Shankar Iyer, VMware | VMworld 2019
>> live from San Francisco, celebrating 10 years of high tech coverage. It's the Cube covering Veum World 2019. Brought to you by VM Wear and its ecosystem partners. >> Welcome back, everyone. Live Cube coverage here in San Francisco, California Mosconi North were in the lobby for VM World 2019. I'm John for a day. Volante are 10 years covering VM World's been exciting, Dave, and we've watched all the changes and our next guest is going to illuminate all the benefits at the top of the stack, as I call the end user experience. Shaker Ire, Who's the V S v. P. And general manager End User Computing within VM, where what that means is, he takes care of all the stuff that we're virtualization creates those efficiencies. I think what Palmer's just called end user computing still, but they still have that name back then, if I remember correctly, >> yeah, you >> know the name is stuck because it's ah, it's sort of income, passes all the technologies and uses use right as digital interface is. So that's why it's and use the computing. It's any digital interface that anybody at work uses. Now, the interesting thing is people don't work in an office anymore, and the interface is no longer just a laptop. >> Well, I want to get into some stupid questions around the work environment cause whether you working at a cafe or at home is all kinds of security issues. Also, user experiences. Collaboration software. But let's first get the news out of the way. Digital work, Space news What's the What's going on? The show? What you guys announcing? Yeah, so >> before we get to >> the news that we met me, frame it up a little bit right? Because when you think about organizations today, especially with the changing demographics, where they're going in terms of new devices, the mobility phenomenon, right, the transformation they're going through in terms of just their own cloud and APS and so on, right it. Every every one of those things effects employees, right. And at the end of the day, you know what organizations want is for the employees to have a great experience all the way, as we call it from higher to retire. Not to do that, you know you need a platform because I can just give you a pretty apt running in the laptop and say, Great, that's That's the end of the employees experience, right? It's fundamentally transforming the own whole environment. That's why it's still retains its term and use the computing. And to do that, you have to hit at least three facets, right? One is, of course, How do you deliver a great experience for the employees where they can get any app, any device, anywhere, any form? Anyway, that's one aspect of it. The second aspect of it is from a nightie standpoint. I've gotta manage all this complexity, right, and it's only growing. It's not shrinking with all the head virginity, so there's a management angle of it, and then the tone angle of it is, you know, security. As you pointed out, right security so important. In fact, what you users want is they don't want any security driven compromises. What is an example of security, even compromise, that I have to go through three passwords because he simply don't trust me? Heck, figure it out. Is what the user's Saito I t especially the millennials. Right. So s So you gotta address that. So the platform that we have workspace one actually addresses all three So we have innovations today and news in all three areas, right? So it's an example. Employ experiences, something we've been driving with enterprises and corporations for at least two years. Now we've upped the ante. We have now introducing a virtual assistant that employees can use either through voice or text to essentially ask questions. Hey, what's how do I get into WiFi? What's my employee directory? Um, you know who I go to first? You know this and that, right? As employed onboard the organization. Those examples of virtual assistant can do it. So we released the virtual assistant. That's a big piece of news in the employ experience. Sadie. Another big piece of news is we are introducing a tech preview of what we call digital employees experience management, which means I t now has a user expedient score that they can look at and say, Hey, is David getting a great expedience? No, it's poor, and I can die right in. I can find out the root cause I can fix the issue, and I could do that automatically. >> KP eyes can come out of that right? Absolutely serviceability. >> Absolutely. And I think you know, I've talked to many Cee Io's and we you know, we drive works based one and they for awhile sort of told me, Hey, this is all good. But >> I don't know how I'm doing all my >> doing with respect to, you know, your best best customer. Um, I ahead and behind and far behind. So this really helps them. >> Here. Let me ask the questions. That's a good point I want because this gets down to the heart of the issue. What is the top requests that you're getting from your customers or top two or three features? That pattern that continued comes back from your customer base when it comes to end user computing. These the experience, >> it spends all three things, right? So the first thing is, they're saying, Listen, I want to be able to deliver a great employee experience some, you know, help me do that. Helping measure and make sure I know what journey, Eman That's one right. Second is I've got to set virginity. I've got this complexity of God. You know, I always phones. I've got android tablets. I've got a you know, Dell laptop. I've got a Mac book. I've got you know a rugged device. I've got some work space I ot devices like printers and ex sector X factor. I've got this head virginity. Just help me manage this complexity in a sort of a unified, seamless, uniform way. Right? And third is help me secure my enterprise. So there's a whole model emerging called zero Trust. Where in the old world, what you do is you just build a huge wall around the enterprise, right? A pedometer, and say I'm inside the wall. I need to be domain joined on that inside the fire world. Therefore, I'm good. I mean, you got to throw that out of the window anymore. >> Doesn't exist in your model, because if a millennial or workaround working at home, that means every single i p device on my network potentially a compromise point. >> Correct. So you have You have to start with that device never ought to be trusted. And every network is hostile, right? If you start out for that reminds, then you build trust over time, right? And how do you build trust? You first say you leverage user identity, You say Okay, Davis who he is, right? And so that becomes an identity. You say this device is trusted or partially trusted. So one of the things we're announcing its part of innovations today is what we call workspace to risk analytic, which means we're able to provide a risk or write for the device. And we can say, Hey, this device is a risk on a score of 1 to 10 of eight, which means I can mostly trust it. Maybe you don't trust the sensitive apse. So therefore, a block access to the most sensitive apse, right? So use a combination of different things. They use things like NSX micro segmentation to your point about how we build on the Via Mary Stack. The carbon black acquisition is phenomenal because it gives us that intelligence. So collectively, we're able to sort of implement the zero trust model. Right. So >> those are the >> three main topics, right? Is employed expedience, unified management and zero trust security are really, really >> important. I want to ask you about your tenure, gm, where coincided with the air watch expedition. And prior to that event theme, we're struggled in this space. Ana Citrix dominated your pre Gerald. You know, your former company kind of fumbling around in air watch now. Air watch, if I recall correctly from wrong was not like the number one player. Just like people are saying carbon blacks, not the number one player. Absolutely. And then you get into the VM where flywheel effect or Sanjay Putin came in and it was great leader. But I wonder if you could sort of describe the ascendancy of the end user computing business at at VM wear. And I'm curious you mentioned carbon black and you kind of replicate that with our end point cloud security, peace. There's obviously a security use case. You clearly just described it, but take us back to >> great, great, great question. So actually, I joined right when literally, maybe a month before the air watch acquisition. Right then. So a Sandy and I and the rest of the team sort of worked this. We said, Hey, listen, a watch is a phenomenal sort of mobile management and security player. We had a very good product and horizon VD I, but it was a little bit isolated, and there were others, like, say, tricks that are sort of motor head in that space. So what? The first thing we did is we have three assets. Actually, the third I said what we had a Fed rated identity asset that we had purchase, but not leverage. So we said he know what the identity really has to get coupled with. You know, the death star pulled the mobile world, so we actually took these three piece parts and started integrating it as he started integrating it. We said, You know, this actually forms a very interesting work space, and we said It's a digital work space to be sort of coined that term and started to really tight together. The experience is a user would have, whether they were in a mobile device, a physical desktop or a virtual desktop right and made that seamless. So that's when the work's based one app was born and this was probably around the 2015 time frame. So we started releasing it, and then we started to stitching together basically all the back and integrations, right, So out >> of >> this out of that was born a workspace. And so, in 2016 with the momentum of the workspace, desktop business came back because now it had it been on. We've done a lot of work on the desktop businesses. Well, we made it very competitive with Citrix. We bought volumes. We integrated that we made it actually the best media solution. The markets, with a tremendous traction by itself in the horizon space and then integrating it works with people, said You know what, I need to get that workspace. And why am I dealing with Citrix this horizon solution within workspace in a more than salts my problem. In fact, it's better in certain areas. So that sort of got momentum going around that we really built that workspace momentum. And that was, I would say, till about 2016 or so. And then we saw these three things coming up. One is Hey, employees, experience matters. We really started pouring effort into the employees experience from, you know, day one day two and beyond. And then recently, including this show, we added divided sort of Day zero and then the off boarding pieces. Well, so employees experience became sort of the lightning rod for why somebody would adopt this workspace one platform which were built by then, right, and then we added on this ability to do modern management, especially on Windows and Mac, which was really starting to take off last year completely. Darden rounded out that portfolio and handsome capability, and then we added Now zero trust model, which is which is now sort of bolstered by the acquisition of carbon black. So you can see this a set off cascading talk, full moves. But we did it in a way where, you know, it was really truly integrated. So when as we come out with carbon black now, one of the most interesting things is right when carbon black comes into the fold, we've already done the integration. We're actually going to show it on my keynote right after this, right? We're actually showing the integration between workspace one intelligence and carbon backs You There you have it. You already have an asset that's completely integrated. >> So the risk or is interesting to me as well, so as endpoint security, because much, much more importantly, no fishing is you know, the big way that people get give up credentials. Does >> any of >> this seep into machines and I ot and edge? >> Yeah, and fabulous question. >> Wonder if you could come. >> Absolutely. I think listen, be if you think about risk oars and if >> you think about >> risks at large and devices they've been largely and Windows devices and not to and blame it on Windows, I think they might accept in a fabulous job of sort of progressing windows. But by far it's the most used operating system in the enterprise, right? But Mobile is getting used there. There, you know, it's starting to make a huge starting take a large part of the real estate of the enterprise. So I think we have a unique opportunity now through the data we collect on mobile devices with workspace one using the underlying air watch technology coupled with some of the, um, you know, data that, you know, data analytics tools we have in the carbon black cloud and the way they do sort of threat analysis and, uh, and determine potential attack vectors. We have an opportunity to leverage that intelligence. And that day, the lake and that technology, coupled with the data, we have to really now build a broader sort of threat surface understanding across multiple devices, and eventually that goes into a I ot. Right. So we're actually going to be working with some of the other technologies we have in Wimmer called Paul's Right. Pulse is very interesting because they have the ability to speak multiple device protocols that nobody does. Okay, so we're gonna take advantage of them potentially to sort of be able to start to poke into devices that are attached to the office, but not quite attached to the office. In the sense they're not mainstream devices you and I would use. But indirectly, you may use it, right? So be able to sort of get a much broader view off a visibility of devices. Second is how to manage them through a combination of workspace, one impulse and third, to get the data so that we can feed it into this federated cloud of workspace one intelligence and carbon black to understand the risk. And that way you have this three prom thing, right? I >> wanna ask you a personal question. Pat gal singer was very prolific this week again. Props of in social Media, Mojo doing a selfie on stage with Craig. Job ate up. Yeah, um, doing a little morning thing, telling people how he prepares for his keynote. Yeah. So how do you prepare for your keynote. Do you like, give it for a M and hit the gym and get a job coming up right after this interview? >> I do. I I I'm not fat. That's incredibly disciplined, I think. I think it's been waking up at 4 a.m. for a long time, so I'm not that much of an early bird. But I prepare because, you know, I've been involved in the construction of the keynote. So for me, it's, um, be started work on this, probably about three months ago, because the story came together. It's very natural to me. Just like you asked me the question. You know, tell me about the evolution. It's just a very natural thing because, like telling you >> on relevant story, not just beady eye. Yeah, it's so much more now. >> It's so much more And, you know, and I've lived through this and I participated in most of the decision making, so, you know, when my head of product marketing company said, Hey, what should we do with the keynote? I said, You know, I have the storyline in mind, right? And sit on the same three or four pillars I'm talking to you about, right? How do we tell the story to the audience about what is the platform? Why should they sort of bet on it? How did they sort of deploy it, show them some real world examples and then basically sprinkling all the innovations? That sounds exciting. So? So because of that story lines always being in my head. So it's not that hard. It's just sometimes you just need to sort of a CZ. You're unstable. >> You're preparing Saul, you're part of Yeah, I was handing it to you. Nobody related it. So >> for me, I think it's just sometimes just rehearsing some of the key parts. And then, of course, the visual cues. And they >> want to slam home the big point. They go. You know, I've been looking at your career. You have to check your technologies, but also, you're pretty much been a product leader. Yeah, and your career definite. So I gotta ask you around from the big movements in the innocent. Like your perspective as a participant. This was a product leaders Well, executive in there and done that. Amazon introduced their first conference around cloud security called reinforces. Here we get Cube coverage there. It was interesting because it wasn't like a typical security conference like black hat. Definitely on our say wasn't so much I t is really about cloud security. And so Dave and I were speculating like, this is the first cloud security show. I mean, dedicated to kind of cloud security didn't say cloud security, but essentially, cloud security. >> What is >> your take on the cloud security? Because a >> little bit >> of a different view, little bit architectural change. If you gotta have the on premises, you're gonna have the cloud if things any working together, some things you're doing and security quite frankly, around isolation to, you know, working in in any environment. You're that year in the middle of it all. >> Yeah. >> What is cloud >> security and why I have a conference isn't relevant with your thoughts. >> That's a >> great question. I think you know, you see many of these trends, I think, you know, listen, many of these conferences, they provoke their thought provoking, so it forces you to think right? So when I think about cloud security now, traditionally when you think about cloud security, you would think about technologies like Cass be light cloud access service broker. You would think about encryption to means much more than I do >> all the usual stuff in the back. If he's there, other people are there. But no. >> Yeah, I mean more than my coffee. I think you know you. It's sort of you think of the the the NL unlocked to cloud securities Data center security where you think of the sort of Amazon cloud living in Amazon Data Center. And, you know, how can we protect the, you know, the data and the egress access into those cloud and in the same technology sort of apply, but to your point that you sort of just touched upon its That cloud is not living in isolation. First of all, that Amazon Cloud is connected to a whole bunch of, you know, applications that are still sitting in the data center. Right. So they were not there. Potentially not moving the Oracle database today isn't there moving some workloads to the cloud, right? That's what most most companies are. Hey, guess what? There's all these end points of the connecting the connecting both the data center in the cloud. You're not gonna proxy to the cloud to get to the data center. So there's gateways. So do me. Cloud security can't be an isolated, you know, sort of technology that companies have to sort of think about now is there Is there opportunity to leverage the cloud to manage security better and get visibility in the security environment to do security? Analytics? Absolutely. So I think to me, that's where it's going. Because security, I think, has been proven, is no longer. You know, the one sing single thing. It's just you have to do multiple things. Every time I go talk to CSO's, they tell me they got this technology. I said, Hey, wait a minute. You you have 20. Did you cut down any yet? We've got down a few, but you know, they're just nervous about cutting down too much. Because of that one piece of software >> insurance policy. They're insecure. >> They cut to the added four, >> another tool. Bullshit. I think I think the architecture will get simpler because it's way too complex, but the same time I think you have to. There's no sustenance, cloud security and network security or endpoint security, and >> maybe there's a whole new group emerging within VM where that you could add to your repertoire en Pointe computing group your end user computing. Why don't have endpoint computing? That's >> what you're holding >> is you know is all about what do we need to do for the user? Both as I t and the end user? Okay. And now he now folks like hr and so on, the securities has to be built into it, right? So much like that. I think when you go build our data centers are the public cloud and build this hybrid clouds, security is to be built into that as >> well. We'll shake our thanks for coming on and sharing your insights. A super important area. We're gonna be covering this. This is cloud to point of this end user computing. This is where the edge of the network is. That's where the people are. They are part of the edge. A thin part of the edge of a big part of the edge. You're gonna be in the middle of it will be following the attraction. Thanks for coming on. You So much for having me having played Cuba, Cuba live here in San Francisco on chopper develop the state tune from or we have two sets. Three days of wall to wall coverage, worldly in day one. Stay with us. We gotta have Michael Dell. Pat Nelson. Come on Tomorrow and a lot more guests coming onto. They stay with us. We'll be right back.
SUMMARY :
Brought to you by VM Wear and its ecosystem partners. he takes care of all the stuff that we're virtualization creates those efficiencies. Now, the interesting thing is people don't work in an office anymore, and the interface is no Well, I want to get into some stupid questions around the work environment cause whether you working at a cafe or at home is all kinds And at the end of the day, you know what organizations want is for the employees to have a great KP eyes can come out of that right? But doing with respect to, you know, your best best customer. What is the top requests I want to be able to deliver a great employee experience some, you know, help me do that. Doesn't exist in your model, because if a millennial or workaround working at home, So one of the things we're announcing its part I want to ask you about your tenure, gm, So a Sandy and I and the rest the employees experience from, you know, day one day two and beyond. So the risk or is interesting to me as well, so as endpoint security, because much, much more importantly, I think listen, be if you think about risk oars and if In the sense they're not mainstream devices you and I would use. So how do you prepare for your keynote. But I prepare because, you know, I've been involved in the construction Yeah, it's so much more now. It's so much more And, you know, and I've lived through this and I participated in most of the decision making, So And they So I gotta ask you around from the big movements If you gotta have the on premises, you're gonna have the cloud if I think you know, you see many of these trends, I think, you know, listen, many of these conferences, all the usual stuff in the back. the NL unlocked to cloud securities Data center security where you think of the sort too complex, but the same time I think you have to. maybe there's a whole new group emerging within VM where that you could add to your repertoire en And now he now folks like hr and so on, the securities has to be built into Cuba live here in San Francisco on chopper develop the state tune from or we have two sets.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Dave | PERSON | 0.99+ |
David | PERSON | 0.99+ |
Pat Nelson | PERSON | 0.99+ |
Amazon | ORGANIZATION | 0.99+ |
Michael Dell | PERSON | 0.99+ |
2016 | DATE | 0.99+ |
Dell | ORGANIZATION | 0.99+ |
San Francisco | LOCATION | 0.99+ |
Craig | PERSON | 0.99+ |
Davis | PERSON | 0.99+ |
Sanjay Putin | PERSON | 0.99+ |
2015 | DATE | 0.99+ |
20 | QUANTITY | 0.99+ |
10 years | QUANTITY | 0.99+ |
John | PERSON | 0.99+ |
second aspect | QUANTITY | 0.99+ |
Citrix | ORGANIZATION | 0.99+ |
Mojo | PERSON | 0.99+ |
Saul | PERSON | 0.99+ |
last year | DATE | 0.99+ |
Tomorrow | DATE | 0.99+ |
three | QUANTITY | 0.99+ |
one aspect | QUANTITY | 0.99+ |
1 | QUANTITY | 0.99+ |
One | QUANTITY | 0.99+ |
Second | QUANTITY | 0.99+ |
Oracle | ORGANIZATION | 0.99+ |
one | QUANTITY | 0.99+ |
third | QUANTITY | 0.99+ |
4 a.m. | DATE | 0.99+ |
two sets | QUANTITY | 0.98+ |
VM World 2019 | EVENT | 0.98+ |
VMware | ORGANIZATION | 0.98+ |
Windows | TITLE | 0.98+ |
both | QUANTITY | 0.98+ |
Both | QUANTITY | 0.98+ |
Mac | COMMERCIAL_ITEM | 0.98+ |
First | QUANTITY | 0.98+ |
first | QUANTITY | 0.98+ |
three assets | QUANTITY | 0.97+ |
first conference | QUANTITY | 0.97+ |
three things | QUANTITY | 0.97+ |
today | DATE | 0.97+ |
three features | QUANTITY | 0.97+ |
one app | QUANTITY | 0.97+ |
one piece | QUANTITY | 0.97+ |
Three days | QUANTITY | 0.97+ |
four | QUANTITY | 0.96+ |
Sandy | PERSON | 0.96+ |
one platform | QUANTITY | 0.96+ |
San Francisco, | LOCATION | 0.95+ |
10 | QUANTITY | 0.95+ |
first thing | QUANTITY | 0.95+ |
four pillars | QUANTITY | 0.95+ |
two | QUANTITY | 0.95+ |
three passwords | QUANTITY | 0.95+ |
eight | QUANTITY | 0.94+ |
this week | DATE | 0.94+ |
single thing | QUANTITY | 0.92+ |
Cass | ORGANIZATION | 0.92+ |
about three months ago | DATE | 0.91+ |
Eman | PERSON | 0.91+ |
a day | QUANTITY | 0.9+ |
android | TITLE | 0.89+ |
three main topics | QUANTITY | 0.89+ |
one impulse | QUANTITY | 0.88+ |
Palmer | PERSON | 0.87+ |
Shankar Iyer | PERSON | 0.87+ |
Sadie | PERSON | 0.86+ |
VM Wear | ORGANIZATION | 0.86+ |
Veum World 2019 | EVENT | 0.85+ |
Cee Io | ORGANIZATION | 0.85+ |
Cuba, Cuba | LOCATION | 0.85+ |
three piece | QUANTITY | 0.84+ |
Cube | ORGANIZATION | 0.84+ |
at least two years | QUANTITY | 0.83+ |