Srinivas Mukkamala & David Shepherd | Ivanti
(gentle music) >> Announcer: "theCube's" live coverage is made possible by funding from Dell Technologies, creating technologies that drive human progress. (upbeat music) (logo whooshing) >> Hey, everyone, welcome back to "theCube's" coverage of day one, MWC23 live from Barcelona, Lisa Martin here with Dave Vellante. Dave, we've got some great conversations so far This is the biggest, most packed show I've been to in years. About 80,000 people here so far. >> Yeah, down from its peak of 108, but still pretty good. You know, a lot of folks from China come to this show, but with the COVID situation in China, that's impacted the attendance, but still quite amazing. >> Amazing for sure. We're going to be talking about trends and mobility, and all sorts of great things. We have a couple of guests joining us for the first time on "theCUBE." Please welcome Dr. Srinivas Mukkamala or Sri, chief product officer at Ivanti. And Dave Shepherd, VP Ivanti. Guys, welcome to "theCUBE." Great to have you here. >> Thank you. >> So, day one of the conference, Sri, we'll go to you first. Talk about some of the trends that you're seeing in mobility. Obviously, the conference renamed from Mobile World Congress to MWC mobility being part of it, but what are some of the big trends? >> It's interesting, right? I mean, I was catching up with Dave. The first thing is from the keynotes, it took 45 minutes to talk about security. I mean, it's quite interesting when you look at the shore floor. We're talking about Edge, we're talking about 5G, the whole evolution. And there's also the concept of are we going into the Cloud? Are we coming back from the Cloud, back to the Edge? They're really two different things. Edge is all decentralized while you recompute. And one thing I observed here is they're talking about near real-time reality. When you look at automobiles, when you look at medical, when you look at robotics, you can't have things processed in the Cloud. It'll be too late. Because you got to make millisecond-based stations. That's a big trend for me. When I look at staff... Okay, the compute it takes to process in the Cloud versus what needs to happen on-prem, on device, is going to revolutionize the way we think about mobility. >> Revolutionize. David, what are some of the things that you're saying? Do you concur? >> Yeah, 100%. I mean, look, just reading some of the press recently, they're predicting 22 billion IoT devices by 2024. Everything Sri just talked about there. It's growing exponentially. You know, problems we have today are a snapshot. We're probably in the slowest place we are today. Everything's just going to get faster and faster and faster. So it's a, yeah, 100% concur with that. >> You know, Sri, on your point, so Jose Maria Alvarez, the CEO of Telefonica, said there are three pillars of the future of telco, low latency, programmable networks, and Cloud and Edge. So, as to your point, Cloud and low latency haven't gone hand in hand. But the Cloud guys are saying, "All right, we're going to bring the Cloud to the Edge." That's sort of an interesting dynamic. We're going to bypass them. We heard somebody, another speaker say, "You know, Cloud can't do it alone." You know? (chuckles) And so, it's like these worlds need each other in a way, don't they? >> Definitely right. So that's a fantastic way to look at it. The Cloud guys can say, "We're going to come closer to where the computer is." And if you really take a look at it with data localization, where are we going to put the Cloud in, right? I mean, so the data sovereignty becomes a very interesting thing. The localization becomes a very interesting thing. And when it comes to security, it gets completely different. I mean, we talked about moving everything to a centralized compute, really have massive processing, and give you the addition back wherever you are. Whereas when you're localized, I have to process everything within the local environment. So there's already a conflict right there. How are we going to address that? >> Yeah. So another statement, I think, it was the CEO of Ericsson, he was kind of talking about how the OTT guys have heard, "We can't let that happen again. And we're going to find new ways to charge for the network." Basically, he's talking about monetizing the API access. But I'm interested in what you're hearing from customers, right? 'Cause our mindset is, what value you're going to give to customers that they're going to pay for, versus, "I got this data I'm going to charge developers for." But what are you hearing from customers? >> It's amazing, Dave, the way you're looking at it, right? So if we take a look at what we were used to perpetual, and we said we're going to move to a subscription, right? I mean, everybody talks about subscription economy. Telcos on the other hand, had subscription economy for a long time, right? They were always based on usage, right? It's a usage economy. But today, we are basically realizing on compute. We haven't even started charging for compute. If you go to AWS, go to Azure, go to GCP, they still don't quite charge you for actual compute, right? It's kind of, they're still leaning on it. So think about API-based, we're going to break the bank. What people don't realize is, we do millions of API calls for any high transaction environment. A consumer can't afford that. What people don't realize is... I don't know how you're going to monetize. Even if you charge a cent a call, that is still going to be hundreds and thousands of dollars a day. And that's where, if you look at what you call low-code no-code motion? You see a plethora of companies being built on that. They're saying, "Hey, you don't have to write code. I'll give you authentication as a service. What that means is, Every single time you call my API to authenticate a user, I'm going to charge you." So just imagine how many times we authenticate on a single day. You're talking a few dozen times. And if I have to pay every single time I authenticate... >> Real friction in the marketplace, David. >> Yeah, and I tell you what. It's a big topic, right? And it's a topic that we haven't had to deal with at the Edge before, and we hear it probably daily really, complexity. The complexity's growing all the time. That means that we need to start to get insight, visibility. You know? I think a part of... Something that came out of the EU actually this week, stated, you know, there's a cyber attack every 11 seconds. That's fast, right? 2016, that was 40 seconds. So actually that speed I talked about earlier, everything Sri says that's coming down to the Edge, we want to embrace the Edge and that is the way we're going to move. But customers are mindful of the complexity that's involved in that. And that, you know, lens thought to how are we going to deal with those complexities. >> I was just going to ask you, how are you planning to deal with those complexities? You mentioned one ransomware attack every 11 seconds. That's down considerably from just a few years ago. Ransomware is a household word. It's no longer, "Are we going to get attacked?" It's when, it's to what extent, it's how much. So how is Ivanti helping customers deal with some of the complexities, and the changes in the security landscape? >> Yeah. Shall I start on that one first? Yeah, look, we want to give all our customers and perspective customers full visibility of their environment. You know, devices that are attached to the environment. Where are they? What are they doing? How often are we going to look for those devices? Not only when we find those devices. What applications are they running? Are those applications secure? How are we going to manage those applications moving forward? And overall, wrapping it round, what kind of service are we going to do? What processes are we going to put in place? To Sri's point, the low-code no-code angle. How do we build processes that protect our organization? But probably a point where I'll pass to Sri in a moment is how do we add a level of automation to that? How do we add a level of intelligence that doesn't always require a human to be fixing or remediating a problem? >> To Sri, you mentioned... You're right, the keynote, it took 45 minutes before it even mentioned security. And I suppose it's because they've historically, had this hardened stack. Everything's controlled and it's a safe environment. And now that's changing. So what would you add? >> You know, great point, right? If you look at telcos, they're used to a perimeter-based network. >> Yep. >> I mean, that's what we are. Boxed, we knew our perimeter. Today, our perimeter is extended to our home, everywhere work, right? >> Yeah- >> We don't have a definition of a perimeter. Your browser is the new perimeter. And a good example, segueing to that, what we have seen is horizontal-based security. What we haven't seen is verticalization, especially in mobile. We haven't seen vertical mobile security solutions, right? Yes, you hear a little bit about automobile, you hear a little bit about healthcare, but what we haven't seen is, what about food sector? What about the frontline in food? What about supply chain? What security are we really doing? And I'll give you a simple example. You brought up ransomware. Last night, Dole was attacked with ransomware. We have seen the beef producer colonial pipeline. Now, if we have seen agritech being hit, what does it mean? We are starting to hit humanity. If you can't really put food on the table, you're starting to really disrupt the supply chain, right? In a massive way. So you got to start thinking about that. Why is Dole related to mobility? Think about that. They don't carry service and computers. What they carry is mobile devices. that's where the supply chain works. And then that's where you have to start thinking about it. And the evolution of ransomware, rather than a single-trick pony, you see them using multiple vulnerabilities. And Pegasus was the best example. Spyware across all politicians, right? And CEOs. It is six or seven vulnerabilities put together that actually was constructed to do an attack. >> Yeah. How does AI kind of change this? Where does it fit in? The attackers are going to have AI, but we could use AI to defend. But attackers are always ahead, right? (chuckles) So what's your... Do you have a point of view on that? 'Cause everybody's crazy about ChatGPT, right? The banks have all banned it. Certain universities in the United States have banned it. Another one's forcing his students to learn how to use ChatGPT to prompt it. It's all over the place. You have a point of view on this? >> So definitely, Dave, it's a great point. First, we all have to have our own generative AI. I mean, I look at it as your digital assistant, right? So when you had calculators, you can't function without a calculator today. It's not harmful. It's not going to take you away from doing multiplication, right? So we'll still teach arithmetic in school. You'll still use your calculator. So to me, AI will become an integral part. That's one beautiful thing I've seen on the short floor. Every little thing there is a AI-based solution I've seen, right? So ChatGPT is well played from multiple perspective. I would rather up level it and say, generated AI is the way to go. So there are three things. There is human intense triaging, where humans keep doing easy work, minimal work. You can use ML and AI to do that. There is human designing that you need to do. That's when you need to use AI. >> But, I would say this, in the Enterprise, that the quality of the AI has to be better than what we've seen so far out of ChatGPT, even though I love ChatGPT, it's amazing. But what we've seen from being... It's got to be... Is it true that... Don't you think it has to be cleaner, more accurate? It can't make up stuff. If I'm going to be automating my network with AI. >> I'll answer that question. It comes down to three fundamentals. The reason ChatGPT is giving addresses, it's not trained on the latest data. So for any AI and ML method, you got to look at three things. It's your data, it's your domain expertise, who is training it, and your data model. In ChatGPT, it's older data, it's biased to the people that trained it, right? >> Mm-hmm. >> And then, the data model is it's going to spit out what it's trained on. That's a precursor of any GPT, right? It's pre-trained transformation. >> So if we narrow that, right? Train it better for the specific use case, that AI has huge potential. >> You flip that to what the Enterprise customers talk about to us is, insight is invaluable. >> Right. >> But then too much insight too quickly all the time means we go remediation crazy. So we haven't got enough humans to be fixing all the problems. Sri's point with the ChatGPT data, some of that data we are looking at there could be old. So we're trying to triage something that may still be an issue, but it might have been superseded by something else as well. So that's my overriding when I'm talking to customers and we talk ChatGPT, it's in the news all the time. It's very topical. >> It's fun. >> It is. I even said to my 13-year-old son yesterday, your homework's out a date. 'Cause I knew he was doing some summary stuff on ChatGPT. So a little wind up that's out of date just to make that emphasis around the model. And that's where we, with our Neurons platform Ivanti, that's what we want to give the customers all the time, which is the real-time snapshot. So they can make a priority or a decision based on what that information is telling them. >> And we've kind of learned, I think, over the last couple of years, that access to real-time data, real-time AI, is no longer nice to have. It's a massive competitive advantage for organizations, but it's going to enable the on-demand, everything that we expect in our consumer lives, in our business lives. This is going to be table stakes for organizations, I think, in every industry going forward. >> Yeah. >> But assumes 5G, right? Is going to actually happen and somebody's going to- >> Going to absolutely. >> Somebody's going to make some money off it at some point. When are they going to make money off of 5G, do you think? (all laughing) >> No. And then you asked a very good question, Dave. I want to answer that question. Will bad guys use AI? >> Yeah. Yeah. >> Offensive AI is a very big thing. We have to pay attention to it. It's got to create an asymmetric war. If you look at the president of the United States, he said, "If somebody's going to attack us on cyber, we are going to retaliate." For the first time, US is willing to launch a cyber war. What that really means is, we're going to use AI for offensive reasons as well. And we as citizens have to pay attention to that. And that's where I'm worried about, right? AI bias, whether it's data, or domain expertise, or algorithmic bias, is going to be a big thing. And offensive AI is something everybody have to pay attention to. >> To your point, Sri, earlier about critical infrastructure getting hacked, I had this conversation with Dr. Robert Gates several years ago, and I said, "Yeah, but don't we have the best offensive, you know, technology in cyber?" And he said, "Yeah, but we got the most to lose too." >> Yeah, 100%. >> We're the wealthiest nation of the United States. The wealthiest is. So you got to be careful. But to your point, the president of the United States saying, "We'll retaliate," right? Not necessarily start the war, but who started it? >> But that's the thing, right? Attribution is the hardest part. And then you talked about a very interesting thing, rich nations, right? There's emerging nations. There are nations left behind. One thing I've seen on the show floor today is, digital inequality. Digital poverty is a big thing. While we have this amazing technology, 90% of the world doesn't have access to this. >> Right. >> What we have done is we have created an inequality across, and especially in mobility and cyber, if this technology doesn't reach to the last mile, which is emerging nations, I think we are creating a crater back again and putting societies a few miles back. >> And at much greater risk. >> 100%, right? >> Yeah. >> Because those are the guys. In cyber, all you need is a laptop and a brain to attack. >> Yeah. Yeah. >> If I don't have it, that's where the civil war is going to start again. >> Yeah. What are some of the things in our last minute or so, guys, David, we'll start with you and then Sri go to you, that you're looking forward to at this MWC? The theme is velocity. We're talking about so much transformation and evolution in the telecom industry. What are you excited to hear and learn in the next couple of days? >> Just getting a complete picture. One is actually being out after the last couple of years, so you learn a lot. But just walking around and seeing, from my perspective, some vendor names that I haven't seen before, but seeing what they're doing and bringing to the market. But I think goes back to the point made earlier around APIs and integration. Everybody's talking about how can we kind of do this together in a way. So integrations, those smart things is what I'm kind of looking for as well, and how we plug into that as well. >> Excellent, and Sri? >> So for us, there is a lot to offer, right? So while I'm enjoying what I'm seeing here, I'm seeing at an opportunity. We have an amazing portfolio of what we can do. We are into mobile device management. We are the last (indistinct) company. When people find problems, somebody has to go remediators. We are the world's largest patch management company. And what I'm finding is, yes, all these people are embedding software, pumping it like nobody's business. As you find one ability, somebody has to go fix them, and we want to be the (indistinct) company. We had the last smile. And I find an amazing opportunity, not only we can do device management, but do mobile threat defense and give them a risk prioritization on what needs to be remediated, and manage all that in our ITSM. So I look at this as an amazing, amazing opportunity. >> Right. >> Which is exponential than what I've seen before. >> So last question then. Speaking of opportunities, Sri, for you, what are some of the things that customers can go to? Obviously, you guys talk to customers all the time. In terms of learning what Ivanti is going to enable them to do, to take advantage of these opportunities. Any webinars, any events coming up that we want people to know about? >> Absolutely, ivanti.com is the best place to go because we keep everything there. Of course, "theCUBE" interview. >> Of course. >> You should definitely watch that. (all laughing) No. So we have quite a few industry events we do. And especially there's a lot of learning. And we just raised the ransomware report that actually talks about ransomware from a global index perspective. So one thing what we have done is, rather than just looking at vulnerabilities, we showed them the weaknesses that led to the vulnerabilities, and how attackers are using them. And we even talked about DHS, how behind they are in disseminating the information and how it's actually being used by nation states. >> Wow. >> And we did cover mobility as a part of that as well. So there's a quite a bit we did in our report and it actually came out very well. >> I have to check that out. Ransomware is such a fascinating topic. Guys, thank you so much for joining Dave and me on the program today, sharing what's going on at Ivanti, the changes that you're seeing in mobile, and the opportunities that are there for your customers. We appreciate your time. >> Thank you >> Thank you. >> Yes. Thanks, guys. >> Thanks, guys. >> For our guests and for Dave Vellante, I'm Lisa Martin. You're watching "theCUBE" live from MWC23 in Barcelona. As you know, "theCUBE" is the leader in live tech coverage. Dave and I will be right back with our next guest. (gentle upbeat music)
SUMMARY :
that drive human progress. This is the biggest, most packed from China come to this show, Great to have you here. Talk about some of the trends is going to revolutionize the Do you concur? Everything's just going to get bring the Cloud to the Edge." I have to process everything that they're going to pay for, And if I have to pay every the marketplace, David. to how are we going to deal going to get attacked?" of automation to that? So what would you add? If you look at telcos, extended to our home, And a good example, segueing to that, The attackers are going to have AI, It's not going to take you away the AI has to be better it's biased to the people the data model is it's going to So if we narrow that, right? You flip that to what to be fixing all the problems. I even said to my This is going to be table stakes When are they going to make No. And then you asked We have to pay attention to it. got the most to lose too." But to your point, have access to this. reach to the last mile, laptop and a brain to attack. is going to start again. What are some of the things in But I think goes back to a lot to offer, right? than what I've seen before. to customers all the time. is the best place to go that led to the vulnerabilities, And we did cover mobility I have to check that out. As you know, "theCUBE" is the
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Lisa Martin | PERSON | 0.99+ |
Dave Vellante | PERSON | 0.99+ |
David | PERSON | 0.99+ |
Dave Vellante | PERSON | 0.99+ |
Dave | PERSON | 0.99+ |
Dave Shepherd | PERSON | 0.99+ |
Jose Maria Alvarez | PERSON | 0.99+ |
Ericsson | ORGANIZATION | 0.99+ |
David Shepherd | PERSON | 0.99+ |
six | QUANTITY | 0.99+ |
Telefonica | ORGANIZATION | 0.99+ |
Srinivas Mukkamala | PERSON | 0.99+ |
40 seconds | QUANTITY | 0.99+ |
China | LOCATION | 0.99+ |
45 minutes | QUANTITY | 0.99+ |
100% | QUANTITY | 0.99+ |
2024 | DATE | 0.99+ |
United States | LOCATION | 0.99+ |
2016 | DATE | 0.99+ |
90% | QUANTITY | 0.99+ |
ChatGPT | TITLE | 0.99+ |
Robert Gates | PERSON | 0.99+ |
First | QUANTITY | 0.99+ |
AWS | ORGANIZATION | 0.99+ |
Sri | ORGANIZATION | 0.99+ |
Barcelona | LOCATION | 0.99+ |
today | DATE | 0.99+ |
yesterday | DATE | 0.99+ |
millions | QUANTITY | 0.99+ |
this week | DATE | 0.99+ |
Dell Technologies | ORGANIZATION | 0.99+ |
Telcos | ORGANIZATION | 0.99+ |
US | ORGANIZATION | 0.99+ |
Last night | DATE | 0.98+ |
Today | DATE | 0.98+ |
Sri | PERSON | 0.98+ |
Mobile World Congress | EVENT | 0.98+ |
one | QUANTITY | 0.98+ |
Edge | ORGANIZATION | 0.98+ |
three things | QUANTITY | 0.98+ |
first time | QUANTITY | 0.98+ |
Dr. | PERSON | 0.98+ |
108 | QUANTITY | 0.98+ |
telco | ORGANIZATION | 0.98+ |
several years ago | DATE | 0.97+ |
first | QUANTITY | 0.97+ |
MWC | EVENT | 0.96+ |
hundreds and thousands of dollars a day | QUANTITY | 0.96+ |
MWC23 | EVENT | 0.96+ |
About 80,000 people | QUANTITY | 0.95+ |
one thing | QUANTITY | 0.95+ |
13-year-old | QUANTITY | 0.95+ |
theCUBE | TITLE | 0.95+ |
theCUBE | ORGANIZATION | 0.95+ |
two different things | QUANTITY | 0.94+ |
day one | QUANTITY | 0.93+ |
Ivanti | PERSON | 0.92+ |
seven vulnerabilities | QUANTITY | 0.91+ |
VP | PERSON | 0.91+ |
president | PERSON | 0.9+ |
three pillars | QUANTITY | 0.89+ |
first thing | QUANTITY | 0.89+ |
Stephen Manly & Anjan Srinivas, Druva
>> All right, we'll be back in a moment. We'll have Stephen Manly, the CTO, and Anjan Srinivas, the GM and VP of Product Management will join me. You're watching theCUBE, the leader in high tech enterprise coverage. >> Ransomware is top of mind for everyone. The attacks are becoming more frequent and more sophisticated. It's a problem you can't solve alone anymore. Ransomware is built to exploit weaknesses in your backup solution, destroying data and your last line of defense. With many vendors, it can take a lot of effort and configuration to ensure your backup environment is secure. Criminals also know that it's easy to fall behind on best practices like vulnerability scans, patches and updates. In fact, 42% of vulnerabilities are exploited after a patch has been released. After an attack, recovery can be a long and manual process that still may not restore clean or complete data. The good news is that you can keep your data safe and recover faster with the Druva data resiliency cloud on your side. The Druva platform functions completely in the cloud with no hardware, software, operating system, or complex configurations. Which means there are none of the weaknesses that ransomware commonly uses to attack backups. Our software is a service model delivers 24/7 365 fully managed security operations for your backup environment. We handle all the vulnerability scans, patches and upgrades for you. Druva also makes zero trust security easy with built in multi-factor authentication, single sign on and roll based access controls. In the event of an attack, Druva helps you stop the spread of ransomware and quickly understand what went wrong with built in access insights and anomaly detection. Then you can use industry first tools and services to automate the recovery of clean unencrypted data from the entire timeframe of the attack. Cyber attacks are a major threat, but you can make protection and recovery easy with Druva. (upbeat music) >> Welcome back everyone to theCUBE special presentation with Druva on Why Ransomware Isn't Your Only Problem. I'm John Furrier, host of theCUBE. Our next guest are Stephen Manly's, Chief Technology Officer of Druva and Anjan Srinivas, who is the general manager and Vice President of Product Management at Druva. Gentleman, you got the keys to the kingdom, the technology, ransomware, data resilience. This is the topic the IDC white paper that you guys put together with IDC really kind of nails it out. I want to get into it right away. Welcome to this segment, I really appreciate it. Thanks for coming on. >> Great to be here John. >> So what's your thoughts on the survey's conclusion, obviously, the resilience is huge. Ransomware continues to thunder away at businesses and causes a lot of problems. Disruption, I mean, it's endless ransomware problems. What's your thoughts on the conclusion? >> So I'll say the thing that pops out to me is on the one hand everybody who sees the survey, who reads it's is going to say, well, that's obvious. Of course, ransomware continues to be a problem. Cyber resilience is an issue that's plaguing everybody. But I think when you dig deeper and there's a lot of subtleties to look into. But one of the things that I hear on a daily basis from the customers is it's because the problem keeps evolving. It's not as if the threat was a static thing to just be solved and you're done. Because the threat keeps evolving, it remains top of mind for everybody because it's so hard to keep up with what's happening in terms of the attacks. >> And I think the other important thing to note, John, is that people are grappling with this ransomware attack all of a sudden where they were still grappling with a lot of legacy in their own environment. So they were not prepared for the advanced techniques that these ransomware attackers were bringing to market. It's almost like these ransomware attackers had a huge leg up in terms of technology that they had in their favor while keeping the lights on was keeping it ideally from all the tooling that needed to do. A lot of people are even still wondering when that happens next time what do I even do? So clearly not very surprising. Clearly I think it's here to stay. And I think as long as people don't retool for a modern era of data management, this is going to stay this way. >> Yeah, I mean, I hear this whole time in our CUBE conversations with practitioners. It's kind of like the security program, give me more tools I'll buy anything that comes in the market, I'm desperate. There's definitely attention, but it doesn't seem like people are satisfied with the tooling that they have. Can you guys share kind of your insights into what's going on in the product side because people claim that they have tools at fine points of recovery opportunities but they can't get there. So it seems to be that there's a confidence problem here in the market. How do you guys see that? Because I think this is where the rubber meets the road with ransomware 'cause it is a moving train, it's always changing but it doesn't seem as confidence. Can you guys talk about that? What's your reaction? >> Yeah, let me jump in first and Stephen can add to it. What happens is I think this is a panic buying and they have accumulated this tooling now just because somebody said it could solve your problem. But they haven't had a chance to take a relook from a ground up perspective to see where are the bottlenecks, where are the vulnerabilities and which tooling set needs to lie where, where does the logic need to reside. And what at Druva of we are watching people do and people do it successfully, is that as they have adopted Druva technology which is ground up built for the cloud, and really built in a way which is driven at a data insight level where we have people even monitoring our service for anomalies and activities that are suspicious. We know where we need to play a role in really kind of mitigating this ransomware. And then there is a whole plethora of ecosystem players that kind of combine to really really finish the story so to say, right? So I think this has been a panic buying situation. This is like, get me any help you can give me. And I think as this settles down and people really understand that longer term as they really build out a true defense mechanism, they need to think really ground up. They will start to really see the value of technologies like Druva and try to identify the right set of ecosystem to really bring together to solve it meaningfully. >> I was going to say I mean, one of the really interesting things in this survey for me and for a moment, little more than a moment it made me think was the large number of respondents who said, I've got a really efficient well run back up environment. Who then on basically the next question said, and I have no confidence that I can recover from a ransomware attack. And you scratch your head and you think, well, if your backup environment is so good, why do you have such low confidence? And I think that's the moment when we dug deeper and we realized, if you've got a traditional architecture and let's face it, the disbase architecture has been around for almost two decades now in terms of disbased backup. You can have that tune to the help, that can be running as efficiently as you want it. But it was built before the ransomware attacks, before all these cyber issues really started hitting companies. And so I have this really well run traditional backup environment that is not at all built for these modern threat vectors. And so that's really why customers are saying, I'm doing the best I can, but as Anjan pointed out, the architecture, the tooling isn't there to support what problems I need to solve today. >> Well, that's a great point. And before we get into the customer side I want to get to in second. I interviewed Jaspreet, the founded and CEO many years ago even before the pandemic and you mentioned modern. You guys have always had the cloud with Druva, this is huge. Now that you're past the pandemic, what is that modern cloud edge that you guys have? Because that's a great point. A lot of stuff was built kind of back up and recovery bolted on, not really kind of designed into the current state of the infrastructure and the cloud native application modern environment we're seeing right now is a huge issue. >> I think to me there's three things that come up over and over and over again as we talk to people in terms of being built in cloud, being cloud native, why isn't an advantage? The first one is security and ransomware. And we can go deeper but the most obvious one that always comes up is every single backup you do with Druva is air gapped, offsite, managed under a separate administrative domain so that you're not retrofitting any sort of air gap network and buying another appliance or setting up your own cloud environment to manage this. Every backup is ransomware protected, guaranteed. I think the second advantage is the scalability. And this certainly plays into account as your business grows or in some cases as you shrink or repurpose workloads you're only paying for what you use. But it also plays a big role again when you start thinking of ransomware recoveries because we can scale your recovery in cloud on premises as much or as little as you want. And then I think the third one is we're seeing basically things evolving, new workloads, data sprawl, new threat vectors. And one of the nice parts of being SaaS service in the cloud is you're able to roll out new functionality every two weeks and there's no upgrade cycle, there's no waiting. The customer doesn't have to say, wow, I need it six months in the lab before I upgrade it and it's an 18 month, 24 month cycle before the functionality releases. You're getting it every two weeks and it's backed by Druva to make sure it works. >> That says it. Anjan, you got the product side, it's a challenging job 'cause you have so many customers asking for things probably on the roadmap you probably go hour for that one. But I want to get your thoughts on what you're hearing and seeing from customers. we just reviewed the IDC with Phil. How are you guys responding to your customer's needs? Because it seems that it's highly accelerated probably on the feature request, but also structurally as as ransomware continues to evolve. What are you hearing, what's the key customer need? How are you guys responding? >> Yeah, actually I have two things that I hear very clearly when I talk to customers. One, I think after listening to their security problems and their vulnerability challenges because we see customers and help customers who are getting challenged by ransomware on a weekly basis. And what I find that this problem is not just a technology problem, it's an operating model problem. So in order to really secure themselves, they need a security operating model and a lot of them haven't figured out that security operating model in totality. Now, where we come in as Druva is that we are providing them the cloud operating model and a data protection operating model combined with a data insights operating model which all fit into their overall security operating model that they are really owning and they need to manage and operate. Because this is just not about a piece of technology. On top of that, I think our customers are getting challenged by all the same challenges of not just spending time on keeping the lights on, but innovating faster with less. And that has been this age old problem, do more with less. But in this whole, they're like trying to innovate we're in the middle of the war so to say, right? The war is happening, they're getting attacked, but there's also net new shadow IT challenges that's forcing them to make sure that they can manage all the new applications that are getting developed in the cloud. There is thousands of SaaS applications that they're consuming not knowing which data is critical to their success and which ones to protect and govern and secure. So all of these things are coming at them at 100 miles per hour while they're just trying to live one day at a time. And unless they really develop this overall security operating model helped by cloud native technologies like Druva that is really providing them a true cloud native model of really giving like a touchless and an invisible protection infrastructure not just beyond backups, beyond just the data protection that we all know of into this kind of this mindset of kind of being able to look at where each of those functionalities need to lie. That's where I think they're grappling with. Now Druva is clearly helping them with keep up to pace with the public cloud innovations that they need to do and how to protect data. We just launched our EC2 offering to protect EC2 virtual machines back in AWS. And we are going to be continuing to evolve that to further many services that public cloud software 'cause our customers are really kind of consuming them at breakneck speed. >> So the new workloads, the new security capabilities. Love that, good call out there. Stephen there's still the issue of the disruption side of it. You guys have a guarantee, there's a cost to ownership as you get more tools. Can you talk about that angle of it? Because you got new workloads, you got the new security needs, what's the disruption impact? Because you won't avoid that, how much is it going to cost you? And you guys have this guarantee, can you explain that? >> Yeah, absolutely. So Druva launched our $10 million data resiliency guarantee. And for us, there were really two key parts to this. The first obviously is $10 million means that, again, we're willing to put our money where our mouth is and that's a big deal, right? That we're willing to back this with the guarantee. But then the second part and this is the part that I think reflects that sort of model that Anjan was talking about. We sort of look at this and we say, the goal of Druva is to do the job of protecting and securing your data for you. So that you as a customer don't have to do it anymore. And so the guarantee actually protects you against multiple types of risks all with SLAs. So everything from your data is going to be recoverable in the case of a ransomware attack. Okay, that's good. Of course, for it to be recoverable we're also guaranteeing your backup success rate. We're also guaranteeing the availability of the service. We're guaranteeing that the data that we're storing for you can't be compromised or leaked externally. And we're guaranteeing the long term durability of the data so that if you back up with us today and you need to recover it 30 years from now, that data is going to be recovered. So we wanted to really attack the end to end risks that affect our customers. Cybersecurity is a big deal but it is not the only problem out there. And the only way for this to work is to have a service that can provide you SLAs across all of the risks because that means, again, as a SaaS vendor, we're doing the job for you so you're buying results as opposed to technology. >> That's great point. Ransomware isn't the only problem, that's the title of this presentation. But it's a big one and people concerned about it so great stuff. And the last five minutes guys if you don't mind, I'd love to have you share what's on the horizon for Druva. You mentioned the new workloads Anjan, you mentioned this new security hearing shift left, DevOps is now the developer model, they're running IT. Yet data and security teams now stepping in and trying to be as high velocity as possible for the developers and enterprises. What's on the horizon for Druva? What trends is the company watching and how are you guys putting that together to stay ahead in the marketplace and the competition? >> I think listening to our customers, what we realize is they need help with the public cloud number one. I think that's a big wave of consumption. People are consolidating their data centers moving to the public cloud. They need help in expanding data protection which becomes the basis of a lot of the security operating model that I talked about. They need that first from Druva before they can start to get into much more advanced level of insights and analytics on that data to protect themselves and secure themselves and do interesting things with that data. So we are expanding our coverage on multiple fronts there. The second key thing is to really bring together a very insightful presentation layer which I think is very unique to Druva because only we can look at multiple tenants, multiple customers because we are a SaaS vendor. And look at insights and give them best practices and guidances and analytics that nobody else can give. There's no silo anymore because we are able to take a good big vision view and now help our customers with insights that otherwise that information map is completely missing. So we are able to guide them down a path where they can optimize which workloads need what kind of protection and then how to secure them. So that is the second level of insights and analytics that we are building. And there's a whole plethora of security offerings that we are going to build all the way from a feature level where we have things like recycle bin that's already available to our customers today to prevent any anomalous behavior and attacks that would delete their backups and then they still have a way to recover from it. But also things to curate and get back to that point in time where it is safe to recover and help them with a sandbox which they can recover confidently knowing it's not going to jeopardize them again and reinfect the whole environment again. So there's a whole bunch of things coming, but the key themes are public cloud, data insights and security. And that's where my focus is to go and get those features delivered. And Stephen can add a few more things around services that Stephen is looking to build and launch. >> Sure. So John, I think one of the other areas that we see just an enormous groundswell of interest. So public cloud is important, but there are more and more organizations that are running hundreds if not thousands of SaaS applications. And a lot of those SaaS applications have data. So there's the obvious things like Microsoft 365, Google Workspace, but we're also seeing a lot of interest in protecting Salesforce. Because if you think about it, if someone deletes some really important records in Salesforce, that's actually kind of the record of your business. And so we're looking at one more SaaS application protection and really getting deep in that application awareness. It's not just about backup and recovery. When you look at something like a Salesforce or something like a Microsoft 365, you do want to look into sandboxing, you want to look into long term archival. Because this is the new record of the business, what used to be in your on-premises databases that all lives in cloud and SaaS applications now. So that's a really big area of investment for us. The second one, just to echo what Anjan said is, one of the great things of being a SaaS provider is I have metadata that spans across thousands of customers and tens of billions of backups a year. And I'm tracking all sorts of interesting information that is going to enable us to do things like make backups more autonomous. So that customers, again, I want to do the job for them, we'll do all the tuning, we'll do all the management for them. To be able to better detect ransomware attacks, better respond to ransomware attacks because we're seeing across the globe. And then of course, being able to give them more insight into what's happening in their data environment so they can get a better security posture before any attack happens. Because let's face it, if you can set your data up more cleanly, you're going to be a lot less worried and a lot less exposed when that attack happens. So we want to be able to again, cover those SaaS applications in addition to the public cloud. And then we want to be able to use our metadata and use our analytics and use this massive pipeline we've got to deliver value to our customers. Not just charts and graphs, but actual services that enable them to focus their attention on other parts of the business. >> That's great stuff, Anjan. >> And remember John, I think all this while keeping things really easy to consume, consumer grade UI, APIs. And during the power of SaaS as a service simplicity to kind of continue on amongst kind of keeping these complex technologies together. >> Anjan, that's a great call out. I was going to mention ease of use and self-service, big part of the developer and IT experience expected it's a table stakes, love the analytic angle. I think that brings the scale to the table and faster time to value to get to learn best practices. But at the end of the day, automation, cross cloud protection and security to protect and recover. This is huge and this is a big part of not only just protecting against ransomware and other things, but really being fast and being agile. So really appreciate the insights. Thanks for sharing on this segment, really under the hood and really kind of the value of the product. Thanks for coming on, appreciate it. >> Thank you very much. >> Okay, there it is. You got the experts talk about the hood, the product, the value, the future of what's going on with Druva and the future of cloud native protecting and recovering. This is what it's all about. It's not just ransomware they have to worry about. In a moment, Dave Allante will give you some closing thoughts on the subject here. You're watching theCUBE, the leader in high tech enterprise coverage. >> As organizations migrate their business processes to multi-cloud environments, they still face numerous threats and risks of data loss. With a growing number of cloud platforms and fragmented applications, it leads to an increase in data silos, sprawl and management complexity. As workloads become more diverse, it's challenging to effectively manage data growth, infrastructure, and resource costs across multiple cloud deployments. Using numerous backup vendor solutions for multiple cloud platforms can lead to management complexity. More importantly, the lack of centralized visibility and control can leave you exposed to security vulnerabilities, including ransomware that can cripple your business. The Druva data resiliency cloud is the only 100% SaaS data resiliency platform that provides centralized, secure air gapped and immutable backup and recovery. With Druva, your data is safe with multiple layers of protection and is ready for fast recovery from cyber attacks, data corruption, or accidental data loss. Through a simple, easy to manage platform, you can seamlessly protect fragmented, diverse data at scale, across public clouds and your business critical SaaS applications. Druva is the only 100% SaaS vendor that can manage, govern, and protect data across multiple clouds and business critical SaaS applications. It supports not just backup up and recovery, but also data resiliency across high value use cases such as e-discovery, sensitive data governance, ransomware and security. No other vendor can match Druva for customer experience, infinite scale, storage optimization, data immutability and ransomware protection. The Druva data resiliency cloud, your data always safe, always ready. Visit druva.com today to schedule a free demo. (upbeat music) >> One of the big takeaways from today's program is that in the scramble to keep business flowing over the past two plus years, a lot of good technology practices have been put into place. But there's much more work to be done, specifically because the frequency of attacks is on the rise and the severity of lost, stolen or inaccessible data is so much higher today. Business resilience must be designed into architectures and solutions from the start. It cannot be an afterthought. Well, actually it can be, but you won't be happy with the results. Now, part of the answer is finding the right partners, of course, but it also means taking a systems view of your business, understanding the vulnerabilities and deploying solutions that can balance cost efficiency with appropriately high levels of protection, flexibility, and speed/accuracy of recovery. We hope you found today's program useful and informative. Remember, this session is available on demand in both its full format and the individual guest segments. All you got to do is go to thecube.net and you'll see all the content. Or you can go to druva.com. There are tons of resources available including analyst reports, customer stories. There's this cool TCO calculator. You can find out what pricing looks like and lots more. Thanks for watching Why Ransomware Isn't Your Only Problem made possible by Druva. A collaboration with IDC and presented by theCUBE, your leader in enterprise and emerging tech coverage. (upbeat music)
SUMMARY :
and Anjan Srinivas, the GM and configuration to ensure your This is the topic the IDC white paper on the survey's conclusion, that pops out to me Clearly I think it's here to stay. that comes in the market, I'm desperate. and Stephen can add to it. and let's face it, the kind of designed into the And one of the nice parts of probably on the roadmap you and they need to manage and operate. So the new workloads, the the goal of Druva is to I'd love to have you share So that is the second level of insights that is going to enable And during the power of SaaS as a service and faster time to value to You got the experts talk about the hood, Druva is the only 100% SaaS is that in the scramble
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
John | PERSON | 0.99+ |
Stephen | PERSON | 0.99+ |
Stephen Manly | PERSON | 0.99+ |
Dave Allante | PERSON | 0.99+ |
Anjan Srinivas | PERSON | 0.99+ |
John Furrier | PERSON | 0.99+ |
$10 million | QUANTITY | 0.99+ |
18 month | QUANTITY | 0.99+ |
24 month | QUANTITY | 0.99+ |
42% | QUANTITY | 0.99+ |
AWS | ORGANIZATION | 0.99+ |
Druva | ORGANIZATION | 0.99+ |
first | QUANTITY | 0.99+ |
hundreds | QUANTITY | 0.99+ |
second part | QUANTITY | 0.99+ |
thecube.net | OTHER | 0.99+ |
two things | QUANTITY | 0.99+ |
Phil | PERSON | 0.99+ |
thousands | QUANTITY | 0.99+ |
six months | QUANTITY | 0.99+ |
two key parts | QUANTITY | 0.99+ |
third one | QUANTITY | 0.99+ |
one day | QUANTITY | 0.99+ |
three things | QUANTITY | 0.99+ |
today | DATE | 0.99+ |
Druva | TITLE | 0.99+ |
each | QUANTITY | 0.98+ |
second level | QUANTITY | 0.98+ |
one | QUANTITY | 0.98+ |
both | QUANTITY | 0.98+ |
IDC | ORGANIZATION | 0.98+ |
pandemic | EVENT | 0.98+ |
Anjan | PERSON | 0.98+ |
second key | QUANTITY | 0.98+ |
30 years | QUANTITY | 0.97+ |
One | QUANTITY | 0.97+ |
second one | QUANTITY | 0.96+ |
100 miles per hour | QUANTITY | 0.95+ |
Microsoft | ORGANIZATION | 0.95+ |
second | QUANTITY | 0.95+ |
theCUBE | ORGANIZATION | 0.94+ |
first tools | QUANTITY | 0.93+ |
100% | QUANTITY | 0.93+ |
thousands of customers | QUANTITY | 0.92+ |
Anjan | ORGANIZATION | 0.91+ |
EC2 | TITLE | 0.9+ |
Workspace | TITLE | 0.89+ |
first one | QUANTITY | 0.89+ |
two decades | QUANTITY | 0.89+ |
Stephen Manly & Anjan Srinivas, Druva
(upbeat music) >> Welcome back everyone to theCUBE special presentation with Druva on why ransomware isn't your only problem. I'm John Furrier, your host of theCUBE. Our next guest are Stephen Manly, Chief Technology Officer of Druva. And Anjan Srinivas, who is the general manager and vice president of product management in Druva. Gentleman, you got the keys to the kingdom, the technology, ransomware, data resilience. This is the topic, the IDC White Paper that you guys put together with IDC. Really nails it out. I want to get into it right away. Welcome to this segment. I really appreciate it. Thanks for coming on. >> Anjan: Great to be here John. >> So what's your thoughts on the survey's conclusion? Obviously the resilience is huge. Ransomware continues to thunder away at businesses and causes a lot of problems, disruption. I mean, it's endless ransomware problems. What's your thoughts on the conclusion? >> So I'll say the thing that pops out to me is on the one hand, everybody who sees the survey, who reads, it's going to say, well that's obvious. Of course ransomware continues to be a problem. Cyber resilience is an issue that's plaguing everybody. But I think when you dig deeper and there's a lot of subtleties to look into, but one of the things that I hear on a daily basis from the customers is it's because the problem keeps evolving. It's not as if the threat was a static thing to just be solved and you're done. Because the threat keeps evolving, it remains top of mind for everybody because it's so hard to keep up with what's happening in terms of the attacks. >> And I think the other important thing to note, John, is that people are grappling with this ransomware attack all of a sudden where they were still grappling with a lot of legacy in their own environment. So they were not prepared for the advanced techniques that these ransomware attackers were bringing to market. It's almost like these ransomware attackers had a huge leg up in terms of technology that they had in their favor while keeping the lights on was keeping IT away from all the tooling that needed to do. A lot of people are even still wondering when that happens next time, what do I even do? So clearly not very surprising. Clearly I think it's here to stay and I think as long as people don't retool for a modern era of data management, this is going to stay this way. >> Yeah, I mean I hear this all the time in our CUBE conversations with practitioners It's like the security product. Give me more tools. I'll buy anything that comes in the market. I'm desperate. There's definitely attention, but it doesn't seem like people are satisfied with the tooling that they have. Can you guys share your insights into what's going on in the product side? Because people claim that they have tools at fine points of recovery opportunities, but they can't get there. So it seems to be that there's a confidence problem here in the market. How do you guys see that? 'Cause I think this is where the rubber meets the road with ransomware 'cause it is a moving train. It's always changing, but it doesn't seem this confidence. Can you guys talk about that? What's your reaction? >> Yeah, let me jump in first and Stephen can add to it. What happens is I think this is a panic buying and they have accumulated this tooling now just because somebody said could solve your problem but they haven't had a chance to take a relook from a ground up perspective to see where are the bottlenecks, where are the vulnerabilities, and which tooling set needs to lie where, where does the logic need to reside? And what a Druva, we are watching people do and people do it successfully is that as they have adopted Druva technology, which is ground up built for the cloud and really built in a way which is driven at a data insight level where we have people even monitoring our service for anomalies and activities that are suspicious. We know where we need to play a role in really mitigating this ransomware. And then there is a whole plethora of ecosystem players that combine really, really finish the story so to say. So I think this has been a panic buying situation. This is like, get me any help you can give me. And I think as this settles down and people really understand that longer term as they really build out a true defense mechanism, they need to think really ground up. They will start to really see the value of technologies like Druva and try to identify the right set of ecosystem to really bring together to solve it meaningfully. >> John: Yes, Stephen. >> I was going to say, one of the really interesting things in the survey for me and for a moment, little more than a moment, it made me think was that the large number of respondents who said I've got a really efficient well-run backup environment who then on basically the next question said, and I have no confidence that I can recover from a ransomware attack. And you scratch your head and you think, well if your backup environment is so good, why do you have such low confidence? And I think that's the moment when we dug deeper and we realized, if you've got a traditional architecture and let's face it, the disk-based architecture's been around for almost two decades now in terms of disk-based backup, you can have that tune to the health. That can be running as efficiently as you want it, but it was built before the ransomware attacks, before all these cyber issues really start hitting companies. And so I have this really well-run traditional backup environment that is not at all built for these modern threat vectors. And so that's really why customers are saying, I'm doing the best I can, but as Anjan pointed out, the architecture, the tooling isn't there to support what problems I need to solve today. >> Yeah, great point. >> And so yeah. >> Well, that's a great point. Before we get into the customer side, I want to get to in second, I interviewed Jaspreet, the founder and CEO, many years ago even before the pandemic. You mentioned modern. You guys have always had the cloud with Druva. This is huge. Now that you're past the pandemic, what is that modern cloud edge that you guys have? 'Cause that's a great point. A lot of stuff was built, backup and recovery bolted on, not really designed into the current state of the infrastructure and the cloud native application modern environment we're seeing right now is a huge issue. >> I think, to me, there's three things that come up over and over and over again as we talk to people in terms of being built in cloud, being cloud native, why is it an advantage? The first one is, is security and ransomware. And we can go deeper, but the most obvious one that always comes up is every single backup you do with Druva is air gap, offsite, managed under a separate administrative domain so that you're not retrofitting any air gap network and buying another appliance or setting up your own cloud environment to manage this. Every backup is ransomware protected, guaranteed. I think the second advantage is the scalability. And this certainly plays into account as your business grows or in some cases as you shrink or repurpose workloads. You're only paying for what you use. But it also plays a big role, again, when you start thinking of ransomware recoveries because we can scale your recovery in cloud, on-premises as much or as little as you want. And then I think the third one is, we're seeing basically things evolving, new workloads, data sprawl, new threat vectors. And one of the nice parts of being a SaaS service in the cloud is you're able to roll out new functionality every two weeks and there's no upgrade cycle, there's no waiting. The customer doesn't have to say, wow, I need it six months in the lab before I upgrade it and it's an 18-month, 24-month cycle before the functionality releases. You're getting it every two weeks and it's backed by Druva to make sure it works. >> Anjan, you got the product side. It's challenging job 'cause you have so many customers asking for things probably on the roadmap. You probably go hour for that one. But I want to get your thoughts on what you're hearing and seeing from customers. We just reviewed the IDC with Phil. How are you guys responding to your customer's needs? Because it seems that it's highly accelerated probably on the feature request, but also structurally as as ransomware continues to evolve. What are you hearing? What's the key customer need? How are you guys responding? >> Yeah, actually, I have two things that I hear very clearly when I talk to customers. One, I think after listening to their security problems and their vulnerability challenges, because we see customers and help customers who are getting challenge by ransomware on a weekly basis, and what I find that this problem is not just a technology problem, it's an operating model problem. So in order to really secure themselves, they need a security operating model and a lot of them haven't figured out that security operating model in totality. Now where we come in as Druva is that we are providing them the cloud operating model and a data protection operating model combined with a data insights operating model, which all fit into that overall security operating model that they are really owning and they need to manage and operate because this is just not about a piece of technology. On top of that, I think our customers are getting challenged by all the same challenges of not just spending time on keeping the lights on, but innovating faster with less. And that has been this age old problem, do more with less. But in this whole, they're like trying to innovate when the middle of the war so to say. The war is happening, they're getting attacked, but there's also net new shadow IT challenges that's forcing them to make sure that they can manage all the new applications that are getting developed in the cloud. There is thousands of SaaS applications that they're consuming, not knowing which data is critical to their success and which ones to protect and govern and secure. So all of these things are coming at them at a hundred miles per hour while they're just trying to live one day at a time. And unless they really develop this overall security operating model helped by cloud native technologies like Druva that really providing them a true cloud native model of really giving like a touchless and an invisible protection infrastructure. Not just beyond backups, beyond just the data protection that we all know of into this mindset of being able to look at where each of those functionalities need to lie. That's where I think they're grappling with. Now Druva is clearly helping them with keep up to pace with the public cloud innovations that they need to do and how to protect data. We just launched our EC2 offering to protect EC2 virtual machines back in AWS and we are going to be continuing to evolve that to further many services that public cloud software 'cause our customers are really consuming them at breakneck speed. >> So the new workloads, the new security capabilities, love that. Good call out there. Stephen, there's still the issue of the disruption side of it. You guys have a guarantee. There's a cost of ownership as you get more tools. Can you talk about that angle of it? Because this is, you got new workloads, you got the new security needs, what's the disruption impact? 'Cause we won't avoid that. How much it going to cost you? And you guys have this guarantee, can you explain that? >> Yeah, absolutely. So Druva launched our $10 million data resiliency guarantee. And for us, there were really two key parts to this. The first obviously is $10 million means that, again, we're willing to put our money where our mouth is and that's a big deal. That we're willing to back this with the guarantee. But then the second part, and this is the part that I think reflects that model that Anjan was talking about. We look at this and we say, the goal of Druva is to do the job of protecting and securing your data for you so that you as a customer don't have to do it anymore. And so the guarantee actually protects you against multiple types of risks all with SLAs. So everything from, your data's going to be recoverable in the case of a ransomware attack. Okay, that's good. Of course for it to be recoverable, we're also guaranteeing your backup success rate. We're also guaranteeing the availability of the service. We're guaranteeing that the data that we're storing for you can't be compromised or leaked externally. And we're guaranteeing the long term durability of the data so that if you back up with us today and you need to recover 30 years from now, that data's going to be recovered. So we wanted to really attack the end-to-end risks that affect our customers. Cybersecurity is a big deal, but it is not the only problem out there and the only way for this to work is to have a service that can provide you SLAs across all of the risks because that means, again, as a SaaS vendor, we're doing the job for you so you're buying results as opposed to technology. >> That's great. Great point. Ransomware isn't the only problem. That's the title of this presentation, but it's a big one. People concerned about it. So great stuff. In the last five minutes guys, if you don't mind, I'd love to have you share what's on the horizon for Druva. You mentioned the new workloads Anjan. You mentioned this new security hearing shift left. DevOps is now the developer model. They're running IT, yet data and security teams now stepping in and trying to be as high velocity as possible for the developers and enterprises. What's on the horizon for Druva? What trends is the company watching, and how are you guys putting that together to stay ahead in the marketplace in the competition? >> Yeah, I think listening to our customers, what we realize is they need help with the public cloud, number one. I think that's a big wave of consumption. People are consolidating their data centers moving to the public cloud. They need help in expanding data protection, which becomes the basis of a lot of the security operating model that I talked about. They need that first from Druva before they can start to get into much more advanced level of insights and analytics on that data to protect themselves and secure themselves and do interesting things with that data. So we are expanding our coverage on multiple fronts there. The second key thing is to really bring together a very insightful presentation layer, which I think is very unique to Druva because only we can look at multiple tenants, multiple customers because we are a SaaS vendor and look at insights and give them best practices and guidances and analytics that nobody else can give. There's no silo anymore because we are able to take a good big vision view and now help our customers with insights that otherwise that information map is completely missing. So we are able to guide them down a path where they can optimize which workloads need, what kind of protection, and then how to secure them. So that is the second level of insights and analytics that we are building. And there's a whole plethora of security offerings that we are going to build all the way from a feature level where we have things like recycled bin that's already available to our customers today to prevent any anomalous behavior and attacks that would delete their backups and then they still have a way to recover from it, but also things to curate and get back to that point in time where it is safe to recover and help them with a sandbox, which they can recover confidently knowing it's not going to jeopardize them again and reinfect the whole environment again. So there's a whole bunch of things coming, but the key themes are public cloud, data insights, and security and that's where my focus is to go and get those features delivered. And Stephen can add a few more things around services that Stephen is looking to build and launch. >> Sure. So John, I think one of the other areas that we see just an enormous groundswell of interest. So public cloud is important, but there are more and more organizations that are running hundreds, if not thousands of SaaS applications and a lot of those SaaS applications have data. So there's the obvious things like Microsoft 365, Google Workspace, but we're also seeing a lot of interest in protecting Salesforce because if you think about it, if someone deletes some really important records in Salesforce, that's actually the record of your business. And so we're looking at more and more SaaS application protection and really getting deep in that application awareness. It's not just about backup and recovery when you look at something like a Salesforce or something like a Microsoft 365, you do want to look into sandboxing, you want to look into long-term archival because, and this is the new record of the business. What used to be in your on-premises databases, that all lives in cloud and SaaS applications now. So that's a really big area of investment for us. The second one, just to echo what Anjan said is, one of the great things of being a SaaS provider is I have metadata that spans across thousands of customers and tens of billions of backups a year. And I'm tracking all sorts of interesting information that is going to enable us to do things like make backups more autonomous so that customers, again, I want to do the job for them. We'll do all the tuning. We'll do all the management for them to be able to better detect ransomware attacks, better respond to ransomware attacks because we're seeing across the globe. And then of course being able to give them more insight into what's happening in their data environment so they can get a better security posture before any attack happens. Because let's face it, if you can set your data up more cleanly, you're going to be a lot less worried and a lot less exposed from when attack happens. So we want to be able to, again, cover those SaaS applications in addition to the public cloud. And then we want to be able to use our metadata and use our analytics and use this massive pipeline we've got to deliver value to our customers, not just charts and graphs, but actual services that enable them to focus their attention on other parts of the business. >> That's great stuff. >> And remember John, I think all this while keeping things really easy to consume, consumer grade UI, APIs, and really, the power of SaaS as a service, simplicity to continue on amongst keeping these complex technologies together. >> Anjan that's a great call out. I was going to mention ease of use and self-service. Big part of the developer and IT experience, expected, it's the table stakes. Love the analytic angle. I think that brings the scale to the table and faster time to value to get to learn best practices. But at the end of the day, automation, cross cloud protection, and security to protect and recover. This is huge and this is a big part of not only just protecting against ransomware and other things, but really being fast and being agile. So really appreciate the insights. Thanks for sharing on this segment. Really under the hood and really the value of the product. Thanks for coming on. Appreciate it. >> Thank you very much. >> Okay, there it is. You got the experts talking about under the hood, the product, the value, the future of what's going on with Druva and the future of cloud native protecting and recovering. This is what it's all about. It's not just ransomware they have to worry about. In a moment, Dave Vellante will give you some closing thoughts on the subject here. You're watching theCUBE, the leader in high tech enterprise coverage. (gentle music)
SUMMARY :
This is the topic, the IDC White Paper on the survey's conclusion? that pops out to me Clearly I think it's here to stay So it seems to be that finish the story so to say. and let's face it, the disk-based and the cloud native of being a SaaS service in the cloud We just reviewed the IDC with Phil. and they need to manage and operate of the disruption side of it. the goal of Druva is to I'd love to have you share So that is the second level of insights that is going to enable us to do things and really, the power and security to protect and recover. and the future of cloud native
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Stephen | PERSON | 0.99+ |
Dave Vellante | PERSON | 0.99+ |
John | PERSON | 0.99+ |
Stephen Manly | PERSON | 0.99+ |
Anjan | PERSON | 0.99+ |
John Furrier | PERSON | 0.99+ |
Anjan Srinivas | PERSON | 0.99+ |
18-month | QUANTITY | 0.99+ |
$10 million | QUANTITY | 0.99+ |
24-month | QUANTITY | 0.99+ |
thousands | QUANTITY | 0.99+ |
hundreds | QUANTITY | 0.99+ |
six months | QUANTITY | 0.99+ |
AWS | ORGANIZATION | 0.99+ |
Phil | PERSON | 0.99+ |
second advantage | QUANTITY | 0.99+ |
one day | QUANTITY | 0.99+ |
30 years | QUANTITY | 0.99+ |
second part | QUANTITY | 0.99+ |
Druva | ORGANIZATION | 0.99+ |
third one | QUANTITY | 0.99+ |
three things | QUANTITY | 0.99+ |
two things | QUANTITY | 0.99+ |
Druva | TITLE | 0.99+ |
today | DATE | 0.99+ |
first | QUANTITY | 0.99+ |
two key parts | QUANTITY | 0.98+ |
second one | QUANTITY | 0.98+ |
first one | QUANTITY | 0.98+ |
second key | QUANTITY | 0.98+ |
IDC | ORGANIZATION | 0.98+ |
pandemic | EVENT | 0.97+ |
theCUBE | ORGANIZATION | 0.97+ |
second level | QUANTITY | 0.97+ |
one | QUANTITY | 0.97+ |
each | QUANTITY | 0.97+ |
One | QUANTITY | 0.97+ |
second | QUANTITY | 0.96+ |
thousands of customers | QUANTITY | 0.96+ |
Microsoft | ORGANIZATION | 0.95+ |
Jaspreet | PERSON | 0.93+ |
SaaS | QUANTITY | 0.93+ |
EC2 | TITLE | 0.92+ |
tens of | QUANTITY | 0.87+ |
many years ago | DATE | 0.83+ |
Anjan Srinivas, Druva | PERSON | 0.82+ |
every two weeks | QUANTITY | 0.81+ |
Anjan | ORGANIZATION | 0.81+ |
a hundred miles per hour | QUANTITY | 0.81+ |
Workspace | TITLE | 0.8+ |
Salesforce | TITLE | 0.79+ |
billions of backups a year | QUANTITY | 0.71+ |
ORGANIZATION | 0.7+ | |
two decades | QUANTITY | 0.7+ |
single backup | QUANTITY | 0.68+ |
CUBE | ORGANIZATION | 0.66+ |
Bhavana Srinivas, PubNub | Cisco DevNet Create 2017
>> Announcer: Live from San Francisco, it's theCUBE covering DevNet Create 2017 brought to you by Cisco. >> Hey, welcome back everyone, we are here live in San Francisco for theCUBE's exclusive two days of coverage of Cisco's new inaugural event called DevNet Create. An extension of their classical developer group DevNet, DevNet Create really going into the ethos of DevOps, the infrastructruous code targeting cloud-native and app developers, the collision between applications and infrastructure. A new direction for Cisco, this is theCUBE, I'm John Furrier with my co-host Peter Burris. Our next guest is Bhavana Srines- >> Bhavana: Srinivas. >> Srinivas, solutions architect at PubNub, which provides real-time pubs. Welcome to theCUBE, thanks for coming on. >> Thank you, it's great to be here and talk to you guys. >> So, PubNub, you couldn't get PubSub but it relates. Explain what you guys do real quick. >> Yeah, so what PubNub is is it provides real-time infrastructure as a service. So we realized that a lot of people were trying to build these real-time, always-on applications wherein when something happens in real life, you want that message or event to be translated to several of your friends or other users instantly. So, everyone is trying to build a real-time app like, say, a taxi dispatcher like Lyft or for example, a chat application where if I send a message my friends need to receive it instantly. Anyone trying to build these kind of real-time applications were building the infrastructure before they even got to the best part, which is their business logic. So, we decided that we will provide that infrastructure, we'll provide that plumbing. We'll build a global distributed network for all of these app developers to build their always-on applications. So, what we do is provide this real-time, bidirectional communication between devices in a very scalable manner and it's very, it focuses on real-time communication. >> And the key there is that most apps are mobile, you require this so you want to get them accelerated because, let's face it, most apps don't make it, right? So why build all the plumbing? >> Bhavana: Right. >> Focus on getting to figuring out the best app experience. >> Exactly, so it's for mobile, web, and even for IoT devices because everyone now wants to talk to each other. You're not going to let that gradual sit by itself, you want to connect it. So, like you said, it's meant to go to market quickly. Like you said, not every company has the resources or the time and the effort to put in to building this infrastructure, so why don't we provide this as a service? So now they're focusing on their business logic and try and make that app look pretty. >> So you're clearly in the world of cloud-native, which really is pure cloud, mostly startups. Because why have a data center? If you're a startup, I mean anyone that does a startup these days, if you have data center you're either crazy or you have so much case you just want to spend it. Why would you want to do it? You just go right to the cloud. >> Right, right, right, so we call ourselves more of a network because we're not... Think of it as a CDN but for real-time data. It's not longer static files- >> Peter: CDN is smaller messages deterministic performance. >> Exactly, exactly, you nailed it. So, what we're- >> John: You nailed it. >> Peter: I'm the man! (laughter) >> All right, so talk to me about where your use cases are. Give us some examples of customers and some specific apps that are on the network. >> For sure, so, if you take eBay for instance. They use PubNub for buyer-seller chat. So, you go on eBay, you want to talk to that buyer before you actually buy that thing. So, that chat application is powered by PubNub. Or for instance, you go to Logitech and then you want to control all these devices in your house, and PubNub is what enables that from your mobile phone to all the devices in your house. That is PubNub in play there. Or, if for instance, Lyft uses us for to see where exactly the driver is in real-time. So you're able to see every instantly. So, it's such a low-lying infrastructure that we play in almost 35 different industries. Whether it's real-time chat or taxi dispatch, multiplayer game, like Pocket Gems uses us. That's where it's real-time at it's core, right? So, you have two screens, people are playing a game. You want to see what the other person is doing, right? That's the essence of a multiplayer game. And so you can imagine how important it is to be real-time in such a use case, and that's where PubNub fits in. >> But just so we're clear, we're not talking about scada kinds of, system control kinds of things. Low-level IoT protocols, we're talking about a machine that serve human types of speeds. >> Bhavana: Exactly. >> A few hundred milliseconds, that kind of stuff. >> Exactly, exactly, so we're protocol, we call ourselves protocol agnostic. So, as long as a device can speak ECP it can understand PubNub. So, all you're dealing with is that high-level application level APIs. >> Peter: So you're still layer seven? >> Yes, very much layer seven. >> Peter: That's important. >> Yeah, but then the way we provide that layer seven API is by building out this very robust network. >> All right, so explain to us how you guys play with microservices because you're doing a topic on, Always-on Apps are Driving Microservices to the Edge. >> Yeah, yeah, yeah, yeah. So, so far you understood that PubNub's almost like a message pipeline between devices. If you have a message to throw out, PubNub will route it for you anywhere in the world. So then we decided that people are sending all these small bits of data through our network, but let's do something with that data. So, maybe if there's a chat application and people are talking to each other, maybe you want to translate it in-stream. So you put in a function there on the PubNub network that says, "Hey, if my destination is going to a "Spanish-speaking person, translate it." Or if I want to do sentiment analysis because I have a customer support kind of app, data's flowing between an agent and a customer, then let's do some sentiment analysis on it. So, what we added to this humongous network is the ability to put small pieces of logic on it. So that it acts on the data flowing though the network. And so it becomes easy to spin up these microservices through PubNub and that's what I'm going to be talking about. So it's, yeah-- >> John: So it's a brand new innovation. >> Bhavana: Sorry? >> A new innovation opportunity for you guys-- >> Bhavana: Exactly. >> To apply logic into a data stream while it's in motion. >> Of course, yes, so we recently even did have a BLOCK, we call this BLOCK, event handlers. So, we have a BLOCK with Cisco Spark. So if you wanted to do any kind of collaboration using that Cisco Spark, you can now send data through PubNub and instantly, in real-time it will sync up with Cisco Spark. >> So, Bhavana I got to get your perspective on something. We talk to a lot of enterprises and you're involved with a lot of cutting edge companies. Microservices, cloud-native, they're doing cutting edge stuff. They don't have time to be bothered with old-fashioned stuff because they have no baggage. There's no legacy, a lot of these enterprises have legacy environments, they're trying to be relevant, and they're looking to design great apps. Is there a pattern that you've seen or observation that you've noticed on these successful new, emerging companies that could be an opportunity for someone to look at and say, "Hmm, I should to more of that." What's the trend? >> (laughs) That's a loaded question. But we talk to a lot of small and medium businesses and also a lot of enterprise level companies. But then, it's just that the sales cycles are much slower. You can't go to a company and say that, "Hey, I know you're building a technical product. "Speed up your development process," right? So it's up to them to do that. So with enterprises at least they have the resource and time to do so. But, like you said, they have a lot of legacy systems. So, it's hard to tear that down and-- >> John: Build new. >> Build new stuff that you have, which might be more optimized but we try to make it work. So we're trying to now, like I said, if you're within the PubNub eco-system, you can use our BLOCKS but then everyone understands https. So we've now included a BLOCKs endpoint, where if you just dock http, you can get in to the PubNub network. So ways to use our network using their infrastructure. So we're trying to make this network accessible for anyone, irrespect of whether they use-- >> John: So integrate easily into these older legacy environments. >> Bhavana: Exactly. >> Well, but so one of the places where at least PubSub initially started was the idea that you could have a published without having to know who the clients were. >> Bhavana: Right, right, right, right. >> So you anticipate, does PubNub anticipate that you're actually going to be in a position to say, I as a real-time device, who has a real-time service, can put something into PubNub and then devices out there can subscribe to it? So a device manufacturer may sell something, it takes advantage of that centralized service, but have it operate in a deterministic, high-quality high-reliability way? Is that kind of the direction you're taking? >> Yeah, but at the end of the day, someone has to build an application. >> Peter: Sure. >> So for instance, even in Insteon, they use PubNub. They integrate PubNub within their devices and they're now selling it at Best Buys and whatnot. So it's like when I as a customer buy an Insteon product, I don't know there's PubNub in there. But then using PubNub, Insteon's now able to collect data about my usage patterns or where I can be saving energy, et cetera so the- >> But then the alternative for them is to build a full-stack system, manage it, have system integrators, have operators-- >> I mean, that was exactly the case at Insteon. They had 23 on-call support agents all day, every day, trying to do exactly what PubNub did for them without that. >> John: Yeah, they save all that cost. It's kind of like why people use Amazon. >> Right, exactly. >> (laughs) I don't need a data center, I don't need staff. All right, what did you think about this event? Obviously, Cisco has been first in a lot of markets and succeeded in networking but didn't really knock it out of the park on smart home or-- >> Peter: Linksys. >> (laughs) And so on and so forth but now, with cloud-native, we're saying is that the opportunity for them? >> Bhavana: Yeah. >> What's your take on Cisco's moving up the stack? >> I mean, I think it's great. This is one of the first conferences that DevNet is hosting for developers, right? I just got here but we've had a booth here and people are saying really great things. And there's been a steady crowd. And apparently there have been great talks. So I'm actually very excited to give my talk and then go on. >> Peter: What time is your talk, today? >> Yeah, today at 5 p.m. and then I'm here tomorrow as well. So, excited to check out the whole experience. >> Great to have you on theCube and thanks for sharing PubNub and we look forward to getting more updates from you. And congratulations on your success. >> Bhavana: Thank you. >> And your customers, thanks for sharing. >> It was great to be here, thank you so much. >> John: Thanks so much. >> So you should stop by our booth when you- >> We'll stop by and check out PubNub, the real-time pub-sub service used by all cutting edge companies in the cloud-native. This is theCUBE, Cube Cloud. Check out our content at youtube.com/siliconangle. That's our Cube Cloud, all the content there for you. I'm John Furrier with Peter Burris. Stay with us for more live, exclusive coverage from Cisco's inaugural event, DevNet Create, after this short break. (upbeat music) >> Hi, I'm April Mitchell and I'm the Senior Director of Strategy and Planning.
SUMMARY :
brought to you by Cisco. and app developers, the collision between Welcome to theCUBE, thanks for coming on. So, PubNub, you couldn't get PubSub but it relates. or event to be translated to several of your friends So, like you said, it's meant to go to market quickly. if you have data center you're either crazy Right, right, right, so we call ourselves Exactly, exactly, you nailed it. All right, so talk to me about where your use cases are. And so you can imagine how important it is to be real-time But just so we're clear, we're not talking about So, all you're dealing with is that Yeah, but then the way we provide that layer seven API All right, so explain to us how you guys play with So, so far you understood that PubNub's So if you wanted to do any kind of So, Bhavana I got to get your perspective on something. So, it's hard to tear that down and-- So we've now included a BLOCKs endpoint, where if you just John: So integrate easily into these older that you could have a published without someone has to build an application. So it's like when I as a customer buy an Insteon product, I mean, that was exactly the case at Insteon. John: Yeah, they save all that cost. All right, what did you think about this event? This is one of the first conferences that DevNet is hosting So, excited to check out the whole experience. Great to have you on theCube and thanks for sharing That's our Cube Cloud, all the content there for you. and I'm the Senior Director of Strategy and Planning.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Peter Burris | PERSON | 0.99+ |
John | PERSON | 0.99+ |
Cisco | ORGANIZATION | 0.99+ |
Peter | PERSON | 0.99+ |
John Furrier | PERSON | 0.99+ |
Bhavana Srinivas | PERSON | 0.99+ |
Amazon | ORGANIZATION | 0.99+ |
Insteon | ORGANIZATION | 0.99+ |
two screens | QUANTITY | 0.99+ |
San Francisco | LOCATION | 0.99+ |
tomorrow | DATE | 0.99+ |
Best Buys | ORGANIZATION | 0.99+ |
PubNub | ORGANIZATION | 0.99+ |
Logitech | ORGANIZATION | 0.99+ |
two days | QUANTITY | 0.99+ |
Srinivas | PERSON | 0.99+ |
April Mitchell | PERSON | 0.99+ |
first | QUANTITY | 0.99+ |
Linksys | ORGANIZATION | 0.99+ |
Bhavana | PERSON | 0.99+ |
today | DATE | 0.98+ |
eBay | ORGANIZATION | 0.98+ |
Spanish | OTHER | 0.97+ |
DevNet | ORGANIZATION | 0.97+ |
PubNub | TITLE | 0.97+ |
one | QUANTITY | 0.96+ |
Bhavana Srines | PERSON | 0.95+ |
youtube.com/siliconangle | OTHER | 0.95+ |
theCUBE | ORGANIZATION | 0.95+ |
Bhavana | TITLE | 0.92+ |
2017 | DATE | 0.91+ |
23 on-call support | QUANTITY | 0.91+ |
Bhavana | ORGANIZATION | 0.9+ |
almost 35 different industries | QUANTITY | 0.89+ |
Lyft | ORGANIZATION | 0.89+ |
today at 5 p.m. | DATE | 0.88+ |
Lyft | TITLE | 0.87+ |
PubSub | ORGANIZATION | 0.86+ |
layer seven | OTHER | 0.86+ |
DevOps | TITLE | 0.85+ |
DevNet Create | EVENT | 0.85+ |
Cisco Spark | ORGANIZATION | 0.84+ |
Bhavana: Srinivas | TITLE | 0.83+ |
DevNet Create | TITLE | 0.82+ |
Pocket Gems | TITLE | 0.81+ |
first conferences | QUANTITY | 0.81+ |
https | OTHER | 0.77+ |
few hundred milliseconds | QUANTITY | 0.77+ |
Cube Cloud | COMMERCIAL_ITEM | 0.73+ |
Phil Goodwin, Druva | Why Ransomware Isn't Your Only Problem
(soft upbeat music) >> The past two and a half years have seen a dramatic change in the security posture of virtually all organizations. By accelerating the digital business mandate, the isolation economy catalyzed a move toward cloud computing to support remote workers. This, we know. This had several ripple effects on CISO and CIO strategies that were highly visible at the board of directors level. Now, the first major change was to recognize that the perimeter had suddenly been vaporized. Protection, as a result, moved away from things like perimeter-based firewalls toward more distributed endpoints, cloud security, and modern identity management. The second major change was a heightened awareness of the realities of ransomware. Ransomware as a service, for example, emerged as a major threat where virtually anyone with access to critical data and criminal intentions could monetize corporate security exposures. The third major change was a much more acute understanding of how data protection needed to become a fundamental component of cyber security strategies. And more specifically, CIOs quickly realized that their business resilient strategies were too narrowly DR-focused, that their DR approach was not cost efficient and needed to be modernized, and that new approaches to operational resilience were needed to reflect the architectural and business realities of this new environment. Hello and welcome to Why Ransomware isn't your Only Problem, a service of theCUBE made possible by Druva, and in collaboration with IDC. I'm your host, Dave Vellante, and today we're presenting a three-part program. We'll start with the data. IDC recently conducted a global survey of 500 business technology practitioners across 20 industries to understand the degree to which organizations are aware of and prepared for the threats they face in today's new world. IDC Research Vice President, Phil Goodwin is here to share the highlights of the study and summarize the findings from a recent research report on the topic. After that, we're going to hear from Curtis Preston, who's the Chief Technical Evangelist at Druva. I've known Curtis for decades. He's one of the world's foremost experts on backup and recovery, specifically in data protection generally. Curtis will help us understand how the survey data presented by IDC aligns with the real world findings from the field, from his point of view. And he'll discuss why so many organizations have failed to successfully recover from an attack without major pains and big costs, and how to avoid such operational disruptions and disasters. And then finally, we'll hear from the technical experts at Druva, Stephen Manley and Anjan Srinivas. Stephen is a 10-time (indistinct) and chief technology officer at Druva. And Anjan is vice president and general manager of product management at the company. And these individuals will specifically address how Druva is closing the gaps presented in the IDC survey through their product innovation. Right now I'm going to toss it to Lisa Martin, another one of the hosts, for today's program. Lisa, over to you. (soft upbeat music) >> Phil Goodwin joins me next, the VP of research at IDC. We're going to be breaking down what's going on in the threat landscape. Phil, welcome to the program. It's great to have you back on theCUBE. >> Hey, Lisa, it's great to be here with you. >> So talk to me about the state of the global IT landscape as we see cyber attacks massively increasing, the threat landscape changing so much, what is IDC seeing? >> You really hit the top topic that we find from IT organizations as well as business organizations. And really it's that digital resilience that ransomware that has everybody's attention. And it has the attention not just of the IT people, but of the business people alike, because it really does have profound effects across the organization. The other thing that we're seeing, Lisa, is really a move towards cloud. And I think part of that is driven by the economics of cloud, which fundamentally changed the way that we can approach disaster recovery, but also was accelerated during the pandemic for all the reasons that people have talked about in terms of work from home and so on. And then really the third thing is the economic uncertainty. And this is relatively new for 2022. But within IDC we've been doing a lot of research around what are those impacts going to be. And what we find people doing is they want greater flexibility, they want more cost certainty, and they really want to be able to leverage those cloud economics to be have the scale up or scale down on demand nature of cloud. So those are in a nutshell kind of the three things that people are looking at. >> You mentioned ransomware. It's a topic we've been talking about a lot. It's a household word these days. It's now, Phil, no longer if we're going to get attacked, it's when, it's how often, it's the severity. Talk about ransomware as a priority all the way up the stack to the C-suite. And what are they trying to do to become resilient against it? >> Well, what some of the research that we did is we found that about 77% of organizations have digital resilience as a top priority within their organization. And so what you're seeing is organizations trying to leverage things to become more resilient, more digitally resilient, and to be able to really hone in on those kinds of issues that are keeping them awake at night, quite honestly. If you think about digital resilience, it really is foundational to the organization, whether it's through digital transformation or whether it's simply data availability, whatever it might happen to be. Digital resilience is really a large umbrella term that we use to describe that function that is aimed at avoiding data loss, assuring data availability, and helping the organization to extract value from their data. >> And digital resilience, data resilience, as every company these days has to be a data company to be competitive. Digital resilience, data resilience, are you using those terms interchangeably or is data resilience defined as something a little bit different? >> Well, sometimes yeah, that we do get caught using them when one is the other. But data resilience is really a part of digital resilience, if you think about the data itself in the context of of IT computing. So it really is a subset of that. But it is foundational to IT resilience. You can't have it resilience without data resilience. So that's where we're coming from on it >> Inextricably linked. And it's becoming a corporate initiative, but there's some factors that can complicate digital resilience, data resilience, for organizations. What are some of those complications that organizations need to be aware of? >> Well, one of the biggest is what you mentioned at the top of the segment, and that is the area of ransomware. The research that we found is about 46% of organizations have been hit within the last three years. It's kind of interesting how it's changed over the years. Originally, being hit by ransomware had a real stigma attached to it. Organizations didn't want to admit it, and they really avoided confronting that. Nowadays, so many people have been hit by it, that that stigma has gone. And so really it is becoming more of a community kind of effort as people try to defend against these ransomwares. The other thing about it is, it's really a lot like Whack-A-Mole. They attack us in one area, and we defend against it, so they attack us in another area, and we defend against it. And in fact, I had an individual come up to me at a show not long ago and said, "You know, one of these days we're going to get pretty well defended against ransomware and it's going to go away." And I responded, "I don't think so, because we're constantly introducing new systems, new software, and introducing new vulnerabilities. And the fact is ransomware is so profitable the bad guys aren't going to just fade into the night without giving it a lot of fight." So I really think that ransomware is one of those things that is here for the long term, and something that we have to address and have to get proactive about. >> You mentioned some stats there, and recently IDC and Druva did a white paper together that really revealed some quite shocking results. Talk to me about some of the things. Let's talk a little bit about the demographics of the survey and then talk about what was the biggest finding there, especially where it's concerning ransomware. >> Yeah, this was in a worldwide study, it was sponsored by Druva and conducted by IDC as an independent study. And what we did, we surveyed 500, is a little over 500 different individuals across the globe, in North America, select countries in Western Europe as well as several in Asia-Pacific. And we did it across industries where 20 different industries represented. They're all evenly represented. We had surveys that included IT practitioners, primarily CIOs, CTOs, VP of infrastructure, managers of data centers, things like that. And the biggest finding that we had in this, Lisa, was really finding that there is a huge disconnect, I believe, between how people think they are ready and what the actual results are when they get attacked. Some of the statistics that we learned from this, Lisa, include 83% of organizations believe, or told us that they have a playbook that they have for ransomware. I think 93% said that they have a high degree, or a high or very high degree of confidence in their recovery tools and are fully automated. And yet when you look at the actual results, I told you a moment ago, 46% have been attack successfully. I can also tell you that in separate research, fewer than a third of organizations were able to fully recover their data without paying the ransom. And some two thirds actually had to pay the ransom. And even when they did, they didn't necessarily achieve their full recovery. The bad guys aren't necessarily to be trusted. And so the software that they provide sometimes is fully recovered, sometimes it's not. So you look at that and you go, "Wow." On the one hand, people think they're really prepared, and on the other hand, the results are absolutely horrible. Two thirds of people having to pay the ransom. So you start to ask yourself, "Well, what's going on there?" And I believe that a lot of it comes down to... kind of reminds me of the old quote from Mike Tyson. "Everybody has a plan until they get punched in the mouth." And I think that's kind of what happens with ransomware. You think you know what you're doing, you think you're ready, based on the information you have, and these people are smart people and they're professionals, but oftentimes you don't know what you don't know. And like I say, the bad guys are always dreaming up new ways to attack us. And so I think for that reason a lot of these have been successful. So that was kind of the key finding to me in kind of the "aha" moment, really, in this whole thing, Lisa. >> That's a massive disconnect, with the vast majority saying, "We have a cyber recovery playbook," yet, nearly half being the victims of ransomware in the last three years, and then half of them experiencing data loss. What is it then that organizations in this situation across any industry can do to truly enable cyber resilience, data resilience, as we said, this is a matter of this is going to happen, just a matter of when and how often? >> It is a matter, yeah, as you said, it's not if when or how often, it's really how badly. So I think what organizations are really doing now is starting to turn more to cloud-based services. Finding professionals who know what they're doing, who have that breadth of experience, and who have seen the kinds of necessary steps that it takes to do a recovery. And the fact of the matter is a disaster recovery and a cyber recovery are really not the same thing. And so organizations need to be able to plan the kinds of recovery associated with cyber recovery in terms of forensics, in terms of scanning, in terms of analysis, and so forth. So they're turning to professionals in the cloud much more in order to get that breadth of experience and to take advantage of cloud-based services that are out there. >> Talk to me about some of the key advantages of cloud-based services for data resilience versus traditional legacy on-prem equipment. What are some of the advantages? Why is IDC seeing this big shift to cloud where data resilience is concerned? >> Well, the first and foremost is the economics of it. You can have on-demand resources. And in the old days when we had disaster recoveries where there we had two different data centers and a failover and so forth, you had double the infrastructure if your financial services, it might even be triple the infrastructure. It was very complicated, very difficult. By going to the cloud, organizations can subscribe to disaster recovery as a service. And increasingly what we see is a new market of cyber recovery as a service. So being able to leverage those resources to be able to have the forensic analysis available to them, to be able to have the other resources available that are on-demand, and to have that plan in place to have those resources in place. I think what happens in a number of situations, Lisa, is that organizations think they're ready, but then all of a sudden they get hit, and all of a sudden they have to engage with outside consultants, or they have to bring in other experts. And that extends the time to recover that they have, and it also complicates it. So if they have those resources in place, then they can simply turn them on, engage them, and get that recover going as quickly as possible. >> So what do you think the big issue here is? Is it that these IT practitioners, over 500 that you surveyed across 20 industries, this a global survey, do they not know what they don't know? What's the overlying issue here? >> Yeah, I think that's right. It's you don't know what you don't know and until you get into a specific attack... there are so many different ways that organizations can be attacked. And in fact, from this research that we found, is that in many cases, data exfiltration exceeds data corruption by about 50%. And when you think about that, the issue is, once I have your data, what are you going to do? I mean, there's no amount of recovery that is going to help. So organizations are either faced with paying the ransom to keep the data from perhaps being used on the dark web or whatever, or simply saying no and taking their chances. So best practice things like encryption, immutability, things like that that organizations can put into place. Certainly air gaps, having a solid backup foundation to where data is, you have a high probability of recovery, things like that, those are the kinds of things that organizations have to put into place, really is a baseline to assure that they can recover as fast as possible and not lose data in the event of a ransomware attack. >> Given some of the disconnect that you articulated, the stats that show so many think, "We are prepared, we've got a playbook," yet so many are are being attacked, the vulnerabilities as the landscape, threat landscape, just gets more and more amorphous, what do you recommend organizations? Do you talk to the IT practitioners, but does this go all the way up to the board level in terms of, "Hey guys, across every industry we are vulnerable, this is going to happen, we've got to make sure that we are truly resilient and proactive"? >> Yes, and in fact, what we found from this research is in more than half of cases, the CEO is directly involved in the recovery. So this is very much a C-suite issue. And if you look at the the consequences of ransomware it's not just the ransom, it's the lost productivity, it's the loss of revenue, it's the loss of customer faith and goodwill. And organizations that have been attacked have suffered those consequences, and many of them are permanent. So people at the board level, whether it's the CEO, the CFO, the CIO, the CISO, whoever it is, they're extremely concerned about this. And I can tell you they are fully engaged in addressing these issues within their organization. >> So all the way at the top critically important, business critical for any industry. I imagine some industries may be a little bit more vulnerable than others, financial services, healthcare, education, we've just seen big attack in Los Angeles County. But in terms of establishing data resilience, you mentioned ransomware isn't going anywhere, it's a big business, it's very profitable, but what is IDC's prediction where ransomware is concerned? Do you think that organizations, if they truly adopt cloud and status-based technologies, can they get to a place where the C-suite doesn't have to be involved to the point where they really actually have a functioning playbook? >> I don't know if we'll ever get to the point where the C-suite is not involved. It's probably very important to have that level of executive sponsorship. But what we are seeing is, in fact, we predict predict that by 2025, 55% of organizations will have shifted to a cloud-centric strategy for their data resilience. And the reason we say that is workloads on premises aren't going away, so that's the core. We have an increasing number of workloads in the cloud and at the edge, and that's really where the growth is. So being able to take that cloud-centric model and take advantage of cloud resources, like immutable storage, being able to move data from region to region inexpensively and easily, and to be able to take that cloud-centric perspective and apply it on premises as well as in the cloud and at the edge, is really where we believe that organizations are shifting their focus. >> Got it. We're just cracking the surface here, Phil. I wish we had more time. But I had a chance to read the Druva-sponsored IDC white paper. Fascinating finds. I encourage all of you to download that. Take a read. You're going to learn some very interesting statistics and recommendations for how you can really truly deploy data resilience in your organization. Phil, it's been a pleasure to have you on the program. Thank you for joining me. >> No problem. Thank you, Lisa. (gentle music)
SUMMARY :
that the perimeter had in the threat landscape. to be here with you. And it has the attention all the way up the stack to the C-suite. and helping the organization has to be a data company in the context of of IT computing. that organizations need to be aware of? and that is the area of ransomware. the demographics of the survey And so the software that they provide in the last three years, And the fact of the matter of the key advantages And that extends the time in the event of a ransomware attack. it's the loss of revenue, So all the way at the And the reason we say that to have you on the program. Thank you, Lisa.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Curtis | PERSON | 0.99+ |
Dave Vellante | PERSON | 0.99+ |
Curtis Preston | PERSON | 0.99+ |
Anjan | PERSON | 0.99+ |
Lisa | PERSON | 0.99+ |
Lisa Martin | PERSON | 0.99+ |
Phil Goodwin | PERSON | 0.99+ |
Stephen | PERSON | 0.99+ |
Phil | PERSON | 0.99+ |
North America | LOCATION | 0.99+ |
Mike Tyson | PERSON | 0.99+ |
10-time | QUANTITY | 0.99+ |
IDC | ORGANIZATION | 0.99+ |
Anjan Srinivas | PERSON | 0.99+ |
Los Angeles County | LOCATION | 0.99+ |
Stephen Manley | PERSON | 0.99+ |
Druva | ORGANIZATION | 0.99+ |
2022 | DATE | 0.99+ |
Western Europe | LOCATION | 0.99+ |
20 industries | QUANTITY | 0.99+ |
93% | QUANTITY | 0.99+ |
2025 | DATE | 0.99+ |
83% | QUANTITY | 0.99+ |
46% | QUANTITY | 0.99+ |
500 business technology practitioners | QUANTITY | 0.99+ |
500 | QUANTITY | 0.99+ |
55% | QUANTITY | 0.99+ |
20 different industries | QUANTITY | 0.99+ |
over 500 | QUANTITY | 0.98+ |
Whack-A-Mole | ORGANIZATION | 0.98+ |
first | QUANTITY | 0.98+ |
three things | QUANTITY | 0.98+ |
about 50% | QUANTITY | 0.98+ |
one area | QUANTITY | 0.97+ |
about 46% | QUANTITY | 0.97+ |
third thing | QUANTITY | 0.96+ |
about 77% | QUANTITY | 0.96+ |
Asia-Pacific | LOCATION | 0.96+ |
today | DATE | 0.95+ |
over 500 different individuals | QUANTITY | 0.95+ |
two thirds | QUANTITY | 0.95+ |
three-part program | QUANTITY | 0.95+ |
one | QUANTITY | 0.95+ |
third major change | QUANTITY | 0.93+ |
pandemic | EVENT | 0.93+ |
Two thirds | QUANTITY | 0.91+ |
Ransomware | TITLE | 0.9+ |
decades | QUANTITY | 0.9+ |
two different data centers | QUANTITY | 0.9+ |
more than half | QUANTITY | 0.89+ |
second major change | QUANTITY | 0.88+ |
first major change | QUANTITY | 0.86+ |
last three years | DATE | 0.81+ |
half | QUANTITY | 0.81+ |
marily | PERSON | 0.78+ |
double | QUANTITY | 0.74+ |
theCUBE | ORGANIZATION | 0.71+ |
Vice President | PERSON | 0.7+ |
and a half years | QUANTITY | 0.69+ |
Druva | PERSON | 0.62+ |
cases | QUANTITY | 0.61+ |
Druva Why Ransomware Isn't Your Only Problem
>> The past 2 1/2 years have seen a dramatic change in the security posture of virtually all organizations. By accelerating the digital business mandate, the isolation economy catalyzed a move toward cloud computing to support remote workers. This we know. This had several ripple effects on CSO and CIO strategies that were highly visible at the Board of Directors' level. Now, the first major change was to recognize that the perimeter had suddenly been vaporized. Protection, as a result, moved away from things like perimeter-based firewalls toward more distributed endpoints, cloud security, and modern identity management. The second major change was a heightened awareness of the realities of ransomware. Ransomware as a service, for example, emerged as a major threat where virtually anyone with access to critical data and criminal intentions could monetize corporate security exposures. The third major change was a much more acute understanding of how data protection needed to become a fundamental component of cybersecurity strategies, and more specifically, CIOs quickly realized that their business resilience strategies were too narrowly DR-focused, that their DR approach was not cost efficient and needed to be modernized, and that new approaches to operational resilience were needed to reflect the architectural and business realities of this new environment. Hello, and welcome to "Why Ransomware isn't Your Only Problem," a service of theCUBE made possible by Druva, and in collaboration with IDC. I'm your host, Dave Vellante, and today, we're presenting a three-part program. We'll start with the data. IDC recently conducted a global survey of 500 business technology practitioners across 20 industries to understand the degree to which organizations are aware of and prepared for the threats they face in today's new world. IDC Research Vice President Phil Goodwin is here to share the highlights of the study and to summarize the findings from a recent research report on the topic. After that, we're going to hear from Curtis Preston, who's the Chief Technical Evangelist at Druva. I've known Curtis for decades. He's one of the world's foremost experts on backup and recovery, specifically, and data protection, generally. Curtis will help us understand how the survey data presented by IDC aligns with the real world findings from the field from his point of view. And he'll discuss why so many organizations have failed to successfully recover from an attack without major pains and big costs, and how to avoid such operational disruptions and disasters. And then finally, we'll hear from the technical experts at Druva, Stephen Manley and Anjan Srinivas. Stephen is a 10-time CUBE alum and Chief Technology Officer at Druva, and Anjan is Vice President and General Manager of Product Management at the company. And these individuals will specifically address how Druva is closing the gaps presented in the IDC survey through their product innovation. But right now I'm going to toss it to Lisa Martin, another one of the hosts for today's program. Lisa, over to you. (upbeat music) >> Bill Goodwin joins me next, the VP of Research at IDC. We're going to be breaking down what's going on in the threat landscape. Phil, welcome to the program. It's great to have you back on theCUBE. >> Hey, Lisa, it's great to be here with you. >> So talk to me about the state of the global IT landscape as we see cyberattacks massively increasing, the threat landscape changing so much. What is IDC seeing? >> You know, you really hit the top topic that we find from IT organizations as well as business organizations. And really, it's that digital resilience, that ransomware that has everybody's attention, and it has the attention, not just of the IT people, but of the business people alike, because it really does have profound effects across the organization. The other thing that we're seeing, Lisa, is really a move towards cloud. And I think part of that is driven by the economics of cloud, which fundamentally changed the way that we can approach disaster recovery, but also has accelerated during the pandemic for all the reasons that people have talked about in terms of work from home and so on. And then really the third thing is the economic uncertainty, and this is relatively new for 2022, but within IDC we've been doing a lot of research around what are those impacts going to be? And what we find people doing is they want greater flexibility, they want more cost certainty, and they really want to be able to leverage those cloud economics to have the scale up or scale down on demand nature of cloud. So those are, in a nutshell, kind of the three things that people are looking at. >> You mentioned ransomware. It's a topic we've been talking about a lot. It's a household word these days. It's now, Phil, no longer if we're going to get attacked, it's when, it's how often, it's the severity. Talk about ransomware as a priority all the way up the stack to the C-suite, and what are they trying to do to become resilient against it? >> Well, what some of the research that we did is we found that about 77% of organizations have digital resilience as a top priority within their organization. And so what you're seeing is organizations trying to leverage things to become more resilient, more digitally resilient, and to be able to really hone in on those kinds of issues that are keeping them awake at night, quite honestly. If you think about digital resilience, it really is foundational to the organization, whether it's through digital transformation or whether it's simply data availability, whatever it might happen to be. Digital resilience is really a large umbrella term that we use to describe that function that is aimed at avoiding data loss, assuring data availability, and helping the organization to extract value from their data. >> And digital resilience, data resilience, as every company these days has to be a data company to be competitive. Digital resilience, data resilience, are you using those terms interchangeably or is data resilience defined as something a little bit different? >> Well, sometimes yeah, we do get caught using them when one is the other. But data resilience is really a part of digital resilience, if you think about the data itself in the context of IT computing. So it really is a subset of that, but it is foundational to IT resilience. You can't have IT resilience without data resilience. So that's where we're coming from on it. >> Inextricably linked, and it's becoming a corporate initiative, but there's some factors that can complicate digital resilience, data resilience for organizations. What are some of those complications that organizations need to be aware of? >> Well, one of the biggest is what you mentioned at the top of the segment, and that is the area of ransomware. The research that we found is about 46% of organizations have been hit within the last three years. You know, it's kind of interesting how it's changed over the years. Originally, being hit by ransomware had a real stigma attached to it. Organizations didn't want to admit it, and they really avoided confronting that. Nowadays, so many people have been hit by it that that stigma has gone. And so really it is becoming more of a community kind of effort as people try to defend against these ransomers. The other thing about it is it's really a lot like Whac-A-Mole, you know. They attack us in one area and we defend against it so they attack us in another area, and we defend against it. And in fact, I had an individual come up to me at a show not long ago and said, "You know, one of these days we're going to get pretty well defended against ransomware and it's going to go away." And I responded I don't think so because we're constantly introducing new systems, new software, and introducing new vulnerabilities. And the fact is ransomware is so profitable, the bad guys aren't going to just fade into the night without giving it a a lot of fight. So I really think that ransomware is one of those things that is here for the long term and something that we have to address and have to get proactive about. >> You mentioned some stats there, and recently IDC and Druva did a white paper together that really revealed some quite shocking results. Talk to me about some of the things. Let's talk a little bit about the demographics of the survey and then talk about what was the biggest finding there, especially where it's concerning ransomware? >> Yeah, this was a worldwide study. It was sponsored by Druva and conducted by IDC as an independent study. And what we did, we surveyed 500, it was a little over 500 different individuals across the globe in North America, select countries in Western Europe, as well as several in Asia Pacific. And we did it across industries there were 20 different industries represented, they're all evenly represented. We had surveys that included IT practitioners, primarily CIOs, CTOs, VP of infrastructure, you know, managers of data centers, things like that. And the biggest finding that we had in this, Lisa, was really finding that there is a huge disconnect, I believe, between how people think they are ready and what the actual results are when they get attacked. Some of the statistics that we learned from this, Lisa, include 83% of organizations believe, or told us that they have a playbook that they have for ransomware. I think 93% said that they have a high degree, or a high or very high degree of confidence in their recovery tools and are fully automated. And yet, when you look at the actual results, you know, I told you a moment ago, 46% have been attacked successfully. I can also tell you that in separate research, fewer than 1/3 of organizations were able to fully recover their data without paying the ransom, and some 2/3 actually had to pay the ransom. And even when they did, they didn't necessarily achieve their full recovery. You know, the bad guys aren't necessarily to be trusted, and so the software that they provide sometimes is fully recovered, sometimes it's not. So you look at that and you go, wow. On the one hand, people think they're really, really prepared, and on the other hand, the results are absolutely horrible. You know, 2/3 of people having to pay the ransom. So you start to ask yourself, well, what's going on there? And I believe that a lot of it comes down to, kind of reminds me of the old quote from Mike Tyson. "Everybody has a plan until they get punched in the mouth." And I think that's kind of what happens with ransomware. You think you know what you're doing. You think you're ready, based on the information you have. And these people are smart people, and they're professionals, but oftentimes, you don't know what you don't know. And like I said, the bad guys are always dreaming up new ways to attack us. And so, I think, for that reason, a lot of these have been successful. So that was kind of the key finding to me and kind of the aha moment really in this whole thing, Lisa. >> That's a massive disconnect with the vast majority saying, "We have a cyber recovery playbook," yet nearly 1/2 being the victims of ransomware in the last three years, and then 1/2 of them experiencing data loss. What is it then that organizations in this situation across any industry can do to truly enable cyber resilience, data resilience? As we said, this is a matter of this is going to happen, just a matter of when and how often. >> It is a matter, yeah, as you said, it's not if, when, or how often, it's really how badly. So I think what organizations are really doing now is starting to turn more to cloud-based services, you know, finding professionals who know what they're doing, who have that breadth of experience and who have seen the kinds of necessary steps that it takes to do a recovery. And the fact of the matter is a disaster recovery and a cyber recovery are really not the same thing. And so organizations need to be able to plan the kinds of recovery associated with cyber recovery in terms of forensics, in terms of scanning, in terms of analysis, and so forth. So they're turning to professionals in the cloud much more, in order to get that breadth of experience, and to take advantage of cloud-based services that are out there. >> Talk to me about some of the key advantages of cloud-based services for data resilience versus traditional legacy on-prem equipment. What are some of the advantages? Why is IDC seeing this big shift to cloud where data resilience is concerned? >> Well, the first and foremost is the economics of it. You know, you can have on-demand resources. In the old days, when we had disaster recoveries where we had two different data centers and a failover and so forth, you know, you had double the infrastructure. If you're financial services, it might even be triple the infrastructure. It was very complicated, very difficult. By going to the cloud, organizations can subscribe to disaster recovery as a service. And increasingly what we see is a new market of cyber recovery as a service. So being able to leverage those resources, to be able to have the forensic analysis available to them, to be able to have the other resources available that are on demand, and to have that plan in place to have those resources in place. I think what happens in a number of situations, Lisa, is that organizations think they're ready, but then all of a sudden they get hit, and all of a sudden they have to engage with outside consultants, or they have to bring in other experts, and that extends the time to recover that they have and it also complicates it. So if they have those resources in place, then they can simply turn them on, engage them, and get that recovery going as quickly as possible. >> So what do you think the big issue here is? Is it that these IPT practitioners, over 500 that you surveyed across 20 industries, this a global survey, do they they not know what they don't know? What's the overlying issue here? >> Yeah, I think that's right. You don't know what you don't know, and until you get into a specific attack, you know, there are so many different ways that organizations can be attacked. And, in fact, from this research that we found is that, in many cases, data exfiltration exceeds data corruption by about 50%. But when you think about that, the issue is, once I have your data, what are you going to do? I mean, there's no amount of recovery that is going to help. So organizations are either faced with paying the ransom to keep the data from perhaps being used on the dark web, or whatever, or simply saying no, and taking their chances. So best practice things like encryption, immutability, things like that that organizations can put into place. Certainly air gaps, having a solid backup foundation to where data is, you have a high recovery, high probability of recovery, things like that. Those are the kinds of things that organizations have to put into place, really as a baseline to assure that they can recover as fast as possible and not lose data in the event of a ransomware attack. >> Given some of the disconnect that you articulated, the stats that show so many think we are prepared, we've got a playbook, yet so many are being attacked, the vulnerabilities as the landscape, threat landscape, just gets more and more amorphous. What do you recommend organizations do? You talked to the IT practitioners, but does this go all the way up to the board level in terms of, hey guys, across every industry, we are vulnerable, this is going to happen. We've got to make sure that we are truly resilient and proactive? >> Yes, and in fact, what we found from this research is in more than 1/2 of cases, the CEO is directly involved in the recovery. So this is very much a C-suite issue. And if you look at the consequences of ransomware, it's not just the ransom, it's the lost productivity, it's the loss of revenue. It's the loss of customer faith and goodwill, and organizations that have been attacked have suffered those consequences, and many of them are permanent. So people at the board level, whether it's the CEO, the CFO, the CIO, the CSO, you know, whoever it is, they're extremely concerned about these. And I can tell you, they are fully engaged in addressing those issues within their organization. >> So all the way at the top, and critically important, business critical for any industry. I imagine some industries may be a little bit more vulnerable than others, financial services, healthcare, education. We've just seen a big attack in Los Angeles County. But in terms of establishing data resilience, you mentioned ransomware isn't going anywhere, it's a big business, it's very profitable. But what is IDC's prediction where ransomware is concerned? Do you think that organizations, if they truly adopt cloud and SaaS-based technologies, can they get to a place where the C-suite doesn't have to be involved to the point where they really actually have a functioning playbook? >> I don't know if we'll ever get to the point where the C-suite is not involved. It's probably very important to have that level of executive sponsorship. But what we are seeing is, in fact, we predict that by 2025, 55% of organizations will have shifted to a cloud-centric strategy for their data resilience. And the reason we say that is, you know, workloads on premises aren't going away. So that's the core. We have an increasing number of workloads in the cloud and at the edge, and that's really where the growth is. So being able to take that cloud-centric model and take advantage of cloud resources like immutable storage, being able to move data from region to region inexpensively and easily, and to be able to take that cloud-centric perspective and apply it on premises as well as in the cloud and at the edge is really where we believe that organizations are shifting their focus. >> Got it, we're just cracking the surface here, Phil. I wish we had more time, but I had a chance to read the Druva-sponsored IDC white paper. Fascinating finds. I encourage all of you to download that, take a read. You're going to learn some very interesting statistics and recommendations for how you can really truly deploy data resilience in your organization. Phil, it's been a pleasure to have you on the program. Thank you for joining me. >> No problem. Thank you, Lisa. >> In a moment, John Furrier will be here with his next guest. For right now, I'm Lisa Martin, and you are watching theCUBE, the leader in live tech coverage. >> We live in a world of infinite data. Sprawling, dispersed, valuable, but also vulnerable. So how do organizations achieve data resiliency when faced with ever expanding workloads, increasing security threats, and intensified regulations? Unfortunately, the answer often boils down to what flavor of complexity do you like best? The common patchwork approaches are expensive, convoluted, and difficult to manage. There's multiple software and hardware vendors to worry about, different deployments for workloads running on-premises or in the cloud. And an inconsistent security framework resulting in enterprises maintaining four to five copies of the same data, increasing costs and risk, building to an incoherent mess of complications. Now, imagine a world free from these complexities. Welcome to the the Druva Data Resiliency Cloud, where full data protection and beautiful simplicity converge. No hardware, no upgrades, no management, just total data resilience. With just a few clicks, you can get started integrating all of your data resiliency workflows in minutes. Through a true cloud experience built on Amazon Web Services, the Druva platform automates and manages critical daily tasks, giving you time to focus on your business. In other words, get simplicity, scalability, and security instantly. With the Druva Data Resiliency Cloud, your data isn't just backed up, it's ready to be used 24/7 to meet compliance needs and to extract critical insights. You can archive data for long-term retention, be protected against device failure and natural disasters, and recover from ransomware lightning fast. Druva is trusted with billions of backups annually by thousands of enterprises, including more than 60 of the Fortune 500, costing up to 50% less than the convoluted hardware, software, and appliance solutions. As data grows and becomes more critical to your business advantage, a data resiliency plan is vital, but it shouldn't be complicated. Druva makes it simple. (upbeat music) (mouse clicks) >> Welcome back, everyone, to theCUBE and the Druva special presentation of "Why Ransomware isn't Your Only Problem." I'm John Furrier, host of theCUBE. We're here with W Curtis Preston, Curtis Preston, as he's known in the industry, Chief Technical Evangelist at Druva. Curtis, great to see you. We're here at "Why Ransomware isn't Your Only Problem." Great to see you, thanks for coming on. >> Happy to be here. >> So we always see each other at events now events are back. So it's great to have you here for this special presentation. The white paper from IDC really talks about this in detail. I'd like to get your thoughts, and I'd like you to reflect on the analysis that we've been covering here in this survey data, how it lines up with the real world that you're seeing out there. >> Yeah, I think it's, the survey results really, I'd like to say, I'd like to say that they surprised me, but unfortunately, they didn't. The data protection world has been this way for a while where there's this difference in belief, or difference between the belief and the reality. And what we see is that there are a number of organizations that have been hit, successfully hit by ransomware, paid the ransom and/or lost data, and yet the same people that were surveyed, they had high degrees of confidence in their backup system. And, you know, I could probably go on for an hour as to the various reasons why that would be the case, but I think that this long running problem that as long as I've been associated with backups, which, you know, has been a while, it's that problem of, you know, nobody wants to be the backup person. And people often just, they don't want to have anything to do with the backup system, and so it sort of exists in this vacuum. And so then management is like, "Oh, the backup system's great," because the backup person often, you know, might say that it's great because maybe it's their job to say so. But the reality has always been very, very different. >> It's funny, you know. "We're good, boss, we got this covered." >> Yeah, it's all good, it's all good. >> And the fingers crossed, right? So again, this is the reality, and as it becomes backup and recovery, which we've talked about many times on theCUBE, certainly we have with you before, but now with ransomware, also, the other thing is people get ransomware hit multiple times. So it's not only like they get hit once, so, you know, this is a constant chasing the tail on some ends, but there are some tools out there, You guys have a solution, and so let's get into that. You know, you have had hands-on backup experience. What are the points that surprise you the most about what's going on in this world and the realities of how people should be going forward? What's your take? >> Well, I would say that the one part in the survey that surprised me the most was people that had a huge, you know, there was a huge percentage of people that said that they had, you know, a ransomware response, you know, and readiness program. And you look at that, and how could you be, you know, that high a percentage of people be comfortable with their ransomware readiness program, which includes a number of things, right? There's the cyberattack aspect of responding to a ransomware attack, and then there's the recovery aspect. And so you believe that your company was ready for that, and then you go, and I think it was 67% of the people in the survey paid the ransom, which as a person who, you know, has spent my entire career trying to help people successfully recover their data, that number, I think, just hurt me the most is that because, you talked about re-infections. The surest way to guarantee that you get re-attacked and reinfected is to pay the ransom. This goes back all the way to ransom since the beginning of time, right? Everyone knows if you pay the blackmail, all you're telling people is that you pay blackmail. >> You're in business, you're a good customer >> Yeah, yeah, exactly. >> for ransomware. >> Yeah, so the fact that, you know, 60, what, 2/3 of the people that were attacked by ransomware paid the ransom. That one statistic just hurt my heart. >> Yeah, and I think this is the reality. I mean, we go back, and even the psychology of the practitioners was, you know, it's super important to get backup and recovery, and that's been around for a long time, but now that's an attack vector, okay? And there's dollars involved, like I said, I'm joking, but there's recurring revenue for the bad guys if they know you're paying up and if you're stupid enough not to change your tooling. So again, it works both ways. So I got to ask you, why do you think so many owners are unable to successfully respond after an attack? Is it because, they know it's coming, I mean, they're not that dumb. I mean, they have to know it's coming. Why aren't they responding successfully to this? >> I think it's a litany of things, starting with that aspect that I mentioned before, that nobody wants to have anything to do with the backup system, right? So nobody wants to be the one to raise their hand because if you're the one that raises their hand, "You know, that's a good idea, Curtis, why don't you look into that?" Nobody wants to be- >> Where's that guy now? He doesn't work here anymore. Yeah, I hear where you coming from. >> Exactly. >> It's psychology (indistinct) >> Yeah, so there's that. But then the second is that because of that, no one's looking at the fact that backups are the attack vector. They become the attack vector. And so because they're the attack vector, they have to be protected as much, if not more than the rest of the environment. The rest of the environment can live off of Active Directory and, you know, and things like Okta, so that you can have SSO and things like that. The backup environment has to be segregated in a very special way. Backups have to be stored completely separate from your environment. The login and authentication and authorization system needs to be completely separate from your typical environment. Why? Because if that production environment is compromised, now knowing that the attacks or that the backup systems are a significant portion of the attack vector, then if the production system is compromised, then the backup system is compromised. So you've got to segregate all of that. And I just don't think that people are thinking about that. You know, and they're using the same backup techniques that they've used for many, many years. >> So what you're saying is that the attack vectors and the attackers are getting smarter. They're saying, "Hey, we'll just take out the backup first so they can't backup. So we got the ransomware." It makes sense. >> Yeah, exactly. The largest ransomware group out there, the Conti ransomware group, they are specifically targeting specific backup vendors. They know how to recognize the backup servers. They know how to recognize where the backups are stored, and they are exfiltrating the backups first, and then deleting them, and then letting you know you have ransom. >> Okay, so you guys have a lot of customers. They all kind of have the same problem. What's the patterns that you're seeing? How are they evolving? What are some of the things that they're implementing? What is the best practice? >> Well, again, you've got to fully segregate that data, and everything about how that data is stored and everything about how that data's created and accessed, there are ways to do that with other, you know, with other commercial products. You can take a standard product and put a number of layers of defense on top of it, or you can switch to the way Druva does things, which is a SaaS offering that stores your data completely in the cloud in our account, right? So your account could be completely compromised. That has nothing to do with our account. It's a completely different authentication and authorization system. You've got multiple layers of defense between your computing environment and where we store your backups. So basically, what you get by default with the way Druva stores your backups is the best you can get after doing many, many layers of defense on the other side and having to do all that work. With us, you just log in and you get all of that. >> I guess, how do you break the laws of physics? I guess that's the question here. >> Well, because that's the other thing is that by storing the data in the cloud, and I've said this a few times, you get to break the laws of physics, and the only way to do that is time travel. (both laughing) So yes, so Druva has time travel. And this is a Curtisism, by the way, I don't think this is our official position, but the idea is that the only way to restore data as fast as possible is to restore it before you actually need it, and that's kind of what I mean by time travel, in that you, basically, you configure your DR, your disaster recovery environment in Druva one time, and then we are pre-restoring your data as often as you tell us to do, to bring your DR environment up to the, you know, the current environment as quickly as we can so that in a disaster recovery scenario, which is part of your ransomware response, right? Again, there are many different parts, but when you get to actually restoring the data, you should be able to just push a button and go. The data should already be restored. And that's the way that you break the laws of physics is you break the laws of time. >> (laughs) Well, all right, everyone wants to know the next question, and this is a real big question is, are you from the future? >> (laughs) Yeah. Very much the future. >> What's it like in the future, backup, recovery? How does it restore? Is it air gapping everything? >> Yeah, well, it's a world where people don't have to worry about their backups. I like to use the phrase get out of the backup business, just get into the restore business. You know, I'm a grandfather now, and I love having a granddaughter, and I often make the joke that if I'd have known how great grandkids were, I would've skipped straight to them, right? Not possible. Just like this. Recoveries are great. Backups are really hard. So in the future, if you use a SaaS data protection system and data resiliency system, you can just do recoveries and not have to worry about backups. >> Yeah, and what's great about your background is you've got a lot of historical perspective. You've seen that, the waves of innovation. Now it really is about the recovery and real time. So a lot of good stuff going on. And got to think automated, things got to be rocking and rolling. >> Absolutely. Yeah. I do remember, again, having worked so hard with many clients over the years, back then, we worked so hard just to get the backup done. There was very little time to work on the recovery. And I really, I kid you not, that our customers don't have to do all of those things that all of our competitors have to do to, you know, to break, to try to break the laws of physics, I've been fighting the laws of physics my entire career, to get the backup done in the first place, then to secure all the data, and to air gap it and make sure that a ransomware attack isn't going to attack it. Our customers get to get straight to a fully automated disaster recovery environment that they get to test as often as possible and they get to do a full test by simply pressing a single button. And you know, I wish everybody had that ability. >> Yeah, I mean, security's a big part of it. Data's in the middle of it all. This is now mainstream, front lines, great stuff. Curtis, great to have you on, bring that perspective, and thanks for the insight. Really appreciate it. >> Always happy to talk about my favorite subject. >> All right, we'll be back in a moment. We'll have Stephen Manley, the CTO, and Anjan Srinivas, the GM and VP of Product Management will join me. You're watching theCUBE, the leader in high tech enterprise coverage. >> Ransomware is top of mind for everyone. Attacks are becoming more frequent and more sophisticated. It's a problem you can't solve alone anymore. Ransomware is built to exploit weaknesses in your backup solution, destroying data, and your last line of defense. With many vendors, it can take a lot of effort and configuration to ensure your backup environment is secure. Criminals also know that it's easy to fall behind on best practices like vulnerability scans, patches, and updates. In fact, 42% of vulnerabilities are exploited after a patch has been released. After an attack, recovery can be a long and manual process that still may not restore clean or complete data. The good news is that you can keep your data safe and recover faster with the Druva Data Resiliency Cloud on your side. The Druva platform functions completely in the cloud with no hardware, software, operating system, or complex configurations, which means there are none of the weaknesses that ransomware commonly uses to attack backups. Our software as a service model delivers 24/7/365 fully managed security operations for your backup environment. We handle all the vulnerability scans, patches, and upgrades for you. Druva also makes zero trust security easy with built-in multifactor authentication, single sign-on, and role-based access controls. In the event of an attack, Druva helps you stop the spread of ransomware and quickly understand what went wrong with built-in access insights and anomaly detection. Then you can use industry first tools and services to automate the recovery of clean, unencrypted data from the entire timeframe of the attack. Cyberattacks are a major threat, but you can make protection and recovery easy with Druva. (electronic music) (upbeat music) (mouse clicks) >> Welcome back, everyone, to theCUBE's special presentation with Druva on "Why Ransomware isn't Your Only Problem." I'm John Furrier, host of theCUBE. Our next guests are Stephen Manley, Chief Technology Officer of Druva, and Anjan Srinivas, who is the General Manager and Vice President of Product Management at Druva. Gentlemen, you got the keys to the kingdom, the technology, ransomware, data resilience. This is the topic. The IDC white paper that you guys put together with IDC really kind of nails it out. I want to get into it right away. Welcome to this segment. I really appreciate it. Thanks for coming on. >> Great to be here, John. >> So what's your thoughts on the survey's conclusion? Obviously, the resilience is huge. Ransomware continues to thunder away at businesses and causes a lot of problems, disruption. I mean, it's endless ransomware problems. What's your thoughts on the conclusion? >> So I'll say the thing that pops out to me is, on the one hand, everybody who sees the survey and reads it is going to say, "Well, that's obvious." Of course, ransomware continues to be a problem. Cyber resilience is an issue that's plaguing everybody. But I think when you dig deeper and there's a lot of subtleties to look into, but one of the things that I hear on a daily basis from the customers is, it's because the problem keeps evolving. It's not as if the threat was a static thing to just be solved and you're done. Because the threat keeps evolving, it remains top of mind for everybody because it's so hard to keep up with what's happening in terms of the attacks. >> And I think the other important thing to note, John, is that people are grappling with this ransomware attack all of a sudden where they were still grappling with a lot of legacy in their own environment. So they were not prepared for the advanced techniques that these ransomware attackers were bringing to market. It's almost like these ransomware attackers had a huge leg up in terms of technology that they had in their favor while keeping the lights on was keeping IT away from all the tooling that they needed to do. A lot of people are even still wondering, when that happens next time, what do I even do? So clearly not very surprising. Clearly, I think it's here to stay, and I think as long as people don't retool for a modern era of data management, this is going to to stay this way. >> Yeah, I hear this all the time in our CUBE conversations with practitioners. It's kind of like the security pro, give me more tools, I'll buy anything that comes in the market, I'm desperate. There's definitely attention, but it doesn't seem like people are satisfied with the tooling that they have. Can you guys share kind of your insights into what's going on in the product side? Because, you know, people claim that they have tools at crime points of recovery opportunities, but they can't get there. So it seems to be that there's a confidence problem here in the market. How do you guys see that? 'cause I think this is where the rubber meets the road with ransomware 'cause it is a moving train, it's always changing, but it doesn't seem there's confidence. Can you guys talk about that? What's your reaction? >> Yeah, let me jump in first, and Stephen can add to it. What happens is, I think this is a panic buying and they have accumulated this tooling now just because somebody said they could solve your problem, but they haven't had a chance to take a real look from a ground up perspective to see where are the bottlenecks? Where are the vulnerabilities? And which tooling set needs to lie where? Where does the logic need to reside? And what, in Druva, we are watching people do and people do it successfully, is that as they have adopted Druva technology, which is ground up built for the cloud, and really built in a way which is, you know, driven at a data insight level where we have people even monitoring our service for anomalies and activities that are suspicious. We know where we need to play a role in really kind of mitigating this ransomware, and then there's a whole plethora of ecosystem players that kind of combine to really finish the story, so to say, right? So I think this has been a panic buying situation. This is like, "Get me any help you can give me." And I think as this settles down and people really understand that longer term as they really build out a true defense mechanism, they need to think really ground up. They will start to really see the value of technologies like Druva, and try to identify the right set of ecosystem to really bring together to solve it meaningfully. >> Yes, Stephen? >> I was going to say, I mean, one of the the really interesting things in the survey for me, and for a moment, a little more than a moment, it made me think was that the large number of respondents who said, "I've got a really efficient, well-run back environment," who, then, on basically the next question said, "And I have no confidence that I can recover from a ransomware attack." And you scratch your head and you think, "Well, if your backup environment is so good, why do you have such low confidence?" And I think that's the moment when we dug deeper and we realized, if you've got a traditional architecture, and let's face it, the disk-based architecture's been around for almost two decades now, in terms of disk-based backup, you can have that tuned to the hilt. That can be running as efficiently as you want it, but it was built before the ransomware attacks, before all these cyber issues, you know, really start hitting companies. And so I have this really well-run traditional backup environment that is not at all built for these modern threat vectors. And so that's really why customers are saying, "I'm doing the best I can," but as Anjan pointed out, the architecture, the tooling isn't there to support what problems I need to solve today. >> Yeah, great point. >> And so, yeah. >> Well, that's a great point. Before we get into the customer side I want to get to in second, you know, I interviewed Jaspreet, the founder and CEO many years ago, even before the pandemic, and you mentioned modern. You guys have always had the cloud with Druva. This is huge. Now that you're past the pandemic, what is that modern cloud edge that you guys have? 'Cause that's a great point. A lot of stuff was built kind of backup and recovery bolted on, not really kind of designed into the current state of the infrastructure and the cloud native application modern environment we're seeing right now. It's a huge issue. >> I think, to me there's three things that come up over and over and over again as we talk to people in terms of, you know, being built in cloud, being cloud native, why is it an advantage? The first one is security and ransomware. And we can go deeper, but the most obvious one that always comes up is every single backup you do with Druva is air gapped, offsite, managed under a separate administrative domain so that you're not retrofitting any sort of air gap network and buying another appliance or setting up your own cloud environment to manage this. Every backup is ransomware protected, guaranteed. The second advantage is the scalability. And you know, this certainly plays into account as your business grows, or, in some cases, as you shrink or repurpose workloads, you're only paying for what you use. But it also plays a big role, again, when you start thinking of ransomware recoveries because we can scale your recovery in cloud, on premises as much or as little as you want. And then I think the third one is we're seeing, basically, things evolving, new workloads, data sprawl, new threat vectors. And one of the nice parts of being a SaaS service in the cloud is we're able to roll out new functionality every two weeks and there's no upgrade cycle, there's no waiting. The customer doesn't have to say, "Wow, I needed six months in the lab before I upgrade it and it's an 18-month, 24-month cycle before the functionality releases. You're getting it every two weeks, and it's backed by Druva to make sure it works. >> Anjan, you know, you got the product side, you know, it's a challenging job 'cause you have so many customers asking for things, probably on the roadmap, you probably can go an hour for that one, but I want to get your thoughts on what you're hearing and seeing from customers. We just reviewed the IDC with Phil. How are you guys responding to your customer's needs? Because it seems that it's highly accelerated, probably on the feature requests, but also structurally as ransomware continues to evolve. What are you hearing? What's the key customer need? How are you guys responding? >> Yeah, actually, I have two things that I hear very clearly when I talk to customers. One, I think, after listening to their security problems and their vulnerability challenges, because we see customers and help customers who are getting challenged by ransomware on a weekly basis. And what I find that this problem is not just a technology problem, it's an operating model problem. So in order to really secure themselves, they need a security operating model and a lot of them haven't figured out that security operating model in totality. Now where we come in, as Druva, is that we are providing them the cloud operating model and a data protection operating model, combined with a data insights operating model which all fit into their overall security operating model that they are really owning and they need to manage and operate, because this is not just about a piece of technology. On top of that, I think our customers are getting challenged by all the same challenges of not just spending time on keeping the lights on, but innovating faster with less. And that has been this age old problem, do more with less. But in this whole, they're like trying to innovate in the middle of the war, so to say. The war is happening, they're getting attacked, but there's also net new shadow IT challenges that's forcing them to make sure that they can manage all the new applications that are getting developed in the cloud. There is thousands of SaaS applications that they're consuming, not knowing which data is critical to their success and which ones to protect and govern and secure. So all of these things are coming at them at 100 miles per hour, while they're just trying to live one day at a time. And unless they really develop this overall security operating model, helped by cloud native technologies like Druva that really providing them a true cloud native model of really giving like a touchless and an invisible protection infrastructure. Not just beyond backups, beyond just the data protection that we all know of into this mindset of kind of being able to look at where each of those functionalities need to lie. That's where I think they're grappling with. Now Druva is clearly helping them with keep up to pace with the public cloud innovations that they need to do and how to protect data. We just launched our EC2 offering to protect EC2 virtual machines back in AWS, and we are going to be continuing to evolve that to further the many services that public cloud software 'cause our customers are really kind of consuming them at breakneck speed. >> So new workloads, new security capabilities. Love that. Good call out there. Stephen, there's still the issue of the disruption side of it. You guys have a guarantee. There's a cost of ownership as you get more tools. Can you talk about that angle of it? You got new workloads, you got the new security needs, what's the disruption impact? 'Cause you want to avoid that. How much is it going to cost you? And you guys have this guarantee, can you explain that? >> Yeah, absolutely. So Druva launched our $10 million data resiliency guarantee. And for us, there were really two key parts to this. The first obviously is $10 million means that, you know, again, we're willing to put our money where our mouth is, and that's a big deal, right? That we're willing to back this with the guarantee. But then the second part, and this is the part that I think reflects that sort of model that Anjan was talking about. We sort of look at this and we say the goal of Druva is to do the job of protecting and securing your data for you so that you, as a customer, don't have to do it anymore. And so the guarantee actually protects you against multiple types of risks, all with SLAs. So everything from your data's going to be recoverable in the case of a ransomware attack. Okay, that's good. Of course, for it to be recoverable, we're also guaranteeing your backup success rate. We're also guaranteeing the availability of the service. We're guaranteeing that the data that we're storing for you can't be compromised or leaked externally, and we're guaranteeing the long-term durability of the data so that if you backup with us today and you need to recover 30 years from now, that data's going to be recovered. So we wanted to really attack the end-to-end risks that affect our customers. Cybersecurity is a big deal, but it is not the only problem out there, and the only way for this to work is to have a service that can provide you SLAs across all of the risks, because that means, as a SaaS vendor, we're doing the job for you so you're buying results as opposed to technology. >> That's great. Great point. Ransomware isn't the only problem. That's the title of this presentation, but it's a big one. (laughs) People are concerned about it, so great stuff. In the last five minutes, guys, if you don't mind, I'd love to have you share what's on the horizon for Druva? You mentioned the new workloads, Anjan. You mentioned this new security. You're going to shift left. DevOps is now the developer model. They're running IT. Get data and security teams now stepping in and trying to be as high velocity as possible for the developers and enterprises. What's on the horizon for Druva? What trends is the company watching, and how are you guys putting that together to stay ahead in the marketplace and the competition? >> Yeah, I think, listening to our customers, what we realize is they need help with the public cloud, number one. I think that's a big wave of consumption. People are consolidating their data centers, moving to the public cloud. They need help in expanding data protection, which becomes the basis of a lot of the security operating model that I talked about. They need that first, from Druva, before they can start to get into much more advanced level of insights and analytics around that data to protect themselves and secure themselves and do interesting things with that data. So we are expanding our coverage on multiple fronts there. The second key thing is to really bring together a very insightful presentation layer, which, I think, is very unique to Druva because only we can look at multiple tenants, multiple customers because we are a SaaS vendor, and look at insights and give them best practices and guidances and analytics that nobody else can give. There's no silo anymore because we are able to take a good big vision view and now help our customers with insights that otherwise that information map is completely missing. So we are able to guide them down a path where they can optimize which workloads need what kind of protection, and then how to secure them. So that is the second level of insights and analytics that we are building. And there's a whole plethora of security offerings that we are going to build, all the way from a feature level where we have things like (audio distorts) that's already available to our customers today to prevent any anomalous behavior and attacks that would delete their backups and then they still have a way to recover from it, but also things to curate and get back to that point in time where it is safe to recover and help them with a sandbox which they can recover confidently knowing it's not going to jeopardize them again and reinfect the whole environment again. So there's a whole bunch of things coming, but the key themes are public cloud, data insights, and security, and that's where my focus is, to go and get those features delivered, and Stephen can add a few more things around services that Stephen is looking to build and launch. >> Sure, so, yeah, so John, I think one of the other areas that we see just an enormous groundswell of interest. So public cloud is important, but there are more and more organizations that are running hundreds, if not thousands of SaaS applications, and a lot of those SaaS applications have data. So there's the obvious things, like Microsoft 365, Google Workspace, but we're also seeing a lot of interest in protecting Salesforce because, if you think about it, if someone you know deletes some really important records in Salesforce, that's actually kind of the record of your business. And so, we're looking at more and more SaaS application protection, and really getting deep in that application awareness. It's not just about backup and recovery when you look at something like a Salesforce, or something like Microsoft 365. You do want to look into sandboxing, you want to look into long-term archival, because this is the new record of the business. What used to be in your on-premises databases, that all lives in cloud and SaaS applications now. So that's a really big area of investment for us. The second one, just to echo what Anjan said is, one of the great things of being a SaaS provider is I have metadata that spans across thousands of customers and tens of billions of backups a year. I'm tracking all sorts of interesting information that is going to enable us to do things like make backups more autonomous so that customers, again, I want to do the job for them. We'll do all the tuning, we'll do all the management for them to be able to better detect ransomware attacks, better respond to ransomware attacks, because we're seeing across the globe. And then, of course, being able to give them more insight into what's happening in their data environment so they can get a better security posture before any attack happens. Because, let's face it, if you can set your data up more cleanly, you're going to be a lot less worried and a lot less exposed when that attack happens. So we want to be able to, again, cover those SaaS applications in addition to the public cloud, and then we want to be able to use our metadata and use our analytics and use this massive pipeline we've got to deliver value to our customers. Not just charts and graphs, but actual services that enable them to focus their attention on other parts of the business. >> That's great stuff. >> And remember, John, I think all this while keeping things really easy to consume, consumer grade UI, APIs, and then really the power of SaaS as a service, simplicity to kind of continue on, amongst kind of keeping these complex technologies together. >> Anjan, that's a great callout. I was going to mention ease of use and self-service. Big part of the developer and IT experience. Expected. It's the table stakes. Love the analytic angle, I think that brings the scale to the table, and faster time to value to get to learn best practices. But at the end of the day, automation, cross-cloud protection and security to protect and recover. This is huge, and this is a big part of not only just protecting against ransomware and other things, but really being fast and being agile. So really appreciate the insights. Thanks for sharing on this segment, really under the hood and really kind of the value of the product. Thanks for coming on, appreciate it. >> Thank you very much. >> Okay, there it is. You have the experts talk about under the hood, the product, the value, the future of what's going on with Druva, and the future of cloud native protecting and recovering. This is what it's all about. It's not just ransomware they have to worry about. In a moment, Dave Vellante will give you some closing thoughts on the subject here. You're watching theCUBE, the leader in high tech enterprise coverage. >> As organizations migrate their business processes to multi-cloud environments, they still face numerous threats and risks of data loss. With a growing number of cloud platforms and fragmented applications, it leads to an increase in data silos, sprawl, and management complexity. As workloads become more diverse, it's challenging to effectively manage data growth, infrastructure, and resource costs across multiple cloud deployments. Using numerous backup vendor solutions for multiple cloud platforms can lead to management complexity. More importantly, the lack of centralized visibility and control can leave you exposed to security vulnerabilities, including ransomware that can cripple your business. The Druva Data Resiliency Cloud is the only 100% SaaS data resiliency platform that provides centralized, secure, air gapped, and immutable backup and recovery. With Druva, your data is safe with multiple layers of protection and is ready for fast recovery from cyberattacks, data corruption, or accidental data loss. Through a simple, easy to manage platform, you can seamlessly protect fragmented, diverse data at scale, across public clouds, and your business critical SaaS applications. Druva is the only 100% SaaS vendor that can manage, govern, and protect data across multiple clouds and business critical SaaS applications. It supports not just backup and recovery, but also data resiliency across high value use cases, such as e-discovery, sensitive data governance, ransomware, and security. No other vendor can match Druva for customer experience, infinite scale, storage optimization, data immutability, and ransomware protection. The Druva Data Resiliency Cloud, your data, always safe, always ready. Visit druva.com today to schedule a free demo. (upbeat music) >> One of the big takeaways from today's program is that in the scramble to keep business flowing over the past 2+ years, a lot of good technology practices have been put into place, but there's much more work to be done, specifically, because the frequency of attacks is on the rise and the severity of lost, stolen, or inaccessible data is so much higher today, business resilience must be designed into architectures and solutions from the start. It cannot be an afterthought. Well, actually it can be, but you won't be happy with the results. Now, part of the answer is finding the right partners, of course, but it also means taking a system's view of your business, understanding the vulnerabilities and deploying solutions that can balance cost efficiency with appropriately high levels of protection, flexibility, and speed slash accuracy of recovery. Here we hope you found today's program useful and informative. Remember, this session is available on demand in both its full format and the individual guest segments. All you got to do is go to thecube.net, and you'll see all the content, or you can go to druva.com. There are tons of resources available, including analyst reports, customer stories. There's this cool TCO calculator. You can find out what pricing looks like and lots more. Thanks for watching "Why Ransomware isn't Your Only Problem," made possible by Druva, in collaboration with IDC and presented by theCUBE, your leader in enterprise and emerging tech coverage. (upbeat music)
SUMMARY :
and prepared for the threats they face It's great to have you back on theCUBE. to be here with you. of the global IT landscape and it has the attention, all the way up the stack to the C-suite, and helping the organization has to be a data company in the context of IT computing. that organizations need to be aware of? and that is the area of ransomware. the demographics of the survey and kind of the aha moment of this is going to happen, and to take advantage of the key advantages and that extends the time to recover and not lose data in the that you articulated, the CIO, the CSO, you know, whoever it is, So all the way at the top, And the reason we say that is, you know, to have you on the program. Thank you, Lisa. and you are watching theCUBE, and to extract critical insights. and the Druva special presentation So it's great to have you here because the backup person often, you know, It's funny, you know. and the realities of how is that you pay blackmail. Yeah, so the fact that, you know, 60, and even the psychology Yeah, I hear where you coming from. or that the backup systems is that the attack vectors and then letting you know you have ransom. They all kind of have the same problem. is the best you can get I guess that's the question here. And that's the way that you Very much the future. So in the future, if you use Now it really is about the and they get to do a full test and thanks for the insight. Always happy to talk and Anjan Srinivas, the GM and VP none of the weaknesses This is the topic. and causes a lot of problems, disruption. and reads it is going to that they needed to do. that comes in the market, I'm desperate. Where does the logic need to reside? and let's face it, the disk-based and the cloud native of being a SaaS service in the cloud is We just reviewed the IDC with Phil. and they need to manage and operate, of the disruption side of it. And so the guarantee actually protects you I'd love to have you share So that is the second level of insights actually kind of the record really easy to consume, the scale to the table, and the future of cloud native Druva is the only 100% SaaS vendor is that in the scramble
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Dave Vellante | PERSON | 0.99+ |
Lisa Martin | PERSON | 0.99+ |
Stephen Manley | PERSON | 0.99+ |
Bill Goodwin | PERSON | 0.99+ |
Curtis | PERSON | 0.99+ |
John | PERSON | 0.99+ |
Anjan Srinivas | PERSON | 0.99+ |
Stephen | PERSON | 0.99+ |
Curtis Preston | PERSON | 0.99+ |
John Furrier | PERSON | 0.99+ |
Lisa | PERSON | 0.99+ |
Asia Pacific | LOCATION | 0.99+ |
Phil | PERSON | 0.99+ |
10-time | QUANTITY | 0.99+ |
60 | QUANTITY | 0.99+ |
six months | QUANTITY | 0.99+ |
42% | QUANTITY | 0.99+ |
67% | QUANTITY | 0.99+ |
IDC | ORGANIZATION | 0.99+ |
$10 million | QUANTITY | 0.99+ |
$10 million | QUANTITY | 0.99+ |
24-month | QUANTITY | 0.99+ |
18-month | QUANTITY | 0.99+ |
2022 | DATE | 0.99+ |
Druva | ORGANIZATION | 0.99+ |
two key parts | QUANTITY | 0.99+ |
thousands | QUANTITY | 0.99+ |
Mike Tyson | PERSON | 0.99+ |
thecube.net | OTHER | 0.99+ |
North America | LOCATION | 0.99+ |
one day | QUANTITY | 0.99+ |
55% | QUANTITY | 0.99+ |
second part | QUANTITY | 0.99+ |
Anjan | PERSON | 0.99+ |
20 industries | QUANTITY | 0.99+ |
first | QUANTITY | 0.99+ |
AWS | ORGANIZATION | 0.99+ |
Western Europe | LOCATION | 0.99+ |
Druva | TITLE | 0.99+ |
Los Angeles County | LOCATION | 0.99+ |
2025 | DATE | 0.99+ |
Amazon Web Services | ORGANIZATION | 0.99+ |
hundreds | QUANTITY | 0.99+ |
93% | QUANTITY | 0.99+ |
two things | QUANTITY | 0.99+ |
Phil Goodwin | PERSON | 0.99+ |
500 business technology practitioners | QUANTITY | 0.99+ |
83% | QUANTITY | 0.99+ |
500 | QUANTITY | 0.99+ |
46% | QUANTITY | 0.99+ |
second advantage | QUANTITY | 0.99+ |
both ways | QUANTITY | 0.99+ |
second | QUANTITY | 0.99+ |
W Curtis Preston, Druva
(bright inspirational music) >> Welcome back everyone to theCUBE and the Druva special presentation of, "Why Ransomware Isn't Your Only Problem." I'm John Furrier, host of theCUBE. We're here with W. Curtis Preston. Curtis Preston, as you know in the industry, Chief Technical Evangelist at Druva. Curtis, great to see you. We're here at, "Why Ransomware Isn't Your Only Problem." Great to see you. Thanks for coming on. >> Happy to be here. >> So we always see each other events, now events are back. So it's great to have you here for this special presentation. The White Paper from IDC really talks about this in detail. Like to get your thoughts, and I'd like you to reflect on the analysis that we've been covering here and the survey data, how it lines up with the real world that you're seeing out there. >> Yeah, I think it's... The survey results really I'd like to say that they surprised me, but unfortunately they didn't. The data protection world has been this way for a while where there's this difference in belief, or difference between the belief and the reality. And what we see is that there are a number of organizations that have been hit- successfully hit by ransomware, paid the ransom and/or lost data. And yet the same people that were surveyed they had high degrees of confidence in their backup system. And, you know, I could probably go on for an hour as to the various reasons why that would be the case, but I think that this long running problem that as long as I've been associated with backups, which, you know, has been a while, it's that problem of, you know, nobody wants to be the backup person. And people often just they don't want to have anything to do with the backup system. And so it sort of exists in this vacuum. And so then management is like, "Oh, the backup system's great," because the backup person often, you know, might say that it's great because maybe it's their job to say so. But the reality has always been very, very different. >> It's funny, you know, "We're good boss, we got this covered." >> Good. All good. It's all good. >> Fingers crossed, right? So again, this is the reality, and as it becomes backup and recovery, which we've talked about many times on theCUBE, certainly we have with you before, but now with ransomware, also, the other thing is people get ransomware hit multiple times. So it's not only like they get hit once. So, you know, this is a constant chasing the tail on some ends, but there are some tools out there. You guys have a solution. And so let's get into that. You know, you have had hands-on backup experience. What are the points that surprise you the most about what's going on in this world and the realities of how people should be going forward? What's your take? >> Well, I would say that the one part in the survey that surprised me the most was people that had a huge, you know, that there was a huge percentage of people that said that they had a, you know, a ransomware response, you know, and readiness program. And you look at that and how could you be, you know, that high a percentage of people be comfortable with their ransomware readiness program and a, you know, which includes a number of things, right? There's the cyber attack aspect of responding to a ransomware attack, and then there's the recovery aspect. And so you believe that your company was ready for that, and then you go, and I think it was 67% of the people in the survey paid the ransom, which as a person who, you know, has spent my entire career trying to help people successfully recover their data, that number I think just hurt me the most is that because you talked about re-infections the surest way to guarantee that you get re-attacked and reinfected is to pay the ransom. This goes back all the way to ransom since the beginning of time, right? Everyone knows if you pay the blackmail all you're telling people is that you pay blackmail. >> You're in business, you're a good customer. ALR for ransomware. >> Yeah. So, the fact that, you know, 60, what, two-thirds of the people that were attacked by ransomware paid the ransom. That one statistic just, just hurt my heart. >> Yeah. And I think this is the reality. I mean, we go back and even the psychology of the practitioners was, you know, super important to get back in recovery. And that's been around for a long time. But now that's an attack vector, okay? And there's dollars involved, like I said, ALR, I'm joking but there's recurring revenue for the for the bad guys if they know you're paying up and if you're stupid enough not to change you're tooling. Right? So again, it works both ways. So, I got to ask you, why do you think so many organizations are unable to successfully respond after an attack? Is it because- they know it's coming. I mean, they're not that dumb. I mean, they have to know it's coming. Why aren't they responding successfully to this? >> I think it's a litany of things starting with that aspect that I mentioned before that nobody wants to have anything to do with the backup system, right? So, nobody wants to be the one to raise their hand because if you're the one that raises their hand "You know what, that's a good idea, Curtis, why don't you look into that?" Right? Nobody wants to be responsible- >> Where's that guy now? He doesn't work here anymore. Yeah, but I hear where you coming from. Psychology (indistinct). >> Yeah. So there's that. But then the second is that because of that no one's looking at the fact that backups are the attack vector. They become the attack vector. And so because they're the attack vector they have to be protected as much, if not more, than the rest of the environment. The rest of the environment can live off of active directory and, you know, and things like Okta so that you can have SSO and things like that. The backup environment has to be segregated in a very special way. Backups have to be stored completely separate from your environment. The login and authentication and authorization system needs to be completely separate from your typical environment. Why? Because if you, if that production environment is compromised now knowing that the attacks or that the backup systems are a significant portion of the attack vector, if the production system is compromised then the backup system is compromised. So you've got to segregate all of that. And I just don't think that people are thinking about that. You know, and they're using the same backup techniques that they've used for many, many years. >> So what you're saying is that the attack vectors and the attackers are getting smarter. They're saying, "Hey, we'll just take out the backup first so they can't back-up. So we got the ransomware." >> Yeah, exactly. The largest ransomware group out there, the Conti ransomware group, they are specifically targeting specific backup vendors. They know how to recognize the backup servers. They know how to recognize where the backups are stored and they are exfiltrating the backups first and then deleting them and then letting you know you have ransom. Right? >> Okay, so you guys have a lot of customers They all kind of have the same- this problem. What's the patterns that you're seeing? How are they evolving? What are some of the things that they're implementing? What is the best practice? >> Well, again, you've got to fully segregate that data, There are, and everything about how that data is stored and everything about how that data is created and accessed. There are ways to do that with other, you know, with other commercial products. You can take a standard product and put a number of layers of defense on top of it or you can switch to the way Druva does things which is a SaaS offering that stores your data completely in the cloud in our account, right? So your account could be completely compromised. That has nothing to do with our account. And the- it's a completely different authentication and authorization system. You've got multiple layers of defense between your computing environment and where we store your backups. So basically what you get by default with the way Druva stores your backups is the best you can get after doing many, many layers of defense on the other side and having to do all that work with us. You just login and you get all of that. >> I guess how do you break the laws of physics? I guess that's the question here. >> Well, when, because that's the other thing is that by storing the data in the cloud, we do it, and I've said this a few times, that you get to break the laws of physics. And the only way to do that is to, is time travel. And that's what, so yeah. So Druva has time travel. What, and this is a courtisism by the way, I don't think this is our official position, but the idea is that the only way to restore data as fast as possible is to restore it before you actually need it. And that's what kind of what I mean by time travel. In that you, basically, you configure your DR, your disaster recovery environment in Druva one time. And then we are pre-restoring your data as often as you tell us to do, to bring your DR environment up to the, you know, the current environment as quickly as we can so that in a disaster recovery scenario which is part of your ransomware response, right? Again, there are many different parts but when you get to actually restoring the data you should be able to just push a button and go. The data should already be restored. And that's the, that's the way that you of physics is you break the laws of time. >> Well, I and everyone wants to know the next question, and this is the real big question is, are you from the future? (light chuckling) >> Yeah. Very much the future. >> What's it like in the future, back-up recovery, how's it restored? Is it air gapping everything? >> Yeah, it, well, it's a world where people don't have to worry about their backups. I like to use the phrase, "get out of the backup business. Just get into the restore business." I, you know, I'm a grandfather now and I love having a granddaughter and I often make the joke that if I'd have known how great grandkids were I would've skipped straight to them. Right? Not possible. Just like this. Recoveries are great. Backups are really hard. So, in the future, if you use a SaaS data protection system and data resiliency system, you can just do recoveries and not have to worry about backups. >> Yeah. And what's great about your background is you've got a lot of historical perspective. I've seen that in the ways of innovation now it's really is about the recovery and real time. So a lot of good stuff going on and got to think automated. Things got to be rocking and rolling. >> Absolutely. Yeah. I do remember, again, having worked so hard with many clients over the years, back then we worked so hard just to get the backup done. There was very little time to work on the recovery. And I really, I kid you not that our customers don't have to do all of those things that all of our competitors have to do to, you know, to try to break the laws of physics. I've been fighting the laws of physics my entire career to get the backup done in the first place. Then to secure all the data, right? To air gap it and make sure that a ransomware attack isn't going to attack it. Our customers get to get straight to a fully automated disaster recovery environment that they get to test as often as possible and they get to do a full test by simply pressing a single button. And you know, I wish that, I wish everybody had that ability. >> Yeah, I mean, security's a big part of it. Data's in the middle of it. All this is now mainstream front lines. Great stuff. Curtis, great to have you on, bring that perspective and thanks for the insight. Really appreciate it. >> Always happy to talk about my favorite subject. >> Alright. We'll be back in a moment. We'll have Stephen Manley, the CTO, and Anjan Srinivas, the GM and VP of Product Management will join me. You're watching theCUBE, the leader in high tech enterprise coverage. (gentle scientific music)
SUMMARY :
and the Druva special presentation of, So it's great to have you here because the backup person often, you know, It's funny, you know, It's all good. and the realities of how that said that they had a, you know, You're in business, by ransomware paid the ransom. of the practitioners was, you know, Yeah, but I hear where you coming from. or that the backup systems is that the attack vectors and then letting you know What's the patterns that you're seeing? is the best you can get I guess that's the question here. is that by storing the data So, in the future, if you use I've seen that in the ways of that they get to test as often Curtis, great to have you on, Always happy to talk and Anjan Srinivas, the GM
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Stephen Manley | PERSON | 0.99+ |
Curtis | PERSON | 0.99+ |
Curtis Preston | PERSON | 0.99+ |
Anjan Srinivas | PERSON | 0.99+ |
67% | QUANTITY | 0.99+ |
John Furrier | PERSON | 0.99+ |
W. Curtis Preston | PERSON | 0.99+ |
ALR | ORGANIZATION | 0.99+ |
60 | QUANTITY | 0.99+ |
second | QUANTITY | 0.99+ |
first | QUANTITY | 0.99+ |
Druva | TITLE | 0.98+ |
IDC | ORGANIZATION | 0.98+ |
two-thirds | QUANTITY | 0.98+ |
Conti | ORGANIZATION | 0.98+ |
both ways | QUANTITY | 0.98+ |
Druva | ORGANIZATION | 0.98+ |
Why Ransomware Isn't Your Only Problem | TITLE | 0.98+ |
Why Ransomware Isn't Your Only Problem | TITLE | 0.97+ |
one time | QUANTITY | 0.96+ |
theCUBE | ORGANIZATION | 0.95+ |
one part | QUANTITY | 0.92+ |
one | QUANTITY | 0.91+ |
an hour | QUANTITY | 0.88+ |
Druva | PERSON | 0.86+ |
single button | QUANTITY | 0.83+ |
W Curtis Preston | PERSON | 0.83+ |
once | QUANTITY | 0.74+ |
each | QUANTITY | 0.59+ |
many years | QUANTITY | 0.58+ |
Okta | ORGANIZATION | 0.43+ |
David Wigglesworth, Commvault & Don Foster, Commvault | Commvault GO 2019
>> Narrator: Live from Denver, Colorado, it's theCUBE. Covering Commvault Go 2019. Brought to you by Commvault. (upbeat electronic music) >> Hey, welcome back to theCUBE. Lisa Martin with Stu Miniman. We are covering Commvault Go '19 from Colorado and Stu and I are pleased to welcome a couple of guys back to theCUBE. We've got David Wigglesworth, a VP, now VP of Global Sales and Emerging Technologies at Commvault for what, a couple weeks now David? >> About a month and five days. >> About a month, and look who's back, it's Don Foster, VP of Storage Solutions, >> Great to be back. from the Keynote stage, welcome back Don. >> Thank you very much. >> Don, and we appreciate you bringing your own personal makeup artist, Sanjay Merchandandi, >> Yeah. >> A man of many skills. >> Indeed. (laughing) >> He really is. So if this whole, like, CEO thing doesn't work, he's clearly got a career in, you know, touch-up makeup. >> In makeup. >> Yeah, all right, so Wigs we'll start with you, you've got a cool nickname, so I got to use it. You've been here for about a month or so. This is a new Commvault. We've heard a lot in the last two days. A lot of news, a lot of leadership changes, obviously, go-to-market changes, new partner offerings, lots of stuff. Tell us first, before we dig in, what attracted you to Commvault? >> That's a pretty easy question to answer, it's the leadership. So, obviously I'm very familiar with Commvault. I've competed with them in my past career. Always been a very formidable competitor. When you walked into an account in my previous life and they said they had Commvault, you usually kind-of wiped your brow, and thought 'Oh okay, I've got to find something else here to talk about' but in all seriousness, for me it was, you know, when I first noticed in the News that Sanjay had come onboard. That peaked my interest, because obviously I knew Sanjay in my previous life at EMC and at VMware. And then when I watched Ricardo join the company, I was like, okay, this is something I really need to dig into. And so when I had the opportunity to meet with them and understand the direction of where they want to take the company, which was also already just a phenomenal IT organization, just a pillar in the IT community, with what the founders were able to do in relatively short amount of time. I was really excited to be able to come over and be a part of it. >> Wigs, you've got a emerging tech under your purview, tell us a little bit about what that's going to mean in your role. >> Right now it means I'm head big, right? So, by now, everyone's heard of the acquisition that was made. That was the other thing also that really interested me, was that technology because I really think that's where the market is going and I just felt like it was a great addition to the Commvault family of products. But it's a different technology. It's calling on a different set of folks with inside of an account and it's primarily an enterprise play. It can be a go-down-market a little bit, and enterprise's is kind of where I spent the last several years of my career, the last 20 or so (laughs) and so what we've decided to do is, because it's so different, we've decided for the time being, that we were going to create a special aid organization globally to go sell that solution so that our existing core sellers can focus on our existing set of products, right? That we can be a specialist organization that can help them with their customers, selling all of the additional emerging tech, right? And so, here at the show, we've obviously spent time talking about Hedvig. Metallic is another new technology for us. Now Metallic is going to handled differently, but as we continue to grow our emerging technologies from the traditional core Commvault family of products, that's what I'm going to be focused on. So it'll begin with Hedvig. >> So for the role that you're in now, you said about a month or so, are you bringing in a brand-new sales overlay team? Are you guys hiring like crazy or are some of the Commvault OG sales-guys-or-girls shifting up, we'll say? >> For the most part, we're bringing in new talent. We're looking for people that have a broad spectrum of the experience, right. Obviously someone with strong storage background, but also people that know virtualization code, people that understand containers. Those skillsets are really important to us. And so we're busy building out both an America sales team and also building out a Nemea sales team. And then my partner, I call him my partner-in-crime, Ediz. Ediz is building out our SE organization for the same two theaters. We'll start in those two theaters and then once we get the product fully integrated, which is part of what this guy is doing, once we get the product fully integrated, then I think you'll see us start to move into some other theaters. But right now we're going to focus on those. So yes, we're hiring. Right now my LinkedIn says, "David Wigglesworth, we're hiring." >> I think I saw that actually (laughing). >> So Don, we got to dig into some of the technology with you and Avinash yesterday. >> Absolutely. >> So we're now getting most of the way through the conference, bring us inside some of the conversations you're having. I know it was one of the biggest question, we had coming in was: 'All right The Hedvig that we knew, what's going to change, how does that fit?' Blurring the lines between primary and secondary and all those discussions we had with Sanjay. So take us to how people, are they kind of getting it at this point? And we know it's a journey for the integration and where it will ultimately end. >> Here's the real interesting thing, is probably in the first, I don't know, maybe 24 hours of having conversations with people from partner exchange all the way through to basically day one of actual Commvault Go, I probably had about four, maybe five if you count one of the service providers from Customers' Partners, come up and say, "Okay look, we looked at this tech about 18, 12 months ago and it was top of our list for what we wanted to do for building out this initiative, but there was a little bit too much risk." Going okay, do we really want to invest that much on a company that is maybe not the largest, most, I wouldn't want to say, reputable, but substantial in the marketplace. Will they be there in the future? And they're like, "Now that we know you've legitimized that business "and you want to keep that technology going forward, "this is fantastic. "We totally want to go and take a re-look back at this "and see how we can apply "that back into our infrastructure." So that's a great feedback to hear, and only serves as validation that when we look at the tech and say "This is good stuff," that we know it's good stuff and then of course the next piece is always, "All right, so now when can I start using this for Commvault and?" >> Right. >> That's when we start getting into the conversations of all right, we've got some integration work to do, the partners are asking when they can start to get access to sell it and again, we've got some work to do just to industrialize what we're doing and make the experience similar and then we'll start to roll it out in a considered fashion. >> I'm curious about the education piece. One of the customers that was onstage this morning, Sonic Healthcare, one of the things he said, on main stage and when he stopped by theCUBE a couple of hours ago, was, he said: "I wouldn't be in my job," and he runs disaster recovery and business continuity for Sonic Healthcare, "I wouldn't be in my job without Commvault's support." And I really appreciated and respected how he talked about some of the failures that they had. I always think failure is a good F-word if you leverage it in that way, (agreement) failure can mean success, if you learn from it. But the support organization and the training he talked about have been instrumental. Talk to us, guys, about how you're going to be partnering together to not just enable the big partners for those large enterprise accounts but maybe even the new sales-guys-and-girls that are coming, David, to your team to help everybody really understand how best to delivery a really stellar customer experience with something as exciting now as Hedvig is. >> You want to start, since you've been working on the integration. >> Yes, absolutely. First and foremost, I've been working with Avinash and his brother, Srinivas, and a lot of their engineering team. You really start to lock in things that are repeatable and scalable in nature, right? So that if we are going to open this up to more people, we do need to have repeatable nature of the building blocks for different use cases. So there's some core work we're doing on outlining, positioning, criteria, success, what the outcome needs to be, how that ties back in to hardware. Making sure as well that we understand how the messaging really does resonate and make sure that we're following and being focused on what our core targets are. Because a solution like what Hedvig offers, you can quickly start talking about a lot of different things that could be all things to many people, and we know that that's probably the worst decision to make, because you go super wide and don't go very deep at all and you end up losing the value prop. So identifying what the real core use cases are, getting deep in how it works, one with what the structure of it looks like, making it repeatable, that's the first and foremost thing, I think, for how we can help both Ediz and Wigs' sales team, and on the support side, doing very similar things but also doing some of the programmatic work of the integration and the experience. I talk about experience, like the sending of logs, the things that Matthew Magby from Sonic Healthcare was talking about how we really helped him. We want that same level of experience tied into where the software storage platform works as well. So there's some work to be done there. But as we get it done, the enablement on the support side, as you know, we deal with storage everyday anyway, so it's not like it's a big leap, but we do have to bring them into the mix of how the actual technology works, where it breaks, why it breaks, and those are all the things that we're really focused on in the next 90 days. >> Yeah, I think the real key for me as we talk to customers and also employees is I want them all to have the same experience with the new Hedvig solution that they experience with Commvault, right? And that goes from training our employees, really getting our SEs up to speed, so they can have a meaningful conversation to be able to get a customer to say, "Yeah, I think I'd like to speak with the Special Aid team. "Please have them give me a call." And also on the enablement for the clients, and having the customer understand that you can dial to 1-800 number for support, you can talk to somebody that can lead you down a path and give you the same quality of support you've been used to whether you're calling about a Hedvig solution or whether you're calling about a Commvault solution. >> Yeah, we talked about it a little yesterday, but the scale of the offering is a little bit different. >> It is. >> And therefore, that has some challenges on the support. And something that I'm sure Commvault is going to work on making that, it's not identical for every customer but a little bit more repeatable to be able to scale out that offering. >> I would agree, I would agree. The hardest thing to do is when you have a product that has so much functionality as Hedvig is to not lose focus and try to talk way too broad. What you've really got to do is, you've got to drill down with the client try to understand where their pinpoints are and because, quite frankly, the Hedvig product can do a lot of things. >> Don: Yeah, it can. >> Who's the ideal target customers, we talked about the theaters in which you're going to be launching first. Enterprise, we talked about that. Commvault has a significant presence in the Fortune 500, I think I read about three quarters of Commvault's revenue today comes from the Fortune 500, and Stu was saying yesterday about 80% of the revenue comes from the channel. So we look at Hedvig and the enterprise for a second, customers that are new to Commvault, those existing enterprise customers, GTM both? >> Yeah, I would say, the primary focus is going to be calling on the existent customer set. It's much easier to have a conversation with someone who knows who you are, even though you may be selling a new solution, at least they know who you are and they have a positive experience with us. So that, number one, we're going to focus on our probably our top 300 global accounts to start, as well as our top enterprise accounts. So there's probably, I would say, in the two theaters I mentioned earlier, there's probably about 35 hundred accounts that we're really going to focus on, and really try to make sure that we get in front of as many as we can and tell the story. I think that's where we have to start. Now, will there be greenfield opportunities? Yeah, I think quite frankly, that the Hedvig offering is different enough that it will enable us to go call on some of accounts that aren't doing business with Commvault today, maybe doing business with some of our competitors. So hopefully we can use that to actually win more traditional Commvault business. That's the plan. >> And the reason the enterprise really makes sense, the global accounts, is most larger companies have figured out how try solve the CapEx problem, right? >> David: Yeah. >> They've figured out just the economies of scale and how they grow and move, they can kind of handle that. What really still becomes a challenging piece is the operational efficiency. So, can I get the right solution at the right cost, but do it in a way that I'm actually making things more simplified? I'm not actually exploding more complexity into my environment. That's really where the Commvault data management platform and the Hedvig solution together really make a really solid story. >> All right, so Wigs, Don's team's really got their work cut out for them with all the integration work and know they've got a cadence and a roadmap. For you, obviously, new logos, there's got to be revenue goals. What are some of the key KPIs to measure how this becomes a successful acquisition? >> Well if my CEO is standing close by, he may be in earshot of this, right now it's trying to drive as much revenue as we can. But we also have to realize that we also have to build a pipeline, right? So right now my main focus here is I got to get a team in place that can go articulate the value of this solution to a client, right, number one, both technically and then working with Ediz to get the SE team in place, so that's number one. Number two, while we're doing that, we need to build a pipeline, right? When you make an investment, as you guys know, you're expected to start getting a return on that pretty quickly. And, it's nice, we inherited some nice pipeline with the acquisition. But with opportunity comes responsibility and so we've got to build that pipeline up and really get out in front of customers and find some opportunities that we can not only try to finish for this second half so we can hit all of our financial metrics, but really build pipeline for FY21, for us which starts in April. >> So the voice of the customer is, really can be really powerful. We've heard from a number of Commvault customers on our program yesterday, today on main stage. Is there a plan, Wigs, from your perspective, to get customers into some sort of data so that you have proof in the pudding to show those large enterprises and those theaters to help build that pipeline. Look at someone who's been an existing Commvault customer for five, 10 years or so, here's the, I don't want to say migration path, but maybe upgrade path to expand footprint in there. Here's how we did it, here's why this was ideal for this customer. Plans to get those early adopters to help you dial up the pipeline? >> So have you been reading my 'Go to market strategy' (laughing) 'cause you kind of you basically just read it. So yes, listen we are inheriting some nice accounts with Hedvig. They have some nice logos out there which is really good. And it's a good foundation for us to build upon. But we're very fortunate in that our core sellers have some really good relationships with some pretty large customers really in all different industries. And so, what we're doing right now is we're trying to identify probably about 10 accounts that make sense. That are really strong partners. They don't have to necessarily be really big customers, but just really strong partners that want to work together with us. And exactly what you just said, let's get in front of them, let's give them an opportunity to play with the technology and have them help us figure out, we think we have a pretty good idea what the go-to-marketing messaging should be for our existing customer base but certainly don't assume that we know everything. So have them help us build that strategy. So that is absolutely the plan. >> We've been hearing a lot about the last couple of days, of just, the openness of Commvault. Whether it's, I really thought it was cool with Metallic that the telemetry that partners can get to help customers, maybe even before a customer knows of an issue or an opportunity, but this telemetry, this 'let's learn from our customers,' couldn't agree as a marketer with you more about, we might think we have a great tagline, great messaging, but it's the users who need to validate that. What I'm hearing a lot over the last day and a half is how receptive Commvault is. We're listening to our customers, whether it's existing and comeback customers that Sanjay's team are dealing with, or even through partners. That message is loud and clear, and that's pretty important. >> Yeah, I couldn't agree more. And I'll be honest with you, what's it's also been able to give us an opportunity to do is where we've had some relationships, quite frankly, that maybe we need to work a little harder on. Hedvig has given us that opportunity to kind of start those conversations as well. I think there's a lot of value, both on the existing opportunities as well as growing the business overall. >> Guys, nothing short of a lot of work ahead. But, pretty exciting stuff. We thank you both. Wigs, welcome again to Commvault. >> Thank you. >> Can't wait for next year. Going to bring some cool customers on the program. >> Yeah, absolutely. >> Looking forward. The buzz is so amazing this year. So many customers have said, "I know you weren't here last year, but wow," and that's what they've said. I can't wait to see what this is going to be like next year. Thank you for having us on here. >> You've got to come back. >> Absolutely we will. >> Yeah? >> Yeah. >> All right, guys, thank you for joining Stu and I. >> Thank you both very much. >> Thank you. >> For Stu Miniman, I am Lisa Martin, and you're watching theCUBE from Commvault Go '19. (upbeat electronic music)
SUMMARY :
Brought to you by Commvault. and Stu and I are pleased to welcome from the Keynote stage, welcome back Don. he's clearly got a career in, you know, touch-up makeup. We've heard a lot in the last two days. I really need to dig into. what that's going to mean in your role. of the acquisition that was made. and then once we get the product fully integrated, So Don, we got to dig into some of the technology with you and all those discussions we had with Sanjay. and say "This is good stuff," that we know it's good stuff and make the experience similar and the training he talked about on the integration. and on the support side, doing very similar things and having the customer understand but the scale of the offering is a little bit different. And something that I'm sure Commvault is going to work on and because, quite frankly, the Hedvig product about 80% of the revenue comes from the channel. and tell the story. and the Hedvig solution together What are some of the key KPIs to measure that can go articulate the value to help you dial up the pipeline? So that is absolutely the plan. that the telemetry that partners can get to help customers, that maybe we need to work a little harder on. We thank you both. Going to bring some cool customers on the program. and that's what they've said. and you're watching theCUBE from Commvault Go '19.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
David | PERSON | 0.99+ |
Lisa Martin | PERSON | 0.99+ |
David Wigglesworth | PERSON | 0.99+ |
Matthew Magby | PERSON | 0.99+ |
Don Foster | PERSON | 0.99+ |
Sanjay Merchandandi | PERSON | 0.99+ |
Stu Miniman | PERSON | 0.99+ |
five | QUANTITY | 0.99+ |
April | DATE | 0.99+ |
Srinivas | PERSON | 0.99+ |
Commvault | ORGANIZATION | 0.99+ |
24 hours | QUANTITY | 0.99+ |
two theaters | QUANTITY | 0.99+ |
Sonic Healthcare | ORGANIZATION | 0.99+ |
Stu | PERSON | 0.99+ |
last year | DATE | 0.99+ |
ORGANIZATION | 0.99+ | |
Metallic | ORGANIZATION | 0.99+ |
Hedvig | ORGANIZATION | 0.99+ |
Sanjay | PERSON | 0.99+ |
one | QUANTITY | 0.99+ |
VMware | ORGANIZATION | 0.99+ |
Don | PERSON | 0.99+ |
next year | DATE | 0.99+ |
yesterday | DATE | 0.99+ |
Avinash | PERSON | 0.99+ |
today | DATE | 0.99+ |
EMC | ORGANIZATION | 0.99+ |
both | QUANTITY | 0.99+ |
One | QUANTITY | 0.99+ |
first | QUANTITY | 0.99+ |
Ediz | PERSON | 0.99+ |
Ediz | ORGANIZATION | 0.99+ |
second half | QUANTITY | 0.99+ |
this year | DATE | 0.99+ |
First | QUANTITY | 0.98+ |
Denver, Colorado | LOCATION | 0.98+ |
Colorado | LOCATION | 0.98+ |
CapEx | ORGANIZATION | 0.98+ |
Hedvig | PERSON | 0.98+ |
1-800 | OTHER | 0.97+ |
America | LOCATION | 0.96+ |
about 35 hundred accounts | QUANTITY | 0.96+ |
about 80% | QUANTITY | 0.95+ |