Nadir Izrael, Armis | Manage Risk with the Armis Platform
(upbeat music) >> Today's organizations are overwhelmed by the number of different assets connected to their networks, which now include not only IT devices and assets, but also a lot of unmanaged assets, like cloud, IoT, building management systems, industrial control systems, medical devices, and more. That's not just it, there's more. We're seeing massive volume of threats, and a surge of severe vulnerabilities that put these assets at risk. This is happening every day. And many, including me, think it's only going to get worse. The scale of the problem will accelerate. Security and IT teams are struggling to manage all these vulnerabilities at scale. With the time it takes to exploit a new vulnerability, combined with the lack of visibility into the asset attack surface area, companies are having a hard time addressing the vulnerabilities as quickly as they need. This is today's special CUBE program, where we're going to talk about these problems and how they're solved. Hello, everyone. I'm John Furrier, host of theCUBE. This is a special program called Managing Risk Across Your Extended Attack Surface Area with Armis, new asset intelligence platform. To start things off, let's bring in the co-founder and CTO of Armis, Nadir Izrael. Nadir, great to have you on the program. >> Yeah, thanks for having me. >> Great success with Armis. I want to just roll back and just zoom out and look at, what's the big picture? What are you guys focused on? What's the holy grail? What's the secret sauce? >> So Armis' mission, if you will, is to solve to your point literally one of the holy grails of security teams for the past decade or so, which is, what if you could actually have a complete, unified, authoritative asset inventory of everything, and stressing that word, everything. IT, OT, IoT, everything on kind of the physical space of things, data centers, virtualization, applications, cloud. What if you could have everything mapped out for you so that you can actually operate your organization on top of essentially a map? I like to equate this in a way to organizations and security teams everywhere seem to be running, basically running the battlefield, if you will, of their organization, without an actual map of what's going on, with charts and graphs. So we are here to provide that map in every aspect of the environment, and be able to build on top of that business processes, products, and features that would assist security teams in managing that battlefield. >> So this category, basically, is a cyber asset attack surface management kind of focus, but it really is defined by this extended asset attack surface area. What is that? Can you explain that? >> Yeah, it's a mouthful. I think the CAASM, for short, and Gartner do love their acronyms there, but CAASM, in short, is a way to describe a bit of what I mentioned before, or a slice out of it. It's the whole part around a unified view of the attack surface, where I think where we see things, and kind of where Armis extends to that is really with the extended attack surface. That basically means that idea of, what if you could have it all? What if you could have both a unified view of your environment, but also of every single thing that you have, with a strong emphasis on the completeness of that picture? If I take the map analogy slightly more to the extreme, a map of some of your environment isn't nearly as useful as a map of everything. If you had to, in your own kind of map application, you know, chart a path from New York to whichever your favorite surrounding city, but it only takes you so far, and then you sort of need to do the rest of it on your own, not nearly as effective, and in security terms, I think it really boils down into you can't secure what you can't see. And so from an Armis perspective, it's about seeing everything in order to protect everything. And not only do we discover every connected asset that you have, we provide a risk rating to every single one of them, we provide a criticality rating, and the ability to take action on top of these things. >> Having a map is huge. Everyone wants to know what's in their inventory, right, from a risk management standpoint, also from a vulnerability perspective. So I totally see that, and I can see that being the holy grail, but on the vulnerability side, you got to see everything, and you guys have new stuff around vulnerability management. What's this all about? What kind of gaps are you seeing that you're filling in the vulnerability side, because, okay, I can see everything. Now I got to watch out for threat vectors. >> Yeah, and I'd say a different way of asking this is, okay, vulnerability management has been around for a while. What the hell are you bringing into the mix that's so new and novel and great? So I would say that vulnerability scanners of different sorts have existed for over a decade. And I think that ultimately what Armis brings into the mix today is how do we fill in the gaps in a world where critical infrastructure is in danger of being attacked by nation states these days, where ransomware is an everyday occurrence, and where I think credible, up-to-the-minute, and contextualize vulnerability and risk information is essential. Scanners, or how we've been doing things for the last decade, just aren't enough. I think the three things that Armis excels at and completes the security staff today on the vulnerability management side are scale, reach, and context. Scale, meaning ultimately, and I think this is of no news to any enterprise, environments are huge. They are beyond huge. When most of the solutions that enterprises use today were built, they were built for thousands, or tens of thousands of assets. These days, we measure enterprises in the billions, billions of different assets, especially if you include how applications are structured, containers, cloud, all that, billions and billions of different assets, and I think that, ultimately, when the latest and greatest in catastrophic new vulnerabilities come out, and sadly, that's a monthly occurrence these days. You can't just now wait around for things to kind of scan through the environment, and figure out what's going on there. Real time images of vulnerabilities, real time understanding of what the risk is across that entire massive footprint is essential to be able to do things, and if you don't, then lots and lots of teams of people are tasked with doing this day in, day out, in order to accomplish the task. The second thing, I think, is the reach. Scanners can't go everywhere. They don't really deal well with environments that are a mixed IT/OT, for instance, like some of our clients deal with. They can't really deal with areas that aren't classic IT. And in general, these days over 70% of assets are in fact of the unmanaged variety, if you will. So combining different approaches from an Armis standpoint of both passive and active, we reach a tremendous scale, I think, within the environment, and ability to provide or reach that is complete. What if you could have vulnerability management, cover a hundred percent of your environment, and in a very effective manner, and in a very scalable manner? And the last thing really is context. And that's a big deal here. I think that most vulnerability management programs hinge on asset context, on the ability to understand, what are the assets I'm dealing with? And more importantly, what is the criticality of these assets, so I can better prioritize and manage the entire process along the way? So with these things in mind, that's what Armis has basically pulled out is a vulnerability management process. What if we could collect all the vulnerability information from your entire environment, and give you a map of that, on top of that map of assets? Connect every single vulnerability and finding to the relevant assets, and give you a real way to manage that automatically, and in a way that prevents teams of people from having to do a lot of grunt work in the process. >> Yeah, it's like building a search engine, almost. You got the behavioral, contextual. You got to understand what's going on in the environment, and then you got to have the context to what it means relative to the environment. And this is the criticality piece you mentioned, this is a huge differentiator in my mind. I want to unpack that. Understanding what's going on, and then what to pay attention to, it's a data problem. You got that kind of search and cataloging of the assets, and then you got the contextualization of it, but then what alarms do I pay attention to? What is the vulnerability? This is the context. This is a huge deal, because your businesses, your operation's going to have some important pieces, but also it changes on agility. So how do you guys do that? That's, I think, a key piece. >> Yeah, that's a really good question. So asset criticality is a key piece in being able to prioritize the operation. The reason is really simple, and I'll take an example we're all very, very familiar with, and it's been beaten to death, but it's still a good example, which is Log4j, or Log4Shell. When that came out, hundreds of people in large organizations started mapping the entire environment on which applications have what aspect of Log4j. Now, one of the key things there is that when you're doing that exercise for the first time, there are literally millions of systems in a typical enterprise that have Log4j in them, but asset criticality and the application and business context are key here, because some of these different assets that have Log4j are part of your critical business function and your critical business applications, and they deserve immediate attention. Some of them, or some Git server of some developer somewhere, don't warrant quite the same attention or criticality as others. Armis helps by providing the underlying asset map as a built-in aspect of the process. It maps the relationships and dependencies for you. It pulls together and clusters together. What applications does each asset serve? So I might be looking at a server and saying, okay, this server, it supports my ERP system. It supports my production applications to be able to serve my customers. It serves maybe my .com website. Understanding what applications each asset serves and every dependency along the way, meaning that endpoint, that server, but also the load balancers are supported, and the firewalls, and every aspect along the way, that's the bread and butter of the relationship mapping that Armis puts into place to be able to do that, and we also allow users to tweak, add information, connect us with their CMDB or anywhere else where they put this in, but once the information is in, that can serve vulnerability management. It can serve other security functions as well. But in the context of vulnerability management, it creates a much more streamlined process for being able to do the basics. Some critical applications, I want to know exactly what all the critical vulnerabilities that apply to them are. Some business applications, I just want to be able to put SLAs on, that this must be solved within a week, this must be solved within a month, and be able to actually automatically track all of these in a world that is very, very complex inside of an operation or an enterprise. >> We're going to hear from some of your customers later, but I want to just get your thoughts on, anecdotally, what do you hear from? You're the CTO, co-founder, you're actually going into the big accounts. When you roll this out, what are they saying to you? What are some of the comments? Oh my God, this is amazing. Thank you so much. >> Well, of course. Of course. >> Share some of the comments. >> Well, first of all, of course, that's what they're saying. They're saying we're great. Of course, always, but more specifically, I think this solves a huge gap for them. They are used to tools coming in and discovering vulnerabilities for them, but really close to nothing being able to streamline the truly complex and scalable process of being able to manage vulnerabilities within the environment. Not only that, the integration-led, designer-led deployment and the fact that we are a completely agent-less SaaS platform are extremely important for them. These are times where if something isn't easily deployable for an enterprise, its value is next to nothing. I think that enterprises have come to realize that if something isn't a one click deployment across the environment, it's almost not worth the effort these days, because environments are so complex that you can't fully realize the value any other way. So from an Armis standpoint, the fact that we can deploy with a few clicks, the fact that we immediately provide that value, the fact that we're agent-less, in the sense that we don't need to go around installing a footprint within the environment, and for clients who already have Armis, the fact that it's a flip of a switch, just turn it on, are extreme. I think that the fact, in particular, that Armis can be deployed. the vulnerability management can be deployed on top of the existing vulnerability scanner with a simple one-click integration is huge for them. And I think all of these together are what contribute to them saying how great this is. But yeah, that's it. >> The agent listing is huge. What's the alternative? What does it look like if they're going to go the other route, slow to deploy, have meetings, launch it in the environment? What's it look like? >> I think anything these days that touches an endpoint with an agent goes through a huge round of approvals before anything goes into an environment. Same goes, by the way, for additional scanners. No one wants to hear about additional scanners. They've already gone through the effort with some of the biggest tools out there to punch holes through firewalls, to install scanners in different ways. They don't want yet another scanner, or yet another agent. Armis rides on top of the existing infrastructure, the existing agents, the existing scanners. You don't need to do a thing. It just deploys on top of it, and that's really what makes this so easy and seamless. >> Talk about Armis research. Can you talk about, what's that about? What's going on there? What are you guys doing? How do you guys stay relevant for your customers? >> For sure. So one of the, I've made a lot of bold claims throughout, I think, the entire Q and A here, but one of the biggest magic components, if you will, to Armis that kind of help explain what all these magic components are, are really something that we call our collective asset knowledge base. And it's really the source of our power. Think of it as a giant collective intelligent that keeps learning from all of the different environments combined that Armis is deployed at. Essentially, if we see something in one environment, we can translate it immediately into all environments. So anyone who joins this or uses the product joins this collective intelligence in essence. What does that mean? It means that Armis learns about vulnerabilities from other environments. A new Log4j comes out, for instance. It's enough that, in some environments, Armis is able to see it from scanners, or from agents, or from SBOMs, or anything that basically provides information about Log4j, and Armis immediately infers or creates enrichment rules that act across the entire tenant base, or the entire client base of Armis. So very quick response to industry events, whenever something comes out, again, the results are immediate, very up to the minute, very up to the hour, but also I'd say that Armis does its own proactive asset research. We have a huge data set at our disposal, a lot of willing and able clients, and also a lot of partners within the industry that Armis leverages, but our own research is into interesting aspects within the environment. We do our own proactive research into things like TLStorm, which is kind of a bit of a bridging research and vulnerabilities between cyber physical aspect. So on the one hand, the cyber space and kind of virtual environments, but on the other hand, the actual physical space, vulnerabilities, and things like UPSs, or industrial equipment, or things like that. But I will say that also, Armis targets its research along different paths that we feel are underserved. We started a few years back research into firmwares, different types of real time operating systems. We came out with things like URGENT/11, which was research into, on the one hand, operating systems that run on two billion different devices worldwide, on the other hand, in the 40 years it existed, only 13 vulnerabilities were ever exposed or revealed about that operating system. Either it's the most secure operating system in the world, or it's just not gone through enough rigor and enough research in doing this. The type of active research we do is to complement a lot of the research going on in the industry, serve our clients better, but also provide kind of inroads, I think, for the industry to be better at what they do. >> Awesome, Nadir, thanks for sharing the insights. Great to see the research. You got to be at the cutting edge. You got to investigate, be ready for a moment's notice on all aspects of the operating environment, down to the hardware, down to the packet level, down to the any vulnerability, be ready for it. Great job. Thanks for sharing. Appreciate it. >> Absolutely. >> In a moment, Tim Everson's going to join us. He's the CSO of Kalahari Resorts and Conventions. He'll be joining me next. You're watching theCUBE, the leader in high tech coverage. I'm John Furrier. Thanks for watching. (upbeat music)
SUMMARY :
With the time it takes to What's the holy grail? in every aspect of the environment, management kind of focus, and the ability to take and I can see that being the holy grail, and manage the entire and cataloging of the assets, and every dependency along the way, What are some of the comments? Well, of course. and the fact that we are What's the alternative? of the biggest tools out there What are you guys doing? from all of the different on all aspects of the He's the CSO of Kalahari
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Nadir Izrael | PERSON | 0.99+ |
Tim Everson | PERSON | 0.99+ |
New York | LOCATION | 0.99+ |
John Furrier | PERSON | 0.99+ |
thousands | QUANTITY | 0.99+ |
John Furrier | PERSON | 0.99+ |
Nadir | PERSON | 0.99+ |
billions | QUANTITY | 0.99+ |
Kalahari Resorts and Conventions | ORGANIZATION | 0.99+ |
Armis | ORGANIZATION | 0.99+ |
today | DATE | 0.99+ |
40 years | QUANTITY | 0.99+ |
first time | QUANTITY | 0.99+ |
Today | DATE | 0.99+ |
Gartner | ORGANIZATION | 0.99+ |
each asset | QUANTITY | 0.98+ |
second thing | QUANTITY | 0.98+ |
one click | QUANTITY | 0.98+ |
13 vulnerabilities | QUANTITY | 0.98+ |
a week | QUANTITY | 0.98+ |
over 70% | QUANTITY | 0.98+ |
millions of systems | QUANTITY | 0.98+ |
one | QUANTITY | 0.98+ |
two billion different devices | QUANTITY | 0.97+ |
a month | QUANTITY | 0.97+ |
one-click | QUANTITY | 0.97+ |
both | QUANTITY | 0.96+ |
Log4j | TITLE | 0.96+ |
hundred percent | QUANTITY | 0.96+ |
over a decade | QUANTITY | 0.95+ |
tens of thousands | QUANTITY | 0.94+ |
one environment | QUANTITY | 0.94+ |
Log4Shell | TITLE | 0.93+ |
Managing Risk Across Your Extended Attack Surface Area | TITLE | 0.91+ |
SBOMs | ORGANIZATION | 0.89+ |
past decade | DATE | 0.88+ |
three | QUANTITY | 0.86+ |
hundreds of people | QUANTITY | 0.84+ |
CUBE | TITLE | 0.84+ |
single | QUANTITY | 0.82+ |
last decade | DATE | 0.81+ |
CAASM | TITLE | 0.75+ |
CMDB | TITLE | 0.74+ |
billions of different assets | QUANTITY | 0.72+ |
CAASM | ORGANIZATION | 0.66+ |
URGENT | ORGANIZATION | 0.65+ |
single vulnerability | QUANTITY | 0.65+ |
TLStorm | ORGANIZATION | 0.65+ |
Armis' | ORGANIZATION | 0.64+ |
Git | TITLE | 0.64+ |
11 | TITLE | 0.63+ |
a few years | DATE | 0.61+ |
CTO | PERSON | 0.57+ |
the holy grails | QUANTITY | 0.55+ |
assets | QUANTITY | 0.55+ |
lots | QUANTITY | 0.51+ |
clicks | QUANTITY | 0.5+ |
Nadir Izrael, Armis | Managing Risk with the Armis Platform
(upbeat music) >> Today's organizations are overwhelmed by the number of different assets connected to their networks, which now include not only IT devices and assets, but also a lot of unmanaged assets, like cloud, IoT, building management systems, industrial control systems, medical devices, and more. That's not just it, there's more. We're seeing massive volume of threats, and a surge of severe vulnerabilities that put these assets at risk. This is happening every day. And many, including me, think it's only going to get worse. The scale of the problem will accelerate. Security and IT teams are struggling to manage all these vulnerabilities at scale. With the time it takes to exploit a new vulnerability, combined with the lack of visibility into the asset attack surface area, companies are having a hard time addressing the vulnerabilities as quickly as they need. This is today's special CUBE program, where we're going to talk about these problems and how they're solved. Hello, everyone. I'm John Furrier, host of theCUBE. This is a special program called Managing Risk Across Your Extended Attack Surface Area with Armis, new asset intelligence platform. To start things off, let's bring in the co-founder and CTO of Armis, Nadir Izrael. Nadir, great to have you on the program. >> Yeah, thanks for having me. >> Great success with Armis. I want to just roll back and just zoom out and look at, what's the big picture? What are you guys focused on? What's the holy grail? What's the secret sauce? >> So Armis' mission, if you will, is to solve to your point literally one of the holy grails of security teams for the past decade or so, which is, what if you could actually have a complete, unified, authoritative asset inventory of everything, and stressing that word, everything. IT, OT, IoT, everything on kind of the physical space of things, data centers, virtualization, applications, cloud. What if you could have everything mapped out for you so that you can actually operate your organization on top of essentially a map? I like to equate this in a way to organizations and security teams everywhere seem to be running, basically running the battlefield, if you will, of their organization, without an actual map of what's going on, with charts and graphs. So we are here to provide that map in every aspect of the environment, and be able to build on top of that business processes, products, and features that would assist security teams in managing that battlefield. >> So this category, basically, is a cyber asset attack surface management kind of focus, but it really is defined by this extended asset attack surface area. What is that? Can you explain that? >> Yeah, it's a mouthful. I think the CAASM, for short, and Gartner do love their acronyms there, but CAASM, in short, is a way to describe a bit of what I mentioned before, or a slice out of it. It's the whole part around a unified view of the attack surface, where I think where we see things, and kind of where Armis extends to that is really with the extended attack surface. That basically means that idea of, what if you could have it all? What if you could have both a unified view of your environment, but also of every single thing that you have, with a strong emphasis on the completeness of that picture? If I take the map analogy slightly more to the extreme, a map of some of your environment isn't nearly as useful as a map of everything. If you had to, in your own kind of map application, you know, chart a path from New York to whichever your favorite surrounding city, but it only takes you so far, and then you sort of need to do the rest of it on your own, not nearly as effective, and in security terms, I think it really boils down into you can't secure what you can't see. And so from an Armis perspective, it's about seeing everything in order to protect everything. And not only do we discover every connected asset that you have, we provide a risk rating to every single one of them, we provide a criticality rating, and the ability to take action on top of these things. >> Having a map is huge. Everyone wants to know what's in their inventory, right, from a risk management standpoint, also from a vulnerability perspective. So I totally see that, and I can see that being the holy grail, but on the vulnerability side, you got to see everything, and you guys have new stuff around vulnerability management. What's this all about? What kind of gaps are you seeing that you're filling in the vulnerability side, because, okay, I can see everything. Now I got to watch out for threat vectors. >> Yeah, and I'd say a different way of asking this is, okay, vulnerability management has been around for a while. What the hell are you bringing into the mix that's so new and novel and great? So I would say that vulnerability scanners of different sorts have existed for over a decade. And I think that ultimately what Armis brings into the mix today is how do we fill in the gaps in a world where critical infrastructure is in danger of being attacked by nation states these days, where ransomware is an everyday occurrence, and where I think credible, up-to-the-minute, and contextualize vulnerability and risk information is essential. Scanners, or how we've been doing things for the last decade, just aren't enough. I think the three things that Armis excels at and completes the security staff today on the vulnerability management side are scale, reach, and context. Scale, meaning ultimately, and I think this is of no news to any enterprise, environments are huge. They are beyond huge. When most of the solutions that enterprises use today were built, they were built for thousands, or tens of thousands of assets. These days, we measure enterprises in the billions, billions of different assets, especially if you include how applications are structured, containers, cloud, all that, billions and billions of different assets, and I think that, ultimately, when the latest and greatest in catastrophic new vulnerabilities come out, and sadly, that's a monthly occurrence these days. You can't just now wait around for things to kind of scan through the environment, and figure out what's going on there. Real time images of vulnerabilities, real time understanding of what the risk is across that entire massive footprint is essential to be able to do things, and if you don't, then lots and lots of teams of people are tasked with doing this day in, day out, in order to accomplish the task. The second thing, I think, is the reach. Scanners can't go everywhere. They don't really deal well with environments that are a mixed IT/OT, for instance, like some of our clients deal with. They can't really deal with areas that aren't classic IT. And in general, these days over 70% of assets are in fact of the unmanaged variety, if you will. So combining different approaches from an Armis standpoint of both passive and active, we reach a tremendous scale, I think, within the environment, and ability to provide or reach that is complete. What if you could have vulnerability management, cover a hundred percent of your environment, and in a very effective manner, and in a very scalable manner? And the last thing really is context. And that's a big deal here. I think that most vulnerability management programs hinge on asset context, on the ability to understand, what are the assets I'm dealing with? And more importantly, what is the criticality of these assets, so I can better prioritize and manage the entire process along the way? So with these things in mind, that's what Armis has basically pulled out is a vulnerability management process. What if we could collect all the vulnerability information from your entire environment, and give you a map of that, on top of that map of assets? Connect every single vulnerability and finding to the relevant assets, and give you a real way to manage that automatically, and in a way that prevents teams of people from having to do a lot of grunt work in the process. >> Yeah, it's like building a search engine, almost. You got the behavioral, contextual. You got to understand what's going on in the environment, and then you got to have the context to what it means relative to the environment. And this is the criticality piece you mentioned, this is a huge differentiator in my mind. I want to unpack that. Understanding what's going on, and then what to pay attention to, it's a data problem. You got that kind of search and cataloging of the assets, and then you got the contextualization of it, but then what alarms do I pay attention to? What is the vulnerability? This is the context. This is a huge deal, because your businesses, your operation's going to have some important pieces, but also it changes on agility. So how do you guys do that? That's, I think, a key piece. >> Yeah, that's a really good question. So asset criticality is a key piece in being able to prioritize the operation. The reason is really simple, and I'll take an example we're all very, very familiar with, and it's been beaten to death, but it's still a good example, which is Log4j, or Log4Shell. When that came out, hundreds of people in large organizations started mapping the entire environment on which applications have what aspect of Log4j. Now, one of the key things there is that when you're doing that exercise for the first time, there are literally millions of systems in a typical enterprise that have Log4j in them, but asset criticality and the application and business context are key here, because some of these different assets that have Log4j are part of your critical business function and your critical business applications, and they deserve immediate attention. Some of them, or some Git server of some developer somewhere, don't warrant quite the same attention or criticality as others. Armis helps by providing the underlying asset map as a built-in aspect of the process. It maps the relationships and dependencies for you. It pulls together and clusters together. What applications does each asset serve? So I might be looking at a server and saying, okay, this server, it supports my ERP system. It supports my production applications to be able to serve my customers. It serves maybe my .com website. Understanding what applications each asset serves and every dependency along the way, meaning that endpoint, that server, but also the load balancers are supported, and the firewalls, and every aspect along the way, that's the bread and butter of the relationship mapping that Armis puts into place to be able to do that, and we also allow users to tweak, add information, connect us with their CMDB or anywhere else where they put this in, but once the information is in, that can serve vulnerability management. It can serve other security functions as well. But in the context of vulnerability management, it creates a much more streamlined process for being able to do the basics. Some critical applications, I want to know exactly what all the critical vulnerabilities that apply to them are. Some business applications, I just want to be able to put SLAs on, that this must be solved within a week, this must be solved within a month, and be able to actually automatically track all of these in a world that is very, very complex inside of an operation or an enterprise. >> We're going to hear from some of your customers later, but I want to just get your thoughts on, anecdotally, what do you hear from? You're the CTO, co-founder, you're actually going into the big accounts. When you roll this out, what are they saying to you? What are some of the comments? Oh my God, this is amazing. Thank you so much. >> Well, of course. Of course. >> Share some of the comments. >> Well, first of all, of course, that's what they're saying. They're saying we're great. Of course, always, but more specifically, I think this solves a huge gap for them. They are used to tools coming in and discovering vulnerabilities for them, but really close to nothing being able to streamline the truly complex and scalable process of being able to manage vulnerabilities within the environment. Not only that, the integration-led, designer-led deployment and the fact that we are a completely agent-less SaaS platform are extremely important for them. These are times where if something isn't easily deployable for an enterprise, its value is next to nothing. I think that enterprises have come to realize that if something isn't a one click deployment across the environment, it's almost not worth the effort these days, because environments are so complex that you can't fully realize the value any other way. So from an Armis standpoint, the fact that we can deploy with a few clicks, the fact that we immediately provide that value, the fact that we're agent-less, in the sense that we don't need to go around installing a footprint within the environment, and for clients who already have Armis, the fact that it's a flip of a switch, just turn it on, are extreme. I think that the fact, in particular, that Armis can be deployed. the vulnerability management can be deployed on top of the existing vulnerability scanner with a simple one-click integration is huge for them. And I think all of these together are what contribute to them saying how great this is. But yeah, that's it. >> The agent listing is huge. What's the alternative? What does it look like if they're going to go the other route, slow to deploy, have meetings, launch it in the environment? What's it look like? >> I think anything these days that touches an endpoint with an agent goes through a huge round of approvals before anything goes into an environment. Same goes, by the way, for additional scanners. No one wants to hear about additional scanners. They've already gone through the effort with some of the biggest tools out there to punch holes through firewalls, to install scanners in different ways. They don't want yet another scanner, or yet another agent. Armis rides on top of the existing infrastructure, the existing agents, the existing scanners. You don't need to do a thing. It just deploys on top of it, and that's really what makes this so easy and seamless. >> Talk about Armis research. Can you talk about, what's that about? What's going on there? What are you guys doing? How do you guys stay relevant for your customers? >> For sure. So one of the, I've made a lot of bold claims throughout, I think, the entire Q and A here, but one of the biggest magic components, if you will, to Armis that kind of help explain what all these magic components are, are really something that we call our collective asset knowledge base. And it's really the source of our power. Think of it as a giant collective intelligent that keeps learning from all of the different environments combined that Armis is deployed at. Essentially, if we see something in one environment, we can translate it immediately into all environments. So anyone who joins this or uses the product joins this collective intelligence in essence. What does that mean? It means that Armis learns about vulnerabilities from other environments. A new Log4j comes out, for instance. It's enough that, in some environments, Armis is able to see it from scanners, or from agents, or from SBOMs, or anything that basically provides information about Log4j, and Armis immediately infers or creates enrichment rules that act across the entire tenant base, or the entire client base of Armis. So very quick response to industry events, whenever something comes out, again, the results are immediate, very up to the minute, very up to the hour, but also I'd say that Armis does its own proactive asset research. We have a huge data set at our disposal, a lot of willing and able clients, and also a lot of partners within the industry that Armis leverages, but our own research is into interesting aspects within the environment. We do our own proactive research into things like TLStorm, which is kind of a bit of a bridging research and vulnerabilities between cyber physical aspect. So on the one hand, the cyber space and kind of virtual environments, but on the other hand, the actual physical space, vulnerabilities, and things like UPSs, or industrial equipment, or things like that. But I will say that also, Armis targets its research along different paths that we feel are underserved. We started a few years back research into firmwares, different types of real time operating systems. We came out with things like URGENT/11, which was research into, on the one hand, operating systems that run on two billion different devices worldwide, on the other hand, in the 40 years it existed, only 13 vulnerabilities were ever exposed or revealed about that operating system. Either it's the most secure operating system in the world, or it's just not gone through enough rigor and enough research in doing this. The type of active research we do is to complement a lot of the research going on in the industry, serve our clients better, but also provide kind of inroads, I think, for the industry to be better at what they do. >> Awesome, Nadir, thanks for sharing the insights. Great to see the research. You got to be at the cutting edge. You got to investigate, be ready for a moment's notice on all aspects of the operating environment, down to the hardware, down to the packet level, down to the any vulnerability, be ready for it. Great job. Thanks for sharing. Appreciate it. >> Absolutely. >> In a moment, Tim Everson's going to join us. He's the CSO of Kalahari Resorts and Conventions. He'll be joining me next. You're watching theCUBE, the leader in high tech coverage. I'm John Furrier. Thanks for watching. (upbeat music)
SUMMARY :
With the time it takes to What's the holy grail? in every aspect of the environment, management kind of focus, and the ability to take and I can see that being the holy grail, and manage the entire and cataloging of the assets, and every dependency along the way, What are some of the comments? Well, of course. and the fact that we are What's the alternative? of the biggest tools out there What are you guys doing? from all of the different on all aspects of the He's the CSO of Kalahari
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Nadir Izrael | PERSON | 0.99+ |
Tim Everson | PERSON | 0.99+ |
New York | LOCATION | 0.99+ |
thousands | QUANTITY | 0.99+ |
John Furrier | PERSON | 0.99+ |
John Furrier | PERSON | 0.99+ |
Nadir | PERSON | 0.99+ |
billions | QUANTITY | 0.99+ |
Kalahari Resorts and Conventions | ORGANIZATION | 0.99+ |
Armis | ORGANIZATION | 0.99+ |
today | DATE | 0.99+ |
40 years | QUANTITY | 0.99+ |
first time | QUANTITY | 0.99+ |
Today | DATE | 0.99+ |
Gartner | ORGANIZATION | 0.99+ |
each asset | QUANTITY | 0.98+ |
second thing | QUANTITY | 0.98+ |
one click | QUANTITY | 0.98+ |
13 vulnerabilities | QUANTITY | 0.98+ |
a week | QUANTITY | 0.98+ |
over 70% | QUANTITY | 0.98+ |
millions of systems | QUANTITY | 0.98+ |
one | QUANTITY | 0.98+ |
two billion different devices | QUANTITY | 0.97+ |
a month | QUANTITY | 0.97+ |
one-click | QUANTITY | 0.97+ |
both | QUANTITY | 0.96+ |
Log4j | TITLE | 0.96+ |
hundred percent | QUANTITY | 0.96+ |
over a decade | QUANTITY | 0.95+ |
tens of thousands | QUANTITY | 0.94+ |
one environment | QUANTITY | 0.94+ |
Log4Shell | TITLE | 0.93+ |
Managing Risk Across Your Extended Attack Surface Area | TITLE | 0.91+ |
SBOMs | ORGANIZATION | 0.89+ |
past decade | DATE | 0.88+ |
three | QUANTITY | 0.86+ |
hundreds of people | QUANTITY | 0.84+ |
CUBE | TITLE | 0.84+ |
single | QUANTITY | 0.82+ |
last decade | DATE | 0.81+ |
CAASM | TITLE | 0.75+ |
CMDB | TITLE | 0.74+ |
billions of different assets | QUANTITY | 0.72+ |
CAASM | ORGANIZATION | 0.66+ |
URGENT | ORGANIZATION | 0.65+ |
single vulnerability | QUANTITY | 0.65+ |
TLStorm | ORGANIZATION | 0.65+ |
Armis' | ORGANIZATION | 0.64+ |
Git | TITLE | 0.64+ |
11 | TITLE | 0.63+ |
a few years | DATE | 0.61+ |
CTO | PERSON | 0.57+ |
the holy grails | QUANTITY | 0.55+ |
assets | QUANTITY | 0.55+ |
lots | QUANTITY | 0.51+ |
clicks | QUANTITY | 0.5+ |
Armis | PERSON | 0.49+ |
Christo du Raan, Trustco | Nutanix .NEXT EU 2019
>> Narrator: Live from Copenhagen, Denmark, it's theCUBE. Covering Nutanix dot next 2019. Brought to you by Nutanix. >> Welcome back everyone to theCUBE's live coverage of Nutanix dot next. I'm your host, Rebecca Knight co-hosting along with Stu Miniman. We're joined by Christo du Raan, he is the COO IT Hardware and Infrastructure at Trustco Holdings. Thanks so much for coming on theCube. >> All right, thanks. And thanks for having me. >> Direct from Namibia. So we keep hearing there are customers from 50 countries. And you represent Namibia here. >> Yeah I come from far down in Africa. (laughs) >> So tell our viewers a little bit about Trustco, what you do down there? >> Trustco's a financial services company firstly, we look after all our Namibian customers in the insurance industry, as well as in the banking industry. We've been busy building our banking industry now for the last five years. And we're almost to that point where we can start serving people. Then we've got also educational services that we give to our customers and we've got roughly about 15,000 students, all doing distance learning, and of that 15,000 we've got about 80 to 90 percent of them that we also do finance, not just for the course material but also the technology, that we finance for them, so to give them the capabilities to do their studies through us. Then we've got also natural resources, it's quite a new business unit for us, where we dabble a little in diamond mining, we've got two mines currently, one in Namibia itself, where we produce probably one of the best diamonds in the world, clear cut diamonds, and then also in Sierra Leone we've recently acquired a mining license there as well. Then in Namibia, the other stuff that we do is in Shared Services, where we have our own radio station that we broadcast in Namibia, and then we do a little bit of in-house marketing and media and those type of things. >> Just a few things! >> Well luckily Christo, your IT staff, they have it easy, they don't have, you know, I walk through the Expo floor, it's like oh well how many verticals do you need to go to all of them, to be able to learn what you're doing. So give us if you can just, a little bit of a snapshot of your IT environment, what your team's responsible for, and if you can, kind of bring us even back before you began the journey onto Nutanix. >> So we're very centralized in Namibia, all our stuff gets run out of one data center, or one common area in our area offices, and then we expand to the six branches out in Namibia and in South Africa and now of late we'll be in Sierra Leone. IT team pretty much look after everything, we've got a saying at the office, "If it's got a plug on, it's IT's problem". (laughing) So yeah, so we do everything from the infrastructure, the networking, the servers, the storage, well, now it's Nutanix, everything is already built into one solution, so that the spurred systems have now fallen away, and we only look after it. >> Bring us back to that move to Nutanix, was there an upgrade that you were looking to do? Was there a pain point? What was the impetus to look at Nutanix? >> So our business has expanded quite quickly and the old way of doing things, with the separate SANs, separate switches, separate servers, those type of things became a little bit slumbersome, and difficult to manage because you had to have all these different kind of vendors that's got specific software solutions and specific training that you have to do and it just became a little bit too much for us and we decided that, let's step back a little bit, and see if there's any solutions out there that makes it firstly easier, that we can manage with less people and do more and at that stage hyperconvergence was just on the peak of becoming a thing, if you want to call it that, and we had done our research and found that Nutanix at that stage was the best fit for us and also the most mature in the hyperconverged space. So, that's basically where we got to the Nutanix solution, obviously like everyone else, we started with a Community Edition, dabbled our hand a little bit in there, and saw that's actually doable, it's easy and something that we can build on. >> So, you've been with them for about two years now, so still a relatively new relationship but talk about the beginning in particular and relationships are hard. Every relationship is hard. There are inevitable stumbling blocks. What were some of the challenges you faced and how did you work with Nutanix to overcome them? >> Challenges, I can say, luckily we haven't had a lot of them. Our business is not nearly as big as the Europeans and the Americans, so it is not that complex a system. We had our challenges in the beginning, hypervisor specifically, 'cause we made a huge move, we went totally 180 degrees from our Hyper-V environment, we said we going to go right over to AHV, don't want to do deal licensing, let's just jump in on AHV and go Nutanix fully. So, obviously we had a few challenges with a couple of our services and servers. But other than that, I must say, it was actually a pretty easy move for us. >> It's interesting that you say going from Hyper-V 'cause I've talked to the customers, oh there's a saving from moving from VMware, oh Microsoft, Hyper-V's all included, if you're doing Windows and you've got Hyper-V, I'm sure you've got a Windows application, so was there an application change or what was the driver to move? >> There were some of our applications that were very specific, especially on the network drivers side of things, moving from the normal Windows drivers, to the IO drivers in Linux. We had a couple of challenges with our in-house apps as well, but again, it was a reasonably painless move over to Nutanix. >> One of things we keep hearing about at this conference is how Nutanix is evolving as customer needs and demands are changing. You gave us the overview of your company, you are getting into new businesses and still continuing in established businesses, what are some of the needs that your IT is experiencing and how is Nutanix meeting those needs? >> Like I say, in the old infrastructure days, provisioning was probably the biggest hurdle, if the Dev guys wanted stuff, you first had to go and buy some more hardware, because you need to adapt to them. When we reversed over to Hyper-V eventually, it became easier, but it was still not the right fit. You still had to tweak it and play with it etc etc. So, the biggest challenge was to get our DevOp guys quicker access to what they need. And then also our customers as well. We've moved from where there's a person that needed to provision storage, needed to provision networking, needed to provision server and VMs, that's now all basically done by one person and most of those things we've already automized, so it is five, ten minutes, and then they've got what they need. I think it made us a little bit more agile because we pride ourselves on being quick thinkers, deploying stuff fast and that was always Trustco's main advantage in the Namibian market, we didn't go through all the other rigamarole that other companies have of tendering and doing things in a certain way and by the time that you get there it's not relevant anymore, now we need to do something else again. That brought us quick to market and made it so that we can deliver quicker solutions to our customers. >> So, Christo, was there any impact organizationally for rolling out Nutanix, you mentioned DevOps there, the goal of course is that they shouldn't have to worry about the infrastructure and hopefully Nutanix is delivering that, but there's some retraining or moving inside the organization, what's the impact been on your organization? >> On the customer side, none. They don't even know we've moved over. >> But from the IT side? >> From our customer side, they've not seen anything. From the IT side of things, we had a phased approach, so we started off with the Community Edition, where we basically just dabbled in it, saw what we could do on it and then also, let's call it training for the IT guys, so that they're comfortable in how the product works. So by the time that we got to deploying it in production, it was actually a very smooth transaction. We had all the kinks sorted out beforehand and made sure that everything will work, again, being in the finance industry, in the banking industry, downtime is an absolute no no, and we wanted to get to a point where we say we're not going to move over production sites, production environments, in the evenings from twelve to four in the morning because we've all got families so we'll either plan it properly ahead of time and yes we did it and actually, dare I say, in production time, we moved across almost seamlessly. We've got a lot of redundancies built in obviously so it gave us the opportunity to actually move in place if you want to call it that. >> So what does the future hold for this relationship? Where do you see your partnership with Nutanix evolving and where do you think you'll be, say, five years from now? >> So, we've got a roadmap set out with Nutanix and where we're now only in the baby phase, where we've done the infrastructure, we're happy everything is working, so now we're in the POC stage of exploring the software suite in its entirety. We've started now with Leap and Bolt ADR scenario and tested it extensively and we're now in that process, probably when I get back in Namibia, we'll have the licenses hopefully to start deploying it in our production environment. More closer to the future, in the next I would say, six to nine months, we're going to take on Frame, 'cause part of our business scenario, because we were Microsoft, was the Remote Desktop Service, and that was what kept us so lean. There are some challenges now with Remote Desktop Services where our Dev guys are moving into some Linux and there's different things coming up now where we move away from the traditional monolithic applications to more agile applications and then we'll start dabbling our hands in Frame. For us the holdback was when Frame came out, that it was only in the cloud and for us in Namibia, Africa, the internet is not as stable as we would like, so that was totally off the cards for us. Now that it moved back into on-prem and we can run Frame on-prem, that will probably be our biggest project going forward for the next year and year and a half. >> Excellent. Well thank you so much for coming on theCube Christo. It was a pleasure talking to you. >> Thank you very much. Thanks for having me. >> I'm Rebecca Knight for Stu Miniman, stay tuned for more of theCube's live coverage of dot next. [Urgent Music]
SUMMARY :
Brought to you by Nutanix. he is the COO IT Hardware and Infrastructure And thanks for having me. So we keep hearing there are customers from 50 countries. Yeah I come from far down in Africa. the other stuff that we do is in Shared Services, and if you can, so that the spurred systems have now fallen away, that we can manage with less people but talk about the beginning in Europeans and the Americans, especially on the network drivers side of things, One of things we keep hearing about and made it so that we can deliver On the customer side, none. So by the time that we got to and that was what kept us so lean. Well thank you so much for coming on theCube Christo. Thank you very much. live coverage of dot next.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Sierra Leone | LOCATION | 0.99+ |
Namibia | LOCATION | 0.99+ |
Rebecca Knight | PERSON | 0.99+ |
Trustco | ORGANIZATION | 0.99+ |
Microsoft | ORGANIZATION | 0.99+ |
five | QUANTITY | 0.99+ |
Nutanix | ORGANIZATION | 0.99+ |
Stu Miniman | PERSON | 0.99+ |
South Africa | LOCATION | 0.99+ |
Christo du Raan | PERSON | 0.99+ |
Africa | LOCATION | 0.99+ |
15,000 | QUANTITY | 0.99+ |
180 degrees | QUANTITY | 0.99+ |
six branches | QUANTITY | 0.99+ |
six | QUANTITY | 0.99+ |
Windows | TITLE | 0.99+ |
two mines | QUANTITY | 0.99+ |
ten minutes | QUANTITY | 0.99+ |
Linux | TITLE | 0.99+ |
next year | DATE | 0.99+ |
one solution | QUANTITY | 0.99+ |
nine months | QUANTITY | 0.99+ |
Copenhagen, Denmark | LOCATION | 0.98+ |
50 countries | QUANTITY | 0.98+ |
one | QUANTITY | 0.98+ |
Trustco Holdings | ORGANIZATION | 0.98+ |
one person | QUANTITY | 0.97+ |
one common area | QUANTITY | 0.97+ |
one data center | QUANTITY | 0.97+ |
about two years | QUANTITY | 0.97+ |
about 15,000 students | QUANTITY | 0.97+ |
One | QUANTITY | 0.96+ |
Christo | PERSON | 0.96+ |
Namibian | LOCATION | 0.96+ |
90 percent | QUANTITY | 0.94+ |
2019 | DATE | 0.93+ |
first | QUANTITY | 0.91+ |
Hyper-V | TITLE | 0.91+ |
AHV | ORGANIZATION | 0.89+ |
last five years | DATE | 0.88+ |
five years | QUANTITY | 0.87+ |
Leap | ORGANIZATION | 0.86+ |
firstly | QUANTITY | 0.86+ |
about 80 | QUANTITY | 0.86+ |
Nutanix | LOCATION | 0.85+ |
theCUBE | ORGANIZATION | 0.82+ |
Namibian | OTHER | 0.79+ |
Urgent | ORGANIZATION | 0.79+ |
Bolt | ORGANIZATION | 0.77+ |
four | DATE | 0.76+ |
Namibia, Africa | LOCATION | 0.74+ |
theCube | ORGANIZATION | 0.74+ |
year and a half | DATE | 0.68+ |
Americans | PERSON | 0.62+ |
Expo | EVENT | 0.62+ |
twelve | DATE | 0.56+ |
Nutanix | TITLE | 0.52+ |
Europeans | PERSON | 0.49+ |
EU | EVENT | 0.46+ |
DevOps | TITLE | 0.46+ |