming media was kind of a lifeline for a lot of us but it also was healthcare and education. Did you see any verticals in particular that really started to see an increase in the exploitation and in the risk? >> Yeah, so let's start, let's separate this into two parts. The last part of the key findings that we had was talking about a group we, or a campaign we call Lazarus Borough Model. So this is a global DDoS extortion campaign. We're going to cover that a little bit more when we talk about kind of extorted events and how that operates but these guys, they started where the money is. And so when they first started targeting industries and this kind of coincides with COVID, so it started several months after the pandemic was announced, they started targeting a financial organizations, commercial banking. They went after stock exchange. Many of you would hear about the New Zealand Stock Exchange that went offline. That's this LBA campaign and these guys taking it off. So they started where the money is. They moved to a financial agation targeting insurance companies. They targeted currency exchange places. And then slowly from there, they started to expand. And in so much as our Arbor Cloud folks actually saw them targeting organizations that are part of vaccine development. And so these guys, they don't care who they hurt. They don't care who they're going after. They're going out there for a payday. And so that's one aspect of the industry targeting that we've seen. The other aspect is you'll see, on the next slide here, we actually saw a bunch of different verticals that we really haven't seen in the top 10 before. In fact, if you actually look at this you'll see the number one, two and three are pretty common for us. We almost always are going to see these kinds of telecommunications, wireless, satellite, broadband, these are always going to be in the top. And the reason for that is because gamers and DDoS attacks associated with gaming is kind of the predominant thing that we see in this landscape. And let's face it, gamers are on broadband operating systems. If you're in Asian communities, often they'll use mobile hotspots. So now you start to have wireless come in there. And so that makes sense seeing them. But what doesn't make sense is this internet publishing and broadcasting and you might say, "Well, what is that?" Well, that's things like Zoom and WebEx and Netflix and these other streaming services. And so we're seeing adversaries going after that because those have become critical to people's way of life. Their entertainment, what they're using to communicate for work and school. So they realized if we can go after this it's going to disrupt something and hopefully we can get some recognition. Maybe we can show this as a demonstration to get more customers on our platform or maybe we can get a payday. In a lot of the DDoS attacks that we see, in fact most of them, are all monetary focused. And so they're looking for a payday. They're going to go after something that's going to likely, you know, send out that payment. And then just walk down the line. You can see COVID through this whole thing. Electronic shopping is number five, right? Everybody turned to e-commerce because we're not going to in-person stores anymore. Electronic computer manufacturing, how many more people have to get computers at home now because they're no longer in a corporate environment? And so you can see how the pandemic has really influenced this industry target. >> Significant influencer and I also wonder too, you know, Zoom became a household name for every generation. You know, we're talking to five generations and maybe the generations that aren't as familiar with computer technology might be even more exploitable because it's easy to click on a phishing email when they don't understand how to look for the link. Let's now unpack the different types of DDoS attacks and what is on the rise. You talked about in the report the triple threat and we often think of that in entertainment. That's a good thing, but again, not here. Explain that triple threat. >> Yeah, so what we're seeing here is we have adversaries out there that are looking to take advantage of every possible angle to be able to get that payment. And everybody knows ransomware is a household name at this point, right? And so ransomware and DDoS have a lot in common because they both attack the availability of network resources, where computers or devices or whatever they might be. And so there's a lot of parallels to draw between the two of these. Now ransomware is a denial of service event, right? You're not going to have tens of thousands of computers hitting a single computer to take it down. You're going to have one exploitation of events. Somebody clicked on a link, there was a brute force attempt that managed to compromise a little boxes, credentials, whatever it might be, ransomware gets put on a system, it encrypts all your files. Well, all of a sudden, you've got this ransom note that says "If you want your files decrypted you're going to send us this amount of human Bitcoin." Well, what adversaries are doing now is they're capitalizing on the access that they already gained. So they already have access to the computer. Well, why not steal all the data first then let's encrypt whatever's there. And so now I can ask for a ransom payment to decrypt the files and I can ask for an extortion to prevent me from posting your data publicly. Maybe there's sensitive corporate information there. Maybe you're a local school system and you have all of your students' data on there. You're a hospital that has sensitive PI on it, whatever it might be, right? So now they're going to extort you to prevent them from posting that publicly. Well, why not add DDoS to this entire picture? Now you're already encrypted, we've already got your files, and I'm going to DDoS your system so you can't even access them if you wanted to. And I'm going to tell you, you have to pay me in order to stop this DDoS attack. And so this is that triple threat and we're seeing multiple different ransomware families. In fact, if you look at one of the slides here, you'll see that there's SunCrypt, there's Ragnar Cryptor, and then Maze did this initially back in September and then more recently, even the DarkSide stuff. I mean, who hasn't heard about DarkSide now with the Colonial Pipeline event, right? So they came out and said, "Hey we didn't intend for this collateral damage but it happened." Well, April 24th, they actually started offering DDoS as part of their tool kits. And so you can see how this has evolved over time. And adversaries are learning from each other and are incorporating this kind of methodology. And here we have triple extortion event. >> It almost seems like triple extortion event as a service with the opportunities, the number of vectors there. And you're right, everyone has heard of the Colonial Pipeline and that's where things like ransomware become a household term, just as much as Zoom and video conferencing and streaming media. Let's talk now about the effects that the threat report saw and uncovered region by region. Were there any regions in particular that were, that really stood out as most impacted? >> So not particularly. So one of the phenomena that we actually saw in the threat report, which, you know, we probably could have talked about it before now but it makes sense to talk about it regionally because we didn't see any one particular region, one particular vertical, a specific organization, specific country, none was more heavily targeted than another. In fact what we saw is organizations that we've never seen targeted before. We've seen industries that have never been targeted before all of a sudden are now getting DDoS attacks because we went from a local on-prem, I don't need to be connected to the internet, I don't need to have my employees remote access. And now all of a sudden you're dependent on the internet which is really, let's face it, that's critical infrastructure these days. And so now you have all of these additional people with a footprint connected to the internet then adversary can figure out and they can poke at it. And so what we saw here is just overall, all industries, all regions saw these upticks. The exception would be in China. We actually, in the Asia Pacific region specifically, but predominantly in China. But that often has to do with visibility rather than a decrease in attacks because they have their own kind of infrastructure in China. Brazil's the same way. They have their own kind of ecosystems. And so often you don't see what happens a lot outside the borders. And so from our perspective, we might see a decrease in attacks but, for all we know, they actually saw an increase in the attacks that is internal to their country against their country. And so across the board, just increases everywhere you look. >> Wow. So let's talk about what organizations can do in light of this. As we are here, we are still doing this program by video conferencing and things are opening up a little bit more, at least in the states anyway, and we're talking about more businesses going back to some degree but there's going to still be some mix, some hybrid of working from home and maybe even distance learning. So what can enterprises do to prepare for this when it happens? Because it sounds to me like with the sophistication, the up and to the right, it's not, if we get attacked, it's when. >> It's when, exactly. And that's just it. I mean, it's no longer something that you can put off. You can't just assume that I've never been DDoS attacked, I'm never going to be DDoS attacked anymore. You really need to consider this as part of your core security platform. I like to talk about defense in depth or a layer defense approach where you want to have a layered approach. So, you know, maybe they target your first layer and they don't get through. Or they do get through and now your second layer has to stop it. Well, if you have no layers or if you have one layer, it's not that hard for an adversary to figure out a way around that. And so preparation is key. Making sure that you have something in place and I'm going to give you an operational example here. One of the things we saw with the LBA campaigns is they actually started doing network of conasense for their targets. And what they would do is they would take the IP addresses belonging to your organization. They would look up the domains associated with that and they would figure out like, "Hey, this is bpn.organization.com or VPN two." And all of a sudden they've found your VPN concentrator and so that's where they're going to focus their attack. So something as simple as changing the way that you name your VPN concentrators might be sufficient to prevent them from hitting that weak link or right sizing the DDoS protection services for your company. Did you need something as big as like OnPrem Solutions? We need hardware. Do you instead want to do a managed service? Or do you want to go and talk to a cloud provider because there's right solutions and right sizes for all types of organizations. And the key here is preparation. In fact, all of the customers that we've worked with for the LBA extortion campaigns, if they were properly prepared they experienced almost no downtime or impact to their business. It's the people like the New Zealand Stock Exchange or their service provider that wasn't prepared to handle the attacks that were sent out them that were crippled. And so preparation is key. The other part is awareness. And that's part of what we do with this threat report because we want to make sure you're aware what adversaries are doing, when new attack vectors are coming out, how they're leveraging these, what industries they're targeting because that's really going to help you to figure out what your posture is, what your risk acceptance is for your organization. And in fact, there's a couple of resources that that we have here on the next slide. And you can go to both both of these. One of them is the threat report. You can view all of the details. And we only scratched the surface here in this Cube interview. So definitely recommend going there but the other one is called Horizon And netscout.com/horizon is a free resource you can register but you can actually see near real-time attacks based on industry and based on region. So if your organization out there and you're figuring, "Well I'm never attacked." Well go look up your industry. Go look up the country where you belong and see is there actually attacks against us? And I think you'll be quite surprised that there's quite a few attacks against you. And so definitely recommend checking these out >> Great resources netscout.com/horizon, netscout.com/threatreport. I do want to ask you one final question. That's in terms of timing. We saw the massive acceleration in digital transformation last year. We've already talked about this a number of times on this program. The dependence that businesses and consumers, like globally in every industry, in every country, have on streaming on communications right now. In terms of timing, though, for an organization to go from being aware to understanding what adversaries are doing, to being prepared, how quickly can an organization get up to speed and help themselves start reducing their risks? >> So I think that with DDoS, as opposed to things like ransomware, the ramp up time for that is much, much faster. There is a finite period of time with DDoS attacks that is actually going to impact you. And so maybe you're a smaller organization and you get DDoS attacked. There's a, probably a pretty high chance that that DDoS attack isn't going to last for multiple days. So maybe it's like an hour, maybe it's two hours, and then you recover. Your network resources are available again. That's not the same for something like ransomware. You get hit with ransomware, unless you pay or you have backups, you have to do the rigorous process of getting all your stuff back online. DDoS is more about as soon as the attack stops, the saturation goes away and you can start to get back online again. So it might not be as like immediate critical that you have to have something but there's also solutions, like a cloud solution, where it's as simple as signing up for the service and having your traffic redirected to their scrubbing center, their detection center. And then you may not have to do anything on-prem yourself, right? It's a matter of going out to an organization, finding a good contract, and then signing up, signing on the dotted line. And so I think that the ramp up time for mitigation services and DDoS protection can be a lot faster than many other security platforms and solutions. >> That's good to know cause with the up and to the right trend that you already said, the first quarter is usually slow. It's obviously not that way as what you've seen in 2021. And we can only expect what way, when we talk to you next year, that the up and to the right trend may continue. So hopefully organizations take advantage of these resources, Richard, that you talked about to be prepared to mediate and protect their you know, their customers, their employees, et cetera. Richard, we thank you for stopping by theCube. Talking to us about the sixth NetScout Threat Intelligence Report. Really interesting information. >> Absolutely; definitely a pleasure to have me here. Lisa, anytime you guys want to do it again, you know where I live? >> Yes. It's one of my favorite topics that you got and I got to point out the last thing, your Guardians of the Galaxy background, one of my favorite movies and it should be noted that on the NetScout website they are considered the Guardians of the Connected World. I just thought that connection was, as Richard told me before we went live, not planned, but I thought that was a great coincidence. Again, Richard, it's been a pleasure talking to you. Thank you for your time. >> Thank you so much. >> Richard Hummel, I'm Lisa Martin. You're watching this Cube conversation. (relaxing music)
SUMMARY :
Excited to talk to you. it's a pleasure to be here. that you saw in particular that that comes to mind because One of the global trends and themes And then you have this normal where and to the right trend? And so any person that wants that really started to see an increase In a lot of the DDoS attacks that we see, and maybe the generations that aren't And so there's a lot of parallels to draw effects that the threat report And so now you have all but there's going to still be some mix, and I'm going to give you to understanding what that is actually going to impact you. that the up and to the a pleasure to have me here. and I got to point out the last thing, You're watching this Cube conversation.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Richard | PERSON | 0.99+ |
Richard Hummel | PERSON | 0.99+ |
Lisa Martin | PERSON | 0.99+ |
two hours | QUANTITY | 0.99+ |
2020 | DATE | 0.99+ |
China | LOCATION | 0.99+ |
$10 | QUANTITY | 0.99+ |
New Zealand Stock Exchange | ORGANIZATION | 0.99+ |
April 24th | DATE | 0.99+ |
New Zealand Stock Exchange | ORGANIZATION | 0.99+ |
20% | QUANTITY | 0.99+ |
September | DATE | 0.99+ |
two | QUANTITY | 0.99+ |
2021 | DATE | 0.99+ |
July 2021 | DATE | 0.99+ |
Lisa | PERSON | 0.99+ |
second layer | QUANTITY | 0.99+ |
last year | DATE | 0.99+ |
mid 2020 | DATE | 0.99+ |
Guardians of the Galaxy | TITLE | 0.99+ |
February | DATE | 0.99+ |
NetScout | ORGANIZATION | 0.99+ |
first layer | QUANTITY | 0.99+ |
January | DATE | 0.99+ |
bpn.organization.com | OTHER | 0.99+ |
next year | DATE | 0.99+ |
one layer | QUANTITY | 0.99+ |
800,000 | QUANTITY | 0.99+ |
last year | DATE | 0.99+ |
12 million attacks | QUANTITY | 0.99+ |
both | QUANTITY | 0.99+ |
Colonial Pipeline | EVENT | 0.99+ |
190,000 individuals | QUANTITY | 0.99+ |
four | QUANTITY | 0.99+ |
an hour | QUANTITY | 0.99+ |
One | QUANTITY | 0.99+ |
netscout.com/horizon | OTHER | 0.99+ |
first articles | QUANTITY | 0.99+ |
Netflix | ORGANIZATION | 0.99+ |
Guardians of the Connected World | TITLE | 0.99+ |
Zoom | ORGANIZATION | 0.99+ |
one | QUANTITY | 0.99+ |
one final question | QUANTITY | 0.99+ |
two parts | QUANTITY | 0.98+ |
2.9 million attacks | QUANTITY | 0.98+ |
over 10 million attacks | QUANTITY | 0.98+ |
Arbor Networks | ORGANIZATION | 0.98+ |
one aspect | QUANTITY | 0.98+ |
pandemic | EVENT | 0.98+ |
2019 | DATE | 0.98+ |
five generations | QUANTITY | 0.97+ |
three | QUANTITY | 0.97+ |
tens of thousands | QUANTITY | 0.97+ |
first | QUANTITY | 0.96+ |
Ragnar Cryptor | PERSON | 0.96+ |
first quarter of 2021 | DATE | 0.96+ |
four quarters | QUANTITY | 0.95+ |
ORGANIZATION | 0.95+ | |
nearly 200,000 folks | QUANTITY | 0.95+ |
Richard Hummel & Roland Dobbins, NETSCOUT
(upbeat music) (air whooshing) >> Hi everybody. John Walls here continuing our Cube Conversations here focusing on NETSCOUT today and the drawing problem of ransomware. Obviously very much in the news these days for the couple of high profile cases. It is certainly an increasing challenge, but by no means a new phenomenon at all. With us to talk about this is Roland Dobbins who is the principal engineer of NETSCOUT's A-CERT team. And Ronald and good to see you today, sir. Thanks for joining us. >> Good to see you as well. And Richard Hummel who's Threat Intelligence research lead for the A-CERT Team. And Richard, thank you for being with us as well here on the Cube. >> Absolutely John, thanks for having us. >> Yeah, let's just jump right in here. Ransomware, obviously we're all well aware of a couple of high profile cases, as I alluded to. Let's talk about first, the magnitude and scale of the problem, as it currently exists. And Roland, I'm going to let you just set the table for us here. Let's talk about ransomware, where it was maybe four or five years ago, and then the challenge has become today? >> Actually, John, if you don't mind I'd really like to hand that one to my colleague, Richard because >> By all means, so Richard- he's really has an in-depth background there if that's okay. >> Richard, jump in on that. >> Absolutely. Yeah. And so (clears throat) I'll handle all the ransomware stuff, namely because I've been doing this for going on seven years now of looking specifically at ransomware. I started this right around the time I joined Eyesight Partners, you know leading premier provider of threat intelligence who was acquired by FireEye and now Mandiat, and now even a conglomerate that just acquired Mandia. So there's been a series of acquisitions here but the reality is this threat intelligence has been pervasive across all of these. And you can see that over time that value hasn't diminished. And you can see that by all of these acquisitions. that are like that's a really good example to show how valuable this is because everybody wants it. And the reality is back then I started tracking ransomware specifically looking at a lot of the CryptoLocker variance, things like CryptoWall, and TorrentLocker, and TeslaCrypt. And there's any number I could go on and on and on about all these different variations, and how ransomware came to be, and what you know, adversaries were using it for. But the reality is ransomware has been around for a long, long time and probably three or four years ago. There was this lull in time where people are like, hey we've got these initiatives like no ransomware.org. We've got the, you know, local law enforcement backing in a bunch of different countries. There's this big huge international effort to basically get rid of ransomware. And it's going to% be a thing of the past. And we very clearly see that is not the case. And now with ransomware, you have an evolution over time. It used to be you would have different flavors of ransomware where sometimes it would encrypt your files first and then it would reach back to the command control. Sometimes it would reach back first to get keys and then it would encrypt. Sometimes the encryptions were breakable, sometimes the keys were stored locally, but a lot of them more recent variants of ransomware are very well done. They're very sophisticated. They will encrypt your files and the keys themselves are held by the adversary. And so there's no way to just decrypt it. You can't create a decryptor like a lot of these security companies do you would actually have to get that key from the adversary or you would have to restore your systems from a backup. And so the history of ransomware is very long and varied. And you know one of the core topics we want to discuss today is ransomware isn't by itself anymore. It used to be like ransomware was the name that incited fear but these guys have evolved over time. And now ransomware operators are doing kind of this triple extortion. Where they will encrypt your files, they've already gained access to that system. So then they will exfiltrate sensitive data and they will have that as kind of a hostage and say, look you're going to pay us for this ransomware to decrypt your files, to get those back. But I'll guess what? We also have your sensitive data that we're going to post online and sell and on underground forms unless you pay us additional money. But now we even have a third stage here. And this is kind of where Roland's going to come in and talk about this is we have DDoS extortion. That is surging In fact, we did a survey of enterprise internet service providers. And when we asked them what was their biggest concerns in 2020 and going into 2021 about threats, and obviously ransomware was number one but DDoS extortion was number two. And so you have this one, two bang the adversaries are using to be able to extort payment from victims. And this has been going on for a number of years with this kind of double extortion. And now this triple extortion, in fact going all the way back to the CryptoLocker days you would have banking malware, like Gameover Zeus where they would get on your system, they would do wire transfers from your bank accounts. There was steal files. And then as a last hurrah they would deploy ransomware and encrypt all your files. And so not only did they steal all your money from the bank. Now, they're going to say, you got to pay us to actually do decrypt your files. So this idea of kind of a double tap has been going on for a long time. And more recently around September of last year we started to see this DDoS aspect part of these operations. And so, yeah, that's kind of the history of what we're dealing with here. >> And so, and DDoS distributed denial service, Ronald let you pick up the ball at this point then. Now this evolution you will the triple threat, you know first you were talking about in encryption, in public exposure. And now this DDoS stage, this pillar of the malfeasance, if you will what kind of headaches is this causing in terms of from an engineering perspective from your side of the fence when you're looking at what your clients are dealing with when all of a sudden they have this entirely new plethora of challenges that are confronting them. >> Sure. So DDoS goes back a long ways. So it actually goes back to the late 80s and the early ARPANET. And then we started to see non-monetary DDoS extortion in the early 1990s. And we started to see monetary DDoS extortion that kicked off around 1997. So with any, criminals are very, very adaptive. And so when new technologies come online and new ways that they can potentially exploit it for their gain, they will do so in many cases using old modalities just simply transliterated into the new technology space. And that's what we see with (indistinct) extortion. DDOS attacks are attacks against availability. So the idea is to disrupt the access, (indistinct) access to applications, services, servers, data content, infrastructure, those different types of things. And DDoS attacks can be motivated by pretty much any motivation you can think of. But there is a hard core of DDoS extortionists that we've seen over the years. And this Richard indicated what we started to see is a convergence between these sets of criminal specialties. And so a few years ago, we actually were disassembling a piece of ransomware and it turned out that it had some very basic DDoS attack capabilities coded into it. It was obviously a prototype, it hadn't been finished, but this showed that these criminals in the ransomware space were thinking about getting into DDoS. And now they've developed this methodology where like Richard said, they, number one, they encrypt the files. Number two, they'll threatened to leak information. And then they will DDoS the public facing infrastructure of the organizations to try and put additional pressure on them to pay. And especially now during the pandemic with this wholesale shift to remote work. The attackers for the first time have the ability not only to disrupt the online operations which is bad enough, but they can actually interfere with the ordinary work day activities of the first-line workforce of organizations. And so this really makes it even more potent. And the ransomware itself is interesting as well because it uses exploits (indistinct), social engineering, along with technological exploits to exploit the confidentiality and the integrity of data, and to restrict that stuff which actually turns into an attack against availability. So it's kind of really a different form of DDoS attack and coupled out with a real DDoS attack, and it can be very, very challenging. But one thing John that we've seen is that organizations if they have prepared to deal with a DDoS attack in form an architectural perspective, from an operational perspective. If they have done the things they need to do, to be able to maintain availability, even in the face of attack. There are about 80% of where they need to be to be to able to withstand a ransomware attack. Conversely, if organizations have been doing a good job and ensuring that their systems are secured and if they do get hit somehow with ransomware that they have the ability to maintain operations and communications and recover, they're about 80% of where they need to be to be able to successfully withstand DDoS attacks. And so it turns out that even though these threats are major threats and they are something that organizations need to be aware of, the good news is that a lot of the planning, and resources, and organizational changes that need to be made to face these threats are in fact very similar. >> Yeah, but (indistinct) mean the challenge is, it's hard work, right? It, there's an enormous amount of preparations got to go into this, and pre-planning, pre-thought, and that's what NETSCOUT is all about obviously is trying to get people onto that journey and getting into this examination of their services, and their networks, and... The fact that this can happen on multiple layers, right? It could be application, be protocols, transport, network, whatever, you know just multiple ways that these DDoS attacks can occur. What kind of I'd say well, challenges again does that present in the fact that it is, there are many doors, right? That these attacks can happen from or where these attacks can come from. So how do you then talk to your client base about approaching this kind of examination and these prophylactic measures that you're suggesting that have to be done in order to minimize the damage? >> It's really about business continuity. Now business continuity planning, we used to be called "disaster recovery planning", right? Is something that organizations are very familiar with. It often has executive sponsorship and a lot of planning has gone into it. The thing is DDoS attacks, which were attacks against availability are in fact a manmade disaster, right? And they interrupt the continuity of business. Same thing with the ransomware, and so from an architectural standpoint, from the standpoint of rolling out new products and services, resiliency and to attack, and the ability to maintain availability and continue with operations in the face of attack is really really key for any organization today which has any kind of significant online presence. And that's really just about all of them. And so from a planning standpoint, it's imperative from an architectural standpoint whether we're talking about things like network infrastructure, or DNS, or software applications. It's important from an operational standpoint. So one of the things that we see for example is that many organizations don't really have a good communications plan. They don't have a good internal communications plan nor do they have a good external communications plan for communicating during an event. And they don't even have really a plan for dealing with an event that is disruptive to business continuity and operations. And so that is really key. Technology is important, but the most important aspect of this is the human factor, understanding the business, understanding the types of risks to the business's ability to execute on its mission and then doing the things from a technological perspective, from an operational perspective, and from a communications perspective to maintain operations, and communications throughout an event and to be able to emerge on the other side of that agenda successfully. >> So Richard you're in threat intelligence, right? Risk assessments. And as you said, you've been around this block for quite some time now. In terms of, I guess getting people's attention that has been accomplished now with obviously some, with some of these high profile cases. But what about that kind of work that you're doing in terms of trying to communicate these very threats to your client base or to prospective clients in terms of identifying their real vulnerabilities within their networks and then having them seriously address these. I mean, what's the difference maybe in the mindset now, as opposed to where maybe that conversation was being had a few years ago? >> I think the biggest difference here is a matter of when and not if. It used to be, you could say, "Oh I'm never going to get hit by ransomware or I'm never going to get DDoS attacked." But that is no longer the case. Roland made a really good point that just about every single business in the world now relies on internet connectivity in order to operate their business. If they don't have that then they're not going to be able to connect with their consumers, their shoppers, if they're a retail, right? If you're a bank, then you have to communicate with your individuals having accounts. And I mean, I have not gone to a physical bank in probably six years. And so that just underscores how important it is to have this internet connectivity. Now, with that comes risk. Not only do you risk the DDoS attacks because you're publicly exposed in an adversary where you can actually find your internet space by doing some forensics, such as network scanning, being able to walk that back like a passive DNS but their historical records use things like showdown to figure out what kind of devices you're running. So there's any number of ways that you can do that. But at the same time you're also exposing yourself to these ransomware operators and really any kind of crime ware operator out there, because they're going to exploit you over the internet. We actually did a case study probably two years ago. Looking at brute forcing on networks and looking at exploitation attempts to figure out like what is the Delta? If you have an online internet presence are you going to get attacked? And the answer was very shocking to us. Yes, you're going to get attacked. And also it's going to be in less than five minutes, from the time a brand new IOT device goes online to the time it starts getting brute force attacked. And within 24 hours you're going to get exploitation attempts from known vulnerabilities or devices that haven't been patched and things like that. And so the reality is not if you're going to get attacked, it's when? And so understanding that is the nature of the threat landscape right now and having this kind of security awareness. Actually another good point that Roland just brought up was that human element. The human element is kind of the linchpin for any security organization. And as part of my master's I had wrote a dissertation about, and I named it as such my professor didn't really care for this, but I said, "The humans are the weakest link." Because in the security posture, that is essentially true. If you don't have the expertise on a team you're not going to be able to get things configured properly. If you don't have the expertise you're not going to be able to respond properly. If you have individuals that aren't concerned about security, now you're going to have a bunch of gaps. Not only that, social engineering is still the number one method that adversaries use to get into organizations and that manipulates the human element. And so having the security awareness in what we do here, on this cube interview, the threat reports, we publish, the blogs that we do, all the threads summaries, all of that goes hand-in-hand with educating the general public and having security awareness pushed out as much as possible to every single person we can. And that's really the key, this preparation, this awareness of what adversaries are doing in order to defend against them. >> So Roland in your mind and you've already walked us through a little bit of this about certain steps and measures. Do you think that could be taken safeguards basically, that everybody should have in the place? What is the optimal scenario from an engineering perspective in terms of trying to prevent these kinds of intrusions, these kinds of attacks in terms of what are those basic pieces, these fundamental pieces as you see it now, understanding as Richard just told us that it's matter of not if, but when? >> Right. So availability, redundancy these have to be core architectural principles whether we're talking about network infrastructure, whether we're talking about important ancillary supporting services like DNS in terms of personnel, in terms of remote access. All of these different elements and many many more have to be designed from the out. All the services in the applications whether they're used internally, whether they are part of service delivery that an organization is doing across the internet, publicly there has to be redundancy and resiliency. There has to be a defense plan in order to defend these assets in these organizations against attack. Whether it's DDoS attack or whether it's a containment plan to deal with a ransomware that potentially gets let loose inside the enterprise network, there has to be a plan to contain it, and deal with it, and restore from backup. These plans have to be continuously updated because IT is not static. There are always noose and nance and changes this organizations provision new services offer new products, move into new markets and new new sub-specializations. And so the plans have to be consistently updated and they have to be rehearsed. You can't have a plan that just exists as pixels on a phosphorous somewhere. The plan has to be executed because you're going to find that there's some scenario, some service, or application, or operational process that needs to be updated or that needs to be included in the plan. And this has to be done regularly. Another key point is that you have to have people who are very skilled and who have both depth and breadth of understanding. And either you bring those people into your organization or you reach out and get that expertise from organizations who do in fact have that kind of expertise on tap and available. >> Well, is, you both certainly exhibit the depth and the breadth to fight this issue(chuckles) I certainly appreciate the time, the insights, and the warning is quite clear. Be prepared, do the hard work upfront. It could save you a lot of headache on the backside. And it is a matter of when and not if, these days. Richard Roland, thanks for being with us here on the Cube >> Thank you so much. >> Thank you so much. It's a pleasure. >> All right, talking about the triple threat of extortion, cyber extortion these days, and DDoS, the distributed denial of service in the growing problem. It is, but there is a way that you can combat it. And you just learned about that (indistinct) NETSCOUT here on the Cube. (upbeat music)
SUMMARY :
And Ronald and good to see you today, sir. Good to see you as well. And Roland, I'm going to let you just set By all means, so Richard- and how ransomware came to be, of challenges that are confronting them. of the organizations to try that have to be done in order and to be able to emerge And as you said, and that manipulates the human element. that everybody should have in the place? And so the plans have to of headache on the backside. Thank you so much. and DDoS, the distributed
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Richard Hummel | PERSON | 0.99+ |
Ronald | PERSON | 0.99+ |
John | PERSON | 0.99+ |
Richard | PERSON | 0.99+ |
Roland Dobbins | PERSON | 0.99+ |
Roland | PERSON | 0.99+ |
John Walls | PERSON | 0.99+ |
2020 | DATE | 0.99+ |
Mandiat | ORGANIZATION | 0.99+ |
Richard Roland | PERSON | 0.99+ |
2021 | DATE | 0.99+ |
NETSCOUT | ORGANIZATION | 0.99+ |
FireEye | ORGANIZATION | 0.99+ |
three | DATE | 0.99+ |
Mandia | ORGANIZATION | 0.99+ |
seven years | QUANTITY | 0.99+ |
first time | QUANTITY | 0.99+ |
six years | QUANTITY | 0.99+ |
Eyesight Partners | ORGANIZATION | 0.99+ |
late 80s | DATE | 0.99+ |
today | DATE | 0.99+ |
two years ago | DATE | 0.99+ |
early 1990s | DATE | 0.99+ |
one | QUANTITY | 0.98+ |
third stage | QUANTITY | 0.98+ |
first | QUANTITY | 0.98+ |
about 80% | QUANTITY | 0.98+ |
four | DATE | 0.98+ |
less than five minutes | QUANTITY | 0.97+ |
24 hours | QUANTITY | 0.97+ |
four years ago | DATE | 0.97+ |
CryptoLocker | TITLE | 0.94+ |
five years ago | DATE | 0.94+ |
one thing | QUANTITY | 0.94+ |
pandemic | EVENT | 0.92+ |
triple | QUANTITY | 0.92+ |
both | QUANTITY | 0.91+ |
1997 | DATE | 0.9+ |
Gameover Zeus | TITLE | 0.89+ |
few years ago | DATE | 0.88+ |
two bang | QUANTITY | 0.87+ |
A-CERT | ORGANIZATION | 0.86+ |
first-line workforce | QUANTITY | 0.82+ |
single | QUANTITY | 0.81+ |
Number two | QUANTITY | 0.8+ |
September of last year | DATE | 0.76+ |
TeslaCrypt | ORGANIZATION | 0.75+ |
Delta | ORGANIZATION | 0.74+ |
Roland | ORGANIZATION | 0.74+ |
double extortion | QUANTITY | 0.7+ |
double tap | QUANTITY | 0.7+ |
couple | QUANTITY | 0.7+ |
Cube | ORGANIZATION | 0.68+ |
single person | QUANTITY | 0.65+ |
CERT | ORGANIZATION | 0.64+ |
TorrentLocker | TITLE | 0.62+ |
around | DATE | 0.62+ |
core topics | QUANTITY | 0.6+ |
CryptoLocker | ORGANIZATION | 0.6+ |
DDoS | OTHER | 0.55+ |
CryptoWall | ORGANIZATION | 0.53+ |
ARPANET | ORGANIZATION | 0.51+ |
two | QUANTITY | 0.49+ |
2021 002 Richard Hummel V1 FOR SLIDE REVIEW
(upbeat music) >> Hey, welcome to this Cube conversation with NetScout. I'm Lisa Martin. Excited to talk to you. Richard Hummel, the manager of threat research for Arbor Networks, the security division of NetScout. Richard, welcome to theCube. >> Thanks for having me, Lisa, it's a pleasure to be here. >> We're going to unpack the sixth NetScout Threat Intelligence Report, which is going to be very interesting. But something I wanted to start with is we know that and yes, you're going to tell us, COVID and the pandemic has had a massive impact on DDoS attacks, ransomware. But before we dig into the report, I'd like to just kind of get some stories from you as we saw last year about this time rapid pivot to work from home, rapid pivot to distance learning. Talk to us about some of the attacks that you saw in particular that literally hit close to home. >> Sure and there's one really good prime example that comes to mind because it impacted a lot of people. There was a lot of media sensation around this but if you go and look, just Google it, Miami Dade County and DDoS, you'll see the first articles that pop up is the entire district school network going down because the students did not want to go to school and launched a DDoS attack. There was something upwards of 190,000 individuals that could no longer connect to the school's platform, whether that's a teacher, a student or parents. And so it had a very significant impact. And when you think about this in terms of the digital world, that impacted very severely, a large number of people and you can't really translate that to what would happen in a physical environment because it just doesn't compute. There's two totally different scenarios to talk about here. >> Amazing that a child can decide, "I don't want to go to school today." And as a result of a pandemic take that out for nearly 200,000 folks. So let's dig into, I said this is the sixth NetScout Threat Intelligence Report. One of the global trends and themes that is seen as evidence in what happened last year is up and to the right. Oftentimes when we're talking about technology, you know, with analyst reports up and to the right is a good thing. Not so in this case. We saw huge increases in threat vectors, more vectors weaponized per attack sophistication, expansion of threats and IOT devices. Walk us through the overall key findings from 2020 that this report discovered. >> Absolutely. And if yo glance at your screen there you'll see the key findings here where we talk about record breaking numbers. And just in 2020, we saw over 10 million attacks, which, I mean, this is a 20% increase over 2019. And what's significant about that number is COVID had a huge impact. In fact, if we go all the way back to the beginning, right around mid March, that's when the pandemic was announced, attacks skyrocketed and they didn't stop. They just kept going up and to the right. And that is true through 2021. So far in the first quarter, typically January, February is the down month that we observe in DDoS attacks. Whether this is, you know, kids going back to school from Christmas break, you have their Christmas routines and e-commerce is slowing down. January, February is typically a slow month. That was not true in 2021. In fact, we hit record numbers on a month by month in both January and February. And so not only do we see 2.9 million attacks in the first quarter of 2021, which, I mean, let's do the math here, right? We've got four quarters, you know, we're on track to hit 12 million attacks potentially, if not more. And then you have this normal where we said 800,000 approximately month over month since the pandemic started, we started 2021 at 950,000 plus. That's up and to the right and it's not slowing down. >> It's not slowing down. It's a trend that it shows, you know, significant impact across every industry. And we're going to talk about that but what are some of the new threat vectors that you saw weaponized in the last year? I mean, you talked about the example of the Miami-Dade school district but what were some of those new vectors that were really weaponized and used to help this up and to the right trend? >> So there's four in particular that we were tracking in 2020 and these nets aren't necessarily new vectors. Typically what happens when an adversary starts using this is there's a proof of concept code out there. In fact, a good example of this would be the RDP over UDP. So, I mean, we're all remotely connected, right? We're doing this over a Zoom call. If I want to connect to my organization I'm going to use some sort of remote capability whether that's a VPN or tunneling in, whatever it might be, right? And so remote desktop is something that everybody's using. And we saw actors start to kind of play around with this in mid 2020. And in right around September, November timeframe we saw a sudden spike. And typically when we see spikes in this kind of activity it's because adversaries are taking proof of concept code, that maybe has been around for a period of time, and they're incorporating those into DDoS for hire services. And so any person that wants to launch a DDoS attack can go into underground forums in marketplaces and they can purchase, maybe it's $10 in Bitcoin, and they can purchase an attack. That leverage is a bunch of different DDoS vectors. And so adversaries have no reason to remove a vector as new ones get discovered. They only have the motivation to add more, right? Because somebody comes into their platform and says, "I want to launch an attack that's going to take out my opponent." It's probably going to look a lot better if there's a lot of attack options in there where I can just go through and start clicking buttons left and right. And so all of a sudden now I've got this complex multi-vector attack that I don't have to pay anything extra for. Adversary already did all the work for me and now I can launch an attack. And so we saw four different vectors that were weaponized in 2020. One of those are notably the Jenkins that you see listed on the screen in the key findings. That one isn't necessarily a DDoS vector. It started out as one, it does amplify, but what happens is Jenkins servers are very vulnerable and when you actually initiate this attack, it tips over the Jenkins server. So it kind of operates as like a DoS event versus DDoS but it still has the same effect of availability, it takes a server offline. And then now just in the first part of 2021 we're tracking multiple other vectors that are starting to be weaponized. And when we see this, we go from a few, you know, incidents or alerts to thousands month over month. And so we're seeing even more vectors added and that's only going to continue to go up into the right. You know that theme that we talked about at the beginning here. >> As more vectors get added, and what did you see last year in terms of industries that may have been more vulnerable? As we talked about the work from home, everyone was dependent, really here we are on Zoom, dependent on Zoom, dependent on Netflix. Streaming media was kind of a lifeline for a lot of us but it also was healthcare and education. Did you see any verticals in particular that really started to see an increase in the exploitation and in the risk? >> Yeah, so let's start, let's separate this into two parts. The last part of the key findings that we had was talking about a group we, or a campaign we call Lazarus Borough Model. So this is a global DDoS extortion campaign. We're going to cover that a little bit more when we talk about kind of extorted events and how that operates but these guys, they started where the money is. And so when they first started targeting industries and this kind of coincides with COVID, so it started several months after the pandemic was announced, they started targeting a financial organizations, commercial banking. They went after stock exchange. Many of you would hear about the New Zealand Stock Exchange that went offline. That's this LBA campaign and these guys taking it off. So they started where the money is. They moved to a financial agation targeting insurance companies. They targeted currency exchange places. And then slowly from there, they started to expand. And in so much as our Arbor Cloud folks actually saw them targeting organizations that are part of vaccine development. And so these guys, they don't care who they hurt. They don't care who they're going after. They're going out there for a payday. And so that's one aspect of the industry targeting that we've seen. The other aspect is you'll see, on the next slide here, we actually saw a bunch of different verticals that we really haven't seen in the top 10 before. In fact, if you actually look at this you'll see the number one, two and three are pretty common for us. We almost always are going to see these kinds of telecommunications, wireless, satellite, broadband, these are always going to be in the top. And the reason for that is because gamers and DDoS attacks associated with gaming is kind of the predominant thing that we see in this landscape. And let's face it, gamers are on broadband operating systems. If you're in Asian communities, often they'll use mobile hotspots. So now you start to have wireless come in there. And so that makes sense seeing them. But what doesn't make sense is this internet publishing and broadcasting and you might say, "Well, what is that?" Well, that's things like Zoom and WebEx and Netflix and these other streaming services. And so we're seeing adversaries going after that because those have become critical to people's way of life. Their entertainment, what they're using to communicate for work and school. So they realized if we can go after this it's going to disrupt something and hopefully we can get some recognition. Maybe we can show this as a demonstration to get more customers on our platform or maybe we can get a payday. In a lot of the DDoS attacks that we see, in fact most of them, are all monetary focused. And so they're looking for a payday. They're going to go after something that's going to likely, you know, send out that payment. And then just walk down the line. You can see COVID through this whole thing. Electronic shopping is number five, right? Everybody turned to e-commerce because we're not going to in-person stores anymore. Electronic computer manufacturing, how many more people have to get computers at home now because they're no longer in a corporate environment? And so you can see how the pandemic has really influenced this industry target. >> Significant influencer and I also wonder too, you know, Zoom became a household name for every generation. You know, we're talking to five generations and maybe the generations that aren't as familiar with computer technology might be even more exploitable because it's easy to click on a phishing email when they don't understand how to look for the link. Let's now unpack the different types of DDoS attacks and what is on the rise. You talked about in the report the triple threat and we often think of that in entertainment. That's a good thing, but again, not here. Explain that triple threat. >> Yeah, so what we're seeing here is we have adversaries out there that are looking to take advantage of every possible angle to be able to get that payment. And everybody knows ransomware is a household name at this point, right? And so ransomware and DDoS have a lot in common because they both attack the availability of network resources, where computers or devices or whatever they might be. And so there's a lot of parallels to draw between the two of these. Now ransomware is a denial of service event, right? You're not going to have tens of thousands of computers hitting a single computer to take it down. You're going to have one exploitation of events. Somebody clicked on a link, there was a brute force attempt that managed to compromise a little boxes, credentials, whatever it might be, ransomware gets put on a system, it encrypts all your files. Well, all of a sudden, you've got this ransom note that says "If you want your files decrypted you're going to send us this amount of human Bitcoin." Well, what adversaries are doing now is they're capitalizing on the access that they already gained. So they already have access to the computer. Well, why not steal all the data first then let's encrypt whatever's there. And so now I can ask for a ransom payment to decrypt the files and I can ask for an extortion to prevent me from posting your data publicly. Maybe there's sensitive corporate information there. Maybe you're a local school system and you have all of your students' data on there. You're a hospital that has sensitive PI on it, whatever it might be, right? So now they're going to extort you to prevent them from posting that publicly. Well, why not add DDoS to this entire picture? Now you're already encrypted, we've already got your files, and I'm going to DDoS your system so you can't even access them if you wanted to. And I'm going to tell you, you have to pay me in order to stop this DDoS attack. And so this is that triple threat and we're seeing multiple different ransomware families. In fact, if you look at one of the slides here, you'll see that there's SunCrypt, there's Ragnar Cryptor, and then Maze did this initially back in September and then more recently, even the DarkSide stuff. I mean, who hasn't heard about DarkSide now with the Colonial Pipeline event, right? So they came out and said, "Hey we didn't intend for this collateral damage but it happened." Well, April 24th, they actually started offering DDoS as part of their tool kits. And so you can see how this has evolved over time. And adversaries are learning from each other and are incorporating this kind of methodology. And here we have triple extortion event. >> It almost seems like triple extortion event as a service with the opportunities, the number of vectors there. And you're right, everyone has heard of the Colonial Pipeline and that's where things like ransomware become a household term, just as much as Zoom and video conferencing and streaming media. Let's talk now about the effects that the threat report saw and uncovered region by region. Were there any regions in particular that were, that really stood out as most impacted? >> So not particularly. So one of the phenomenon that we actually saw in the threat report, which, you know, we probably could have talked about it before now but it makes sense to talk about it regionally because we didn't see any one particular region, one particular vertical, a specific organization, specific country, none was more heavily targeted than another. In fact what we saw is organizations that we've never seen targeted before. We've seen industries that have never been targeted before all of a sudden are now getting DDoS attacks because we went from a local on-prem, I don't need to be connected to the internet, I don't need to have my employees remote access. And now all of a sudden you're dependent on the internet which is really, let's face it, that's critical infrastructure these days. And so now you have all of these additional people with a footprint connected to the internet then adversary can figure out and they can poke it. And so what we saw here is just overall, all industries, all regions saw these upticks. The exception would be in China. We actually, in the Asia Pacific region specifically, but predominantly in China. But that often has to do with visibility rather than a decrease in attacks because they have their own kind of infrastructure in China. Brazil's the same way. They have their own kind of ecosystems. And so often you don't see what happens a lot outside the borders. And so from our perspective, we might see a decrease in attacks but, for all we know, they actually saw an increase in the attacks that is internal to their country against their country. And so across the board, just increases everywhere you look. >> Wow. So let's talk about what organizations can do in light of this. As we are here, we are still doing this program by video conferencing and things are opening up a little bit more, at least in the states anyway, and we're talking about more businesses going back to some degree but there's going to still be some mix, some hybrid of working from home and maybe even distance learning. So what can enterprises do to prepare for this when it happens? Because it sounds to me like with the sophistication, the up and to the right, it's not, if we get attacked, it's when. >> It's when, exactly. And that's just it. I mean, it's no longer something that you can put off. You can't just assume that I've never been DDoS attacked, I'm never going to be DDoS attacked anymore. You really need to consider this as part of your core security platform. I like to talk about defense in depth or a layer defense approach where you want to have a layered approach. So, you know, maybe they target your first layer and they don't get through. Or they do get through and now your second layer has to stop it. Well, if you have no layers or if you have one layer, it's not that hard for an adversary to figure out a way around that. And so preparation is key. Making sure that you have something in place and I'm going to give you an operational example here. One of the things we saw with the LBA campaigns is they actually started doing network of conasense for their targets. And what they would do is they would take the IP addresses belonging to your organization. They would look up the domains associated with that and they would figure out like, "Hey, this is bpn.organization.com or VPN two." And all of a sudden they've found your VPN concentrator and so that's where they're going to focus their attack. So something as simple as changing the way that you name your VPN concentrators might be sufficient to prevent them from hitting that weak link or right sizing the DDoS protection services for your company. Did you need something as big as like OnPrem Solutions? We need hardware. Do you instead want to do a managed service? Or do you want to go and talk to a cloud provider because there's right solutions and right sizes for all types of organizations. And the key here is preparation. In fact, all of the customers that we've worked with for the LBA extortion campaigns, if they were properly prepared they experienced almost no downtime or impact to their business. It's the people like the New Zealand Stock Exchange or their service provider that wasn't prepared to handle the attacks that were sent out them that were crippled. And so preparation is key. The other part is awareness. And that's part of what we do with this threat report because we want to make sure you're aware what adversaries are doing, when new attack vectors are coming out, how they're leveraging these, what industries they're targeting because that's really going to help you to figure out what your posture is, what your risk acceptance is for your organization. And in fact, there's a couple of resources that that we have here on the next slide. And you can go to both both of these. One of them is the threat report. You can view all of the details. And we only scratched the surface here in this Cube interview. So definitely recommend going there but the other one is called Horizon And netscout.com/horizon is a free resource you can register but you can actually see near real-time attacks based on industry and based on region. So if your organization out there and you're figuring, "Well I'm never attacked." Well go look up your industry. Go look up the country where you belong and see is there actually attacks against us? And I think you'll be quite surprised that there's quite a few attacks against you. And so definitely recommend checking these out >> Great resources netscout.com/horizon, netscout.com/threatreport. I do want to ask you one final question. That's in terms of timing. We saw the massive acceleration in digital transformation last year. We've already talked about this a number of times on this program. The dependence that businesses and consumers, like globally in every industry, in every country, have on streaming on communications right now. In terms of timing, though, for an organization to go from being aware to understanding what adversaries are doing, to being prepared, how quickly can an organization get up to speed and help themselves start reducing their risks? >> So I think that with DDoS, as opposed to things like ransomware, the ramp up time for that is much, much faster. There is a finite period of time with DDoS attacks that is actually going to impact you. And so maybe you're a smaller organization and you get DDoS attacked. There's a, probably a pretty high chance that that DDoS attack isn't going to last for multiple days. So maybe it's like an hour, maybe it's two hours, and then you recover. Your network resources are available again. That's not the same for something like ransomware. You get hit with ransomware, unless you pay or you have backups, you have to do the rigorous process of getting all your stuff back online. DDoS is more about as soon as the attack stops, the saturation goes away and you can start to get back online again. So it might not be as like immediate critical that you have to have something but there's also solutions, like a cloud solution, where it's as simple as signing up for the service and having your traffic redirected to their scrubbing center, their detection center. And then you may not have to do anything on-prem yourself, right? It's a matter of going out to an organization, finding a good contract, and then signing up, signing on the dotted line. And so I think that the ramp up time for mitigation services and DDoS protection can be a lot faster than many other security platforms and solutions. >> That's good to know cause with the up and to the right trend that you already said, the first quarter is usually slow. It's obviously not that way as what you've seen in 2021. And we can only expect what way, when we talk to you next year, that the up and to the right trend may continue. So hopefully organizations take advantage of these resources, Richard, that you talked about to be prepared to mediate and protect their you know, their customers, their employees, et cetera. Richard, we thank you for stopping by theCube. Talking to us about the sixth NetScout Threat Intelligence Report. Really interesting information. >> Absolutely; definitely a pleasure to have me here. Lisa, anytime you guys want to do it again, you know where I live? >> Yes. It's one of my favorite topics that you got and I got to point out the last thing, your Guardians of the Galaxy background, one of my favorite movies and it should be noted that on the NetScout website they are considered the Guardians of the Connected World. I just thought that connection was, as Richard told me before we went live, not planned, but I thought that was a great coincidence. Again, Richard, it's been a pleasure talking to you. Thank you for your time. >> Thank you so much. >> Richard Hummel, I'm Lisa Martin. You're watching this Cube conversation. (relaxing music)
SUMMARY :
Excited to talk to you. it's a pleasure to be here. that you saw in particular that that comes to mind because One of the global trends and themes And then you have this normal where and to the right trend? And so any person that wants that really started to see an increase In a lot of the DDoS attacks that we see, and maybe the generations that aren't And so there's a lot of parallels to draw effects that the threat report But that often has to do with visibility but there's going to still be some mix, and I'm going to give you to understanding what that is actually going to impact you. that the up and to the a pleasure to have me here. and I got to point out the last thing, You're watching this Cube conversation.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Richard | PERSON | 0.99+ |
Richard Hummel | PERSON | 0.99+ |
Lisa Martin | PERSON | 0.99+ |
two hours | QUANTITY | 0.99+ |
2020 | DATE | 0.99+ |
$10 | QUANTITY | 0.99+ |
China | LOCATION | 0.99+ |
New Zealand Stock Exchange | ORGANIZATION | 0.99+ |
April 24th | DATE | 0.99+ |
New Zealand Stock Exchange | ORGANIZATION | 0.99+ |
20% | QUANTITY | 0.99+ |
September | DATE | 0.99+ |
two | QUANTITY | 0.99+ |
2021 | DATE | 0.99+ |
Lisa | PERSON | 0.99+ |
second layer | QUANTITY | 0.99+ |
last year | DATE | 0.99+ |
mid 2020 | DATE | 0.99+ |
February | DATE | 0.99+ |
NetScout | ORGANIZATION | 0.99+ |
first layer | QUANTITY | 0.99+ |
Guardians of the Galaxy | TITLE | 0.99+ |
January | DATE | 0.99+ |
bpn.organization.com | OTHER | 0.99+ |
next year | DATE | 0.99+ |
one layer | QUANTITY | 0.99+ |
800,000 | QUANTITY | 0.99+ |
last year | DATE | 0.99+ |
12 million attacks | QUANTITY | 0.99+ |
both | QUANTITY | 0.99+ |
Colonial Pipeline | EVENT | 0.99+ |
190,000 individuals | QUANTITY | 0.99+ |
four | QUANTITY | 0.99+ |
an hour | QUANTITY | 0.99+ |
One | QUANTITY | 0.99+ |
netscout.com/horizon | OTHER | 0.99+ |
first articles | QUANTITY | 0.99+ |
Netflix | ORGANIZATION | 0.99+ |
Zoom | ORGANIZATION | 0.99+ |
one | QUANTITY | 0.99+ |
Guardians of the Connected World | TITLE | 0.99+ |
one final question | QUANTITY | 0.99+ |
two parts | QUANTITY | 0.98+ |
2.9 million attacks | QUANTITY | 0.98+ |
over 10 million attacks | QUANTITY | 0.98+ |
Arbor Networks | ORGANIZATION | 0.98+ |
one aspect | QUANTITY | 0.98+ |
pandemic | EVENT | 0.98+ |
2019 | DATE | 0.98+ |
five generations | QUANTITY | 0.97+ |
three | QUANTITY | 0.97+ |
tens of thousands | QUANTITY | 0.97+ |
first | QUANTITY | 0.96+ |
Ragnar Cryptor | PERSON | 0.96+ |
first quarter of 2021 | DATE | 0.96+ |
four quarters | QUANTITY | 0.95+ |
ORGANIZATION | 0.95+ | |
nearly 200,000 folks | QUANTITY | 0.95+ |
Richard Hartmann, Grafana Labs | KubeCon + CloudNativeCon Europe 2021 - Virtual
>>from around the >>globe. It's the >>cube with coverage of Kublai >>Khan and Cloud Native Con Europe 2021 >>virtual brought to >>you by red hat, the cloud native computing foundation and ecosystem partners. Hello, welcome back to the cubes coverage of coupon 21 Cloud Native Con 21 Virtual, I'm John Ferrier Host of the Cube. We're here with a great gas to break down one of the hottest trends going on in the industry and certainly around cloud native as this new modern architecture is evolving so fast. Richard Hartman, director of community at Griffon, a lab's involved with Prometheus as well um, expert and fun to have on and also is going to share a lot here. Richard, thanks for coming. I appreciate it. >>Thank you >>know, we were chatting before we came on camera about the human's ability to to handle all this new shift uh and the and the future of observe ability is what everyone has been talking about. But you know, some say the reserve abilities, just network management was just different, you know, scale Okay, I can buy that, but it's got a lot more than that. It involves data involves a new architecture, new levels of scale that cloud native has brought to the table that everyone is agreeing on. It scales their new capabilities, thus setting up new architectures, new expectations and new experiences are all happening. Take us through the future of observe ability. >>Mhm. Yes, so um 11 of the things which many people find when they onboard themselves onto the cloud native space is um you can scale along different and new axis, which you couldn't scale along before, uh which is great. Of course, it enables growth, it enables different operating models, it enables you to choose different or more modern engineering trade offs, like the underlying problems are still the same, but you just slice and dice your problems and compartmentalize your services differently. But the problem is um it becomes more spread out and the more classic tooling tends to be built for those more classic um setups and architectures as your architecture becomes more malleable and as you can can choose and pick how to grow it along with which access a lot more directly and you have to um that limits the ability of the humans actually operating that system to understand what is truly going on. Um Obviously everyone is is fully fully all in on A. I. M. L. And all those things. But one of the dirty secrets is you will keep needing domain specific experts who know what they're doing and what that thing should look like, what should be working hard to be working. But enable those people to actually to actually understand the current state of the system and compare this to the desired state of the system. Is highly nontrivial in particular, once you have not machine lifetimes of month or years which he had before, which came down to two sometimes hours and when you go to Microsoft to surveillance and such sometimes even into sub seconds. So a lot of this is about enabling this, this this higher volume of data, this higher scale of data, this higher cardinality of what what you actually attach as metadata on your data and then still be able to carry all this and makes sense of it at scale and at speed because if you just toss it into a data lake and do better analysis like half a day later no one cares about it anymore. It needs to be life it needs or at least the largest part of it needs to be life. You need to be able to alert right now if something is imminently customer facing. >>Well, that's awesome. I love totally agree this new observe ability horizontally scalable, more surface area, more axes, as you point out, changes the data equation on the automation plays a big role in mention machine learning and ai great, great grounds for that. I gotta ask you just well before we move on to the next topic around this is that the most people that come from the old world with the tooling and come from that old school vendor mentality or old soup architecture, old school architecture tend to kind of throw stones at the future and say, well the economics are all wrong and the performance metrics. So I want to ask you so I assume that we believe we do believe because assume that's going to happen. What is the economic picture? What's the impact that people are missing? When you look at the benefits of what this system is going to enable the impact? Specifically whether it's economics, productivity, efficient code, what are some of the things that maybe the VCS or other people in the naysayers side? Old school will, will throw stones at what's the, what's the big upside here? >>Mhm. So this will not be true for everyone and there will still be certain situations where it makes sense to choose different sets of of trade offs, but most everyone will be moving into the cloud for for convenience and speed reasons. And I'm deliberately not saying cost reasons. Um the reason being um usually or in the past you had simply different standard service delineations and all of the proserve, the consulting your hiring pool was all aligned with this old type of service delineation, which used to be a physical machine or a service or maybe even a service and you had a hot standby or something. If we, if we got like really a hugely respect from the same things still need to operate under laying what you do. But as we grow as an industry, more of more of this is commoditized and same as we commoditize service and storage network. We commoditized actually running off that machine and with service and such go even further. Um so it's not so much about about this fundamentally changing how it's built. It's just that a larger or a previously thing which was part of your value at and of what you did in your core is now just off the shelf infrastructure which you just by as much as you need again at certain scales and for certain specific use cases, this will not be true for the foreseeable future, but most everyone um will be moving there simply because where they actually add value and the people they can hire for and who are interested in that type of problem. I just mean that it's a lot more more sensical to to choose this different delineation but it's not cheaper >>and the commoditization and disintermediation is definitely happening, totally agree. And the complexity that's gonna be abstracted away with software is novell and it's also systematic. There's just it's new and there's some systems involved, so great insight there. I totally agree with you. The disruption is happening majority of almost all areas, so in all verticals and all industries, so so great point. I think this is where I think everyone's so excited and some people are paranoid actually frankly, but we cover that in depth on the Cuban other segments. But great point. We'll get back to what you're where you're spending your time right now. Um You're spending a lot of time on open metrics. What is that enabling take us through that? >>So um the super quick history of Prometheus, of course, we need that for open metrics. Promises was actually created in 2012. Um and the wire format which he used to in the exposition format, which he used to transport metrics into Prometheus is stable since 2014. Um But there is a large problem here. Um It carries the promise his name and a lot of competing projects and a lot of competing vendors of course there are vendors which compete with just the project. Um It's simply refused to to to take anything in which carried the promise his name. Of course, this doesn't align with their food um strategy, which they ran back then. So um together with scenes, the f we decided to just have a new different name for just that wire format for the underlying data model for everything which you need to make one complete exposition or a bunch of expositions towards towards permissions. So that's it at the corn, that's been ongoing since 2000 and 15 16 something. Um But there's also changes on the one hand, there is a super careful, a super super careful um Clean up and backwards compatible cleanup of a few things which the permit this exposition former serious here for didn't get right. But also we enable two features within this and as permitted chose open metrics as its official format. We also uplift committees and varying both heads. Obviously it's easier to get the synchronization. Um Ex employers stand out which is a completely new, at least outside of certain large search companies google. Um Who who used who use ex employers to do something different with with their traces. Um it was in 2017 when they told me that for them searching for traces didn't scale by labels. Uh and at that point I wanted to have both. I wanted to have traces and logs also with the same label set as permitting system. But when they tell you searching doesn't scale like they tell you you better listen. So uh the thing is this you have your index where you store all your data or your where you have the reference to enter your database and you have these label sets and they are super efficient and and quite powerful when compared to more traditional systems but they still carry a cost and that cost becomes non trivial at scale. So instead of storing the same labels for your metrics and your logs and your traces, the idea is to just store an I. D. For your trace which is super lightweight and it's literally just one idea. So your index is super tiny. Um And then you touch this information to your logs to your metrics and in the meantime also two year to year logs. Um So you know already that trace has certain properties because historically you have this needle estate problem. You have endless amounts of traces and you need to figure out what are the useful are they are the judicial and interesting aero state highlight and see some error occurring whatever if that information is already attached to your other signals. That's a lot easier. Of course. You see you're highlighting see bucket and you see a trace ID which is for that high latency bucket. So going into that trace, I already know it is a highlight and see trace for for a service which has a high latency, it has visited that labor. It was running this in that context, blah blah blah blah blah. Same for logs. There is an error. There is an exception, maybe a security breach, what have you and I can jump directly into a trace and I have all this mental context and the most expensive part is the humans. So enabling that human to not need to break mental uh train of thought to just jump directly from all the established state which they already have here in debugging just right into the trace, went back and just see why that thing behave that way. It's super powerful and it's also a lot cheaper to store this on the back and a four year traces which in our case internally we just run at 100% something. We do not throw data way, which means you don't have the super interesting thing. And by the way the trace just doesn't exist for us a good job. And that's the one thing to to from day one this intent to to marry those three pillars more closely. The other thing is by having a true lingua franca. It gave that concept of of of promises compatibility on the wire, its own name and it's its own distinct concept. And that is something which a lot of people simply attached to. So just by having that name, allow the completely different conversation over the last half decade or so and to close >>them close it >>up and to close that point because I come from the network, from the networking space and, and basically I T f r f C s are the currency within the networking space and how you force your vendors to support something, which is why I brought open metrics into the I. D. F. To to give it an official stamp of approval in Rfc number which is currently hopefully successful. Um So all of a sudden you can slip this into your tender and just tell your vendor, ex wife said okay, you need to support this. But I've seen all of a sudden by contract they're bound to to support communities native. So >>I support that Rfc yet or no, is that still coming? >>I, so at the last uh TF meeting, which was virtual, obviously I presented everything to the L. A W G. Um there was very good feedback. Um they want to adopt it as an informational uh I. D. Reason being it is most or it is a documentation of an already widely existed standard. So it gets different bits and pieces in the heather. Um Currently I'm waiting for a few rounds of feedback on specific wording how to make it more clear and such. Um looking >>good. It's looking good. >>Oh yes while presenting it. They actually told me that I have a conference with promises and performance. Well >>that's how you get things done in the old school internet. That's the way it was talking to Vince serving all of my friends and that generation we grew up, I mean I was telling a story on the clubhouse, just random that I grew up in the era. We used to pirate software used to deal software back in the old days. Pre open source. This is how things get done. So I gotta ask you the impact question. The, the deal with open metrics potentially could disrupt all those startups. So what, how does this impact all these stars because everyone is jockeying for land grabbing the observe ability space? Is that just because it's just too many people competing for one spot or do they all have differentiation? What happens to all those observe ability startups that got minted and funded? >>So I have, I think we have to split this into two answers, the first one open metrics and also Prometheus we're trying really hard to standardize what we're doing and to make this reusable as much as we possibly can um simply because premises itself does not have any any profit motivation or anything, it is just a project run by people. Um so we gain by, by users using our stuff and working in the way, which we think is a good way to operate. So anyone who just supports all those open standards, just on boards themselves onto a huge ecosystem of already installed base. And we're talking millions and millions and millions of installations, we don't have hard numbers, but the millions and millions I am certain of and thats installations, not users, so that's several orders of magnitude more. Um, so that that actually enables an ecosystem within which to move as to the second question. It is a super hot topic. So obviously that we see money starts coming in from all right. Um, I don't think that everyone will survive, but that is just how it usually is. There is a lot of of not very differentiated offerings, be the software, be they as a service, be their distributions? Well, you don't really see much much value and not not a lot of, not a lot of much anything in ways of innovation. So this is more about about making it easier to run or or taking that pain away, which obviously makes you open to attack by by all the hyper scale. Of course, they can just do this at a higher scale than you. Um, so unless you actually really in a way in that space and actually shape and lead in that space, at least to some extent, it will probably be relatively hard. That being said. >>Yeah, when you ride, when you ride the big waves like this, I mean, you you got to be on the right side of this. Uh, Pat Gelsinger's when he was that VM Where now is that intel told me on the cube one time. If you're not, you don't get it right on these waves, your driftwood, Right? So, so, you know, and we've seen this movie before, when you start to see the standards bodies like the I E T. F. Start to look at standards. You start to think there's a broader market opportunities, a need for some standards, which is good. It enables more value, right value creation, whether it's out in the open or if it's innovative from a commercialization standpoint, you know, these are good things and then you have everyone who's jockeying around from the land grab incomes, a standard momentum, you gotta be on the right side of these things. We know what we know it's gonna look like. If you're not on the right side of the standard, then your proprietary, >>precisely. >>And so that's the endgame. Okay, well, I really appreciate the impact. Final question. Um, as the world evolved post Covid as cloud Native goes mainstream, the enterprises in the cloud scale are demanding more things. Enterprises are are, you know, they want more stuff than just straight up in the cloud startups, for instance. So you start to see, you know, faster, more agility obviously, uh, with deploying modern apps, when you start getting into enterprise grade scale, you gotta start thinking, you know, this is an engineering and computer science discipline. Coming together, you've got to look at the architecture. What's your future vision of how the next gen programmable infrastructure looks like? >>You mean, as in actually manage those services or limited to observe ability to >>observe ability, role, observe ability. Just you're in the urine. The survivability speaks to the operating system of what's going on, distributed computing you're looking at, you gotta have a good observe ability if you want to deploy services. So, you know, as it evolves and this is not a fringe thing anymore. This is real deal. This observe abilities a key linchpin in the architecture. >>So, um, maybe to approach us from two sides. One of the things which, which, I mean I come from very much non cloud native background. One of the things which tends to be overlooked in cloud native is that not everything is green field. Matter of fact, legacy is the code word for makes actual money. Um, so a lot of brownfield installations, which still make money, which we keep making money and all of those existence, they will not go away anytime soon. And as soon as you go to actually industry trying to uplift themselves to industry that foreign, all those passwords you get a lot more complexity in, in just the availability of systems than just the cloud native scheme. So being able to to actually put all of those data types together and not just have you. Okay, nice. I have my micro service events fully instrumented and if anything happens on the layer below, I'm simply unable to make any any effort on debugging um things like for example, Prometheus course they are so widely adopted enable you to literally, and I did this myself um from the Diesel Genset of your data center over the network down to down to the office. If if someone is in there, if if if your station and your pager is is uh stepped in such to the database to the extra service which is facing your end customers, all of those use the same labels that use the same metadata to actually talk about this. So all of a sudden I can really drill down into my data, not only from you. Okay. I have my microservices, my database. Big deal. No, I can actually go down as deep in my infrastructure as my infrastructure is. And this is especially important for anyone who's from the more traditional enterprise because most of them will for the foreseeable future have tons and tons and tons of those installations and the ability to just marry all this data together no matter where it's coming from. Of course you have this lingual franklin, you have these widely adopted open standards. I think that is one of the main drivers in >>jail. I think you just nailed the hybrid and surprised use case, you know, operation at scale and integrating the systems. So great job Richard, thank you so much for coming on. Richard Hartman, Director of community Griffon A labs. I'm talking, observe ability here on the cube. I'm john for your host covering cube con 21 cognitive content. One virtual. Thanks for watching. Mhm Yeah. Mhm.
SUMMARY :
It's the 21 Virtual, I'm John Ferrier Host of the Cube. But you know, some say the reserve abilities, just network management was just different, like the underlying problems are still the same, but you just slice and dice your problems and compartmentalize So I want to ask you so I assume that we believe we do believe because assume that's at and of what you did in your core is now just off the shelf infrastructure And the complexity that's gonna be abstracted away with software is novell and it's also systematic. We do not throw data way, which means you don't have the super interesting of a sudden you can slip this into your tender and just tell your vendor, ex wife said okay, I, so at the last uh TF meeting, which was virtual, It's looking good. have a conference with promises and performance. So I gotta ask you the impact question. or or taking that pain away, which obviously makes you open to attack by and we've seen this movie before, when you start to see the standards bodies like the I E T. F. So you start to see, you know, faster, more agility obviously, uh, with deploying modern apps, So, you know, as it evolves and this is not a fringe thing anymore. One of the things which tends to be overlooked in cloud native is that not everything is green field. I think you just nailed the hybrid and surprised use case, you know, operation at scale
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Richard | PERSON | 0.99+ |
Richard Hartman | PERSON | 0.99+ |
John Ferrier | PERSON | 0.99+ |
2017 | DATE | 0.99+ |
2012 | DATE | 0.99+ |
Microsoft | ORGANIZATION | 0.99+ |
second question | QUANTITY | 0.99+ |
100% | QUANTITY | 0.99+ |
Richard Hartmann | PERSON | 0.99+ |
One | QUANTITY | 0.99+ |
11 | QUANTITY | 0.99+ |
two | QUANTITY | 0.99+ |
millions | QUANTITY | 0.99+ |
two sides | QUANTITY | 0.99+ |
one spot | QUANTITY | 0.99+ |
Prometheus | TITLE | 0.99+ |
Vince | PERSON | 0.99+ |
2014 | DATE | 0.99+ |
two answers | QUANTITY | 0.99+ |
Grafana Labs | ORGANIZATION | 0.99+ |
Pat Gelsinger | PERSON | 0.99+ |
four year | QUANTITY | 0.99+ |
2000 | DATE | 0.99+ |
KubeCon | EVENT | 0.99+ |
one idea | QUANTITY | 0.99+ |
two features | QUANTITY | 0.99+ |
three pillars | QUANTITY | 0.98+ |
two year | QUANTITY | 0.98+ |
both | QUANTITY | 0.98+ |
ORGANIZATION | 0.97+ | |
one | QUANTITY | 0.97+ |
one thing | QUANTITY | 0.96+ |
first one | QUANTITY | 0.96+ |
Griffon | ORGANIZATION | 0.95+ |
half | DATE | 0.95+ |
one time | QUANTITY | 0.94+ |
15 | DATE | 0.93+ |
both heads | QUANTITY | 0.93+ |
day one | QUANTITY | 0.9+ |
Griffon A labs | ORGANIZATION | 0.87+ |
CloudNativeCon Europe 2021 | EVENT | 0.86+ |
Cloud Native Con | EVENT | 0.84+ |
last half decade | DATE | 0.82+ |
Cuban | OTHER | 0.81+ |
Cloud Native Con Europe | EVENT | 0.81+ |
red hat | ORGANIZATION | 0.79+ |
Covid | TITLE | 0.77+ |
tons | QUANTITY | 0.76+ |
too many people | QUANTITY | 0.76+ |
a day later | DATE | 0.74+ |
john | PERSON | 0.73+ |
con 21 | COMMERCIAL_ITEM | 0.71+ |
21 Virtual | COMMERCIAL_ITEM | 0.7+ |
L. A W | ORGANIZATION | 0.7+ |
Kublai | PERSON | 0.68+ |
intel | ORGANIZATION | 0.65+ |
VCS | ORGANIZATION | 0.65+ |
16 | DATE | 0.63+ |
Rfc | ORGANIZATION | 0.54+ |
franklin | ORGANIZATION | 0.53+ |
Khan | PERSON | 0.47+ |
2021 | DATE | 0.47+ |
21 | COMMERCIAL_ITEM | 0.34+ |
Fernando Brandao, AWS & Richard Moulds, AWS Quantum Computing | AWS re:Invent 2020
>>From around the globe. It's the cube with digital coverage of AWS reinvent 2020, sponsored by Intel and AWS. >>Welcome back to the queue. It's virtual coverage of Avis reinvent 2020 I'm John furry, your host. Um, this is a cute virtual we're here. Not in, in remote. We're not in person this year, so we're doing the remote interviews. And then this segment is going to build on the quantum conversation we had last year, Richard moles, general manager of Amazon bracket and aid was quantum computing and Fernando Brandao head of quantum algorithms at AWS and Brent professor of theoretical physics at Caltech. Fernando, thanks for coming on, Richard. Thanks for joining us. >>You're welcome to be here. >>So, Fernando, first of all, love your title, quantum algorithms. That's the coolest title I've heard so far and you're pretty smart because you're a theoretical professor of physics at Caltech. So, um, which I'd never be able to get into, but I wish I could get into there someday, but, uh, thanks for coming on. Um, quantum has been quite the rage and you know, there's a lot of people talking about it. Um, it's not ready for prime time. Some say it's moving faster than others, but where are we on quantum right now? What are, what are you, what are you seeing Fernanda where the quantum, where are peg us in the evolution of, of, uh, where we are? >>Um, yeah, what quantum, uh, it's an emerging and rapidly developing fields. Uh, but we are see where are you on, uh, both in terms of, uh, hardware development and in terms of identifying the most impactful use cases of one company. Uh, so, so it's, it's, it's early days for everyone and, and we have like, uh, different players and different technologies that are being sport. And I think it's, it's, it's early, but it's exciting time to be doing quantum computing. And, uh, and it's very interesting to see the interest in industry growing and, and customers. Uh, for example, Casa from AWS, uh, being, uh, being willing to take part in this journey with us in developmental technology. >>Awesome. Richard, last year we talked to bill Vass about this and he was, you know, he set expectations really well, I thought, but it was pretty much in classic Amazonian way. You know, it makes the announcement a lot of progress then makes me give us the update on your end. You guys now are shipping brackets available. What's the update on your end and Verner mentioned in his keynote this week >> as well. Yeah, it was a, it was great until I was really looking at your interview with bill. It was, uh, that was when we launched the launch the service a year ago, almost exactly a year ago this week. And we've come a long way. So as you mentioned, we've, uh, we've, uh, we've gone to general availability with the service now that that happened in August. So now a customer can kind of look into the, uh, to the bracket console and, uh, installed programming concept computers. You know, there's, uh, there's tremendous excitement obviously, as, as you mentioned, and Fernando mentioned, you know, quantum computers, uh, we think >>Have the potential to solve problems that are currently, uh, uh, unsolvable. Um, the goal of bracket is to fundamentally give customers the ability to, uh, to go test, uh, some of those notions to explore the technology and to just start planning for the future. You know, our goal was always to try and solve some of the problems that customers have had for, you know, gee, a decade or so now, you know, they tell us from a variety of different industries, whether it's drug discovery or financial services, whether it's energy or there's chemical engineering, machine learning, you know, th the potential for quantum computer impacts may industries could potentially be disruptive to those industries. And, uh, it's, it's essential that customers can can plan for the future, you know, build their own internal resources, become experts, hire the right staff, figure out where it might impact their business and, uh, and potentially disrupt. >>So, uh, you know, in the past they're finding it hard to, to get involved. You know, these machines are very different, different technologies building in different ways of different characteristics. Uh, the tooling is very disparate, very fragmented. Historically, it's hard for companies to get access to the machines. These tend to be, you know, owned by startups or in, you know, physics labs or universities, very difficult to get access to these things, very different commercial models. Um, and, uh, as you, as you suggested, a lot of interests, a lot of hype, a lot of claims in the industry, customers want to cut through all that. They want to understand what's real, uh, what they can do today, uh, how they can experiment and, uh, and get started. So, you know, we see bracket as a catalyst for innovation. We want to bring together end-users, um, consultants, uh, software developers, um, providers that want to host services on top of bracket, try and get the industry, you know, rubbing along them. You spoke to lots of Amazonians. I'm sure you've heard the phrase innovation flywheel, plenty of times. Um, we see the same approach that we've used successfully in IOT and robotics and machine learning and apply that same approach to content, machine learning software, to quantum computing, and to learn, to bring it together. And, uh, if we get the tooling right, and we make it easy, um, then we don't see any reason why we can't, uh, you know, rapidly try and move this industry forward. And >>It was fun areas where there's a lot of, you know, intellectual computer science, um, technology science involved in super exciting. And Amazon's supposed to some of that undifferentiated heavy. >>That's what I am, you know, it's like, >>There's a Maslow hierarchy of needs in the tech industry. You know, people say, Oh, why five people freak out when there's no wifi? You know, you can't get enough compute. Right. So, you know, um, compute is one of those things with machine learning is seeing the benefits and quantum there's so much benefits there. Um, and you guys made some announcements at, at re-invent, uh, around BRACA. Can you share just quickly share some of those updates, Richard? >>Sure. I mean, it's the way we innovate at AWS. You know, we, we start simple and we, and we build up features. We listen to customers and we learn as we go along, we try and move as quickly as possible. So since going public in, uh, in, in August, we've actually had a string of releases, uh, pretty consistent, um, delivering new features. So we try to tie not the integration with the platform. Customers have told us really very early on that they, they don't just want to play with the technology. They want to figure out how to, how to envisage a production quantum computing service, how it might look, you know, in the context of a broad cloud platform with AWS. So we've, uh, we launched some integration with, uh, other AWS capabilities around security, managing limits, quotas, tagging resources, that type of thing, things that are familiar to, uh, to, to, to current AWS users. >>Uh, we launched some new hardware. Uh, all of our partners D-Wave launched some, uh, uh, you know, a 5,000 cubit machine, uh, just in September. Uh, so we made that available on bracket the same day that they launched that hardware, which was very cool. Um, you know, we've made it, uh, we've, we've made it easier for researchers. We've been, you know, impressed how many academics and researchers have used the service, not just large corporations. Um, they want to have really deep access to these machines. They want to program these things at a low level. So we launched some features, uh, to enable them to do their research, but reinvent, we were really focused on two things, um, simulators and making it much easier to use, uh, hybrid systems systems that, uh, incorporate classical compute, traditional digital computing with quantum machinery, um, in the vein that follow some of the liens that we've seen, uh, in machine learning. >>So, uh, simulators are important. They're a very important part of, uh, learning how to use concepts, computers. They're always available 24, seven they're super convenient to use. And of course they're critical in verifying the accuracy of the results that we get from quantum hardware. When we launched the service behind free simulator for customers to help debug their circuits and experiments quickly, um, but simulating large experiments and large systems is a real challenge on classical computers. You know, it, wasn't hard on classical. Uh, then you wouldn't need a quantum computer. That's the whole point. So running large simulations, you know, is expensive in terms of resources. It's complicated. Uh, we launched a pretty powerful simulator, uh, back in August, which we thought at the time was always powerful managed. Quantum stimulates circuit handled 34 cubits, and it reinvented last week, we launched a new simulator, which actually the first managed simulator to use tensor network technology. >>And it can run up to 50 cubits. So we think is, we think is probably the most powerful, uh, managed quantum simulator on the market today. And customers can flip easily between either using real quantum hardware or either of our, uh, stimulators just by changing a line of code. Um, the other thing we launched was the ability to run these hybrid systems. You know, quantum computers will get more, no don't get onto in a moment is, uh, today's computers are very imperfect, you know, lots of errors. Um, we working, obviously the industry towards fault-tolerant machines and Fernando can talk about some research papers that were published in that area, but right now the machines are far from perfect. And, uh, and the way that we can try to squeeze as much value out of these devices today is to run them in tandem with classical systems. >>We think of the notion of a self-learning quantum algorithm, where you use a classical optimization techniques, such as we see machine learning to tweak and tune the parameters of a quantum algorithm to try and iterate and converge on the best answer and try and overcome some of these issues surrounding errors. That's a lot of moving parts to orchestrate for customers, a lot of different systems, a lot of different programming techniques. And we wanted to make that much easier. We've been impressed with a, a, an open projects, been around for a couple of years, uh, called penny lane after the Beatles song. And, um, so we wanted to double down on that. We were getting a lot of positive feedback from customers about the penny lane talk it, so we decided to, uh, uh, make it a first class citizen on bracket, make it available as a native feature, uh, in our, uh, in our Jupiter notebooks and our tutorials learning examples, um, that open source project has very similar, um, guiding principles that we do, you know, it's open, it's cross platform, it's technology agnostic, and we thought he was a great fit to the service. >>So we, uh, we announced that and made it available to customers and, uh, and, and, uh, already getting great feedback. So, uh, you know, finishing the finishing the year strongly, I think, um, looking forward to 2021, you know, looking forward to some really cool technology it's on the horizon, uh, from a hardware point of view, making it easy to use, um, you know, and always, obviously trying to work back from customer problems. And so congratulations on the success. I'm sure it's not hard to hire people interested, at least finding qualified people it'd be different, but, you know, sign me up. I love quantum great people, Fernando real quick, understanding the relationship with Caltech unique to Amazon. Um, tell us how that fits into the, into this, >>Uh, right. John S no, as I was saying, it's it's early days, uh, for, for quantum computing, uh, and to make progress, uh, in abreast, uh, put together a team of experts, right. To work both on, on find new use cases of quantum computing and also, uh, building more powerful, uh, quantum hardware. Uh, so the AWS center for quantum computing is based at Caltech. Uh, and, and this comes from the belief of AWS that, uh, in quantum computing is key to, uh, to keep close, to stay close of like fresh ideas and to the latest scientific developments. Right. And Caltech is if you're near one computing. So what's the ideal place for doing that? Uh, so in the center, we, we put together researchers and engineers, uh, from computer science, physics, and other subjects, uh, from Amazon, but also from all the academic institutions, uh, of course some context, but we also have Stanford and university of Chicago, uh, among others. So we broke wrongs, uh, in the beauty for AWS and for quantum computer in the summer, uh, and under construction right now. Uh, but, uh, as we speak, John, the team is busy, uh, uh, you know, getting stuff in, in temporary lab space that we have at cottage. >>Awesome. Great. And real quick, I know we've got some time pressure here, but you published some new research, give a quick a plug for the new research. Tell us about that. >>Um, right. So, so, you know, as part of the effort or the integration for one company, uh, we are developing a new cubix, uh, which we choose a combination of acoustic and electric components. So this kind of hybrid Aquacel execute, it has the promise for a much smaller footprint, think about like a few microliters and much longer storage times, like up to settlements, uh, which, which is a big improvement over the scale of the arts sort of writing all export based cubits, but that's not the whole story, right? On six, if you have a good security should make good use of it. Uh, so what we did in this paper, they were just put out, uh, is, is a proposal for an architecture of how to build a scalable quantum computer using these cubits. So we found from our analysis that we can get more than a 10 X overheads in the resources required from URI, a universal thought around quantum computer. >>Uh, so what are these resources? This is like a smaller number of physical cubits. Uh, this is a smaller footprint is, uh, fewer control lines in like a smaller approach and a consistent, right. And, and these are all like, uh, I think this is a solid contribution. Uh, no, it's a theoretical analysis, right? So, so the, uh, the experimental development has to come, but I think this is a solid contribution in the big challenge of scaling up this quantum systems. Uh, so, so, so John, as we speak like, uh, data blessed in the, for quantum computing is, uh, working on the experimental development of this, uh, a highly adequacy architecture, but we also keep exploring other promising ways of doing scalable quantum computers and eventually, uh, to bring a more powerful computer resources to AWS customers. >>It's kind of like machine learning and data science, the smartest people work on it. Then you democratize that. I can see where this is going. Um, Richard real quick, um, for people who want to get involved and participate or consume, what do they do? Give us the playbook real quick. Uh, so simple, just go to the AWS console and kind of log onto the, to the bracket, uh, bracket console, jump in, you know, uh, create, um, create a Jupiter notebook, pull down some of our sample, uh, applications run through the notebook and program a quantum computer. It's literally that simple. There's plenty of tutorials. It's easy to get started, you know, classic cloud style right now from commitment. Jump in, start simple, get going. We want you to go quantum. You can't go back, go quantum. You can't go back to regular computing. I think people will be running concert classical systems in parallel for quite some time. So yeah, this is the, this is definitely not a one way door. You know, you go explore quantum computing and see how it fits into, uh, >>You know, into the, into solving some of the problems that you wanted to solve in the future. But definitely this is not a replacement technology. This is a complimentary technology. >>It's great. It's a great innovation. It's kind of intoxicating technically to get, think about the benefits Fernando, Richard, thanks for coming on. It's really exciting. I'm looking forward to keeping up keeping track of the progress. Thanks for coming on the cube coverage of reinvent, quantum computing going the next level coexisting building on top of the shoulders of other giant technologies. This is where the computing wave is going. It's different. It's impacting people's lives. This is the cube coverage of re-invent. Thanks for watching.
SUMMARY :
It's the cube with digital coverage of AWS And then this segment is going to build on the quantum conversation we had last Um, quantum has been quite the rage and you know, Uh, but we are see where are you on, uh, both in terms of, uh, hardware development and Richard, last year we talked to bill Vass about this and he was, you know, he set expectations really well, there's, uh, there's tremendous excitement obviously, as, as you mentioned, and Fernando mentioned, Have the potential to solve problems that are currently, uh, uh, unsolvable. So, uh, you know, in the past they're finding it hard to, to get involved. It was fun areas where there's a lot of, you know, intellectual computer science, So, you know, um, compute is one of those things how it might look, you know, in the context of a broad cloud platform with AWS. uh, uh, you know, a 5,000 cubit machine, uh, just in September. So running large simulations, you know, is expensive in terms of resources. And, uh, and the way that we can try to you know, it's open, it's cross platform, it's technology agnostic, and we thought he was a great fit to So, uh, you know, finishing the finishing the year strongly, but also from all the academic institutions, uh, of course some context, but we also have Stanford And real quick, I know we've got some time pressure here, but you published some new research, uh, we are developing a new cubix, uh, which we choose a combination of acoustic So, so the, uh, the experimental development has to come, to the bracket, uh, bracket console, jump in, you know, uh, create, You know, into the, into solving some of the problems that you wanted to solve in the future. It's kind of intoxicating technically to get, think about the benefits Fernando,
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Fernando Brandao | PERSON | 0.99+ |
AWS | ORGANIZATION | 0.99+ |
Richard | PERSON | 0.99+ |
Caltech | ORGANIZATION | 0.99+ |
Amazon | ORGANIZATION | 0.99+ |
Richard Moulds | PERSON | 0.99+ |
September | DATE | 0.99+ |
John S | PERSON | 0.99+ |
John | PERSON | 0.99+ |
Fernando | PERSON | 0.99+ |
Brent | PERSON | 0.99+ |
August | DATE | 0.99+ |
last week | DATE | 0.99+ |
Verner | PERSON | 0.99+ |
2021 | DATE | 0.99+ |
Stanford | ORGANIZATION | 0.99+ |
six | QUANTITY | 0.99+ |
last year | DATE | 0.99+ |
last year | DATE | 0.99+ |
34 cubits | QUANTITY | 0.99+ |
a year ago | DATE | 0.99+ |
first | QUANTITY | 0.99+ |
five people | QUANTITY | 0.99+ |
Intel | ORGANIZATION | 0.99+ |
Fernanda | PERSON | 0.98+ |
5,000 cubit | QUANTITY | 0.98+ |
today | DATE | 0.98+ |
two things | QUANTITY | 0.98+ |
both | QUANTITY | 0.97+ |
one | QUANTITY | 0.97+ |
this week | DATE | 0.96+ |
seven | QUANTITY | 0.96+ |
D-Wave | ORGANIZATION | 0.95+ |
Richard moles | PERSON | 0.95+ |
this year | DATE | 0.95+ |
bill Vass | PERSON | 0.94+ |
up to 50 cubits | QUANTITY | 0.94+ |
24 | QUANTITY | 0.93+ |
one way | QUANTITY | 0.93+ |
a year ago this week | DATE | 0.89+ |
Aquacel | ORGANIZATION | 0.89+ |
Avis reinvent 2020 | TITLE | 0.88+ |
one company | QUANTITY | 0.87+ |
Beatles | ORGANIZATION | 0.86+ |
AWS Quantum Computing | ORGANIZATION | 0.8+ |
BRACA | LOCATION | 0.76+ |
a decade | QUANTITY | 0.76+ |
computing | EVENT | 0.75+ |
couple of years | QUANTITY | 0.75+ |
10 X | QUANTITY | 0.74+ |
more than | QUANTITY | 0.73+ |
re:Invent 2020 | TITLE | 0.62+ |
playbook | COMMERCIAL_ITEM | 0.62+ |
Jupiter | ORGANIZATION | 0.6+ |
wave | EVENT | 0.55+ |
Chicago | LOCATION | 0.54+ |
Maslow | ORGANIZATION | 0.52+ |
penny | TITLE | 0.49+ |
Janine Teo, Hugo Richard, and Vincent Quah | AWS Public Sector Online Summit
>>from around the globe. It's the Cube with digital coverage of AWS Public Sector online brought to you by Amazon Web services. Oven Welcome back to the cubes. Virtual coverage of Amazon Web services. Eight. Of his public sector summit online. We couldn't be there in person, but we're doing remote interviews. I'm John Curry. Your host of the Cube got a great segment from Asia Pacific on the other side of the world from California about social impact, transforming, teaching and learning with cloud technology. Got three great guests. You go. Richard is the CEO and co founder of Guys Tech and Jean Te'o, CEO and founder of Solve Education Founders and CEOs of startups is great. This is squad was the AIPAC regional head. Education, health care, not for profit and research. Ray Ws, he head start big program Vincent. Thanks for coming on, Janine. And you go Thank you for joining. >>Thanks for having us, John. >>We're not there in person. We're doing remote interviews. I'm really glad to have this topic because now more than ever, social change is happening. Um, this next generation eyes building software and applications to solve big problems. And it's not like yesterday's problems there. Today's problems and learning and mentoring and starting companies are all happening virtually digitally and also in person. So the world's changing. So, um, I gotta ask you, Vincent, we'll start with you and Amazon. Honestly, big started builder culture. You got two great founders here. CEO is doing some great stuff. Tell us a little bit what's going on. A pack, >>A lot of >>activity. I mean, reinvent and some it's out. There are really popular. Give us an update on what's happening. >>Thank you. Thank you for the question, John. I think it's extremely exciting, especially in today's context, that we are seeing so much activities, especially in the education technology sector. One of the challenges that we saw from our education technology customers is that they are always looking for help and support in many off the innovation that they're trying to develop the second area off observation that we had waas, that they are always alone with very limited resources, and they usually do not know where to look for in terms, off support and in terms off who they can reach out to. From a community standpoint, that is actually how we started and developed this program called A W s. At START. It is a program specifically for education technology companies that are targeting delivering innovative education solutions for the education sector. And we bring specific benefits to these education technology companies when they join the program. Aws ed start. Yeah, three specific areas. First one is that we support them with technical support, which is really, really key trying to help them navigate in the various ranges off A W S services that allows them to develop innovative services. The second area is leaking them and building a community off like minded education technology founders and linking them also to investors and VCs and lastly, off course, in supporting innovation. We support them with a bit off AWS cop credits promotional credits for them so that they can go on experiment and develop innovations for their customers. >>That's great stuff. And I want to get into that program a little further because I think that's a great example of kind of benefits AWS provides actually free credits or no one is gonna turn away free credits. We'll take the free credits all the time all day long, but really it's about the innovation. Um, Jean, I want to get your thoughts. How would solve education? Born? What problems were you solving? What made you start this company and tell us your story? >>Thank you so much for the question. So, actually, my co founder was invited to speak at an African innovation forum a couple of years back on the topic that he was sharing with. How can Africa skip over the industrialization face and go direct to the knowledge economy? Onda, the discussion went towards in orderto have access to the knowledge economy, unique knowledge. And how do you get knowledge Well through education. So that's when everybody in the conference was a bit stuck right on the advice waas. In order to scale first, we need to figure out a way to not well, you know, engaging the government and schools and teachers, but not depend on them for the successful education initiated. So and that's was what pain walk away from the conference. And when we met in in Jakarta, we started talking about that also. So while I'm Singaporean, I worked in many developing countries on the problem that we're trying to solve this. It might be shocking to you, but UNESCO recently published over 600 million Children and you are not learning on. That is a big number globally right on out of all the SDG per se from U N. Education. And perhaps I'm biased because I'm a computer engineer. But I see that education is the only one that can be solved by transforming bites. But since the other stg is like, you know, poverty or hunger, right, actually require big amount of logistic coordination and so on. So we saw a very, um, interesting trend with mobile phones, particularly smartphones, becoming more and more ubiquitous. And with that, we saw a very, uh, interesting. Fortunately for us to disseminate education through about technology. So we in self education elevate people out of poverty, true, providing education and employment opportunities live urging on tech. And we our vision is to enable people to empower themselves. And what we do is that we do an open platform that provides everyone effected education. >>You could How about your company? What problem you're you saw And how did it all get started? Tell us your vision. >>Thanks, John. Well, look, it all started. We have a joke. One of the co founder, Matthew, had a has a child with severe learning disorder and dyslexia, and he made a joke one day about having another one of them that would support those those kids on Duh. I took the joke seriously, So we're starting sitting down and, you know, trying to figure out how we could make this happen. Um, so it turns out that the dyslexia is the most common learning disorder in the world, with an estimated 10 to 20% off the worldwide population with the disorder between context between 750 million, up to 1.5 billion individual. With that learning disorder on DSO, where we where we sort of try and tackle. The problem is that we've identified that there's two key things for Children with dyslexia. The first one is that knowing that it is dislikes. Yeah, many being assessed. And the second is so what? What do we do about it? And so given or expertise in data science and and I, we clearly saw, unfortunately off, sort of building something that could assess individual Children and adults with dyslexia. The big problem with the assessment is that it's very expensive. We've met parents in the U. S. Specifically who paid up to 6000 U. S. Dollars for for diagnosis within educational psychologist. On the other side, we have parents who wait 12 months before having a spot. Eso What we so clearly is that the observable symptom of dyslexia are reading and everyone has a smartphone and you're smart. Smartphone is actually really good to record your voice. Eso We started collecting order recording from Children and adults who have been diagnosed with dyslexia, and we then trying a model to recognize the likelihood of this lecture by analyzing audio recording. So in theory, it's like diagnosed dyslexic, helping other undiagnosed, dyslexic being being diagnosed. So we have now an algorithm that can take about 10 minutes, which require no priors. Training cost $20. Andi, anyone can use it. Thio assess someone's likelihood off dyslexia. >>You know, this is the kind of thing that really changes the game because you also have learning progressions that air nonlinear and different. You've got YouTube. You got videos, you have knowledge bases, you've got community. Vincent mentioned that Johnny and you mentioned, you know making the bits driver and changing technology. So Jeannine and Hugo, please take a minute to explain, Okay? You got the idea. You're kicking the tires. You're putting it together. Now you gotta actually start writing code >>for us. We know education technology is not you. Right? Um, education games about you. But before we even started, we look at what's available, and we quickly realize that the digital divide is very real. Most technology out there first are not designed for really low and devices and also not designed for people who do not have Internet at hope so way. So with just that assessment, we quickly realized we need toe do something about on board, but something that that that problem is one eyes just one part of the whole puzzle. There's two other very important things. One is advocacy. Can we prove that we can teach through mobile devices, And then the second thing is motivation it again. It's also really obvious, but and people might think that, you know, uh, marginalized communities are super motivated to learn. Well, I wouldn't say that they are not motivated, but just like all of us behavioral changes really hard right. I would love to work out every day, but, you know, I don't really get identity do that. So how do we, um, use technology to and, um, you know, to induce that behavioral change so that date, so that we can help support the motivation to learn. So those are the different things that we >>welcome? >>Yeah. And then the motivated community even more impactful because then once the flywheel gets going and it's powerful, Hugo, your reaction to you know, you got the idea you got, You got the vision you're starting to put. Take one step in front of the other. You got a W s. Take us through the progression, understand the startup. >>Yeah, sure. I mean, what Jane said is very likely Thio what we're trying to do. But for us, there's there's free key things that in order for us to be successful and help as much people as we can, that is free things. The first one is reliability. The second one is accessibility, and the other one is affordability. Eso the reliability means that we have been doing a lot of work in the scientific approach as to how we're going to make this work. And so we have. We have a couple of scientific publications on Do we have to collect data and, you know, sort of published this into I conferences and things like that. So make sure that we have scientific evidence behind us that that support us. And so what that means that we had Thio have a large amount of data >>on and >>put this to work right on the other side. The accessibility and affordability means that, Julian said. You know it needs to be on the cloud because if it's on the cloud, it's accessible for anyone with any device with an Internet connection, which is, you know, covering most of the globe, it's it's a good start on DSO the clock. The cloud obviously allow us to deliver the same experience in the same value to clients and and parent and teacher and allied health professionals around the world. Andi. That's why you know, it's it's been amazing to to be able to use the technology on the AI side as well. Obviously there is ah lot of benefit off being able to leverage the computational power off off the cloud to to make better, argue with them and better training. >>We're gonna come back to both of you on the I question. I think that's super important. Benson. I want to come back to you, though, because in Asia Pacific and that side of the world, um, you still have the old guard, the incumbents around education and learning. But there is great penetration with mobile and broadband. You have great trends as a tailwind for Amazon and these kinds of opportunity with Head Start. What trends are you seeing that are now favoring you? Because with co vid, you know the world is almost kind of like been a line in the sand is before covert and after co vid. There's more demand for learning and education and community now than ever before, not just for education, the geopolitical landscape, everything around the younger generation. There's, um, or channels more data, the more engagement. How >>are you >>looking at this? What's your vision of these trends? Can you share your thoughts on how that's impacting learning and teaching? >>So there are three things that I want to quickly touch on number one. I think government are beginning to recognize that they really need to change the way they approach solving social and economic problems. The pandemic has certainly calls into question that if you do not have a digital strategy, you can't You can find a better time, uh, to now develop and not just developed a digital strategy, but actually to put it in place. And so government are shifting very, very quickly into the cloud and adopting digital strategy and use digital strategy to address some of the key problems that they are facing. And they have to solve them in a very short period of time. Right? We will talk about speed, three agility off the cloud. That's why the cloud is so powerful for government to adult. The second thing is that we saw a lot of schools closed down across the world. UNESCO reported what 1.5 billion students out of schools. So how then do you continue teaching and learning when you don't have physical classroom open? And that's where education, technology companies and, you know, heroes like Janine's Company and others there's so many of them around our ableto come forward and offer their services and help schools go online run classrooms online continue to allow teaching and learning, you know, online and and this has really benefited the overall education system. The third thing that is happening is that I think tertiary education and maybe even catch off education model will have to change. And they recognize that, you know, again, it goes back to the digital strategy that they got to have a clear digital strategy. And the education technology companies like, what? Who we have here today, just the great partners that the education system need to look at to help them solve some of these problems and get toe addressing giving a solution very, very quickly. >>Well, I know you're being kind of polite to the old guard, but I'm not that polite. I'll just say it. There's some old technology out there and Jenny and you go, You're young enough not to know what I t means because you're born in the cloud. So that's good for you. I remember what I t is like. In fact, there's a There's a joke here in the United States that with everyone at home, the teachers have turned into the I T department, meaning they're helping the parents and the kids figure out how to go on mute and how toe configure a network adds just translation. If they're routers, don't work real problems. I mean, this was technology. Schools were operating with low tech zooms out there. You've got video conferencing, you've got all kinds of things. But now there's all that support that's involved. And so what's happening is it's highlighting the real problems of the institutional technology. So, Vincent, I'll start with you. Um, this is a big problem. So cloud solves that one. You guys have pretty much helped. I t do things that they don't want to do any more by automation. This >>is an >>opportunity not necessary. There's a problem today, but it's an opportunity tomorrow. You just quickly talk about how you see the cloud helping all this manual training and learning new tools. >>We are all now living in a cloud empowered economy. Whether we like it or not, we are touching and using services. There are powered by the cloud, and a lot of them are powered by the AWS cloud. But we don't know about it. A lot of people just don't know, right Whether you are watching Netflix, um Well, in the old days you're buying tickets and and booking hotels on Expedia or now you're actually playing games on epic entertainment, you know, playing fortnight and all those kind of games you're already using and a consumer off the cloud. And so one of the big ideas that we have is we really want to educate and create awareness off club computing for every single person. If it can be used for innovation and to bring about benefits to society, that is a common knowledge that everyone needs to happen. So the first big idea is want to make sure that everyone actually is educated on club literacy? The second thing is, for those who have not embarked on a clear cloud strategy, this is the time. Don't wait for for another pandemic toe happen because you wanna be ready. You want to be prepared for the unknown, which is what a lot of people are faced with, and you want to get ahead of the curve and so education training yourself, getting some learning done, and that's really very, very important as the next step to prepare yourself toe face the uncertainty and having programs like AWS EC start actually helps toe empower and catalyzed innovation in the education industry that our two founders have actually demonstrated. So back to you Join. >>Congratulations on the head. Start. We'll get into that real quickly. Uh, head start. But let's first get the born in the cloud generation, Janine. And you go, You guys were competing. You gotta get your APS out there. You gotta get your solutions. You're born in the cloud. You have to go compete with the existing solutions. How >>do you >>view that? What's your strategy? What's your mindset? Janine will start with you. >>So for us, way are very aware that we're solving a problem that has never been solved, right? If not, we wouldn't have so many people who are not learning. So So? So this is a very big problem. And being able to liberate on cloud technology means that we're able to just focus on what we do best. Right? How do we make sure that learning is sufficient and learning is, um, effective? And how do we keep people motivated and all those sorts of great things, um, leveraging on game mechanics, social network and incentives. And then while we do that on the outside way, can just put almost out solved everything to AWS cloud technology to help us not worry about that. And you were absolutely right. The pandemic actually woke up a lot of people and hands organizations like myself. We start to get queries from governments on brother, even big NGOs on, you know, because before cove it, we had to really do our best to convince them until our troops are dry and way, appreciate this opportunity and and also we want to help people realized that in order to buy, adopting either blended approach are a adopting technology means that you can do mass customization off learning as well. And that's what could what we could do to really push learning to the next level. So and there are a few other creative things that we've done with governments, for example, with the government off East Java on top of just using the education platform as it is andare education platform, which is education game Donald Civilization. Um, they have added in a module that teaches Cove it because, you know, there's health care system is really under a lot of strain there, right and adding this component in and the most popular um mitigate in that component is this This'll game called hopes or not? And it teaches people to identify what's fake news and what's real news. And that really went very popular and very well in that region off 25 million people. So tech became not only just boring school subjects, but it can be used to teach many different things. And following that project, we are working with the federal government off Indonesia to talk about anti something and even a very difficult topic, like sex education as well. >>Yeah, and the learning is nonlinear, horizontally scalable, its network graft so you can learn share about news. And this is contextual data is not just learning. It's everything is not like, you know, linear learning. It's a whole nother ballgame, Hugo. Um, your competitive strategy. You're out there now. You got the covert world. How are you competing? How is Amazon helping you? >>Absolutely. John, look, this is an interesting one, because the current competitors that we have, uh, educational psychologist, they're not a tech, So I wouldn't say that we're competing against a competitive per se. I would say that we're competing against the old way of doing things. The challenge for us is to, um, empower people to be comfortable. We've having a machine, you know, analyzing your kids or your recording and telling you if it's likely to be dislikes. Yeah, and in this concept, obviously, is very new. You know, we can see this in other industry with, you know, you have the app that stand Ford created to diagnose skin cancer by taking a photo of your skin. It's being done in different industry. Eso The biggest challenge for us is really about the old way of doing things. What's been really interesting for us is that, you know, education is lifelong, you know, you have a big part in school, but when you're an adult, you learn on Did you know we've been doing some very interesting work with the Justice Department where, you know, we look at inmate and you know, often when people go to jail, they have, you know, some literacy difficulty, and so we've been doing some very interesting working in this field. We're also doing some very interesting work with HR and company who want to understand their staff and put management in place so that every single person in the company are empowered to do their job and and and, you know, achieve success. So, you know, we're not competing against attack. And often when we talk to other ethnic company, we come before you know, we don't provide a learning solution. We provide a assessment solution on e assessment solution. So, really, John, what we're competing against is an old way of doing things. >>And that's exactly why clouds so successful. You change the economics, you're actually a net new benefit. And I think the cloud gives you speed and you're only challenges getting the word out because the economics air just game changing. Right, So that's how Amazon does so well, um, by the way, you could take all our recordings from the Cube, interviews all my interviews and let me know how ideo Okay, so, um, got all the got all the voice recordings from my interview. I'm sure the test will come back challenging. So take a look at that e. I wanna come back to you. But I wanna ask the two founders real quick for the folks watching. Okay on Dhere about Amazon. They know the history. They know the startups that started on Amazon that became unicorns that went public. I mean, just a long list of successes born in the cloud You get big pay when you're successful. Love that business model. But for the folks watching that were in the virtual garages, air in their houses, innovating and building out new ideas. What does Ed start mean for them? How does it work? Would you would recommend it on what are some of the learnings that you have from work with Head Start? >>But our relationship X s start is almost not like client supplier relationship. It's almost like business partners. So they not only help us with protect their providing the technology, but on top of that, they have their system architect to work with my tech team. And they have, you know, open technical hours for us to interact. And on top of that, they do many other things, like building a community where, you know, people like me and Google can meet and also other opportunities, like getting out the word out there. Right. As you know, all of their, uh, startups run on a very thin budget. So how do we not pour millions of dollars into getting out without there is another big benefit as well. So, um definitely very much recommend that start. And I think another big thing is this, right? Uh, what we know now that we have covert and we have demand coming from all over the place, including, like, even a lot of interest, Ally from the government off Gambia, you know? So how do we quickly deploy our technology right there? Or how do we deploy our technology from the the people who are demanding our solution in Nigeria? Right. With technology that is almost frameless. >>Yeah. The great enabling technology ecosystem to support you. And they got the region's too. So the region's do help. I love we call them Cube Region because we're on Amazon. We have our cloud, Hugo, um, and start your observations, experience and learnings from working with aws. >>Absolutely. Look, this is a lot to say, so I'll try and making sure for anyone, but but also for us on me personally, also as an individual and as a founder, it's really been a 365 sort of support. So like Johnny mentioned, there's the community where you can connect with existing entrepreneur you can connect with expert in different industry. You can ask technical expert and and have ah, you know office our every week. Like you said Jenny, with your tech team talking to cloud architect just to unlock any problem that you may have on day and you know, on the business side I would add something which for us has been really useful is the fact that when we when we've approached government being able to say that we have the support off AWS and that we work with them to establish data integrity, making sure everything is properly secured and all that sort of thing has been really helpful in terms off, moving forward with discussion with potential plant and and government as well. So there's also the business aspect side of things where when people see you, there's a perceived value that you know, your your entourage is smart people and and people who are capable of doing great things. So that's been also really >>helpful, you know, that's a great point. The APP SEC review process, as you do deals is a lot easier. When here on AWS. Vincent were a little bit over time with a great, great great panel here. Close us out. Share with us. What's next for you guys? You got a great startup ecosystem. You're doing some great work out there and education as well. Healthcare. Um, how's your world going on? Take a minute, Thio. Explain what's going on in your world, >>John, I'm part of the public sector Team Worldwide in AWS. We have very clear mission statements on by the first is you know, we want to bring about destructive innovation and the AWS Cloud is really the platform where so many off our techs, whether it's a text, healthtech golf text, all those who are developing solutions to help our governments and our education institutions or health care institutions to really be better at what they do, we want to bring about those disruptive innovations to the market as fast as possible. It's just an honor on a privilege for us to be working. And why is that important? It's because it's linked to our second mission, which is to really make the world a better place to really deliver. Heck, the kind of work that Hugo and Janina doing. You know, we cannot do it by ourselves. We need specialists and really people with brilliant ideas and think big vision to be able to carry out what they are doing. And so we're just honored and privileged to be part off their work And in delivering this impact to society, >>the expansion of AWS out in your area has been phenomenal growth. I've been saying to Teresa Carlson, Andy Jassy in the folks that aws for many, many years, that when you move fast with innovation, the public sector and the private partnerships come together. You're starting to see that blending. And you've got some great founders here, uh, making a social impact, transforming, teaching and learning. So congratulations, Janine and Hugo. Thank you for sharing your story on the Cube. Thanks for joining. >>Thank you. Thank >>you, John. >>I'm John Furry with the Cube. Virtual were remote. We're not in person this year because of the pandemic. You're watching a divest Public sector online summit. Thank you for watching
SUMMARY :
AWS Public Sector online brought to you by Amazon Vincent, we'll start with you and Amazon. I mean, reinvent and some it's out. One of the challenges that we saw from our education technology customers What made you start this company and tell us your story? But I see that education is the only one that can be solved You could How about your company? clearly is that the observable symptom of dyslexia are reading You know, this is the kind of thing that really changes the game because you also have learning but and people might think that, you know, uh, marginalized communities are Take one step in front of the other. So make sure that we have which is, you know, covering most of the globe, it's it's a good start on We're gonna come back to both of you on the I question. And they recognize that, you know, again, it goes back to the digital strategy There's some old technology out there and Jenny and you go, You just quickly talk about how you see the cloud And so one of the big ideas that we have is we really want And you go, Janine will start with you. a module that teaches Cove it because, you know, It's everything is not like, you know, linear learning. person in the company are empowered to do their job and and and, you know, achieve success. And I think the cloud gives you speed and you're only challenges getting the word out because Ally from the government off Gambia, you know? So the region's do help. there's a perceived value that you know, your your entourage is smart people helpful, you know, that's a great point. We have very clear mission statements on by the first is you know, Andy Jassy in the folks that aws for many, many years, that when you move fast with innovation, Thank you. Thank you for watching
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Hugo | PERSON | 0.99+ |
Janine | PERSON | 0.99+ |
Julian | PERSON | 0.99+ |
John | PERSON | 0.99+ |
Janina | PERSON | 0.99+ |
Richard | PERSON | 0.99+ |
Janine Teo | PERSON | 0.99+ |
Vincent | PERSON | 0.99+ |
Jenny | PERSON | 0.99+ |
Jeannine | PERSON | 0.99+ |
Amazon | ORGANIZATION | 0.99+ |
Matthew | PERSON | 0.99+ |
Teresa Carlson | PERSON | 0.99+ |
Vincent Quah | PERSON | 0.99+ |
Jean | PERSON | 0.99+ |
UNESCO | ORGANIZATION | 0.99+ |
Johnny | PERSON | 0.99+ |
Jane | PERSON | 0.99+ |
Andy Jassy | PERSON | 0.99+ |
Hugo Richard | PERSON | 0.99+ |
AWS | ORGANIZATION | 0.99+ |
Nigeria | LOCATION | 0.99+ |
John Curry | PERSON | 0.99+ |
California | LOCATION | 0.99+ |
two | QUANTITY | 0.99+ |
Asia Pacific | LOCATION | 0.99+ |
Jean Te'o | PERSON | 0.99+ |
Guys Tech | ORGANIZATION | 0.99+ |
Donald Civilization | TITLE | 0.99+ |
12 months | QUANTITY | 0.99+ |
Thio | PERSON | 0.99+ |
John Furry | PERSON | 0.99+ |
Eight | QUANTITY | 0.99+ |
second mission | QUANTITY | 0.99+ |
U N. Education | ORGANIZATION | 0.99+ |
both | QUANTITY | 0.99+ |
One | QUANTITY | 0.99+ |
ORGANIZATION | 0.99+ | |
United States | LOCATION | 0.99+ |
$20 | QUANTITY | 0.99+ |
U. S. | LOCATION | 0.99+ |
Benson | PERSON | 0.99+ |
second | QUANTITY | 0.99+ |
25 million people | QUANTITY | 0.99+ |
tomorrow | DATE | 0.99+ |
second thing | QUANTITY | 0.99+ |
1.5 billion students | QUANTITY | 0.99+ |
first | QUANTITY | 0.99+ |
AIPAC | ORGANIZATION | 0.99+ |
today | DATE | 0.99+ |
Gambia | LOCATION | 0.98+ |
YouTube | ORGANIZATION | 0.98+ |
Solve Education | ORGANIZATION | 0.98+ |
two founders | QUANTITY | 0.98+ |
Today | DATE | 0.98+ |
Ford | ORGANIZATION | 0.98+ |
one part | QUANTITY | 0.98+ |
third thing | QUANTITY | 0.98+ |
Janine Teo, Hugo Richard & Vincent Quah V1
>> Announcer: From around the globe, it's theCUBE with digital coverage of AWS Public Sector Online brought to you by Amazon Web Services. >> Welcome back to theCUBE's Virtual coverage of Amazon Web Services, AWS Public Sector Summit Online. We couldn't be there in person, but we're doing remote interviews. I'm John Furrier, your host of the cube. We've got a great segment from Asia Pacific on the other side of the world from California, about social impact, transforming teaching and learning with Cloud technology we've got three great guests. Hugo Richard is the CEO and co-founder of Dystech and Janine Teo CEO and founder of Solve Education founders and CEOs of startups is great Vincent Quah is the APAC Regional Head of Education, Healthcare Not-For-Profit and Research for AWS. (indistinct) big program. Vincent, thanks for coming on Janine and Hugo thank you for joining. >> Thanks for having us, John. >> Thanks John So, we're not there in person. We're doing remote interviews. I'm really glad to have this topic because now more than ever social change is happening. This next generation is building software and applications to solve big problems. And it's not like yesterday's problems, they're today's problems and learning and mentoring and starting companies are all happening virtually, digitally, and also in person. So the world's changing. So I got to ask you, Vincent we'll start with you Amazon, obviously big (indistinct) culture. You got two great founders here and CEOs doing some great stuff. Tell us a little bit what's going on at APAC, a lot of activity. I mean re-invent and the summits out there are really popular. Give us an update on what's happening. >> Thank you, thank you for the question, John. I think it's extremely exciting, especially in today's context, that we are seeing so much activities, especially in the education technology sector. One of the challenges that we saw from our education technology customers is that they're always looking for help and support in many of the innovation that they're trying to develop. The second area of observation that we had was that they are always alone with very limited resources and they usually do not know where to look for in terms of support and in terms of not who they can reach out to from a community standpoint, that is actually how we started and developed this program called AWS EdStart. It is a program specifically for education technology companies that are targeting, delivering innovative education solutions for the education sector. And we bring specific benefits to these education technology companies when they joined the program, AWS EdStart. Yeah, three specific areas, one is that we support them with technical support, which is really, really key trying to help them navigate in the various ranges of AWS services that allows them to develop innovative services. The second area is leaking them and building a community of like-minded education technology founders, and linking them also to investors and VCs. And lastly, of course, in supporting innovation, we support them with a bit of AWS Cloud credits, promotional credits for them so that they can go and experiment and develop innovations for their customers. >> That's great stuff I want to get into that program a little bit further because I think, you know, that's a great example of kind of benefits AWS provides (indistinct) free credits or, no one is going to turn away free credits. We'll take the free credits all the time, all day long, but really it's about the innovation. Janine I want to get your thoughts. How was Solve Education born? What problems were you solving? What made you start this company and tell us your story. >> Thank you so much for the question. So actually my co-founder was invited to speak at an African Innovation Forum couple of years back, and the topic that he was sharing with, how can Africa skip over the industrialization phase and go direct to the knowledge economy and that discussion went towards, in order to have access to the knowledge commonly you need knowledge and how do you get knowledge well through education. So that's when everybody in the Congress was a bit stuck, right? And the advice was in order to scale fast, we need to figure out a way to not while, you know, engaging the government and schools and teachers, but not depend on them for the success of the education initiative. So, and that's was what (indistinct) walk away from the conference. And when we met in Jakarta, we started talking about that also. So while I'm Singaporean, I worked in many developing countries. And the problem that we're trying to solve is it might be shocking to you, but UNESCO recently published over 600 million children and youth are not learning. And that is a big number globally, right? And out of all the SDGs per se, from UN, education, and perhaps I'm biased, because I'm a computer engineer, but I see that education is the only one that can be solved by transforming (indistinct) versus the other SDGs like, you know, poverty or hunger, right? Actually require big amount of logistic coordination and so on. So we saw a very interesting trend with mobile phones, particularly smart phones becoming more and more ubiquitous. And with that, we saw a very interesting opportunity for us to disseminate education through mobile technology. So we in self-education elevate people on a public through providing education and employment opportunities, (indistinct) on tech. And we.. our vision is to enable people to empower themselves. And what we do is that we build an open platform that provides everyone active education. >> Hugo How about your company? What problem are you solving? How did it all get started? Tell us your vision. >> Thanks, John. Well, look, it all started with a joke, one of the co-founder, Matthew, had a, he has a child who has severe learning disorder and dyslexia, and he made a joke one day about having (indistinct) that could support those kids. And I took the joke seriously. So we started sitting down and, you know, trying to figure out how we can make this happen. So it turns out that dyslexia is the most common learning disorder in the world. We have an estimated 10 to 20% of the worldwide population with the disorder, due to in context, that's between 750 million up to 1.5 billion individuals with that learning disorder. And so where we sort of try and tackle the problem is that we've identified that there's two key things for children with dyslexia. The first one is that knowing that it is dyslexia, meaning being assessed. And the second one is, so what, what do we do about it? And so given all expertise in data science and AI, we clearly saw an opportunity of sort of building something that could assess individual children and adults with dyslexia. The big problem with the assessment is that it's very expensive. We've met parents in the U.S. specifically who paid up to 6,000 U.S. Dollars for a diagnosis with an educational psychologist. On the other side, we have parents who wait 12 months before having a spot. So what we saw clearly is that the observable symptom of dyslexia are reading, and everyone has a smartphone and (indistinct) from smartphone is actually really good to record your voice. So we started collecting audio recordings from children and adults who have been diagnosed with dyslexia. And we then try to model and to recognize the likelihood of dyslexia by analyzing audio recording. So in theory, it's like diagnosed dyslexic, helping other undiagnosed dyslexic being diagnosed. So we have now (indistinct) them. That can take about 10 minutes, which requires no prior training costs, 20 U.S. Dollar, and anyone can use it to assess someone's likelihood of dyslexia. >> You know, this is the kind of thing that really changes the game because you also have learning for questions that are nonlinear and different. You've got YouTube, you've got videos, you have knowledge bases, you've got community. Vincent mentioned that Janine, you mentioned, you know, making the bits of driver and changing technology. This is the kind of thing that seems obvious now as look at it, but now you've got to put it into action. So, you know, one of the benefits of Cloud on AWS, we'll give a plug for Vincent's company here is that you can move faster. And that's something that Andy Jassy always talks about and Teresa Carlson, being builders and moving fast, but you got to build it. So Janine and Hugo, please take a minute to explain, okay, you got the idea, you're kicking the tires, you're putting it together. Now you've got to actually start writing code. What happens next? Janine, we'll start with you. >> Well, what happens next? Okay. So for us, we know education technology is not new, right. And education games are not new, but before we even started, we look at what's available and we quickly realized that the digital divide is very real, most technology out there first are not designed for (indistinct) devices, and also not designed for people who do not have internet at home. so with just that assessment, we quickly realized we need to do something about, and that's something that problem is. One is just one part of the whole puzzle. There's two other very important things. One is advocacy. Can we prove that we can teach through mobile devices? And then the second thing is motivation. And again, it's also really obvious, but, and people might think that, you know, marginalized communities are super motivated to learn. Well, I wouldn't say that they are not motivated, but just like all of us behavioral change is really hard, right? I would love to workout everyday, but you know, I don't really do that. So how do we use technology to, you know, to induce that behavioral change so that we can help support their motivation to learn. So those are the different things that we work on, certainly with it. >> Yeah, and then a motivated community, is even more impactful because then once the flywheel gets going, then it's powerful. Hugo your reaction to, you know, you got the idea, you got the vision, you're starting to put, take one step in front of the other. You got AWS, take us through the progression on the startup. >> Yeah, sure. I mean, what Janine said is, very likely to, to what we're trying to do, but for us, there's three key things that in order for us to be successful and help as much people as we can, it is three things. The first one is reliability. The second one is accessibility and the other one is affordability. So the reliability means that we have been doing a lot of work in the scientific approach as to how are we going to make this work And so we've.. We have a couple of scientific publications and we had to collect data and, you know, sort of publish this into AI conferences and things like that. So it makes sure that we have the scientific evidence behind us that support us. And so what that means is that we have to have a large amount of data and then put this to work, right on the other side of the accessibility and affordability means that Janine said, you know, it needs to be on the Cloud because if it's on the Cloud, it's accessible for anyone with any device, with an internet connection, which is, you know, covering most of the globe. So it's a good start. And so, the Cloud obviously allow us to deliver the same experience and the same value to clients and parent and teacher and (indistinct) professional around the world. And that's why, you know, it's been amazing, to be able to use the technology on the AI side as well obviously there is a lot of benefit of being able to leverage the computational power of the Cloud, to make better algorithm and better training. >> (indistinct) to come back to both of you on the AI question. I think that's super important. Vincent I want to come back to you though, because in Asia Pacific and that side of the world, you still have the old guard, the incumbents around education and learning, but there's great penetration with mobile and broadband. You have great trends as a tailwind for Amazon and these kinds of opportunities EdStart, what trends are you seeing that are now favoring you? Because with COVID, you know, the world is almost kind of like been a line in the sand is before COVID and after COVID, there's more demand for learning and education and community now than ever before, not just for education, the geopolitical landscape, everything around the younger generation is more channels, more data, the more engagement, how are you looking at this? What's your vision of these trends? Can you share your thoughts on how that's impacting learning and teaching? >> So there're three things that I want to quickly touch on. Number one, I think governments are beginning to recognize that they really need to change the way they approach solving social and economic problems. The pandemic has certainly calls into question that if you do not have a digital strategy, you can't find a better time to now develop and not just develop a digital strategy, but actually to put it in place. And so government are shifting very, very quickly into the Cloud and adopting digital strategy and use digital strategy to address some of the key problems that they are facing. And they have to solve them in a very short period of time. Right, We will talk about speed, the agility of the Cloud, and that's why the Cloud is so powerful for government to adopt. The second thing is that we saw a lot of schools close down across the world, UNESCO reported, what 1.5 billion students out of schools. So how then do you continue teaching and learning when you don't have physical classroom open and that's where education technology companies and, you know, heroes like Janine's company and others, there are so many of them around are able to come forward and offer their services and help schools go online, run classrooms online, continue to allow teaching and learning, you know, online. And this has really benefited the overall education system. The third thing that is happening is that I think tertiary education and maybe even (indistinct) education model will have to change. And they recognize that, you know, again, it goes back to the digital strategy that they've got to have a clear digital strategy and the education technology companies like what, who we have here today. Just the great partners that the education system need to look at to help them solve some of these problems and get to addressing giving a solution very, very quickly. >> Well, I know you're being kind of polite to the old guard, but I'm not that polite. I'll just be, say it. There's some old technology out there and Janine and Hugo, you're young enough not to know what IT means because you're born in the Cloud. So that's good for you. I remember what I teach. Like in fact, there's a, there's a joke here in the United States so with everyone at home the teachers have turned into the IT department, meaning they're helping the parents and the kids figure out how to go unmute and how to configure a network address translation if their routers don't work, real problems. I mean, this was technology, schools were operating with low tech Zoom's out there. You've got video conferencing, you've got all kinds of things, but now there's all that support that's involved. And so what's happening is it's highlighting the real problems of the institutional technology. So Vincent, I'll start with you. This is a big problem. So Cloud solves that one, you guys have pretty much helped IT do things that they don't want to do anymore by automation. This is an opportunity, not necessarily.. There's a problem today, but it's an opportunity tomorrow. Could you just quickly talk about how you see the Cloud, helping all this manual training and learning new tools. >> Absolutely. So I want to say and put forth a hypothesis and that hypothesis is simply this. We are all now living in a Cloud empowered economy, whether we like it or not, we are touching and using services that are powered by the Cloud. And a lot of them are powered by the AWS Cloud, but we don't know about it. A lot of people just don't know, right? Whether you are watching Netflix, well in the old days, you're buying tickets and booking hotels on Expedia, or now you're actually playing games on Epic Entertainment, you know, playing Fortnite and all those kinds of games you're already using and a consumer of the Cloud. And so one of the big ideas that we have is we really want to educate and create awareness of top computing for every single person. If it can be used for innovation and to bring about benefits to society that is a common knowledge that everyone needs to have. And so the first big idea is, want to make sure that everyone actually is educated on Cloud literacy. The second thing is for those who have not embarked on a clear Cloud strategy, this is the time don't wait for another pandemic to happen because you want to be ready. You want to be prepared for the unknown, which is what a lot of people are faced with. And you want to get ahead of the curve. And so education, training yourself, getting some learning done. And that's really very, very important as a next step to prepare yourself to face the uncertainty and having programs like AWS EdStart actually helps to empower and catalyze innovation in the education industry that our two founders have actually demonstrated. So back to you, John. >> Congratulation on the EdStart, we'll get into that and real quickly, EdStart but let's first get the born in the Cloud generation Janine and Hugo you guys are competing, you got to get your apps out there. You've got to get your solutions. You're born in the Cloud. You have to go compete with the existing solutions. How do you view that? What's your strategy? What's your mindset, Janine, we'll start with you. >> So for us, we are very aware that we are solving a problem that has never been solved, right? If not, we wouldn't have so many people who are not learning. So this is a very big problem. And being able to leverage on Cloud technology means that we are able to just focus on what we do best, right? How do we make sure that learning is sufficient and learning is effective. And how do we get people motivated and all those sort of great things leveraging on game mechanics, social network, and incentives. And then while we do that on the Cloud side, we can just put that almost ourselves, everything to AWS Cloud technology to help us not worry about that. And you were absolutely right. The pandemic actually woke up a lot of people and has organizations like myself. We start to get queries from governments and other, even big NGOs on, you know, because before COVID we had to really do our best to convince them until (indistinct) are dry >> (indistinct) knock on doors and convince people. >> Yes. And now we don't have to do that. It's the other way around. So we are really, you know, we appreciate this opportunity and also we want to help people realize that in order to.. By adopting either a blended approach or adopting technology means that you can do mass customization of learning as well. And that's, what we could do to really push learning to the next level. So, and, there are a few other creative things that we've done with governments, for example, with the government of East Java on top of just using the education platform, as it is an educational platform, which is education (indistinct) on our civilization, they have added in a module that teaches COVID because, you know, their health care system is really under a lot of strain there, right? And adding this component in and the most popular mini game in that component is this game called Hoax Or Not. And it teaches people to identify what's fake news and what's real news. And that really went very popular and very well in that region of 25 million people. So that became not only just boring school subjects, but it can be used to teach many different things. And following that project, we are working with the Federal Government of Indonesia to talk about (indistinct) and even a very difficult topic like sex education as well. >> Yeah. And the learning is nonlinear, it's horizontally scalable, it's network graph. So you can learn, share about news. And this is contextual data. It's not just learning, it's everything. It's not like, you know, linear learning. It's a whole nother ballgame, Hugo, your competitive strategy. You're out there now, you got the COVID world. How are you competing? How's Amazon helping you? >> Absolutely John, look, this is an interesting one because the common competitor that we have are educational psychologist, they're not at tech. So I wouldn't say that we're competing against a competitor per se. I would say that we are competing against some old way of doing things. The challenge for us is to empower people, to be comfortable with having a machine, you know, analyzing your kid's audio recording and telling you if it's likely to be dyslexia. And this concept obviously is very new. You know, we can see this in other industry with AI, you know, you have the app that Stanford created to diagnose skin cancer by taking a photo of your skin. So it's being done in different industry. So the biggest challenge for us is really about the old way of doing things. What's been really interesting for us is that you know, education is lifelong, you know, you have a big pot in school, but when you're an adult you learn and, you know, we've been doing some very interesting work with the Justice Department where, you know, we look at inmate and, and, you know, often when people go to jail, they have, you know, some literacy difficulty. And so we've been doing some very interesting work in this field. We're also doing some very interesting work with HR and company who want to understand their staff and put management in place so that every single person in the company are empowered to do the job and, you know, achieve success. So, you know, we're not competing against Ed Tech. And often when we talk to other Ed Tech company, we come before, you know, we don't provide a learning solution. We provide an assessment solution, an E assessment solution. So really John, what we competing against is an old way of doing things. >> And that's exactly why the Cloud's so successful. You change the economics. You're actually a net new benefit. And I think the Cloud gives you speed. And your only challenge is getting the word out because the economics are just game changing, right? So that's how Amazon does so well, by the way, you can take all our recordings from theCUBE interviews, all my interviews and let me know how I do, okay. So got all the, got all the voice recordings for my interview. I'm sure the test will come back challenging. So take a look at that. >> Absolutely. >> Vincent I want to come back to you, but I want to ask the two founders real quick for the folks watching okay and hear about Amazon. They know the history, they know the startups that started on Amazon that became unicorns that went public. I mean, just a long list of successes born in the Cloud. You get big pay when you're successful, love that business model. But for the folks watching that are in the virtual garages or in their houses innovating and building out new ideas, what does EdStart mean for them? How does it work? Would you would recommend it? And what are some of the learnings that you have from working with EdStart? Janine We'll start with you. >> For me. So I would, for me, I would definitely highly recommend EdStart. And the reason is because EdStart, our relationship with EdStart, is almost not like a client-supplier relationship it's almost like business partners. So they not only help us with providing the technology. But on top of that, they have their system architects to work with my tech team and they have, you know, open technical hours for us to interact. And on top of that, they do many other things like building a community where, you know, people like me and Google can meet. And also other opportunities like getting out there, right? As you know, all of the startups run on a very thin budget. So how do we not pour millions of dollars into getting all that out there is another big benefit as well. So I'll definitely very much recommend EdStart. And I think another big thing is this, right? Now that we have COVID and we have demands coming from all other places including like, even (indistinct) from the Government of Gambia, you know, so how do we quickly deploy our technology right there? Or how do we deploy our technology from the people who are demanding our solution in Nigeria, right? With technology it is almost brainless. >> Yeah. The great enabling technology ecosystem to support you. I think, at the regions too. So the regions do help. I love we call them cube regions because we're on Amazon, we have our Cloud Hugo, EdStart your observations, experience and learnings from working with AWS. >> Absolutely. Look, there's a lot to say, so I'll try and make it short for anyone, but, so for us and me personally, and also as an individual and as a founder, it's really been a 365 sort of support. So like Janine mentioned, there's the community where you can connect with existing entrepreneur. You can connect with experts in different industry. You can ask technical experts and have a, you know, office hour every week. Like you said, Janine with, your tech team talking to a Cloud architect just to unlock any problem that you may have. And, you know, on the business side, I would add something which for us has been really useful is the fact that when we've approached government, being able to say that we have the support of AWS and that we work with them to establish data integrity, making sure everything is properly secured and all that sort of thing has been really helpful in terms of moving forward with discussion with potential client and government as well. So there's also the business aspect side of things, where when people see you, there's a perceived value that, you know, your entourage is smart people and people who are capable of doing great things. So that's been also really helpful. >> You know, that's a great point. The AppSec review process as you do deals is a lot easier when you're on AWS. Vincent we're a little bit over time. What a great panel here. Close us out, share with us what's next for you guys. You've got a great startup ecosystem and doing some great work out there and education as well, healthcare, how's your world going on? Take a minute to explain what's going on in your world. >> John I'm part of the public sector team worldwide in AWS, we have very clear mission statements. And the first is, you know, we want to bring about disruptive innovation. And the AWS Cloud is really the platform where so many of our Ed Techs, whether it's (indistinct) Health Tech, Gulf Tech, all those who are developing solutions to help our governments and our education institutions, our healthcare institutions to really be better at what they do. We want to bring about those disruptive innovations to the market, as fast as possible. It's just an honor and a privilege for us to be working. And why is that important? It's because it's linked to our second mission, which is to really make the world a better place to really deliver.. The kind of work that Hugo and Janine are doing. We cannot do it by ourselves. We need specialists and really people with brilliant ideas and think big vision to be able to carry out what they are doing. And so we're just honored and privileged to be part of their work. And in delivering this impact to society. >> The expansion of AWS out in your area has been phenomenal growth. I've been saying to Teresa Carlson and Andy Jassy and the folks at AWS for many, many years, that when you move fast with innovation, the public sector and the private partnerships come together, you starting to see that blending. And you've got some great founders here making a social impact, transforming teaching and learning. So congratulations, Janine and Hugo. Thank you for sharing your story on theCUBE. Thanks for joining. >> Thank you for having us >> thanks John >> Thank you, John. I'm John Furrier with theCUBE Virtual we're remote. We're not in person this year because of the pandemic you're watching AWS Public Sector Online Summit. Thank you for watching. (soft music)
SUMMARY :
brought to you by Amazon Web Services. from Asia Pacific on the other So the world's changing. One of the challenges that but really it's about the innovation. but I see that education is the only one What problem are you solving? So we started sitting down and, you know, is that you can move faster. So how do we use technology to, you know, one step in front of the other. and we had to collect data and, you know, and that side of the world, the education system need to kind of polite to the old guard, And so the first big idea is, You have to go compete with that on the Cloud side, (indistinct) knock on So we are really, you know, It's not like, you know, linear learning. because the common competitor that we have And I think the Cloud gives you speed. that are in the virtual and they have, you know, So the regions do help. and that we work with them The AppSec review process as you do deals And the AWS Cloud is really and the folks at AWS for many, many years, Thank you for watching.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Janine | PERSON | 0.99+ |
Teresa Carlson | PERSON | 0.99+ |
John | PERSON | 0.99+ |
Vincent | PERSON | 0.99+ |
Matthew | PERSON | 0.99+ |
UNESCO | ORGANIZATION | 0.99+ |
Nigeria | LOCATION | 0.99+ |
Hugo | PERSON | 0.99+ |
Vincent Quah | PERSON | 0.99+ |
Amazon | ORGANIZATION | 0.99+ |
Andy Jassy | PERSON | 0.99+ |
Ed Tech | ORGANIZATION | 0.99+ |
John Furrier | PERSON | 0.99+ |
Hugo Richard | PERSON | 0.99+ |
AWS | ORGANIZATION | 0.99+ |
12 months | QUANTITY | 0.99+ |
California | LOCATION | 0.99+ |
Dystech | ORGANIZATION | 0.99+ |
Asia Pacific | LOCATION | 0.99+ |
Amazon Web Services | ORGANIZATION | 0.99+ |
Jakarta | LOCATION | 0.99+ |
EdStart | ORGANIZATION | 0.99+ |
Teresa Carlson | PERSON | 0.99+ |
two | QUANTITY | 0.99+ |
Gulf Tech | ORGANIZATION | 0.99+ |
Federal Government of Indonesia | ORGANIZATION | 0.99+ |
Janine Teo | PERSON | 0.99+ |
ORGANIZATION | 0.99+ | |
second mission | QUANTITY | 0.99+ |
U.S. | LOCATION | 0.99+ |
United States | LOCATION | 0.99+ |
APAC | ORGANIZATION | 0.99+ |
one | QUANTITY | 0.99+ |
over 600 million | QUANTITY | 0.99+ |
Stanford | ORGANIZATION | 0.99+ |
tomorrow | DATE | 0.99+ |
Epic Entertainment | ORGANIZATION | 0.99+ |
Richard Henshall v1 ITA Red Hat Ansiblefest
>> Welcome. My name is Richard Henshall. I'm a senior manager for product management, for Ansible Automation Platform. Think to yourself, how did you adapt to the changes this year? How was your team forced to adapt? And were you prepared and had you been automating already? Talking for the Ansible team, we're ready to move forward. Now we suspect that sentiment is shared by many of us here. We just had a good lesson in why being able to adapt quickly is so important. The previous ways of working may not always be available to us, and we have to change the way we focus and look at things. And this is why I have such a strong belief in the power that automation can gift us. And if we remind ourselves of what the goal of automation is, and to put it very simply, to perform work with minimal human interaction On one hand, this sounds great, no work. But it can also seem very impersonal. And the reality is automation cannot be achieved without knowledge and experience. Because what needs to be automated is what we learn. So much of what we do is specific to our circumstances, to our business or our own personal backgrounds. So how we approach automation is also important. And that's why this year's message "Automate to connect" is relevant to the times we find ourselves in. As a rhetorical question, and of course, all of these are rhetorical questions. I'm sat in a room at my house, staring at a camera. I would next ask you why we need to connect? And what do we connect for? Do we connect to share knowledge, to learn from others, to work on common goals and objectives? Reality is it should be all of these. Any intent when we connect from our work perspective, needs to be about collaboration. Collaboration is essential when we approach how we deal with change. Because when we talk about change, we often see it explained as people process and technology. But when we're forced to change, the unexpected circumstances, you can't always be prepared. You're not always given the time to plan and prepare the way you'd like. So having a way to connect, to build relationships and to collaborate is more important than ever. Back in the days when I was learning my trade, middleware engineering before the endless video calls, presentations and spreadsheets, the most difficult relationship to improve was between us in engineering and the network team. And it wasn't because of the skills it wasn't because we didn't like each other, at least I'd like to think so. And it wasn't for lack of trying. It's because the network team, they're on a different floor, big security door, magnetic locks, special key cards that you needed to have access for. It was aggressively protected so they couldn't be interfered with. It wasn't this opportunity to build the relationships in the same way that we could when we could go and collaborate with the Linux Windows or storage teams. You couldn't wander off and discuss a problem, just have a chat, they were locked away. Now, maybe they like that and sometimes it's good to be locked away, but it forms a barrier. And it's a barrier to collaboration. And so with this group, collaboration required meetings, it required planning and this made it harder. And when something's hard, it makes it easier not to do it. And additionally, we didn't have a platform to help us. So ask yourself, does that sound familiar to your circumstance? What we needed to connect those relationships and we've seen this time and time again, is that for automation we need a consistent technology foundation to connect. With the foundation encourages simplicity for collaboration foundation to connect the people, process and technology and a foundation to help us build trust in those relationships. If we'd had that foundation, that platform, we could have been successful much faster. 'Cause it's important we understand that success depends on trust between groups. To be successful in adapting to change we need to know we trust when the situation may not be perfect. It might be different offices, could be different countries, probably different languages, maybe even different objectives between these different groups. It might be a global pandemic, which is a phrase I never thought I would say in a keynote, but connecting with your colleagues, collaborating and therefore participating in the work that's done. Working as a wider team, enables you to see a broader perspective. Because how else do we trust? Unless we understand each other. How do we trust what we can create? Who has created it? Is he up to standard? And how do we trust what's running where? And who's been running it that we can scale with the correct control? And how do we trust that we can engage removing friction and complexity. And we can do all these things by being given the opportunity to participate, to be included in the overall process. Ultimately, how do we participate to achieve our goals? And what goals do we choose? Your goals are your business challenges automate what makes both your business and IT successful because participation is key to that process. And the more people you can bring together to connect, the more benefit you can achieve. If we've connected and collaborated, we trust what's being produced because automation can be a selfish act. I, the individual do something to make my job easier, but you should think of automation as a gift of knowledge and experience. How can you automate your job to make your colleagues' lives easier? So as we assume and know that participation enables collaboration, how do we help you to collaborate? Well with Ansible, the language of collaboration. And to collaborate, we need to connect. And for that, we have the Ansible Automation Platform. Everything I've described so far is drawn from our collective experience with customers. When Ansible the tool was released, it started as a way to perform automation in a simpler way. As your needs changed, we added more domains and then your needs changed again. As complexity and scale surfaced, a different set of challenges for us to look after. Not only did you do the automation, you need to do more automation as you achieve some successes. And afterwards you have to manage all that automation. To be successful we have deserved that it's not just what you do, it's how and where you do it. It's not just about the tool. It's about the structure, the framework. A focal point and a user experience in maintaining your automation assets. And this is why we focused all of our product offerings into Ansible Automation Platform, a single offering for enterprise grade automation. We've supported your changes in the past, and we've been working to support your changes for the future, help you adapt and connect. Now, if Ansible is the language of collaboration, collections, Ansible content collections are the building blocks of how you simplify the connection of your trusted technologies. Last year, we launched collections as a way to improve the management of content distributed within the Ansible project and the Ansible products. The teams involved were busy working on making this happen over the last 12 months. Working with our community and partners to migrate over 4000.5 modules. This work including this summer with the Ansible collections, 1.0 release. Last Ansible Fest we unveiled certified platforms with the Ansible certified partner program. End to end support for Ansible content between Red Hat and our trusted partners. We now have over 50 certified platforms focused on curated enterprise technology domains. The platforms that you use and rely upon because connecting these domains is connecting your teams. I'm talking about connecting teams. I'm sure that your planning has started already working on cloud native adoption. Key to that cloud native journey and story are containers. And that brings its own set of changes to the way that we work. And we want to support you as you adapt to these changes. I assume most of you are aware that OpenShift is Red Hat's intuivating container orchestration platform based on Kubernetes. And I'd like to announce the release of certified Ansible content collections of Red Hat OpenShift. Whether it be for augmenting provisioning, customizing cluster nodes, or data operations. Collections gives us the perfect opportunity to deliver these use cases and more. Because we know Red Hat customers have chosen and trust Ansible Automation and OpenShift platforms to drive transformation programs. But the connection between these two platforms and the teams that deliver these has always been very implementation efforts. We know that we need to move away from that implementation effort and move to product integration. The reality of evolving tech is it's never all or nothing. If you're fortunate, you can deploy your cloud native application entirely on OpenShift. But what happens, we need to manage across clusters or access existing infrastructure like networks or databases. We're excited to bridge traditional container and edge through Ansible Automation. Perhaps the only automation and container platform solution that is truly agnostic Ansible just doesn't care whose platform you're running on. The new Ansible resource operator, which we deployed as part of Red Hat advanced cluster management is our answer. We're making the Ansible Automation platform a first class provider inside ACM. To enable call outs to automation assets deployed on the automation platform and to make it easily accessible to container management workflows and connect two industry leading technology platforms. Enabling this integration with our customers to identify and enforce policies, applied governance models consistently across multiple clusters, as a deploy and scale complex applications across hybrid multi cluster environments. In the future, the resource operator will be available for any OpenShift deployed service to integrate to the Ansible Automation Platform. And to find out more about this, be sure to checkout Matt Jones' "Future of Ansible Automation Talk" as well as the ACM breakout sessions. Now, as collections are about connecting technology and product integrations are about connecting process. We still need to think about connecting people. How do we ensure that users can find trusted content? So while many users are happy to get content from Ansible galaxy, we know that many enterprises are far less comfortable with that situation. And certainly not comfortable uploading private developed content themselves. We also know that galaxy isn't the only source of content for you to use. There are other source control, repositories, other locations, perhaps even file shares where you allow your teams to collaborate and connect. With all these different sources it can be hard for your users, your internal communities to connect and trust they're using approved content. So we want to connect teams, help them collaborate, have shared goals and ensure trust in how they automate. We need to fill that gap. And that's why last year we launched the automation hub on cloud@redhat.com. As a trusted source for download downstream certified Ansible content supported as part of ground sports automation platform subscription. And this is where you access the collections for those 50 certified platforms I mentioned earlier. But that was only part one of the plan. So while we can provide a location for trusted content that doesn't bring together content from other sources. Before, I mentioned collections were introduced to help the management of automation content. By adopting collections, you provide a path for automation developers to bring content together in a common location, allow multiple teams to increase their time to value in the automation adoption journeys. But to connect internal communities of practice, we need to provide a focal point for all things related to automation content. And that's why we're pleased to announce that the private version of automation hub will be released to the content and knowledge management component of the Ansible Automation Platform. Your privately hosted location for all your Ansible content, to allow you to curate which content is available from which sources, whether it's from Red Hat, the Ansible community, or develop internally. You now have the control over which content you trust. Finally, this year we launched our third hosted service and no additional cost to platform customers. The automation services catalog. The purpose of this service was to allow you to connect your business users with rules-based governance and a simplified user experience to the automation creator deployed via the platform. We're announcing a tech preview launch with the connected technology security connect to your own prem platform environments. It's based on a technology that's part of our future plans. And again, if you attend Matt Jones' "Future of Ansible Automation Talk", you'll hear more about what we're planning in this area. Because this year has been somewhat challenging, automation and Ansible have become more important to many individuals and organizations. So I could leave you with one set of thoughts to adapt and to change as we face, keep things simple, participate in making automation happen and understand the problems to be solved, but always try and keep it simple. Evolve and scale as you connect your teams, as you would grow and expand your automation, grow and expand the scale you're working at as you move forward. And collaborate to break down the silos and domains that build and build your automation that makes change possible. Whether you're an Ansible expert or someone looking for some way to start, we have sessions we hope will inspire you to make your own changes and sessions that will give you the knowledge of how to adapt for the future. Thank you and happy automating.
SUMMARY :
And to collaborate, we need to connect.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Richard Henshall | PERSON | 0.99+ |
Matt Jones' | PERSON | 0.99+ |
Last year | DATE | 0.99+ |
two platforms | QUANTITY | 0.99+ |
last year | DATE | 0.99+ |
Ansible | ORGANIZATION | 0.99+ |
50 certified platforms | QUANTITY | 0.99+ |
cloud@redhat.com | OTHER | 0.99+ |
both | QUANTITY | 0.99+ |
OpenShift | TITLE | 0.98+ |
over 50 certified platforms | QUANTITY | 0.98+ |
one set | QUANTITY | 0.97+ |
Ansible galaxy | ORGANIZATION | 0.97+ |
third hosted service | QUANTITY | 0.96+ |
this year | DATE | 0.95+ |
Ansible Automation | ORGANIZATION | 0.95+ |
Kubernetes | TITLE | 0.92+ |
Future of Ansible Automation Talk | TITLE | 0.92+ |
this summer | DATE | 0.91+ |
first class | QUANTITY | 0.9+ |
over 4000.5 modules | QUANTITY | 0.89+ |
Red Hat | ORGANIZATION | 0.89+ |
last 12 months | DATE | 0.89+ |
single offering | QUANTITY | 0.89+ |
part one | QUANTITY | 0.84+ |
Linux Windows | TITLE | 0.77+ |
Red Hat | TITLE | 0.77+ |
two industry leading technology platforms | QUANTITY | 0.73+ |
Red Hat OpenShift | TITLE | 0.72+ |
pandemic | EVENT | 0.71+ |
Hat | ORGANIZATION | 0.7+ |
one | QUANTITY | 0.68+ |
1.0 | QUANTITY | 0.67+ |
Red | EVENT | 0.66+ |
Future of Ansible Automation | TITLE | 0.63+ |
Ansible Automation Platform | TITLE | 0.61+ |
ITA | ORGANIZATION | 0.61+ |
ACM | ORGANIZATION | 0.6+ |
Red | TITLE | 0.55+ |
Ansiblefest | EVENT | 0.43+ |
Talk | EVENT | 0.43+ |
Fest | EVENT | 0.4+ |
Automation | TITLE | 0.3+ |
Richard Gagnon, City of Amarillo | CUBE Conversation June 2020
>> From theCUBE Studios in Palo Alto and Boston, connecting with thought leaders all around the world, this is a Cube Conversation. >> Hi, I'm Stu Miniman and welcome to this Cube Conversation. I'm coming to you from our Boston area studio, and we always love when we get to talk to practitioners, and not just any practitioner. CIOs, obviously under huge pressures in general, but in today's day and age, lots of pressures on the CIO. So, I'm happy to welcome to the program Rich Gagnon. He is the CIO from the city of Amarillo in Texas. Rich, thank you so much for joining us. >> Glad to be here. Thanks for inviting me. >> All right, so, you know, CIO in a city in Texas, why don't you give us a little bit of what your role entails, a little bit of your background, and looking forward to the conversation. >> So, my background is actually more from the private sector side of the house. Previous to coming to the city of Amarillo, I was the Vice President of Systems Engineering for Palo Alto Networks, for the Americas. Before that, the Global Vice President of Systems Engineering for F5 Networks, and before that, the Director of Global Infrastructure for GameStop. So I stepped into government with a very private-sector, profit-centered mindset, if you will, coming from very high-growth companies. My role with the city is really to be an enabler for local government, to drive not only IT direction, but as a smaller community, I also have to wear the CSO hat, and the Data Privacy Officer hat. Pretty much anything when it comes to leadership of IT and technology, as an enabler to the government, that role falls on me. >> Wow, so a pretty broad mandate that you have there. Rich, give us a little bit, how does that span? How many constituents do you have in your infrastructure, your IT? Maybe you can sketch that out a little bit for us, too. >> Sure, so, I've had peers from the private sector ask me, "What's it like to actually lead in local government?" And the best comparison I can come up with is someone like GE. I have 49 different subsidiaries, different departments that operate as individual business units, only I don't have GE's money or their staff. We have 200,000 people and the departments we support span everything, from the obvious, like public safety, police, fire. We have an airport, a public clinic, water treatment plants, public health. There are streets, all the infrastructure departments. It's very diverse. >> Wow. And with all of those constituents that you have, why don't you give us the pre-COVID-19 discussion first, which is, what are some of those pressures there, from a budgeting standpoint? Are there specific initiatives you've been driving? And how are you responding to all those variables? >> Sure. Well, coming in, it was a little jarring. City leadership was very transparent that the city had sort of stood still for about a decade. I come from a high-growth environment where money was not the precious resource, really. It was always time. It was about speed to market. How do we get competitive advantage and move fast enough to maintain it? That was not the case here. I stepped into an environment where the limitations were Cat 3 cable and switches that still ran CatOS. The year before I came in, the big IT accomplishment was finally completing the migration to Windows 7 and Office 2007. That's where we started. So, for the past three years, I guess I'm starting my fourth year, we have undergone massive transformation. I think my staff thinks I'm a bit of a maniac, because we've run like we were being chased by a rabid dog. We have updated, obviously, the Layer 1 infrastructure, replaced the entire network. We've rolled out a new data center that's all hyper-converged. That enabled us to move our security model from the traditional Layer 3 firewall at the edge to a contextually-based data center with regulation on east-west traffic and segregation. We have rolled out VDI and Office 2016 and Windows 10. It's been a lot. >> Yeah, it really sounds like you went through multiple generations of change there. It's almost like going a decade forward, not just one step forward. Bring us through a little bit, that transformation. Obviously, there should be some clear efficiencies you had, but give us kind of the before and after as you started to deploy some of these technologies. Was there some reskilling? Did you hire some new people? How did that all go? >> Very much so. And like everything, it starts with financials, right? All of the resources at the city within IT were focused on operations, so there was literally no capital budget. As where typically you would update as you go, and update infrastructure, what happened was, as the infrastructure aged, the approach was to hire more staff to try to keep aging infrastructure up and running. That's a failing strategy. So, by moving to HCI, we've actually recovered about 26% of our operating budget, which allowed us to move that money into innovation and infrastructure updating. It took a tremendous amount of reskilling. Fortunately, the one thing that's been, I think, most surprising to me coming to local government, is the creativity of the staff. They were hungry for change. They were excited by the opportunity to move things forward. So, we spent an entire year doing nothing but training. We had a massive amount of budget poured into, "Let's bring the staff up to speed. "Let's get as many vendors in front of them as possible. "Let's get them educated on where the trends are going. "What is hyper-converged architecture "and why does it matter? "What is DevOps and why is the industry heading that way?" So as I said, we started, really, Layer 2-3, established that, built out the new data center, and now our focus is now, we built that platform, and our focus is starting to shift onto business relationship management. We've met with all 49 departments. We do that every six months. We're building 49 different roadmaps for every department, on "What applications are you using? "How do we help you modernize? "How do we help you serve the citizens better?" Because that's how IT serves the community. We serve the community by serving the departments that serve them directly, and being an innovation engine, if you will, for local government, to drive through new applications and ways to serve. So the transition has really started to happen is we've gotten that base platform out of the way and the things that were blocking us from saying, "Yes, and we can do more." >> Wow, so Rich, it's been an interesting discussion as the global pandemic has hit, so many people have talked about, "Boy, when I think about working from home "or managing in this environment, if I was using "10- or 15-year-old technology, "I don't know how, "or if I'd be able to do any of what I had." So, I know Dell brought you over, you're talking HCIs, so I believe you're talking about VxRail as your HCI platform. Talk to us about what HCI enabled as you needed to shift to remote workforce and support, that overall urgent need. >> It's been massive. And it's been interesting to see the IT team absorb it. As we matured, I think they embraced the ability to be innovative and to work with our departments, but this instance really justified why I was driving progress so fervently, why it was so urgent to me. Three years ago, the answer would have been no. We wouldn't have been in a place where we could adapt. With VxRail in place, in a week, we spun up hundreds of instant clones. We spun up a 75-person call center in a day and a half for our public health. We rolled out multiple applications for public health so they could do remote clinics. It's given us the flexibility to be able to roll out new solutions very quickly and be very adaptive. And it's not only been apparent to my team, but it's really made an impact on the business, and now what I'm seeing is those of my customers that were a little lagging or a little conservative are understanding the impact of modernizing the way they do business because it makes them adaptable as well. >> All right, so, Rich, you talked a bunch about the efficiencies that HCI put in place. How about that overall management? You talked about how fast you spun up these new VDI instances. You need to be able to do things much simpler. How does the overall lifecycle management fit into this discussion? >> It makes it so much easier. In the old environment, one, it took a lot of man hours to make change. It was very disruptive when we did make change. It overburdened, I guess that's the word I'm looking for. It really overburdened our staff to cause disruption to business. It wasn't cost-efficient. And then, simple things, like, I've worked for multi-billion dollar companies where we had massive QA environments that replicated production. You simply can't afford that at local government. Having this sort of environment lets me do a scaled-down QA environment, and still get the benefit of rolling out non-disruptive change. As I said earlier, it's allowed us to take all of those cycles that we were spending on lifecycle management, because it's greatly simplified, and move those resources and reskill them in other areas where we can actually have more impact on the business. It's hard to be innovative when 100% of your cycles are just keeping the ship afloat. >> Well, it's definitely a great proof point. So often, you deploy a solution, and when push comes to shove, will it deliver on that value that we're hoping for? HCI has been around for quite a while, but a crisis like this, how can you move past, how can your team respond? Congratulations to your team on that. The Dell team has recently done a number of updates on the VxRail platform. I'm curious, as someone who's been using the platform, what particularly is interesting to you, and what pieces of that have the most relevance to your organization? >> There are a few. So we're starting to look at our SCADA environments, industrial controls. And we're looking at some processing at the edge in those environments. So the new organized D series are interesting. There's some plant environments where that might really make sense to us. We've also partnered with our local counties and we have a DR site where being able to extend the network out to that DR site is going to be very powerful for us. And then there's just some improvements in vSphere that will allow us to do a little QA-ing, if you will, on new code before we roll it out, that I think will have a pretty huge impact for us as well. >> Excellent. So, Rich, when you think about the services that you need to deliver to all of your constituencies, walk us through how the pandemic has affected the team, how you're making sure that your employees are taken care of, but that you can still deliver all of those services. >> So from an internal perspective, not running a legacy architecture has made that a whole lot easier. We've remoted most of the IT team. Our entire development team is at home. Most of our support team is at home. Most of the city is still at home. So being able to do that, one, just having the capability has been huge for us. But also, from a business perspective, it's allowed most of our city functions just to keep running. So, modified services, for sure, but we're still functioning, and I just don't think that would have been capable, we wouldn't have been capable of supporting that, even two and a half years ago. >> So, Rich, we've talked a bit about your infrastructure. I'm curious, is the city, are you leveraging any public cloud environments, or any specific SaaS solutions that are enabling some of what you're doing today also? >> Yes, and we could probably have a 30-minute discussion on what is hybrid cloud and what is multicloud. In our instance, we are leveraging quite a bit of SaaS. We've migrated a lot of our services to SaaS offerings. We have spun up several applications in the cloud. I wouldn't call them truly hybrid. In my mind, hybrid is, I am able to take the workload and very seamlessly move it between my private infrastructure and one or more clouds. This is more, workloads specifically assigned to a public cloud. But yes, we've leveraged that. Simple things like Office365 and Outlook, but just as powerful for us has been VDI and being able to offer Horizon to our employees at home. And, with my other hat on, still maintain the contextual-based security, right? So I didn't have to open up the kingdom. I can still maintain the control that I need to to be able to sleep at night. >> Yeah, it's interesting. One of the questions I love to ask someone in your position is the role of data, how you think of security, how you think of the technology and put those together. Does it help that you wear both the CSO hat and the CIO hat? How do you think about leveraging data? Is there anything that you're sharing with other municipalities, without giving up, of course, personal information? >> Sure. It causes a lot of internal arguments, right? Because there's the two halves of my brain: the CIO half that wants to roll out as much service as I can and be innovative, and the CSO half of my brain that thinks about the exposure of the service that I'm about to roll out. That's part of where we're migrating now as we start to look into our whole approach to data. We've got the platform in place. We're now really migrating our thinking into revamping the way we look at data. I have seven sources for the same data. How do I consolidate and have one source of truth, and where does that reside? My development team is really starting to migrate out of classic development and more into the automation side of the house. How are we interfacing with all of our vendors? That's in review now. And how are we tying to third-party apps? Yeah, that's really the point we're at in our maturity that, now that the infrastructure is in place, we're now migrating to, "what is our data plan?" >> Excellent. Final question I have for you, Rich. I'd love your thoughts on the changing role of CIO. I loved the discussion you had at the beginning going from, really, the private sector to the public sector. Obviously, unique pressures on all businesses right now dealing with the global pandemic, but how do you see the role of the CIO today and how has it been changing? >> I think there's an expectation that you bring value to the business, whether that's local government, or retail, or banking. I think the expectation is that you're not just managing an infrastructure or managing a team, and providing service, but how do you bring actual value to the organization that you serve? And that means that you have to understand the business and all aspects of the business. I think you have to, at least I do as a CIO, I have to spend a tremendous amount of time understanding my internal customer and what are they trying to accomplish, and often, to show them a new way that they just may not be aware of. So I think there's a little more expectation as a CIO that you're going to drive value to whatever business that you're serving. >> Well, Rich, thank you so much. Really enjoyed the conversation. Congratulations on being able to react fast. So glad that you were able to get the transformation project done ahead of this hitting, because otherwise, it would have been a very different conversation. Thanks so much for joining us. >> Thank you. >> All right, I'm Stu Miniman. Stay safe and thank you for watching theCUBE.
SUMMARY :
leaders all around the world, I'm coming to you from Glad to be here. and looking forward to the conversation. and before that, the Director mandate that you have there. And the best comparison I can come up with constituents that you have, and move fast enough to maintain it? as you started to deploy and the things that were as the global pandemic has hit, impact on the business, How does the overall lifecycle management and still get the benefit have the most relevance So the new organized D the services that you need to deliver Most of the city is still at home. I'm curious, is the and being able to offer Horizon One of the questions I love to and the CSO half of my I loved the discussion and all aspects of the business. So glad that you were able to Stay safe and thank you
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
GE | ORGANIZATION | 0.99+ |
10 | QUANTITY | 0.99+ |
Rich Gagnon | PERSON | 0.99+ |
Stu Miniman | PERSON | 0.99+ |
Boston | LOCATION | 0.99+ |
June 2020 | DATE | 0.99+ |
100% | QUANTITY | 0.99+ |
Richard Gagnon | PERSON | 0.99+ |
Rich | PERSON | 0.99+ |
Amarillo | LOCATION | 0.99+ |
Dell | ORGANIZATION | 0.99+ |
30-minute | QUANTITY | 0.99+ |
Palo Alto | LOCATION | 0.99+ |
seven sources | QUANTITY | 0.99+ |
Texas | LOCATION | 0.99+ |
one source | QUANTITY | 0.99+ |
fourth year | QUANTITY | 0.99+ |
75-person | QUANTITY | 0.99+ |
49 different subsidiaries | QUANTITY | 0.99+ |
Windows 10 | TITLE | 0.99+ |
Outlook | TITLE | 0.99+ |
49 departments | QUANTITY | 0.99+ |
200,000 people | QUANTITY | 0.99+ |
One | QUANTITY | 0.99+ |
Windows 7 | TITLE | 0.99+ |
one | QUANTITY | 0.99+ |
Office 2007 | TITLE | 0.99+ |
vSphere | TITLE | 0.99+ |
Office 2016 | TITLE | 0.99+ |
Global Infrastructure | ORGANIZATION | 0.99+ |
VxRail | TITLE | 0.99+ |
Office365 | TITLE | 0.98+ |
VDI | TITLE | 0.98+ |
two halves | QUANTITY | 0.98+ |
both | QUANTITY | 0.98+ |
Three years ago | DATE | 0.98+ |
a week | QUANTITY | 0.98+ |
Americas | LOCATION | 0.97+ |
Layer 2-3 | OTHER | 0.97+ |
about 26% | QUANTITY | 0.96+ |
today | DATE | 0.96+ |
HCI | ORGANIZATION | 0.96+ |
49 different roadmaps | QUANTITY | 0.95+ |
SCADA | ORGANIZATION | 0.94+ |
Vice President | PERSON | 0.94+ |
one step | QUANTITY | 0.94+ |
a day and a half | QUANTITY | 0.93+ |
CatOS | TITLE | 0.92+ |
multi-billion dollar | QUANTITY | 0.9+ |
first | QUANTITY | 0.9+ |
Global Vice President | PERSON | 0.9+ |
two and a half years ago | DATE | 0.88+ |
Layer 1 | OTHER | 0.88+ |
theCUBE Studios | ORGANIZATION | 0.88+ |
15-year-old | QUANTITY | 0.88+ |
hundreds of instant clones | QUANTITY | 0.84+ |
pandemic | EVENT | 0.82+ |
Palo Alto Networks | ORGANIZATION | 0.81+ |
about a decade | QUANTITY | 0.78+ |
six months | QUANTITY | 0.78+ |
Engineering | PERSON | 0.78+ |
past three years | DATE | 0.78+ |
F5 Networks | ORGANIZATION | 0.77+ |
Director | PERSON | 0.76+ |
Conversation | EVENT | 0.76+ |
GameStop | ORGANIZATION | 0.76+ |
-COVID-19 | OTHER | 0.76+ |
Systems | ORGANIZATION | 0.75+ |
half | QUANTITY | 0.7+ |
Cat 3 | COMMERCIAL_ITEM | 0.68+ |
one thing | QUANTITY | 0.66+ |
Cube | ORGANIZATION | 0.65+ |
Horizon | TITLE | 0.64+ |
3 | OTHER | 0.62+ |
global | EVENT | 0.56+ |
HCI | TITLE | 0.5+ |
Richard A. Clarke, National Security & Cyber Risk Expert | Qualys Security Conference 2019
>> Announcer: From Las Vegas, it's theCUBE. Covering Qualys Security Conference 2019, brought to you by Qualys. >> Hey welcome back everybody, Jeff Frick here with theCUBE, we're in Las Vegas at the Bellagio, at the Qualys Security Conference, pretty amazing, it's been going on for 19 years, we heard in the keynote. It's our first time here, and we're excited to have our first guest, he was a keynote earlier this morning, the author of nine books, Richard Clarke, National Security and Cyber Risk expert, and author most recently of "The Fifth Domain." Dick, great to see you. >> Great to be with you. >> Absolutely. So you've been in this space for a very long time. >> I started doing cybersecurity in about 1996 or 1997. >> So early days. And preparing for this, I've watched some of your other stuff, and one of the things you said early on was before there was really nothing to buy. How ironic to think about that, that first there was a firewall, and basic kind of threat protection. Compare and contrast that to walking into RSA, which will be in a couple of months in Moscone, 50,000 people, more vendors than I can count on one hand, now there's too much stuff to buy. Do you look at this evolution? What's your take? And from a perspective of the CIO and the people responsible for protecting us, how should they work through this morass? >> Well, the CIO and the CFO, got used to thinking cyber security costs a little bit, 'cause you can only buy, this is 1997, you can only buy antivirus, firewall, and maybe, in 1997, you could buy an intrusion detection system. Didn't do anything, it just went "beep," but you could buy that too. So you had three things in 1997. And so that resulted in the IT budget having to take a tiny little bit of it, and put it aside for security, maybe 2%, 3% of the budget. Well, now, if you're only spending 2 or 3% of your IT budget on security, somebody owns your company, and it's not you (laughs). >> And that's 2 or 3% of the IT budget, that's not the whole budget. >> No, that's the IT budget. What we found in researching the book, is that secure companies, and there are some, there's companies that don't get hacked, or they get hacked, but the hack gets in, immediately contained, identified, quarantined. The damage is done, but it's easily repaired. Companies that are like that, the resilient companies, are spending 8%, 10%, we found companies at 12 and 17%, of their IT budget on security, and to your point, how many devices do you have to buy? You look at the floor at any of these RSA Conventions, Black Hat, or something, now there are 2000 companies at RSA, and they're all selling something, but their marketing message is all the same. So pity the poor CSO as she goes around trying to figure out, "Well, do I want to talk to that company? "What does it do?" We found that the big banks, and the big corporations, that are secure, have not three, anymore, but 75, 80, different, discreet cybersecurity products on their network, most of it software, some of it hardware. But if you've got 80 products, that's probably 60 vendors, and so you got to, for yourself, there's the big challenge, for a CSO, she's got to figure out, "What are the best products? "How do they integrate? "What are my priorities?" And, that's a tough task, I understand why a lot of the people want to outsource it, because it's daunting, especially for the small and medium-size business, you got to outsource it. >> Right, right. So the good news is, there's a silver lining. So traditionally, and you've talked about this, we talk about it all the time too, there's people that have been hacked and know it, and people that have been hacked and just don't know it yet, and the statistics are all over the map, anywhere you grab it, it used to be hundreds of days before intrusions were detected. Kind of the silver lining in your message is, with proper investments, with proper diligence and governance, you can be in that group, some they're trying to get in all the time, but you can actually stop it, you can actually contain it, you can actually minimize the damage. >> What we're saying is, used to be two kinds of companies, those that are hacked and knew it, and those that are hacked that don't, that didn't know it. Now there's a third kind of company. The company that's stopping the hack successfully, and the average, I think, is a 175 days to figure it out, now it's 175 minutes, or less. The attack gets in, there's all the five or six stages, of what's called "the attack killchain," and gets out very, very quickly. Human beings watching glass, looking at alerts, are not going to detect that and respond in time, it's got to be automated. Everybody says they got AI, but some people really do (laughs), and machine learning is absolutely necessary, to detect things out of the sea of data, 75 different kinds of devices giving you data, all of them alarming, and trying to figure out what's going on, and figure out in time, to stop that attack, quarantine it, you got to move very, very quickly, so you've got to trust machine learning and AI, you got to let them do some of the work. >> It's so funny 'cause people still are peeved when they get a false positive from their credit card company, and it's like (laughs), do you realize how many of those things are going through the system before one elevates to the level that you are actually getting an alert? >> So the problem has always been reducing the number of false positives, and identifying which are the real risks, and prioritizing, and humans can't do that anymore. >> Right, right, there's just too much data. So let's shift gears a little bit about in terms of how this has changed, and again, we hear about it over and over, right, the hacker used to be some malicious kid living in his mom's basement, being mischievous, maybe, actually doing some damage, or stealing a little money. Now it's government-funded, it's state attacks, for much more significant threats, and much more significant opportunities, targets of opportunity. You've made some interesting comments in some of your prior stuff, what's the role of the government? What's the role of the government helping businesses? What's the role of business? And then it also begs the question, all these multinational business, they don't even necessarily just exist in one place, but now, I've got to defend myself against a nation state, with, arguably, unlimited resources, that they can assign to this task. How should corporate CIOs be thinking about that, and what is the role, do you think, of the government? >> Let's say you're right. 20 years ago we actually used to see the number of cyber attacks go up on a Friday night and a Saturday night, because it was boys in their mother's basement who couldn't get a date, you know, and they were down there having fun with the computer. Now, it's not individuals who are doing the attacks. It is, as you say, nation states. It's the Russian Army, Russian Intelligence, Russian Military Intelligence, the GRU. The North Korean Army is funding its development of nuclear weapons by hacking companies and stealing money, all over the world, including central banks, in some cases. So, yeah, the threat has changed, and obviously, a nation state is going to be far more capable of attacking, military is going to be far more capable of attacking, so, CISOs say to me, "I'm being attacked by a foreign military, "isn't that the role of the Pentagon "to defend Americans, American companies?" And General Keith Alexander, who used to run Cyber Command, talks about, if a Russian bomber goes overhead, and drops a bomb on your plant, you expect the United States Air Force to intercept that Russian bomber, that's why you pay your taxes, assuming you pay taxes. What's the difference? General Alexander says, whether that's a Russian bomber attacking your plant, or a Russian cyber attack, attacking your plant, and he says, therefore, people should assume the Pentagon will protect them from foreign militaries. That sounds nice. There's a real ring of truth to that, right? But it doesn't work. I mean, how could the Pentagon defend your regional bank? How could the Pentagon defend the telephone company, or a retail store? It can't. It can barely defend itself, and they're not doing a great job of that either, defending the federal government. So, do you really want the Pentagon putting sensors on your network? Looking at your data? No, you don't. Moreover, they can't. They don't have enough people, they don't have enough skills. At the end of the day, whatever the analogy is about how the Defense Department should defend us from foreign military attack, they can't. And they shouldn't, by the way, in my view. The conclusion that that gets you to, is you got to defend yourself, and you can, right now, if you use the technology that exists. The government has a role, sure. It can provide you warnings, it can provide the community with intelligence, it can fund development and stuff, can train people, but it cannot defend your network, you have to defend your network. >> And you have municipalities, I think it's Atlanta, is the one that keeps getting hit, there's-- >> Well Louisiana, just the other night, the whole state of Louisiana government unplugged from the internet, because it was being hit by a ransomware attack. The whole city of Baltimore's been down, the whole city of Atlanta, as you said. There's a real problem here, because people, many of them are paying the ransom, and they pay the ransom, and they get their network back right away. People ask me, "Can I trust these criminals?" Well you can trust them to give you your network back, because they have a reputation to maintain. Think about that. This whole thing about ransomware depends on their reputation, the bad guys' reputation. If they get a reputation for not giving you your network back when you pay, no one's ever going to pay, so they do give it back, and sometimes that's a lot quicker, and a lot cheaper, than saying no and rebuilding your network. But if we give them the money, what are they doing with it? Yeah, they're buying Ferraris to drive round the streets of Moscow, but some of that money is going back into R&D, so they can develop more effective attacks. >> So it's an interesting take, right, so most people, I think, would say that the cybersecurity war is completely always going to be kind of cat and mouse, whack-a-mole, that the bad guys are always a little step ahead, and you're always trying to catch up, just the way the innovation cycle works. You specifically say no, that's not necessarily always true, that there are specific things you can do to, not necessarily have an impenetrable wall, but to really minimize the impact and neutralize these threats, like a super white blood cell, if you will. So what are those things that companies should be doing, to better increase their probability, their chance, of, I don't know, blocking-- >> Depends on the size of the company. >> Absorbing. >> Depends on the size of the company. But I think whether you're a small-to-medium business, or you're an enterprise, you begin in the same place. And I do this with all of my consulting contracts, I sit down with the leadership of the company individually, and I ask every one of them, "What are you worried about? "What could happen? "What could a bad guy do to you "that matters to your company?" 'Cause what matters to one company may not matter to another company. And you can't spend your entire budget defending the network, so let's figure out exactly what risk we're worried about, and what risk we're just kind of willing to tolerate. And then, we can design security around that, and sometimes that security will be outsourced, to a managed security provider. A lot of it means getting into the cloud, because if you're in Amazon or Microsoft's cloud, you've got some security automatically built in, they've got thousands of people doing the security of the cloud, and if your server's in your basement, good luck. (laughs) >> So, as you look forward, now you said you finished the book earlier in the year, it gets published, and it's out, and that's great, but as you said, it's a fast-moving train, and the spaces develops. 10 years from now, we don't want to look at 10 years from now, it's way too long. But as you look forward the next couple, two, three years, what are you keeping an eye on, that's going to be, again, another sea change of both challenge and opportunity in this space? >> The three technologies we talk about in the book, for the three-year time horizon, 'cause I can't get beyond three years, more machine learning on the defense, but also more machine learning on the offense, and where does that balance work out? To whose advantage? Secondly, quantum computing, which, we don't know how rapidly quantum computing will come onto the market, but we do know it's a risk for some people, in that it might break encryption, if the bad guys get their hands on the quantum computer, so that's a worry. But one I think most immediately, is 5G. What 5G allows people to do, is connect millions of things, at high speed, to the internet. And a lot of those things that will be connected are not defended right now, and are outside firewalls, and don't have end-point protection, and aren't really built into networks on a secure network. So I worry about 5G empowering the Internet of Things, and doing what we call expanding the attack surface, I worry about that. >> Right, Richard, well thank you for taking a few minutes, and congrats on the book, and I'm sure within a couple of years the gears will start turning and you'll put pen to paper and kick another one out for us. >> Number 10. >> All right. He's Richard, I'm Jeff, you're watching theCUBE, we're at the Qualys Security Conference at the Bellagio in Las Vegas, thanks for watching, we'll see you next time. (upbeat music)
SUMMARY :
brought to you by Qualys. at the Qualys Security Conference, So you've been in this space for a very long time. and one of the things you said early on And so that resulted in the IT budget having to take And that's 2 or 3% of the IT budget, and so you got to, for yourself, and the statistics are all over the map, and the average, I think, is a 175 days to figure it out, So the problem has always been reducing the number and what is the role, do you think, of the government? and you can, right now, the whole city of Atlanta, as you said. that the bad guys are always a little step ahead, of the company. "What could a bad guy do to you and the spaces develops. but also more machine learning on the offense, and congrats on the book, at the Bellagio in Las Vegas,
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Microsoft | ORGANIZATION | 0.99+ |
2 | QUANTITY | 0.99+ |
United States Air Force | ORGANIZATION | 0.99+ |
Jeff Frick | PERSON | 0.99+ |
Richard | PERSON | 0.99+ |
1997 | DATE | 0.99+ |
Jeff | PERSON | 0.99+ |
Richard Clarke | PERSON | 0.99+ |
10% | QUANTITY | 0.99+ |
12 | QUANTITY | 0.99+ |
8% | QUANTITY | 0.99+ |
Amazon | ORGANIZATION | 0.99+ |
Richard A. Clarke | PERSON | 0.99+ |
Pentagon | ORGANIZATION | 0.99+ |
175 days | QUANTITY | 0.99+ |
175 minutes | QUANTITY | 0.99+ |
60 vendors | QUANTITY | 0.99+ |
Moscow | LOCATION | 0.99+ |
Las Vegas | LOCATION | 0.99+ |
Qualys | ORGANIZATION | 0.99+ |
2% | QUANTITY | 0.99+ |
Atlanta | LOCATION | 0.99+ |
five | QUANTITY | 0.99+ |
North Korean Army | ORGANIZATION | 0.99+ |
19 years | QUANTITY | 0.99+ |
Moscone | LOCATION | 0.99+ |
80 products | QUANTITY | 0.99+ |
three years | QUANTITY | 0.99+ |
two kinds | QUANTITY | 0.99+ |
17% | QUANTITY | 0.99+ |
Baltimore | LOCATION | 0.99+ |
first time | QUANTITY | 0.99+ |
Friday night | DATE | 0.99+ |
3% | QUANTITY | 0.99+ |
three technologies | QUANTITY | 0.99+ |
three-year | QUANTITY | 0.99+ |
50,000 people | QUANTITY | 0.99+ |
Defense Department | ORGANIZATION | 0.99+ |
Saturday night | DATE | 0.99+ |
75 | QUANTITY | 0.99+ |
The Fifth Domain | TITLE | 0.99+ |
Alexander | PERSON | 0.99+ |
two | QUANTITY | 0.99+ |
2000 companies | QUANTITY | 0.99+ |
GRU | ORGANIZATION | 0.99+ |
Russian Army | ORGANIZATION | 0.99+ |
Keith Alexander | PERSON | 0.99+ |
80 | QUANTITY | 0.99+ |
millions | QUANTITY | 0.99+ |
first guest | QUANTITY | 0.99+ |
nine books | QUANTITY | 0.99+ |
RSA | ORGANIZATION | 0.98+ |
third kind | QUANTITY | 0.98+ |
both | QUANTITY | 0.98+ |
Russian Intelligence | ORGANIZATION | 0.98+ |
Russian Military Intelligence | ORGANIZATION | 0.98+ |
Russian | OTHER | 0.98+ |
six st | QUANTITY | 0.98+ |
three | QUANTITY | 0.98+ |
Ferraris | ORGANIZATION | 0.98+ |
Qualys Security Conference | EVENT | 0.97+ |
10 years | QUANTITY | 0.97+ |
20 years ago | DATE | 0.97+ |
hundreds of days | QUANTITY | 0.97+ |
General | PERSON | 0.97+ |
one | QUANTITY | 0.96+ |
1996 | DATE | 0.96+ |
three things | QUANTITY | 0.96+ |
American | OTHER | 0.96+ |
Louisiana | LOCATION | 0.96+ |
one place | QUANTITY | 0.95+ |
first | QUANTITY | 0.95+ |
Qualys Security Conference 2019 | EVENT | 0.95+ |
75 different kinds of devices | QUANTITY | 0.95+ |
theCUBE | ORGANIZATION | 0.94+ |
Dick | PERSON | 0.93+ |
thousands of people | QUANTITY | 0.93+ |
Bellagio | LOCATION | 0.93+ |
one company | QUANTITY | 0.92+ |
Richard Fong, Chevron | UiPath FORWARD III 2019
>>Live from Las Vegas. It's the cube covering UI path forward Americas 2019 brought to you by UI path. >>Welcome back everyone to the cube live coverage of UI path forward here in Las Vegas. I'm your host, Rebecca Knight, co-hosting alongside of it. Dave Volante, we're joined by Richard Fong. He is the it manager, finance delivery at Chevron. Thank you so much for coming on the show that you're having me. So Chevron of course is a household name, a big oil company, but tell us a little bit about what you do, what you do there. >>The it manager, and I'm responsible for software and application engineering. My team develops custom applications for Chevron and over the last couple of years we've actually started an RPA development practice. >>Okay. So what, what were the issues, the challenges that you were experiencing where you said, Hey, maybe maybe we could get a bot to help us do? >>Yeah, yeah. There are a plethora of opportunities in Chevron to automate many, many mundane tasks. What UI path and RPA brings to the table is a very easy way to automate tasks where these tasks, maybe building a traditional like.net application would be too expensive and take too long. Using the UI path platform, we're able to very quickly build solutions and deploy them much quicker than we would have done if we had to build a traditional, like a.net application. The bots aren't coding are they? Are the bots coding the you could. We found that you don't need to do a lot of coding for these, uh, for these solutions. So that was a big help in terms of being able to deploy and automate solutions very quickly. Like what's an example? What do you mean by a solution? So, believe it or not, we, we have many people who still go through and open up attack email attachments, their Excel files or PDF files or text files and that's their day job. That's what they do all day long, four weeks, usually maybe about two weeks of doing data processing. They spend the other two weeks doing error corrections. So we are able to use UI path to develop a solution. A bot that will call through your one's inbox, open up attachments, copy and paste that data automatically into like a flat file and then they would just upload that into the ERP system. So that was a big, big win for us. And that's just one example. So >>this is, was this an it limo is interested in how RPA gets into an organization? Was that it led, was it business led, is it, is it top down? It sounds like it was an it lead >>initiative in this example. It was an it. Interestingly, it came to Chevron. Chevron's a huge organization with many different it departments actually. And for Chevron it actually started with another it manager in our supply and trading department. I think that took a look at RPA and he just brought it out and socialized it with other it managers and the finance group said, Hey, this is, this has huge potential here. So then we took it and did some proof of concepts with it and just took off with it. >>So get it going back to those employees that you were describing, whose job it was to open up email attachments and then do that data looking for aberrations. What do they do now? I mean the, this has been built to us as we are freeing up your time. You can now focus on the more creative aspects of your job. How are they spending their time >>that, that actually that played out exactly like you mentioned, there was a little bit of nervousness what these employees like, Oh my God, what's going to happen to my job? I've been doing this for years. I am comfortable with it. I'm an expert at opening attachments. Yeah, exactly. Exactly. So there was definitely some nervousness, no doubt. Um, and but what eventually happened is that we were able to redeploy these folks onto other projects and have actually a cost avoidance situation because instead of hiring new folks having to hire new folks are high, bringing in contractors, we are able to redeploy them on to higher value projects. >>Yeah. I mean, I think we hear that a lot from customers, from the vendors you hear, Oh no, everybody loves it. Which is true. Once you experienced it, you love it, but you've got to be cognizant, I would think. And I wonder if you could sort of share your experiences as to how you dealt with that, that uncomfortableness. You got to be cognizant that it's going to affect people's jobs. So what did you guys do to get people more comfortable to educate them that you're not just trying to replace them with software robots. >>Yeah, yeah. No, that's, um, you do need to be sensitive to how people will react to, you know, potentially losing their job. And actually it's not, this story's not, you're losing your job. This is an opportunity to upskill and to, you know, to grow your career. Right. Not we, you know, just doing data entry is kind of like, yeah, it's a little bit career limiting. So, you know, you kind of approach it in that context. And the other thing is Chevron's a great company to work for. W we're not, we're not purposely trying to eliminate positions. We're still growing. You know, oil is still in big demand, so it's about upskilling and reallocating people to higher value work. >>I mean, everybody's hiring, I mean this is basically 0% unemployment. So absolutely. If you're like 98 90 97% of the people you'll, you'll have a job. So right now, be interesting to see if that changes, but even in bad times, you know 90% of the people are employed. So my question is how far do you see this going? Rebecca and I were talking at the top of the our segment. In many ways you're, you're basically, you're, you're automating mundane tasks that already exists. So they're known processes. Okay. It's important you're saving money, you're freeing up undifferentiated heavy lifting. You use Gavin's term, but how far do you see this going? Do you see an opportunity to really create an automation fabric across the company? Have you guys started to think about that? Absolutely. I think >>I see it going pretty far actually. We've kind of just scratched the surface. One of the reasons why I'm here at this conference is that look at what are the new products coming out, new products and features. We're at a juncture where we need to understand now how to scale all of these solutions across the enterprise and how do we ensure also not only that things are automated, but that we are following all our governance risk and compliance procedures so that, you know, when the comptroller, our internal controls group says, you know, you're doing these, automating these financial transactions, what are you doing to make sure you're protecting the integrity of the systems as well? So I'm excited to see that the UiPath has invested quite a bit in things like information protection, security, management of bots and things like that. So that's going to help us. Um, the other thing that we, the other area that we have not fully deployed is around artificial intelligence and machine learning. So those solutions will actually help us and will give us the capability to really further automate and leverage things and ease more easier than what we do today. Most of the solutions that we've deployed are more algorithmic based, rules-based. Um, whereas some of the things that we saw about extracting semi-structured data, tempted template lists, you know, data processing, that's gonna be the next big area that we need to look into. >>So scale makes sense. Cause if you can take something that one person is saving some money on and you can scale it across the organization, I don't know how many employees Chevron has. It's a lot. Absolutely. >>Oh yeah, yeah. Miss benefit to 160 countries. You know, there's folks still the, the automation that we ran for the finance department has been mostly for the central finance groups, corporate finance, but there's financial groups all over the world with Chevron that are looking that also doing similar data processing. We haven't even gone out there yet as much as we want to. Um, but I think what we want to do is go out there this time with artificial intelligence and machine learning features of the, of the platform. So I want to double click on this. So this insecurity piece makes sense. If you're gonna scale it across, you know, 160 countries, et cetera, you got to make sure it's secure and complies. The iPad talks about a path to AI. Why is RPA a path to AI? Can you help us understand that better? Well, I think it's my connection to that. >>I was, I actually was, I was hearing, I'm hearing this talk this morning about that it good marketing and it's, you know, catches your ear. But yeah, and so I had about 20 minutes to think about it since then. I think the easy connection is that it seems, while the way they've deployed AI and ML, it's using the current UI paths UI studio, and it's a drag and drop operation for what they've, the way they're deploying AI and ML. So if you're currently using UI path studio to develop your algorithmic based automations, it's not a great leap to just bring in the AI and ML modules of UI path. >>I want to ask about that. This, this two ideas of introducing AI and ML also declining deploying bots really across the enterprise. We're really talking about change management here. And we scratched the surface a little bit saying that some employees have been happier and saying, okay, I can move over here and I can focus on these higher value areas of my career, grow my career. But there's also a great skepticism within the public about bots. I mean, we've had, we've seen the malevolent bots that really had a real effect on our election and we're seeing that in other areas of technology. How do you bring people along and say that this is a force for good and they'll trust us? Link arms with us. Bots are the future. And there, I mean, do say it, >>it's a valid point that, um, you do need to address the things where, you know, bots could go wrong, things could go rogue. You know, how did we make sure we still have control that incorrect decisions are not being automatically made. So that is a valid, that is a very valid point. And I, so I kind of go back to the whole thing about we have to have good governance risk and compliance processes supported by, uh, the flatform UI path. Um, I'm glad to hear that they made it a priority to continue invest in the platform and include governance, risk and compliance into it. Um, the other aspect from a developer, individual developer perspective is that we need to encourage the developers to put in very good checks and balances in their code to the, to develop for, you know, worst case scenarios about something happens, something goes bump in the middle of the night that your bod is able to recover or alert, you know, and, um, so, and for everything to be very transparent and audible. >>So, um, those things, I think if you do a combination of those things, I think you'll put people at ease about these solutions. How important is the SAS announcement today? Uh, in terms of a deployment model? Is that something that you know, struck a chord with you, that resident? Yeah, so, um, actually before the conference I actually, uh, registered myself for the SAS. An instance of the SAS platform and just like what, uh, they said that it takes a minute. Actually took me a minute. I wanted to say, yeah. Hey, it was just a minute. And I had, I was, you know, it was very seamless to, to develop the RPA using their SAS solution. Great. New features. So I think that has also the potential for organizations like ours that have it on prem to maybe move to a hybrid solution to so we could leverage all the new features and in the 2019 version in hybrid, because you want to maintain some kind of level of GRC compliance, that's, yeah. >>Chevron and not just sort of cookie cutter cloud and, and you know, say, and also to just to, uh, uh, we've invested a lot in the on pram and we're gonna, you know, uh, look for the, you know, get our ROI out of everything that we've done on prem, but I think maybe eventually everything's moving to the cloud. Um, so we'll probably start a journey at some point to, to their cloud version. But I think there's also, um, some, some other companies that I talked about, they do need to know how secure is the cloud version of the, of the UI path. Did you evaluate other companies besides UI path before you took on? Ah, yeah. Why are you I-PASS? I'd love to hear home. So definitely we evaluated other vendors. Um, I think the, the advantage with UI path is it's easy to use. >>Um, you know, it was a fairly, it's a fairly robust tool. Um, the, the, uh, so the concept of the studio and the orchestrator to manage your portfolio of solutions, uh, we felt that it wasn't a, it, it was a stronger product overall. When you go, you know, we've heard a lot about citizen developers and low code or no code as RPA permeates through the organization. Do you see that continuing to be an it service led? I mean, kind of an interesting role for you guys? I mean, I was saying to Rebecca before, it kind of reminds me of service now. I don't know if your service now customers that we are started on it and then you know, I don't know if you have gone into the lines of business, but it was kind of it bringing it two lines of business. Is there a similarity there and do you see RPA as pretty much? >>Very much. And I'd been in it for a really long time. So I went through the days of citizen developers doing access databases or Excel macros and then they throw it over to the fence to it to support. And these things are like, they're not compliant, you know, they're there. So we've had, I was like, we were really worried about what are we going to do with all these RPAs that these folks are going to do, you know, develop on their own. Um, I think the reality is is that we need, we are trying to push innovation out to everyone. So the reality is, is that there will, there will be citizen developers and we actually just need to embrace that and let them develop. And, but the challenges as far as an ID it department is how can we set up the processes, the infrastructure, everything else to receive all these new solutions and manage it and be, be stewards of all these new solutions. >>So I think that's going to be the challenge for our it department. And I think that's going to be something that we need UI path to help us figure out is how do we scale to have thousands of these solutions without having to hire whole army of it, support folks to leverage the tools. Maybe we need RPA for it just as much as we're doing it, RPA for the business, getting the whole house in order. Absolutely. That's going to be, that's, I think that's the key to survival. Thank you so much for coming on the cures. Great. Thank you for having me. I'm Rebecca stay tuned for more into cubes live coverage and the U AIPAC.
SUMMARY :
forward Americas 2019 brought to you by UI path. me. So Chevron of course is a household name, a big oil company, but tell us a little bit about what you do, My team develops custom applications for Chevron and over the last couple of years Hey, maybe maybe we could get a bot to help us do? Are the bots coding the you could. So then we took it and did some proof of concepts with it and So get it going back to those employees that you were describing, whose job it was to open up email attachments folks having to hire new folks are high, bringing in contractors, we are able to redeploy them on to And I wonder if you could sort of share your experiences as to how you dealt with that, that And the other thing is Chevron's a great company to work for. be interesting to see if that changes, but even in bad times, you know 90% of the people are employed. So I'm excited to see that the Cause if you can take something that one person is saving some money on and you can scale you know, 160 countries, et cetera, you got to make sure it's secure and complies. this morning about that it good marketing and it's, you know, catches your ear. you bring people along and say that this is a force for good and they'll code to the, to develop for, you know, worst case scenarios about something I was, you know, it was very seamless to, to develop the RPA and you know, say, and also to just to, uh, uh, I mean, kind of an interesting role for you guys? to do, you know, develop on their own. And I think that's going to be something that we need UI
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Rebecca | PERSON | 0.99+ |
Rebecca Knight | PERSON | 0.99+ |
Dave Volante | PERSON | 0.99+ |
Richard Fong | PERSON | 0.99+ |
Chevron | ORGANIZATION | 0.99+ |
90% | QUANTITY | 0.99+ |
Las Vegas | LOCATION | 0.99+ |
UiPath | ORGANIZATION | 0.99+ |
Excel | TITLE | 0.99+ |
2019 | DATE | 0.99+ |
iPad | COMMERCIAL_ITEM | 0.99+ |
four weeks | QUANTITY | 0.99+ |
two weeks | QUANTITY | 0.99+ |
thousands | QUANTITY | 0.99+ |
two lines | QUANTITY | 0.99+ |
Gavin | PERSON | 0.99+ |
One | QUANTITY | 0.99+ |
two ideas | QUANTITY | 0.99+ |
SAS | ORGANIZATION | 0.98+ |
160 countries | QUANTITY | 0.98+ |
one example | QUANTITY | 0.98+ |
one person | QUANTITY | 0.98+ |
about 20 minutes | QUANTITY | 0.98+ |
today | DATE | 0.98+ |
98 | QUANTITY | 0.98+ |
about two weeks | QUANTITY | 0.97+ |
a minute | QUANTITY | 0.95+ |
GRC | ORGANIZATION | 0.94+ |
90 | QUANTITY | 0.9+ |
97% | QUANTITY | 0.89+ |
U AIPAC | ORGANIZATION | 0.88+ |
0% | QUANTITY | 0.88+ |
this morning | DATE | 0.7+ |
years | QUANTITY | 0.7+ |
last couple of years | DATE | 0.7+ |
double | QUANTITY | 0.63+ |
Chevron | LOCATION | 0.55+ |
FORWARD III | TITLE | 0.55+ |
prem | ORGANIZATION | 0.54+ |
Americas | EVENT | 0.48+ |
Richard Henshall & Tom Anderson, Red Hat | AnsibleFest 2019
>>live from Atlanta, Georgia. It's the Q covering Answerable Fest 2019. Brought to you by >>Red Hat. >>Okay, welcome back. It runs two cubes. Live coverage of Ansel Fest here in Atlanta, Georgia. I'm John for a host of the Cube with stewed Minutemen. Analysts were looking angle. The Cube are next to guest Tom Anderson and most product owner. Red Hat is part of the sensible platform automation properly announced. And Richard Henshaw, product manager. Guys, welcome to the Cube Way had all the execs on yesterday and some customers all pretty jazzed up about this year, mainly around just the timing of how automation is really hitting the scene and some of the scale that's going on. You guys had big news with the answerable automation platform. New addition to the portfolio. What's the feedback? >>So far, I think the feedback has been super positive. We have customers have come to us. A lot of the last little one said, Hey, we're maturing. We're moving along the automation maturity curve, right, and we have multiple teams coming to us and saying, Hey, can you help us connect this other team? We've had a lot of success doing cloud provisioning or doing network automation were doing security automation. What have you and they're coming to us and saying, Help us give us kind of the story if you will, to be able to connect these other teams in our organization. And so that way I kind of feel the pole for this thing to move from a tool that automates this or that. This task for that task. Too much more of a platform center. >>It seems to be scaling out in terms of what automation is touching these days. And look at the numbers six million plus activations on get Hub versus other projects. So activities high in the community. But this seems to be much more broader. Scope now. Bring more things together. What's the rationale behind? What's the reasoning? What's the strategy? But the main thing is, >>automation is got to that point where it's becoming the skill set that we do. So it was always the focus. You know, I'm a database administrator. I'm assists out, man. I'm a middle where I'm a nap deaf on those people, then would do task inside their job. But now we're going to the point off, actually, anybody that can see apiece. Technology can automate piece technology in the clouds have shown This is the way to go forward with the things what we had. We bring that not just in places where it's being created from scratch, a new How do you bring that into what's existing? Because a lot of our customers have 20 or 30 years like a heritage in the I T estate. How do you do with all of that? You can't just rebuild everything into new as well. So you gotta be ableto automate across both of those areas and try and keep. You know, we say it's administrative efficiency versus organization effectiveness. Now how do I get to the point of the organization? Could be effective, supposed just doing things that make my job easier. And that's what we're gonna bring with applying automation capability that anybody can take advantage of. >>Richard. I actually felt the keynote demo this morning did a nice job of that line that they set it up with is this is this is tools that that all the various roles and teams just get it, and it's not the old traditional okay, I do my piece and set it up and then throw it over the wall. There was that, you know? Oh, I've got the notification and then some feedback loops and, you know, we huddled for something and it gets done rather fast, not magic. It's still when I get a certain piece done. Okay, I need to wait for it's actually be up and running, but you know, you're getting everybody into really a enterprise collaboration, almost with the tool driving those activities together >>on that. And that's why yesterday said that focus on collaboration is the great thing. All teams need to do that to be more successful because you get Maur inclusivity, Maurin puts. But organizations also need to coordinate what activities they're doing because they have rules, regulations, structures and standards they have to apply. Make sure that those people can do things in a way that's guided for them so that they're they're effective at what they're trying to do. >>Okay, I think I'm going to explain what's in the platform first because an engine and tower and there, what else is in there, what's new? What's what our customers is going to see. That's new. That's different >>it's the new components are automation Hope Collections, which is a technology inside answer ball itself. On also Automation Analytics and the casing is that engine and terrorist of the beating heart of the platform. But it's about building the body around the outside. So automation is about discover abilities like, What can we find out? What automation can I do that I'm allowed to do? Um, and let six is about the post activity. So I've automated all these things. I've done all this work well, How did it go? Who did what, who did? How much of what? How well did it work? How much did it failed? Succeeds and then, once you build on that, you don't start to expand out into other areas. So what? KP eyes, How much of what I do is automated versus no automated? You can start to instigate other aspects of business change, then Gamification amongst teams. Who's the Who's the boat? The closest motive here into the strategy input source toe How? >>Find out what's working right, essentially and sharing mechanism to for other groups in terms of knowing what's happening >>and how is my platform performing which areas are performing well, which airs might not be performing well. And then, as we move down the road, kind of how my performing against my peers are other organizations that are automating using the ants will automation platform doing? And am I keeping up on my doing better? That kind of stuff. >>So, Tom, there's a robust community as we was talking about. Their platform feels like it builds on yet to change the dynamic a little bit. When you talk about the automation hub and collections, you've already got a long list of the ecosystem vendors that are participating here. Bring us two through a little bit. What led Thio. You know all these announcements and where you expect, you know, how would this change the dynamics of >>the body? And maybe we'll split up that question. I'll talk a little bit about partners because it's both partners and customers in community here that's been driving us this way. I'll talk a little bit about partners and Rich talk about the customer piece here, which is partners have been traditionally distributing their content there. Ansel automation content through our engine capability. So our engine release cycle, or cadence, has been sort of the limiting factor to how fast they can get content out to their users and what what the collections does is part of the platforms allows us to separate those things. Rich talked about it yesterday in his keynote, having that stable platform. But you having yet having content be able to read fast. And our partners love that idea because they can content. They can develop content, create content, get into their users hands faster. So partners like at five and Microsoft you've seen on stage here are both huge contributors. And they've been part of the pole for us to get to the platform >>from a customer perspective. And the thing I love most about doing this job with the gas of customers is because I was a customer on Guy was danceable customer, and then I came over to this side on Dhe. I now go and see customers. I see what they've done, and I know what that's what I want to do. Or that's what I was trying to do. And she started to see those what people wanted to achieve, and I was said yesterday it is moving away from should I automate. How would we automate Maura? What should I automate? And so we'll start to see how customers are building their capabilities. And there's no there's many different ways people do. This is about different customers, >>you know. What's interesting is you guys have such a great success formula first. Well, congratulations. It's great to see how this is turning into such a wider market, because is not just the niche configuration management. More automation become with cloud to point a whole new wider category. So congratulations. The formula we see with success is good product, community customers adopting and then ecosystem that seems to be the successful former in these kinds of growth growth waves you guys experiencing? What is the partnering with you mentioned? S five Microsoft? Because that, to me, is gonna be a tipping point in a tel sign for you guys because you got the community. You got the customers that check check ecosystem. What's the partner angle? How do they involve? Take us through that. What's going on? They're >>so you're absolutely so you know, kind of platform velocity will be driven by partner adoption and how many things customers can automate on that platform or through that platform and for us I mean, the example was in the demo this morning where they went to the automation hub and they pulled down the F five collection, plugged it into a workflow, and they were automating. What are partners? Experience through their customers is Look, if I'm a customer, I have a multi cloud environment or hybrid cloud environment. I've got automation from AWS. I've got azure automation via more automation. Five. Got Sisko. I've got Palo Alto. I've got all these different automation tools to try and string them together, and the customers are coming and telling those vendors Look, we don't want to use your automation to end this automation tooling that one we want to use Ansel is the common substrate if you will automation substrate across this platform. So that's motivating the partners to come to us and say, Hey, I had I was out five Aspire last week, and they're all in a natural. I mean, it's really impressive to see just how much there in unanswerable and how much they're being driven by their customers when they do Ansell workshops without five, they say the attendance is amazing so they're being pulled by their customers and therefore the partners are coming to us. And that's driving our platform kind of usability across the across the scale. >>Another angle we'll see when we talk to the engineers of the partners that are actually doing the work to work with danceable is that they're seeing is ah, change also in how they it's no longer like an individual customer side individual day center because everything is so much more open and so much more visible. You know there's value in there, making it appealing and easy for their customers to gain advantage of what they're doing. And also the fact that the scales across those customers as well because they have their internal team's doing it, saying the same things and so bringing them to an automation capable, like Ansel have to push. That means that they also gained some of the customers appreciation for them, making it easier to do their tasking collaboration with us and you know, the best collaborations. We've got some more partners, all initiated by customers, saying Hey, I want you to go and get danceable content, >>the customer driving a lot of behavior, the guest system. Correct. On the just another point, we've been hearing a lot of security side separate sector, but cyber security. A lot of customers are building teams internally, Dev teams building their own stacks and then telling the suppliers a support my AP eyes. So now you start to see more of a P I integration point. Is that something that is gonna be something that you guys gonna be doubling down on? What's that? What's the approach there? How does that partner connected scale with the customers? So we've >>been eso Ansel security automation, which is the automation connecting I. P. S. C. P. S that kind of stuff. It is almost a replay of what we did the network automation space. So we saw a need in the network automation space. We feel that we became a catalyst in the community with our partners and our customers and our and our contributors. And after about three years now, Ansel Network automation is a huge piece of our business and adoption curve. We're doing the exactly see the exact same thing in the security automation space compliance. The side over here, we're talking about kind of automating the connections between your firewalls, your threat detection systems and all that kind of stuff. So we're working with a set of partners, whether it's Cisco, whether it's Palo Alto, whether it's whether it's resilient by the EMS, resilient and being able to connect and automate the connections between the threat and the response and and all of that kind of >>the same trajectory as the network automation >>Zach. Same trajectory, just runnin the same play and it's working out right now. We're on that kind of early part of that curve, that adoption curve, and we have partners jumping in with us. >>You're talking to customers. We've heard certain stories. You know how I got, you know, 1000 hours of work down to a dozen hours of work there. Is there anything built into the tool today that allows them to kind of generate those those hero stats O. R. Any anything along those lines? >>Talk about analytic committee from yes, >>well, again without any analytic side. I mean, those things starts become possible that one of the things we've been doing is turning on Maur more metrics. And it's actually about mining the data for the customer because Tower gives this great focal point for all the automation that's going on. It's somewhere that everything comes through. So when we export that and then we can we can do that work for all the customers rather than have to duel themselves. Then you start to build those pictures and we start with a few different areas. But as we advance with those and start, see how people use them and start having that conversation customers about what data they want to use and how they want to use it, I think that's gonna be very possible. You know, it's so >>important. E think was laid out here nicely. That automation goes from a tactical solution to more strategic, but more and more how customers can leverage that data and be data driven. That's that's gonna drive them for it. And any good customer examples you have of the outcomes. No, you're talking to a lot of >>PS one from this morning. Yeah, >>so I mean, I'll be Esther up this morning, and I think that the numbers they used in the demo that she's like, you know, last year they did 100,000 from launch to the end of the year. 100,000 changes through their platform on this year so far that in a 1,000,000. So now you know, from my recollection, that's about the same time frame on either side of the year. So that's a pretty impressive acceleration. Side of things. We've had other ones where people have said, You know how many times you were telling some customers yesterday? What used to take eight hours to a D R test with 20 or 30 people in for the weekend now takes 12 minutes for two People on the base is just pushing a few buttons just as they go through and confirm everything worked that that type of you can't get away from that type of change. >>J. P. Morgan example yesterday was pretty compelling. I mean, time savings and people are, I mean, this legit times. I mean, we're talking serious order of magnitude, time savings. So that's awesome. Then I want to ask you guys, Next is we're seeing another pattern in the market where amongst your customer base, where it's the same problem being automated, allover the place so playbooks become kind of key as that starts to happen is that where the insights kind of comes in? Can you help us kind of tie that together? Because if I'm a large enterprise with its I'm decentralized or centralized, are organized problem getting more gear? I'm getting more clouds, game or operations. There's more surface area of stuff and certainly five g I ot is coming around the corner. Mention security. All this is expanding to be much more touchpoints. Automation seems to be the killer app for this automation, those mundane task, but also identifying new things, right? Can you guys comment on that? >>Yeah, so maybe I'll start rich. You could jump in, which is a little bit around, uh, particularly those large accounts where you have these different disparate teams taking a approach to automate something, using Ansel and then be able to repeat or reuse that somewhere else. The organization. So that idea of being for them to be able to curate they're automation content that they've created. Maybe they pulled something down from galaxy. Maybe they've got something from our automation husband. They've made it their own, and now they want to curate that and spread it across the organization to either obviously become more efficient, but also in four standards. That's where automation hub is going to come into play here. Not only will it be a repo for certify content from us and our partners, but it will also be an opportunity for them to curate their own content and share it across the organization. >>Yeah, I think when you tie those two things together and you've got that call discover abilities, I had away go and find what I want. And then the next day, the next day, after you've run the automation, you then got the nerve to say, Well, who's who's using the right corporate approved rolls? Who's using the same set of rolls from the team that builds the standards to make sure you're gonna compliant build again, showing the demo That's just admin has his way of doing it, puts the security baseline application on top and you go, Oh, okay, who's running that security baseline continuously every time. So you can both imposed the the security standards in the way the build works. But you can also validate that everybody is actually doing the security standards. >>You what I find fascinating about what you guys are doing, and I think this is came out clearly yesterday and you guys are talking about it. And some of the community conversations is a social construct here. Going on is that there's a cultural shift where the benefits that you guys are throwing off with the automation is creating a network effect within the companies. So it's not just having a slack channel on texting. The servers are up or down. It's much more of a tighter bond between the stakeholders inside the company's. Because you have people from different geography is you have champions driving change. And there's some solidarity happening between the groups of people, whether they're silo door decentralized. So there's a whole new social network, almost a cultural shift that's happening with the standardization of the substrate. Can you guys comment on this dynamic? Did you see this coming? You planning forward? Are you doubling down on it? >>I think so. And we talk about community right on how important that is. But how did you create that community internally and so ask balls like the catalyst so most teams don't actually need to understand in their current day jobs. Get on all the Dev ops, focus tools or the next generation. Then you bring answer because they want to automate, and suddenly they go. Okay, Now I need to understand source control, and it's honest and version. I need to understand how to get pulls a full request on this and so on and so forth on it changes that provides this off. The catalyst for them to focus on what changed they have to make about how they work, because what they wanted to do was something that requires them to do you no good disciplines and good behaviors that previously there was no motivation or need to do. I think >>Bart for Microsoft hit on that yesterday. You know, if you saw Bart Session but their network engineers having to get familiar with concepts of using automation almost like software development, life cycles right and starting to manage those things in repose. And think of it that way, which is intimidating at first for people who are not used to. But once they're over that kind of humping understand that the answer language itself is simple, and our operations person admin can use it. No problem, >>he said himself. Didn't my network engineers have become network developers. >>It's funny watching and talking to a bunch of customers. They all have their automation journey that they're going through. And I hear the Gamification I'm like, Okay, what if I have certain levels I have to reach in it unlocked capabilities, you know, in the community along the way. Maybe that could build a built in the future. >>Maybe it's swag based, you know, you >>get level C shows that nice work environment when you're not talking about the server's down on some slack channel when you're actually focusing on work. Yeah, so that mean that's the shift. That's what I'm saying, going >>firefighting to being able to >>do for throwing bombs. Yeah, wars. And the guy was going through this >>myself. Now you start a lot of the different team to the deaf teams and the ops teams. And I say it would be nice if these teams don't have to talk to complain about something that hadn't worked. It was Mexican figured it was just like I just like to talk to you because you're my friend. My colleague and I'd like to have a chat because everything's working because it's all automated, so it's consistent. It's repeatable. That's a nice, nice way. It can change the way that people get to interact because it's no longer only phoned me up when something's wrong. I think that absent an interesting dynamic >>on our survey, our customer base in our community before things one of the four things that came up was happier employees. Because if they're getting stuff done and more efficient, they have more time to actually self actualizing their job. That becomes an interesting It's not just a checkbox in some HR manual actually really impact. >>And I kind of think the customers we've heard talk rvs, gentlemen, this morning gave me a lot of the fear initially is, well, I automate myself out of a job, and what we've heard from everybody is that's not absolutely That's not actually true at all. It just allows them to do higher value things that, um or pro >>after that big data, that automation thing. That's ridiculous. >>I didn't use it yesterday. My little Joe Comet with that is when I tried to explain to my father what I do. Andi just said Well, in the 19 seventies, they said that computers you mean we'll do a two day week on? That hasn't come >>true. Trade your beeper and for a phone full of pots. But Richard, Thanks for coming on. Thanks for unpacking the ants. Full automation platforms with features. Congratulations. Great to see the progress. Thank you, Jonah. Everybody will be following you guys to Cuba. Coverage here in Atlanta, First Amendment Stevens for day two of cube coverage after this short break.
SUMMARY :
Brought to you by I'm John for a host of the Cube with A lot of the last little one said, Hey, we're maturing. And look at the numbers six million automation is got to that point where it's becoming the skill set that we do. I actually felt the keynote demo this morning did a nice job of that line that they set to be more successful because you get Maur inclusivity, Maurin puts. Okay, I think I'm going to explain what's in the platform first because an engine and tower and there, What automation can I do that I'm allowed to do? And then, as we move down the road, kind of how my performing against my peers are other organizations that are automating You know all these announcements and where you expect, or cadence, has been sort of the limiting factor to how fast they can get content out to their users and And the thing I love most about doing this job with the gas of customers What is the partnering with you So that's motivating the partners to come to us and say, Hey, I had I was out five team's doing it, saying the same things and so bringing them to an automation capable, So now you start to see more of a P I integration point. We're doing the exactly see the exact same thing curve, that adoption curve, and we have partners jumping in with us. You know how I got, you know, 1000 hours of work down to And it's actually about mining the data And any good customer examples you have of the outcomes. PS one from this morning. So now you know, allover the place so playbooks become kind of key as that starts to happen So that idea of being for them to be able to curate they're automation content that they've created. puts the security baseline application on top and you go, Oh, okay, who's running that security baseline You what I find fascinating about what you guys are doing, and I think this is came out clearly yesterday and you guys are talking about it. that requires them to do you no good disciplines and good behaviors that previously there was no motivation or You know, if you saw Bart Session but their network engineers having to get familiar Didn't my network engineers have become network developers. And I hear the Gamification I'm like, Okay, what if I have certain levels I have Yeah, so that mean that's the shift. And the guy was going through this to you because you're my friend. Because if they're getting stuff done and more efficient, they have more time to actually And I kind of think the customers we've heard talk rvs, gentlemen, this morning gave me a lot of the fear initially after that big data, that automation thing. Andi just said Well, in the 19 seventies, they said that computers you mean we'll do a two day week on? Everybody will be following you guys to Cuba.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Richard Henshaw | PERSON | 0.99+ |
Tom | PERSON | 0.99+ |
Tom Anderson | PERSON | 0.99+ |
Richard | PERSON | 0.99+ |
Cisco | ORGANIZATION | 0.99+ |
Microsoft | ORGANIZATION | 0.99+ |
12 minutes | QUANTITY | 0.99+ |
20 | QUANTITY | 0.99+ |
Cuba | LOCATION | 0.99+ |
100,000 | QUANTITY | 0.99+ |
Atlanta | LOCATION | 0.99+ |
AWS | ORGANIZATION | 0.99+ |
Ansel | ORGANIZATION | 0.99+ |
Rich | PERSON | 0.99+ |
Jonah | PERSON | 0.99+ |
1000 hours | QUANTITY | 0.99+ |
1,000,000 | QUANTITY | 0.99+ |
John | PERSON | 0.99+ |
Atlanta, Georgia | LOCATION | 0.99+ |
last week | DATE | 0.99+ |
100,000 changes | QUANTITY | 0.99+ |
last year | DATE | 0.99+ |
Red Hat | ORGANIZATION | 0.99+ |
Richard Henshall | PERSON | 0.99+ |
yesterday | DATE | 0.99+ |
30 years | QUANTITY | 0.99+ |
eight hours | QUANTITY | 0.99+ |
30 people | QUANTITY | 0.99+ |
two | QUANTITY | 0.99+ |
two cubes | QUANTITY | 0.99+ |
two things | QUANTITY | 0.99+ |
both | QUANTITY | 0.98+ |
Maurin | PERSON | 0.98+ |
five | QUANTITY | 0.98+ |
one | QUANTITY | 0.98+ |
four things | QUANTITY | 0.98+ |
Thio | PERSON | 0.97+ |
Stevens | PERSON | 0.97+ |
this year | DATE | 0.97+ |
this morning | DATE | 0.97+ |
next day | DATE | 0.96+ |
a dozen hours | QUANTITY | 0.96+ |
2019 | DATE | 0.96+ |
both partners | QUANTITY | 0.95+ |
two day week | QUANTITY | 0.95+ |
six | QUANTITY | 0.95+ |
today | DATE | 0.95+ |
Sisko | PERSON | 0.94+ |
Maura | PERSON | 0.93+ |
Answerable Fest 2019 | EVENT | 0.91+ |
Five | QUANTITY | 0.91+ |
Ansel Fest | EVENT | 0.91+ |
First Amendment | QUANTITY | 0.89+ |
two People | QUANTITY | 0.89+ |
J. P. Morgan | ORGANIZATION | 0.86+ |
six million plus | QUANTITY | 0.85+ |
Palo | ORGANIZATION | 0.84+ |
four standards | QUANTITY | 0.83+ |
first | QUANTITY | 0.83+ |
Bart | TITLE | 0.83+ |
about three years | QUANTITY | 0.81+ |
Palo Alto | LOCATION | 0.78+ |
Maur | PERSON | 0.78+ |
Esther | PERSON | 0.78+ |
end of | DATE | 0.75+ |
Andi | PERSON | 0.72+ |
Cube | ORGANIZATION | 0.71+ |