Image Title

Search Results for Zach Lights:

Gaidar Magdanurov, Acronis | Acronis Global Cyber Summit 2019


 

>>from Miami Beach, Florida It's the >>Q covering >>a Cronus Global Cyber Summit 2019. Brought to you by a Cronus. Welcome back to the cubes coverage here in Miami Beach of the Blue Hotel. I'm John Kerry. Hosting the Cube for Cronus is global Cyber. Summit 2019. We're here with the chief marketing officer CMO Guide. Our magnet. Nora. Welcome to the Cube. Thanks for having us. And thanks for coming on. Thank you for talking to me. Not a bad venue. Miami Beach People like it here. It's got a good vibe. >>Yes, a lot of entertainment, actually. For an event perspective, having people in such a nice place is very tough because you have to keep them inside somehow. And you cannot lock their doors. So we have to have really good content. >>People are feeling good. I can see a lot of people smiling people very happy. Congratulations. Take us through the event. Why the event here? What's the main theme? What's the top story that you're telling here at the global Cyber summit? 2019? Sure. So >>way were talking about cyber protection for quite a while. And cyber protection is simple. Terms is combining data protection of cyber security because what we see is happening in the digital world is that traditional data protection, not enough anymore cannot really protect you against all of the threats that you have out there and the number of messages growing. So cyber protection super important and we're developing and selling it for quite a while. But now it is time to keep off really a big push for cyber protection because we have the products that can enable our partners, resellers, service providers, enable and customers and enterprise I t. To deliver seven protection to their work clothes. What we do here at the Summit way, announcing three major things One is a furnace cyber infrastructure, which is a secure, hyper converged infrastructure for running cyber protection. That's external port on the edge workloads because when you run something in the data center, you have the perimeter security. You can protect you with moment. You get out of the data center, you need something really secure and easy to use and also cost efficient because the number of foreclosures growing outside of data center rapidly. So we have this cyber infrastructure way prevented here. Second piece is cyber platform. Cyber is the way for any third party to customize, integrate or extend cyber protection so they can take parts and pieces and integrated into their applications, for they can integrate an application support for customers so they can expand the portfolio of solutions. So that's another picnic. It's a huge thing. No, everybody can integrate cyber protection in any solution and support any type of work. And the third thing going on here is the product, according Cyber Protect, which is basically combination off back up, just a recovery. Cyber security. We have a non to virus. We have anti malware capabilities, but we also have vulnerability assessment, Hatch management, remote management. So it's a combination of multiple tools into one package. So that's really designed for a guy who is already tied off agent for teeth. They don't lots of obligations and doing different things. Tired of managing many things so way, offering them a tool that combines everything that they need to manage outside of the data center. >>You know, I've been really impressed with you guys and do my research for this. Two things jumped out at anyone recover cybersecurity, most from the enterprise space, but also from a data space. You guys have been around for a long time. Great growth, a lot of customers. Great channel relationship with Go to market, which has been successful for you guys in cyber. So cyber security has been your wheelhouse is company, but it's interesting. This theme of the enterprise is coming into focus. So to me, I think it's a huge opportunity. From a market standpoint on the enterprise, you're Tim has traditionally been cyber security. But story is interesting. Your since you're telling an i t story with cyber telling a data story in context to cyber these air coming together, these worlds are here. Talk about that dynamic in the market because that's a market you're targeting specifically. >>So, first of all, a little correction. We do cyber protection, and it's an important difference between several protection of several security, because what we do wait combined data protection so traditional backup disaster recovery file, sink and share all those tools with security. That's vision what is needed for the border protection. So Christ was a traditional data protection company for quite a while, and then we realized that there is this need for security integrated with data protection way started to implement that. So now we're introducing to the market a new type of solution that everybody now recognizes integrated solution between data protection and cyber security. So the market without solution is virtually anybody. But when you talk about the enterprise, the key workloads where you really need that is the edge. So everything outside of the data center edge and end points. And the thing here is that you have just a tiny fraction of all of the devices in your data center. Everything is outside and protecting it, managing it. It's really complicated. That's what we offer now. So you can start protecting those workloads and the edge, what it's like for clothes and >>talk about the product specifically because this platform enabling is interesting. You have a P eyes. You're opening up your developer network of S, V S and M S P's and your customer base. How is that platform going to help that EJ problem and simplify the protection has taken years. >>That helps in a different expects. So in one hand, way as a company would never be able to support all types of work clothes because there's so many different applications and people want to have application and wear protection. So any third party, any eyes via have the expertise with a particular application, they can develop their own workload support so they can support more loads that can support different type of stores. Destinations they can create. Different service is on top off the data so they can process the data. So, for example, they can deliver a malware scanner on top of the back of that will be integrated in the backup solution right so they can extend the platform in that sense. But also it's an opportunity for service providers because full service provided they trying thio differentiate. They all look for something that I will help them to tell the story that they different from the others because the major problem is that if you a service provider you have multiple customers for them, it's very easy to switch to another service providers. So the old for those differentiators and without blood when they can customize they can integrate it with a particular systems and they can focus on specific application. So let's say electronic medical records they can support that for their particular customers. And the customers are going to switch to another provider because they have this customization. And they have a lot of expertise that they can implement through the platform and create a custom my solution, that only them can develop and deliver. So that's That's another aspect of the platform. Only four eyes, these wonderful service providers. Then we talk about resellers and distributors. They can integrate the plot, thicken, integrated with their market places they can. Cell service is directly from the tools that they're building already or the solution marketplace ability. >>Talk about the difference between data protection and cyber protection, because those are kind of now coming together. As you're pointing out target persona for I t. Has been C i o or T buyer on, then you have a C so chief of security from large firms way, Who's buying? Who's using the product, is it? See I owe with staffers in the sea so and because it's like a data protection the old way, it's like, OK, storage, that's the I t. Fire down the list. Five. Storage, both on data protection. That's the old way. The new way is kind of bring it together. Who's that? Is a very good >>question. So I would think about the traditional data center, and we think about the rows of people who work with the data center, their storage guys, working guy, security guys. They may have different goals, different budget. They can be separate. Organization may not even be talking to each other. So selling a combination integrate solution to the data percent. It's complicated, and we've seen that stories many times. C'mon taken very. They try to sell security together. They failed just because it's very difficult to do that. But what we do is we go to the other type of person to the edge guy, the guy who's responsible for the whole infrastructure outside of a data center. Usually it's one team of one person, and they cover everything and they have a problem. They have multiple solution. They have to manage more solutions. You have people, you have to hire more training you have to make, and the reliability of this is just going down because you have to manage multiple tools. Update on different schedules and it's a disaster for a lot of companies. So we go to that guy with the department and tell them, Hey, here's a solution. Now we'll cover most of your knees >>and the number one problem you're solving. What? What's the problem? Statement. Take the high order bid on the promise the >>protection of the device So you protect data application and system that device. Talk >>aboutthe. Range the platform protection. Get the core platform protection infrastructure. Cloud backup. You've got core areas in the model, which one is the most popular in terms of where customers start to rethink their architecture when they start thinking platform versus tools? Because a lot of custom that we talk to and we pull in our community are all in the sea, so specifically are hard core way Don't want another tool way have a lot of tools in the tool shed, so to speak way want to get data horizontally scalable? We don't want to have an enabling platform software, but they have a machine learning and may I be very specific in service is that we use so trying to balance that architecture is what's on there. That's essentially what you guys are doing. So why that's important and why it's important for the customer. >>Exactly. And I I would take a step back here. So a lot of people want to think about protection of data, sleeping in traditional terms, data protection back up. I have a coffee somewhere. So in case something bad happens, I will be able to get back to that coffee. But now people started to understand it's not enough. First of all, they want to get value from the data, so data should be available. It should be fresh, and it should be authentic, So they want to make sure that they have the data they can trust. So the moment the shift from traditional having a coffee to having data that I can use and get Mellie from the data we start thinking about how they can make it work in a way that you always have data available. You don't wasting time, you know, losing anything. And you have a proof that you have that regional data thistles where we play. So we come to them and tell them that simple story. So in the past, you hit by run somewhere for you hit by malware. Attack somebody. A Texas system. You would say, OK, I'll go back to my backup, I'll find those files. I'll recover them. I would hope that they're not too old way offer them is the automatic recovery. They get everything back and they have everything. That was the most fresh data that they need. And we have guarantee that this is the original data they have because what's happening now in the cyber security market? And there were a lot of people Aquino they were talking about it and security experts. Is that the hackers Not on Lee, corrupting a day of stealing your data, the old so mortifying in a way, to influence your decisions. So they do like small, tiny modification, and you're sending your paychecks to somebody else. That's what they basically trying to do all the time. So you have to be able to trust the day of the job. So the moment you think about the chocks enough in the city of the Data, you think, OK, it's not just back up anymore. I need cyber protection. I need something that will actually help me to trust my data. >>You see in the examples everywhere you pointed out visual threats, you know the automation of cyber crime. You're seeing Ransomware. That's killer. And then just personal attacks. This is a really key area. I gotta ask you a question that came up on Twitter the other day. We were talking to folks. This comes up a lot with C. Sosa's well on. This is a quote from acute conversation I had with C. So said, Lookit my environment becoming more complex and costly going up. So that's one killer problem that he has in terms of what he's dealing with his environment. So complexity is going up. You mentioned the edge. It's a big one, right of other things out there wearables and then costs too many vendors, not enough sharing data. So again, this is a very complex and nuanced point. But how did you guys answer that question? So I see it costs. I want cost to go down. I want Plus, he's never gonna go down your abstract thataway. >>Yeah, even more. It's only complexity and cost is also security. More complexity that surfaces. Attack of attack is getting bigger, so you have to find a way to protect it. So answer is integrated type of protection. So what we do. We address five acres of protection and in the digital world, way we call him a Comsat passes safety. You have a copy, you can recover accessibility. You have a copy that you can access when you need it, where you need it. On privacy. You have control where your data is and who can access the data. That authenticity. You have a way to prove that. This is your reach, Dana. And then security. You have protection against external attacks. So we combine it all together into one solution. So you deploy one single agent that will provide backup just recovery. Crossing in. Sure. Hold the service that you need to work with your data Creative copy of the data to share your data, but also its integrated security. So we'll ensure that we passed your system. You have up to date Aly update installed. You have everything up to date. Everything's protected. Then we have an antivirus we have on tomorrow where we have the ability to manage the system. So everything is packed, packaged into one solution. So you don't have multiple agents that are incompatible. Multiple agencies have to update on different schedules multiple people who have to support different types of agents. Everything is combined. So that way we decrease the complexity and then increase the security because security is already integrated. And then the last final piece of the cost is the infrastructure solution that way. So what? We have a current seven infrastructure. It's either a softer applying to heart of our clients that is designed specifically for cyber protection were close, so it can't replace your standard H c I. But it gives you an ability to store data in the mosque obstetrician way. You get our appliance like in the hardware. You have a cheap stories for your secondary data for disaster. Recovery you can do that is to recover that appliance, or you can take our soccer appliance and deployed to commodity hardware. You don't have to buy a very expensive story track. You just deployed to the hard way that you have and use it on there. So that way we sold. It caused problems >>to get multiple options basically on that. Okay, so I gotta ask you the hard question that's going through everyone's mind is okay. I hear this story is too good to be true. Everyone must be. It must be a platform from wars are out there, sees this. They're pandering to customers. What makes you different? Prove that you're valuable to me. Show some evidence Where your differentiation How do you answer the differentiation? What makes you guys different? >>I would say the answer to that is innovation. So everybody has a platform. Everybody's building a glass from I. D. C was proclaiming its in Europe platforms probably three or four years ago. So everybody's talking about it, right? So way do they have the platform about the core differentiation is the innovation that we have Where the first company to use Blockchain for authenticity so we can record way hash coats Oh, files to change And then you can use it to get the verification that you have the original copy of the file in a time step where the 1st 1 to integrate the anti ransomware protection into the back so you don't really have to recover after my run somewhere you get all the files back, it will be the most recent files that you had. So you're getting it all back and it works there, So those innovation they already implemented off platform. So the moment you get a lot from you have all that you need. Old basics. You have user management quarter management so you can deploy and feel for you. Can you? Can? >>Was interesting is you have a holistic view on data, not just narrow view on day that Zach Lights and the I think the integrated is killer customer success. Anecdotal sound bites you can share. What are some of that? Some of feedback you hear from customers on this >>so feedback from customers. The best feedback is that we're hearing from our customers have issues, right? That's the best thing to d'oh. So when things go right with customers happy and you can go online and check out the mosque. Interesting case that >>we have with our scores partnerships because sports of becoming digital so >>everything's difficult depends on data. When you think Formula One isn't data, they lose data, they lose the race, so they have a tremendous amount of data and they have to transfer to a different location to transfer from the track to the headquarters. So we had implemented our cyber protection for a few teams in Formula One and you can just go online and check out that way. Ken Story, Williams Formula One. Great story. They actually tell people how they use it, how it helps them way. Have a bunch of those stories. >>You know, industrial I o. T. Is a huge area. I think you guys have a great opportunity there. People talk about digital threats and getting hacked as individuals. Equipment, machinery can get back to a device on your car. Certainly sports betting on it. Certainly someone's gonna want to manipulate it everything >>now, because we have our separate protects Operation center. We have engineers and security expert watching What's going on. We're collecting feedbacks from our customers and partners. We kill some crazy story all the time. Like what hikers now do. They would have into your email start fortifying your e mails and your documents that you had there because it's digital. There is no trace. You don't really know what was their original documents, so they eventually it will get you to transfer money to wrong account or do something with your assets. You will not going todo and it's just becoming more and more prominent because every digital. Now you don't even have a cocky or a document that's stating how much money you have in your bank. What if you wake up tomorrow instead of $1,000,000? You see $1000 you have no proof that you actually had something else, right? >>Cyber protections of data problem. You guys tackling with creative platform? Yes. Congratulations. Better. Thanks for coming on the Cube. Thanks for your insights. It's a cube jumper. You're watching us here at Miami Beach of the Crows Global Cyber Summit 2019. More coverage after this short break.

Published Date : Oct 14 2019

SUMMARY :

Brought to you by a Cronus. place is very tough because you have to keep them inside somehow. What's the top story that you're telling here at the global That's external port on the edge workloads because when you run something in the data You know, I've been really impressed with you guys and do my research for this. about the enterprise, the key workloads where you really need that is the edge. How is that platform going to help that EJ problem and simplify So the old for those differentiators or T buyer on, then you have a C so chief of security from large firms way, You have people, you have to hire more training you have and the number one problem you're solving. protection of the device So you protect data application and system that device. That's essentially what you guys are doing. So the moment you think about the chocks enough in the city of the Data, you think, OK, it's not just back up anymore. You see in the examples everywhere you pointed out visual threats, you know the automation of cyber crime. You have a copy that you can access when you need it, Okay, so I gotta ask you the hard question that's So the moment you get a lot from you have all that you need. Was interesting is you have a holistic view on data, not just narrow view on day that Zach Lights and the I think the That's the best thing to d'oh. a few teams in Formula One and you can just go online and check out that way. I think you guys have a great opportunity there. so they eventually it will get you to transfer money to wrong account or do something with your assets. Thanks for coming on the Cube.

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
DanaPERSON

0.99+

EuropeLOCATION

0.99+

John KerryPERSON

0.99+

Gaidar MagdanurovPERSON

0.99+

$1,000,000QUANTITY

0.99+

$1000QUANTITY

0.99+

NoraPERSON

0.99+

Ken StoryPERSON

0.99+

Miami BeachLOCATION

0.99+

tomorrowDATE

0.99+

Miami Beach, FloridaLOCATION

0.99+

TexasLOCATION

0.99+

Second pieceQUANTITY

0.99+

AcronisORGANIZATION

0.99+

one packageQUANTITY

0.99+

ChristORGANIZATION

0.99+

five acresQUANTITY

0.98+

threeDATE

0.98+

Zach LightsPERSON

0.98+

one solutionQUANTITY

0.98+

one teamQUANTITY

0.98+

OneQUANTITY

0.97+

bothQUANTITY

0.97+

C. SosaPERSON

0.97+

third thingQUANTITY

0.97+

Two thingsQUANTITY

0.97+

TimPERSON

0.97+

CronusORGANIZATION

0.96+

one personQUANTITY

0.96+

C. SoPERSON

0.96+

Acronis Global Cyber Summit 2019EVENT

0.95+

Formula OneORGANIZATION

0.95+

first companyQUANTITY

0.94+

Crows Global Cyber Summit 2019EVENT

0.94+

I o. T.LOCATION

0.94+

four years agoDATE

0.94+

AquinoPERSON

0.93+

Cyber ProtectORGANIZATION

0.93+

2019DATE

0.92+

FirstQUANTITY

0.92+

ComsatORGANIZATION

0.91+

oneQUANTITY

0.91+

TwitterORGANIZATION

0.91+

four eyesQUANTITY

0.88+

FiveQUANTITY

0.86+

one single agentQUANTITY

0.86+

I. D. CLOCATION

0.84+

Cronus Global Cyber Summit 2019EVENT

0.84+

Blue HotelORGANIZATION

0.82+

seven infrastructureQUANTITY

0.8+

1st 1QUANTITY

0.79+

CyberEVENT

0.72+

CMO GuideORGANIZATION

0.68+

seven protectionQUANTITY

0.68+

Cyber. Summit 2019EVENT

0.66+

three major thingsQUANTITY

0.64+

MORGANIZATION

0.58+

yearsQUANTITY

0.55+

LeePERSON

0.53+

firstQUANTITY

0.52+

Formula OneEVENT

0.5+

OneEVENT

0.5+

MelliePERSON

0.49+

Williams FormulaORGANIZATION

0.47+

PORGANIZATION

0.41+