Image Title

Search Results for both labs:

Richard Hartmann, Grafana Labs | KubeCon + CloudNativeCon NA 2022


 

>>Good afternoon everyone, and welcome back to the Cube. I am Savannah Peterson here, coming to you from Detroit, Michigan. We're at Cuban Day three. Such a series of exciting interviews. We've done over 30, but this conversation is gonna be extra special, don't you think, John? >>Yeah, this is gonna be a good one. Griffon Labs is here with us. We're getting the conversation of what's going on in the industry management, watching the Kubernetes clusters. This is large scale conversations this week. It's gonna be a good one. >>Yeah. Yeah. I'm very excited. He's also got a fantastic Twitter handle, twitchy. H Please welcome Richie Hartman, who is the director of community here at Griffon. Richie, thank you so much for joining us. Thanks >>For having me. >>How's the show been for you? >>Busy. I, I mean, I, I, >>In >>A word, I have a ton of talks at at like maintain a thing and like the covering board searches at the TLC panel. I run forme day. So it's, it's been busy. It, yeah. Monday, I didn't have to run anything. That was quite nice. But there >>You, you have your hands in a lot. I'm not even gonna cover it. Looking at your bio, there's, there's so many different things that you're working on. I know that Grafana specifically had some announcements this week. Yeah, >>Yeah, yeah. We had quite a few, like the, the two largest ones is a, we now have a field Kubernetes integration on Grafana Cloud. So our, our approach is generally extremely open source first. So we try to push stuff into the exporters, like into the open source exporters, into mixes into things which are out there as open source for anyone to use. But that's little bit like a tool set, not a ready made solution. So when we talk integrations, we actually talk about things where you get this like one click experience, You log into your Grafana cloud, you click, I have a Kubernetes, which probably most of us have, and things just work like you in just the data. You have to write dashboards, you have to write alerts, you have to write everything to just get started with extremely opinionated dashboards, SLOs, alerts, again, all those things made by experts, so anyone can use them. And you don't have to reinvent the view for every single user. So that's the one. The other is, >>It's a big deal. >>Oh yeah, it is. Yeah. It is. It, we, we has, its heavily in integrations course. While, I mean, I don't have to convince anyone that perme is a DD factor standard in everything. Cloudnative. But again, it's, it's, it's sometimes a little bit hard to handle or a little bit not easy to get into. So, so smoothing this, this, this path onto onboarding yourself onto this stack and onto those types of solutions. Yes. Is what a lot of people need. Course, if you, if you look at the statistics from coupon, and we just heard this in the governing board session yesterday. Yeah. Like 60% of the people here are first time attendees. So there's a lot of people who just come into this thing and who need, like, this is your path. This is where you should be going. Or at least if you want to go, go there. This is how to get there. >>Here's your runway for takeoff. Yes. Yeah. I think that's a really good point. And I love that you, you had those numbers. I was curious. I, I had seen on Twitter, speaking of Twitter, I had seen, I had seen that, that there were a lot of people here coming for the first time. You're a community guy. Are we at an inflection point where this community is about to continue to scale? >>That's a very good question. Which I can't really answer. So I mean, >>Obviously I bet you're gonna try. >>I covid changed a few things. Yeah. Probably most people, >>A couple things. I mean, you know, casually, it's like such a gentle way of putting that, that was >>Beautiful. I'm gonna say yes, just to explode. All these new ERs are gonna learn Prometheus. They're gonna roll in with a open, open metrics, open telemetry. I love it, >>You know, But, but at the same time, like Cuban is, is ramping back up. But if you look at the, if you look at the registration numbers between Valencia Andro, it was more or less the same. Interesting. Which, so it didn't go onto this, onto this flu trajectory, which it was on like, up to, up to 2019. I expect this to take up again. But also with the economic situation, everything, I, I don't think >>It's, I think the jury's still out on hybrid. I think there's a lot, lot more hybrid. Let's see how the projects are gonna go. That's what I think it's gonna be the tell sign. How many people are in participating? How are the project's advancing? Some of the momentum, >>I mean, from the project level, Most of this is online anyway. Of course. That's how open source, right. I've been working for >>Ages. That's >>Cause you don't have any trouble budget or, or any office or, It's >>Always been that way. >>Yeah, precisely. So the projects are arguably spearheading this, this development and the, the online numbers. I I, I have some numbers in my head, but I'm, I'm not a hundred percent certain to, but they're higher for this time in Detroit than in volunteer as far somewhere. Cool. So that is growing and it's grown in parallel, which also is great. Cause it's much more accessible, much more inclusive. You don't have to have a budget of at least, let's say, I don't know, two to five k to, to fly over the pond and, and attend this thing. You can just do it from your home. So that is, that's a lot more inclusive. And I expect this to, to basically be a second more or less orthogonal growth, growth path. But the best thing about coupon is the hallway track. I'm just meeting people, talking to people and that kind of thing is not really possible with, >>It's, it's great to see people >>In person. No, and it makes such a difference. I mean, yeah. Even and interviewing people in person too. I mean, it does a, it's, it's, and, and this, this whole, I mean cncf, this whole community, every company here is community first. It's how these projects come to be. I think it's awesome. I feel like you got something you're saying to say, Johnny. >>Yeah. And I love some of the advancements. Rich Richie, we talked last time about, you know, open telemetry, open metrics. You're involved in dashboards. Yeah. One of the themes here is ease of use, simplicity, developer productivity. Where do you see the ease of use going from a project standpoint? For me, as you mentions everywhere, it's pretty much, it is, it's almost all corners of the world. Yep. And new people coming in. How, how are you making it easier? What's going on? Give us the update on that. >>So we also, funnily enough at precisely this topic in the TC panel just a few hours ago, about ease of use and about how to, how to make things easier to, to handle how developers currently, like if they just want to get into the cloud native seen, they have like, like we, we did some neck and math, like maybe 10 tools at least, which you have to be somewhat proficient in to just get started, which is honestly horrendous. Yeah. Course. Like with a server, I just had my survey install my thing and it runs, maybe I need a database, but that's roughly it. And this needs to change again. Like it's, it's nice that everything is, is un unraveled. And you have, you, you, you, you don't have those service boundaries which you had before. You can do all the horizontal scaling, you can do all the automatic scaling, all those things that they're super nice. But at the same time, this complexity, which used to be nicely compartmentalized, was deliberately broken up. And so it's becoming a lot harder to, to, like, we, we need to find new ways to compartmentalize this complexity back to, to human understandable levels again, in particular, as we keep onboarding new and new and new, new people, of course it's just not good use of anyone's time to, to just like learn the basics again and again and again. This is something which should be just compartmentalized and automated away. We're >>The three, We were talking to Matt Klein earlier and he was talking about as projects become mature and all over the place and have reach and and usage, you gotta work on the boring stuff. Yes. And when it's boring, that means you have success. Yes. But then you gotta work on the plumbing. What are some of the things that you guys are working on? Because people are relying on the product. >>Oh yeah. So for with my premises head on, the highlight feature is exponential or native or spars. Histograms. There's like three different names for one single concept. If you know Prometheus, you ha you currently have hard bucket boundaries where I say my latency is lower equal two seconds, one second, a hundred milliseconds, what have you. And I can put stuff into those histogram buckets accordingly to those predefined levels, which is extremely efficient, but like on the, on the code level. But it's not very nice for the humans course you need to understand your system before you're able to, to, to choose good cutoff points. And if you, if you, if you add new ones, that's completely fine. But if you want to actually change them, course you, you figured out that you made a fundamental mistake, you're going to have a break in the continue continuity of your observability data. And you cannot undo this in, into the past. So this is just gone native histograms. On the other hand, allow me to, to, okay, I'm not going to get get into the math, but basically you define a single formula, which there comes a good default. If you have good reasons, then you can change it. But if you don't, just don't talk, >>The people are in the math, Hit him up on Twitter. Twitter, h you'll get you that math. >>So the, >>The thing is people want the math, believe me. >>Oh >>Yeah. I mean we don't have time, but hit him up. Yeah. >>There's ProCon in two weeks in Munich and there will be whole talk about like the, the dirty details of all of the stuff. But the, the high level answer is it just does what people would expect it to do. And with very little overhead, you become, you get highly, highly or high resolution histograms, which is really important for a lot of use cases. But this is not just Prometheus with my open metrics head on the 2.0 feature, like the breaking highlight feature of Open Metrics 2.0 will be you guested precisely the same with my open telemetry head on. Low and behold the same underlying technology is being put or has been put into open telemetry. And we've worked for month and month and month and even longer between all different projects to, to assert that we have one single standard which is actually compatible with each other course. One of the worst things which you can have in the cloud ecosystem is if you have soly different things and they break in subtly wrong ways, like it's much better to just not work than to break in a way, which is just a little bit wrong. Of course you won't figure this out until it's too late. So we spent, like with all three hats, we spent insane amounts of time on making this happen and, and making this nice. >>Savannah, one of the things we have so much going on at Cube Con. I mean just you're unpacking like probably another day of cube. We can't go four days, but open time. >>I know, I know. I'm the same >>Open telemetry >>Challenge acceptance open. >>Sorry, we're gonna stay here. All the, They >>Shut the lights off on us last night. >>They literally gonna pull the plug on us. Yeah, yeah, yeah, yeah. They've done that before. It's not the first time we go until they kick us out. We love, love doing this. But Open telemetry is got a lot of news too. So that's, We haven't really talked much about that. >>We haven't at >>All. So there's a lot of stuff going on that, I won't call it boring. That's like code word's. That's cube talk for, for it's working. Yeah. So it's not bad, but there's a lot of stuff going on. Like open telemetry, open metrics, This is the stuff that matters cuz when you go in large scale, that's key. It's just what, missing all the, all the stuff. >>No, >>What are we missing? What are people missing? What's going on in the show that you think that's not actually being reported on? I mean it's a lot of high web assembly for instance got a lot >>Of high. Oh yeah, I was gonna say, I'm glad you're asking this because you, you've already mentioned about seven different hats that you wear. I can only imagine how many hats are actually in your hat cabinet. But you, you are someone with your, with your fingers in a lot of different things. So you can kind of give us a state of the union. Yeah. So go ahead. Let's talk about >>It. So I think you already hit a few good points. Ease of use is definitely one of them. And, and improving the developer experience and not having this like a value of pain. Yeah. That is one of the really big ones. It's going to be interesting cause it is boring. It is janitorial and it needs a different type of persona. A lot of, or maybe not most, but a large fraction of developers like the shiny stuff. And we could see this in Prometheus where like initially the people who contributed this the most where like those restless people who need to fix that one thing, this is impossible, are going to do it. Which changed over the years where the people who now contribute the most are off the janitorial. Like keep things boring, keep things running, still have substantial changes. But but not like more on the maintenance level. >>Yeah. The maintainers. I was just gonna bring that >>Up. Yeah. On the, on the keep things boring while still pushing 'em forward. Yeah. And the thing about ease of use is a lot of this is boring. A lot of this is strategy. A lot of this is toil. A lot of this takes lots of research also in areas where developers are not really good at, like UX for example, and ui like most software developers are really bad at those cause they just think differently from normal humans, I guess. >>So that's an interesting observation that you just made. I we could unpack that on a whole nother show as well. >>So the, the thing is this is going to be interesting for the open source scene course. This needs deliberate investment by companies who assign people to those projects and say, okay, fix that one thing or make it easier to use what have you. That is a lot easier with, with first party products and projects from companies cuz they can invest directly into the thing and they see much more of a value prop. It's, it's kind of normal by now to, to allow developers or even assigned developers onto open source projects. That's not so much the case for the tpms, for the architects, for the UX and your I people like for the documentation people that there's not as much awareness of that this is also driving value for everyone. Yes. And also there's not much as much. >>Yeah, that's a great point. This whole workflow production system of open source, which has grown and keeps growing and we'll keep growing. These be funded. And one of the things we were talking earlier in another session about is about the recession potentially we're hitting and the global issues, macroeconomics that might force some of these projects or companies not to get VC >>Funding. It's such a theme at the show. So, >>So to me, I said it's just not about VC funding. There's other funding mechanisms that's community oriented. There's companies participating, there's other meccas. Richie, if you could have your wishlist of how things could progress an open source, what would you want to see happen in terms of how it's, how things are funded, how things are executed. Cuz developers are going to run businesses. Cuz ultimately if you follow digital transformation to completion, it and developers aren't a department serving the business. They are the business. And that's coming fast. You know, what has to happen in your opinion, if you had the wish magic wand, what would you, what would you snap your fingers to make happen? >>If I had a magic wand that's very different from, from what is achievable. But let, let's >>Go with, Okay, go with the magic wand first. Cause we'll, we'll, we'll we'll riff on that. So >>I'm here for dreams. Yeah, yeah, >>Yeah. I mean I, I've been in open source for more than two, two decades, but now, and most of the open source is being driven forward by people who are not being paid for those. So for example, Gana is the first time I'm actually paid by a company to do my com community work. It's always been on the side. Of course I believe in it and I like doing it. I'm also not bad at it. And so I just kept doing it. But it was like at night on the weekends and everything. And to be honest, it's still at night and in the weekends, but the majority of it is during paid company time, which is awesome. Yeah. Most of the people who have driven this space forward are not in this position. They're doing it at night, they're doing it on the weekends. They're doing it out of dedication to a cause. Yeah. >>The commitment is insane. >>Yeah. At the same time you have companies mostly hyperscalers and either they have really big cloud offerings or they have really big advertisement business or both. And they're extracting a huge amount of value, which has been created in large part elsewhere. Like yes, they employ a ton of developers, but a lot of the technologies they built on and the shoulders of the giants they stand upon it are really poorly paid. And there are some efforts to like, I think the core foundation like which redistribute a little bit of money and such. But if I had my magic wand, everyone who is an open source and actually drives things forwards, get, I don't know, 20% of the value which they create just magically somehow. Yeah. >>Or, or other companies don't extract as much value and, and redistribute more like put more full-time engineers onto projects or whichever, like that would be the ideal state where the people who actually make the thing out of dedication are not more or less left on the sideline. Of course they're too dedicated to just say, Okay, I'm, I'm not doing this anymore. You figure this stuff out and let things tremble and falter. So I mean, it's like with nurses and such who, who just like, they, they know they have something which is important and they keep doing it. Of course they believe in it. >>I think this, I think this is an opportunity to start messaging this narrative because yeah, absolutely. Now we're at an inflection point where there's a big community, there is a shared responsibility in my opinion, to not spread the wealth, but make sure that it's equally balanced and, and the, and I think there's a way to do that. I don't know how yet, but I see that more than ever, it's not just come in, raid the kingdom, steal all the jewels, monetize it, and throw some token token money around. >>Well, in the burnout. Yeah, I mean I, the other thing that I'm thinking about too is it's, you know, it's, it's the, it's the financial aspect of this. It's the cognitive load. And I'm curious actually, when I ask you this question, how do you avoid burnout? You do a million different things and we're, you know, I'm sure the open source community that passion the >>Coach. Yeah. So it's just write code, >>It's, oh, my, my, my software engineering days are firmly over. I'm, I'm, I'm like, I'm the cat herer and the janitor and like this type of thing. I, I don't really write code anymore. >>It's how do you avoid burnout? >>So a i I didn't curse ahead burnout a few years ago. I was not nice, but that was still when I had like a full day job and that day job was super intense and on top I did all the things. Part of being honest, a lot of the people who do this are really dedicated and are really bad at setting boundaries between work >>And process. That's why I bring it up. Yeah. Literally why I bring it up. Yeah. >>I I I'm firmly in that area and I'm, I'm, I don't claim I have this fully figured out yet. It's also even more risky to some extent per like, it's, it's good if you're paid for this and you can do it during your work time. But on the other hand, if it's so nice and like if your hobby and your job are almost completely intersectional, it >>Becomes really, the lines are blurry. >>Yeah. And then yeah, like have work from home. You, you don't even commute anything or anymore. You just sit down at your computer and you just have fun doing your stuff and all of a sudden it's deep at night and you're still like, I want to keep going. >>Sounds like God, something cute. I >>Know. I was gonna say, I was like, passion is something we all have in common here on this. >>That's the key. That is the key point There is a, the, the passion project becomes the job. But now the contribution is interesting because now yeah, this ecosystem is, is has a commercial aspect. Again, this is the, this is the balance between commercialization and keeping that organic production system that's called open source. I mean, it's so fascinating and this is amazing. I want to continue that conversation. It's >>Awesome. Yeah. Yeah. This is, this is great. Richard, this entire conversation has been excellent. Thank you so much for joining us. How can people find you? I mean, I give em your Twitter handle, but if they wanna find out more about Grafana Prometheus and the 1700 things you do >>For grafana grafana.com, for Prometheus, promeus.io for my own stuff, GitHub slash richie age slash talks. Of course I track all my talks in there and like, I don't, I currently don't have a personal website cause I stop bothering, but my, like that repository is, is very, you find what I do over, like for example, the recording link will be uploaded to this GitHub. >>Yeah. Great. Follow. You also run a lot of events and a lot of community activity. Congratulations for you. Also, I talked about this last time, the largest IRC network on earth. You ran, built a data center from scratch. What happened? You done >>That? >>Haven't done a, he even built a cloud hyperscale compete with Amazon. That's the next one. Why don't you put that on the >>Plate? We'll be sure to feature whatever Richie does next year on the cube. >>I'm game. Yeah. >>Fantastic. On that note, Richie, again, thank you so much for being here, John, always a pleasure. Thank you. And thank you for tuning in to us here live from Detroit, Michigan on the cube. My name is Savannah Peterson and here's to hoping that you find balance in your life this weekend.

Published Date : Oct 28 2022

SUMMARY :

We've done over 30, but this conversation is gonna be extra special, don't you think, We're getting the conversation of what's going on in the industry management, Richie, thank you so much for joining us. I mean, I, I, I run forme day. You, you have your hands in a lot. You have to write dashboards, you have to write alerts, you have to write everything to just get started with Like 60% of the people here are first time attendees. And I love that you, you had those numbers. So I mean, I covid changed a few things. I mean, you know, casually, it's like such a gentle way of putting that, I love it, I expect this to take up again. Some of the momentum, I mean, from the project level, Most of this is online anyway. So the projects are arguably spearheading this, I feel like you got something you're saying to say, Johnny. it's almost all corners of the world. You can do all the horizontal scaling, you can do all the automatic scaling, all those things that they're super nice. What are some of the things that you But it's not very nice for the humans course you need The people are in the math, Hit him up on Twitter. Yeah. One of the worst things which you can have in the cloud ecosystem is if you have soly different things and Savannah, one of the things we have so much going on at Cube Con. I'm the same All the, They It's not the first time we go until they Like open telemetry, open metrics, This is the stuff that matters cuz when you go in large scale, So you can kind of give us a state of the union. And, and improving the developer experience and not having this like a I was just gonna bring that the thing about ease of use is a lot of this is boring. So that's an interesting observation that you just made. So the, the thing is this is going to be interesting for the open source scene course. And one of the things we were talking earlier in So, Richie, if you could have your wishlist of how things could But let, let's So Yeah, yeah, Gana is the first time I'm actually paid by a company to do my com community work. shoulders of the giants they stand upon it are really poorly paid. are not more or less left on the sideline. I think this, I think this is an opportunity to start messaging this narrative because yeah, Yeah, I mean I, the other thing that I'm thinking about too is it's, you know, I'm, I'm like, I'm the cat herer and the janitor and like this type of thing. a lot of the people who do this are really dedicated and are really Yeah. I I I'm firmly in that area and I'm, I'm, I don't claim I have this fully You, you don't even commute anything or anymore. I That is the key point There is a, the, the passion project becomes the job. things you do like that repository is, is very, you find what I do over, like for example, the recording link will be uploaded Also, I talked about this last time, the largest IRC network on earth. That's the next one. We'll be sure to feature whatever Richie does next year on the cube. Yeah. My name is Savannah Peterson and here's to hoping that you find balance in your life this weekend.

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
Richie HartmanPERSON

0.99+

RichiePERSON

0.99+

Matt KleinPERSON

0.99+

Savannah PetersonPERSON

0.99+

Richard HartmannPERSON

0.99+

RichardPERSON

0.99+

AmazonORGANIZATION

0.99+

JohnPERSON

0.99+

Grafana LabsORGANIZATION

0.99+

PrometheusTITLE

0.99+

Rich RichiePERSON

0.99+

60%QUANTITY

0.99+

Griffon LabsORGANIZATION

0.99+

two secondsQUANTITY

0.99+

one secondQUANTITY

0.99+

MunichLOCATION

0.99+

20%QUANTITY

0.99+

10 toolsQUANTITY

0.99+

DetroitLOCATION

0.99+

MondayDATE

0.99+

Detroit, MichiganLOCATION

0.99+

GrafanaORGANIZATION

0.99+

yesterdayDATE

0.99+

Grafana PrometheusTITLE

0.99+

threeQUANTITY

0.99+

five kQUANTITY

0.99+

first timeQUANTITY

0.99+

twoQUANTITY

0.98+

next yearDATE

0.98+

bothQUANTITY

0.98+

oneQUANTITY

0.98+

this weekDATE

0.98+

two decadesQUANTITY

0.98+

one single conceptQUANTITY

0.98+

GitHubORGANIZATION

0.98+

2019DATE

0.98+

Grafana cloudTITLE

0.98+

OneQUANTITY

0.97+

last nightDATE

0.97+

SavannahPERSON

0.97+

TwitterORGANIZATION

0.96+

earthLOCATION

0.96+

four daysQUANTITY

0.96+

over 30QUANTITY

0.95+

JohnnyPERSON

0.95+

one clickQUANTITY

0.95+

Grafana CloudTITLE

0.95+

CloudNativeConEVENT

0.94+

few hours agoDATE

0.93+

2.0OTHER

0.93+

GriffonORGANIZATION

0.93+

hundred percentQUANTITY

0.92+

two weeksQUANTITY

0.92+

one thingQUANTITY

0.91+

grafana grafana.comOTHER

0.9+

more than twoQUANTITY

0.89+

three different namesQUANTITY

0.88+

two largestQUANTITY

0.88+

promeus.ioOTHER

0.86+

a hundred millisecondsQUANTITY

0.86+

few years agoDATE

0.86+

single formulaQUANTITY

0.85+

firstQUANTITY

0.83+

Con.EVENT

0.83+

IRCORGANIZATION

0.82+

KubernetesTITLE

0.81+

seven different hatsQUANTITY

0.8+

one single standardQUANTITY

0.79+

Valencia AndroORGANIZATION

0.79+

NA 2022EVENT

0.77+

Open Metrics 2.0OTHER

0.74+

KubeCon +EVENT

0.7+

Lisa-Marie Namphy, Cockroach Labs & Jake Moshenko, Authzed | KubeCon + CloudNativeCon NA 2022


 

>>Good evening, brilliant humans. My name is Savannah Peterson and very delighted to be streaming to you. Live from the Cube Studios here in Motor City, Michigan. I've got John Furrier on my left. John, this is our last interview of the day. Energy just seems to keep oozing. How >>You doing? Take two, Three days of coverage, the queue love segments. This one's great cuz we have a practitioner who's implementing all the hard core talks to be awesome. Can't wait to get into it. >>Yeah, I'm very excited for this one. If it's not very clear, we are a community focused community is a huge theme here at the show at Cape Con. And our next guests are actually a provider and a customer. Turning it over to you. Lisa and Jake, welcome to the show. >>Thank you so much for having us. >>It's great to be here. It is our pleasure. Lisa, you're with Cockroach. Just in case the audience isn't familiar, give us a quick little sound bite. >>We're a distributed sequel database. Highly scalable, reliable. The database you can't kill, right? We will survive the apocalypse. So very resilient. Our customers, mostly retail, FinTech game meet online gambling. They, they, they need that resiliency, they need that scalability. So the indestructible database is the elevator pitch >>And the success has been very well documented. Valuation obviously is a scorp guard, but huge customers. We were at the Escape 19. Just for the record, the first ever multi-cloud conference hasn't come back baby. Love it. It'll come back soon. >>Yeah, well we did a similar version of it just a month ago and I was, that was before Cockroach. I was a different company there talking a lot about multi-cloud. So, but I'm, I've been a car a couple of years now and I run community, I run developer relations. I'm still also a CNCF ambassador, so I lead community as well. I still run a really large user group in the San Francisco Bay area. So we've just >>Been in >>Community, take through the use case. Jake's story set us up. >>Well I would like Jake to take him through the use case and Cockroach is a part of it, but what they've built is amazing. And also Jake's history is amazing. So you can start Jake, >>Wherever you take >>Your Yeah, sure. I'm Jake, I'm CEO and co-founder of Offset. Oted is the commercial entity behind Spice Dvy and Spice Dvy is a permission service. Cool. So a permission service is something that lets developers and let's platform teams really unlock the full potential of their applications. So a lot of people get stuck on My R back isn't flexible enough. How do I do these fine grain things? How do I do these complex sharing workflows that my product manager thinks is so important? And so our service enables those platform teams and developers to do those kinds of things. >>What's your, what's your infrastructure? What's your setup look like? What, how are you guys looking like on the back end? >>Sure. Yeah. So we're obviously built on top of Kubernetes as well. One of the reasons that we're here. So we use Kubernetes, we use Kubernetes operators to orchestrate everything. And then we use, use Cockroach TV as our production data store, our production backend data store. >>So I'm curious, cause I love when these little matchmakers come together. You said you've now been presenting on a little bit of a road show, which is very exciting. Lisa, how are you and the team surfacing stories like Jakes, >>Well, I mean any, any place we can obviously all the social medias, all the blogs, How >>Are you finding it though? >>How, how did you Oh, like from our customers? Yeah, we have an open source version so people start to use us a long time before we even sometimes know about them. And then they'll come to us and they'll be like, I love Cockroach, and like, tell me about it. Like, tell me what you build and if it's interesting, you know, we'll we'll try to give it some light. And it's always interesting to me what people do with it because it's an interesting technology. I like what they've done with it. I mean the, the fact that it's globally distributed, right? That was like a really important thing to you. Totally. >>Yeah. We're also long term fans of Cockroach, so we actually all work together out of Workbench, which was a co-working space and investor in New York City. So yeah, we go way back. We knew the founders. I, I'm constantly saying like if I could have invested early in cockroach, that would've been the easiest check I could have ever signed. >>Yeah, that's awesome. And then we've been following that too and you guys are now using them, but folks that are out there looking to have the, the same challenges, what are the big challenges on selecting the database? I mean, as you know, the history of Cockroach and you're originating the story, folks out there might not know and they're also gonna choose a database. What's the, what's the big challenge that they can solve that that kind of comes together? What, what would you describe that? >>Sure. So we're, as I said, we're a permission service and per the data that you store in a permission service is incredibly sensitive. You need it to be around, right? You need it to be available. If the permission service goes down, almost everything else goes down because it's all calling into the permission service. Is this user allowed to do this? Are they allowed to do that? And if we can't answer those questions, then our customer is down, right? So when we're looking at a database, we're looking for reliability, we're looking for durability, disaster recovery, and then permission services are one of the only services that you usually don't shard geographically. So if you look at like AWS's iam, that's a global service, even though the individual things that they run are actually sharded by region. So we also needed a globally distributed database with all of those other properties. So that's what led us >>To, this is a huge topic. So man, we've been talking about all week the cloud is essentially distributed database at this point and it's distributed system. So distributed database is a hot topic, totally not really well reported. A lot of people talking about it, but how would you describe this distributed trend that's going on? What are the key reasons that they're driving it? What's making this more important than ever in your mind, in your opinion? >>I mean, for our use case, it was just a hard requirement, right? We had to be able to have this global service. But I think just for general use cases, a distributed database, distributed database has that like shared nothing architecture that allows you to kind of keep it running and horizontally scale it. And as your requirements and as your applications needs change, you can just keep adding on capacity and keep adding on reliability and availability. >>I'd love to get both of your opinion. You've been talking about the, the, the, the phases of customers, the advanced got Kubernetes going crazy distributed, super alpha geek. Then you got the, the people who are building now, then you got the lagers who are coming online. Where do you guys see the market now in terms of, I know the Alphas are all building all the great stuff and you guys had great success with all the top logos and they're all doing hardcore stuff. As the mainstream enterprise comes in, where's their psychology, what's on their mind? What's, you share any insight into your perspective on that? Because we're seeing a lot more of it folks becoming like real cloud players. >>Yeah, I feel like in mainstream enterprise hasn't been lagging as much as people think. You know, certainly there's been pockets in big enterprises that have been looking at this and as distributed sequel, it gives you that scalability that it's absolutely essential for big enterprises. But also it gives you the, the multi-region, you know, the, you have to be globally distributed. And for us, for enterprises, you know, you need your data near where the users are. I know this is hugely important to you as well. So you have to be able to have a multi-region functionality and that's one thing that distributed SQL lets you build and that what we built into our product. And I know that's one of the things you like too. >>Yeah, well we're a brand new product. I mean we only founded the company two years ago, but we're actually getting inbound interest from big enterprises because we solve the kinds of challenges that they have and whether, I mean, most of them already do have a cockroach footprint, but whether they did or didn't, once they need to bring in our product, they're going to be adopting cockroach transitively anyway. >>So, So you're built on top of Cockroach, right? And Spice dv, is that open source or? >>It >>Is, yep. Okay. And explain the role of open source and your business model. Can you take a minute to talk about the relevance of that? >>Yeah, open source is key. My background is, before this I was at Red Hat. Before that we were at CoreOS, so CoreOS acquisition and before that, >>One of the best acquisitions that ever happened for the value. That was a great, great team. Yeah, >>We, we, we had fun and before that we built Qua. So my co-founders and I, we built Quay, which is a, a first private docker registry. So CoreOS and, and all of those things are all open source or deeply open source. So it's just in our dna. We also see it as part of our go-to market motion. So if you are a database, a lot of people won't even consider what you're doing without being open source. Cuz they say, I don't want to take a, I don't want to, I don't want to end up in an Oracle situation >>Again. Yeah, Oracle meaning they go, you get you locked in, get you in a headlock, Increase prices. >>Yeah. Oh yeah, >>Can, can >>I got triggered. >>You need to talk about your PTSD there >>Or what. >>I mean we have 20,000 stars on GitHub because we've been open and transparent from the beginning. >>Yeah. And it >>Well, and both of your projects were started based on Google Papers, >>Right? >>That is true. Yep. And that's actually, so we're based off of the Google Zans of our paper. And as you know, Cockroach is based off of the Google Span paper and in the the Zanzibar paper, they have this globally distributed database that they're built on top of. And so when I said we're gonna go and we're gonna make a company around the Zabar paper, people would go, Well, what are you gonna do for Span? And I was like, Easy cockroach, they've got us covered. >>Yeah, I know the guys and my friends. Yeah. So the question is why didn't you get into the first round of Cockroach? She said don't answer that. >>The question he did answer though was one of those age old arguments in our community about pronunciation. We used to argue about Quay, I always called it Key of course. And the co-founder obviously knows how it's pronounced, you know, it's the et cd argument, it's the co cuddl versus the control versus coo, CTL Quay from the co-founder. That is end of argument. You heard it here first >>And we're keeping it going with Osted. So awesome. A lot of people will say Zeed or, you know, so we, we just like to have a little ambiguity >>In the, you gotta have some semantic arguments, arm wrestling here. I mean, it keeps, it keeps everyone entertained, especially on the over the weekend. What's, what's next? You got obviously Kubernetes in there. Can you explain the relationship between Kubernetes, how you're handling Spice dv? What, what does the Kubernetes piece fit in and where, where is that going to be going? >>Yeah, great question. Our flagship product right now is a dedicated, and in a dedicated, what we're doing is we're spinning up a single tenant Kubernetes cluster. We're installing all of our operator suite, and then we're installing the application and running it in a single tenant fashion for our customers in the same region, in the same data center where they're running their applications to minimize latency. Because of this, as an authorization service, latency gets passed on directly to the end user. So everybody's trying to squeeze the latency down as far as they can. And our strategy is to just run these single tenant stacks for people with the minimal latency that we can and give them a VPC dedicated link very similar to what Cockroach does in their dedicated >>Product. And the distributed architecture makes that possible because it's lighter way, it's not as heavy. Is that one of the reasons? >>Yep. And Kubernetes really gives us sort of like a, a level playing field where we can say, we're going going to take the provider, the cloud providers Kubernetes offering, normalize it, lay down our operators, and then use that as the base for delivering >>Our application. You know, Jake, you made me think of something I wanted to bring up with other guests, but now since you're here, you're an expert, I wanna bring that up, but talk about Super Cloud. We, we coined that term, but it's kind of multi-cloud, is that having workloads on multiple clouds is hard. I mean there are, they are, there are workloads on, on clouds, but the complexity of one clouds, let's take aws, they got availability zones, they got regions, you got now data issues in each one being global, not that easy on one cloud, nevermind all clouds. Can you share your thoughts on how you see that progression? Because when you start getting, as its distributed database, a lot of good things might come up that could fit into solving the complexity of global workloads. Could you share your thoughts on or scoping that problem space of, of geography? Yeah, because you mentioned latency, like that's huge. What are some of the other challenges that other people have with mobile? >>Yeah, absolutely. When you have a service like ours where the data is small, but very critical, you can get a vendor like Cockroach to step in and to fill that gap and to give you that globally distributed database that you can call into and retrieve the data. I think the trickier issues come up when you have larger data, you have huge binary blobs. So back when we were doing Quay, we wanted to be a global service as well, but we had, you know, terabytes, petabytes of data that we were like, how do we get this replicated everywhere and not go broke? Yeah. So I think those are kind of the interesting issues moving forward is what do you do with like those huge data lakes, the huge amount of data, but for the, the smaller bits, like the things that we can keep in a relational database. Yeah, we're, we're happy that that's quickly becoming a solved >>Problem. And by the way, that that data problem also is compounded when the architecture goes to the edge. >>Totally. >>I mean this is a big issue. >>Exactly. Yeah. Edge is something that we're thinking a lot about too. Yeah, we're lucky that right now the applications that are consuming us are in a data center already. But as they start to move to the edge, we're going to have to move to the edge with them. And it's a story that we're gonna have to figure out. >>All right, so you're a customer cockroach, what's the testimonial if I put you on the spot, say, hey, what's it like working with these guys? You know, what, what's the, what's the, you know, the founders, so you know, you give a good description, little biased, but we'll, we'll we'll hold you on it. >>Yeah. Working with Cockroach has been great. We've had a couple things that we've run into along the way and we've gotten great support from our account managers. They've brought in the right technical expertise when we need it. Cuz what we're doing with Cockroach is not you, you couldn't do it on Postgres, right? So it's not just a simple rip and replace for us, we're using all of the features of Cockroach, right? We're doing as of system time queries, we're doing global replication. We're, you know, we're, we're consuming it all. And so we do need help from them sometimes and they've been great. Yeah. >>And that's natural as they grow their service. I mean the world's changing. >>Well I think one of the important points that you mentioned with multi-cloud, we want you to have the choice. You know, you can run it in in clouds, you can run it hybrid, you can run it OnPrem, you can do whatever you want and it's just, it's one application that you can run in these different data centers. And so really it's up to you how do you want to build your infrastructure? >>And one of the things we've been talking about, the super cloud concept that we've been issue getting a lot of contrary, but, but people are leaning into it is that it's the refactoring and taking advantage of the services. Like what you mentioned about cockroach. People are doing that now on cloud going the lift and shift market kind of had it time now it's like hey, I can start taking advantage of these higher level services or capability of someone else's stack and refactoring it. So I think that's a dynamic that I'm seeing a lot more of. And it sounds like it's working out great in this situation. >>I just came from a talk and I asked them, you know, what don't you wanna put in the cloud and what don't you wanna run in Kubernetes or on containers and good Yeah. And the customers that I was on stage with, one of the guys made a joke and he said I would put my dog in a container room. I could, he was like in the category, which is his right, which he is in the category of like, I'll put everything in containers and these are, you know, including like mis critical apps, heritage apps, since they don't wanna see legacy anymore. Heritage apps, these are huge enterprises and they wanna put everything in the cloud. Everything >>You so want your dog that gets stuck on the airplane when it's on the tarmac. >>Oh >>God, that's, she was the, don't take that analogy. Literally don't think about that. Well that's, >>That's let's not containerize. >>There's always supply chain concern. >>It. So I mean going macro and especially given where we are cncf, it's all about open source. Do y'all think that open source builds a better future? >>Yeah and a better past. I mean this is, so much of this software is founded on open source. I, we wouldn't be here really. I've been in open source community for many, many years so I wouldn't say I'm biased. I would say this is how we build software. I came from like in a high school we're all like, oh let's build a really cool application. Oh you know what? I built this cuz I needed it, but maybe somebody else needs it too. And you put it out there and that is the ethos of Silicon Valley, right? That's where we grew up. So I've always had that mindset, you know, and social coding and why I have three people, right? Working on the same thing when one person you could share it's so inefficient. All of that. Yeah. So I think it's great that people work on what they're really good at. You know, we all, now you need some standardization, you need some kind of control around this whole thing. Sometimes some foundations to, you know, herd the cats. Yeah. But it's, it's great. Which is why I'm a c CF ambassador and I spend a lot of time, you know, in my free time talking about open source. Yeah, yeah. >>It's clear how passionate you are about it. Jake, >>This is my second company that we founded now and I don't think either of them could have existed without the base of open source, right? Like when you look at I have this cool idea for an app or a company and I want to go try it out, the last thing I want to do is go and negotiate with a vendor to get like the core data component. Yeah. To even be able to get to the >>Prototypes. NK too, by the way. Yeah. >>Hey >>Nk >>Or hire, you know, a bunch of PhDs to go and build that core component for me. So yeah, I mean nobody can argue that >>It truly is, I gotta say a best time if you're a developer right now, it's awesome to be a developer right now. It's only gonna get better. As we were riff from the last session about productivity, we believe that if you follow the digital transformation to its conclusion, developers and it aren't a department serving the business, they are the business. And that means they're running the show, which means that now their entire workflow is gonna change. It's gonna be have to be leveraging services partnering. So yeah, open source just fills that. So the more code coming up, it's just no doubt in our mind that that's go, that's happening and will accelerate. So yeah, >>You know, no one company is gonna be able to compete with a community. 50,000 users contributing versus you riding it yourself in your garage with >>Your dogs. Well it's people driven too. It's humans not container. It's humans working together. And here you'll see, I won't say horse training, that's a bad term, but like as projects start to get traction, hey, why don't we come together as, as the world starts to settle and the projects have traction, you start to see visibility into use cases, functionality. Some projects might not be, they have to kind of see more kind >>Of, not every feature is gonna be development. Oh. So I mean, you know, this is why you connect with truly brilliant people who can architect and distribute sequel database. Like who thought of that? It's amazing. It's as, as our friend >>You say, Well let me ask you a question before we wrap up, both by time, what is the secret of Kubernetes success? What made Kubernetes specifically successful? Was it timing? Was it the, the unambitious nature of it, the unification of it? Was it, what was the reason why is Kubernetes successful, right? And why nothing else? >>Well, you know what I'm gonna say? So I'm gonna let Dave >>First don't Jake, you go first. >>Oh boy. If we look at what was happening when Kubernetes first came out, it was, Mesosphere was kind of like the, the big player in the space. I think Kubernetes really, it had the backing from the right companies. It had the, you know, it had the credibility, it was sort of loosely based on Borg, but with the story of like, we've fixed everything that was broken in Borg. Yeah. And it's better now. Yeah. So I think it was just kind and, and obviously people were looking for a solution to this problem as they were going through their containerization journey. And I, yeah, I think it was just right >>Place, the timing consensus of hey, if we just let this happen, something good might come together for everybody. That's the way I felt. I >>Think it was right place, right time, right solution. And then it just kind of exploded when we were at Cores. Alex Povi, our ceo, he heard about Kubernetes and he was like, you know, we, we had a thing called Fleet D or we had a tool called Fleet. And he's like, Nope, we're all in on Kubernetes now. And that was an amazing Yeah, >>I remember that interview. >>I, amazing decision. >>Yeah, >>It's clear we can feel the shift. It's something that's come up a lot this week is is the commitment. Everybody's all in. People are ready for their transformation and Kubernetes is definitely gonna be the orchestrator that we're >>Leveraging. Yeah. And it's an amazing community. But it was, we got lucky that the, the foundational technology, I mean, you know, coming out of Google based on Go conferences, based on Go, it's no to coincidence that this sort of nature of, you know, pods horizontally, scalable, it's all fits together. I does make sense. Yeah. I mean, no offense to Python and some of the other technologies that were built in other languages, but Go is an awesome language. It's so, so innovative. Innovative things you could do with it. >>Awesome. Oh definitely. Jake, I'm very curious since we learned on the way and you are a Detroit native? >>I am. Yep. I grew up in the in Warren, which is just a suburb right outside of Detroit. >>So what does it mean to you as a Michigan born bloke to be here, see your entire community invade? >>It is, I grew up coming to the Detroit Auto Show in this very room >>That brought me to Detroit the first time. Love n a I a s. Been there with our friends at Ford just behind us. >>And it's just so interesting to me to see the accumulation, the accumulation of tech coming to Detroit cuz it's really not something that historically has been a huge presence. And I just love it. I love to see the activity out on the streets. I love to see all the restaurants and coffee shops full of people. Just, I might tear up. >>Well, I was wondering if it would give you a little bit of that hometown pride and also the joy of bringing your community together. I mean, this is merging your two probably most core communities. Yeah, >>Yeah. Your >>Youth and your, and your career. It doesn't get more personal than that really. Right. >>It's just been, it's been really exciting to see the energy. >>Well thanks for going on the queue. Thanks for sharing. Appreciate it. Thanks >>For having us. Yeah, thank you both so much. Lisa, you were a joy of ball of energy right when you walked up. Jake, what a compelling story. Really appreciate you sharing it with us. John, thanks for the banter and the fabulous questions. I'm >>Glad I could help out. >>Yeah, you do. A lot more than help out sweetheart. And to all of you watching the Cube today, thank you so much for joining us live from Detroit, the Cube Studios. My name is Savannah Peterson and we'll see you for our event wrap up next.

Published Date : Oct 27 2022

SUMMARY :

Live from the Cube Studios here in Motor City, Michigan. implementing all the hard core talks to be awesome. here at the show at Cape Con. case the audience isn't familiar, give us a quick little sound bite. The database you can't And the success has been very well documented. I was a different company there talking a lot about multi-cloud. Community, take through the use case. So you can start Jake, So a lot of people get stuck on My One of the reasons that we're here. Lisa, how are you and the team surfacing stories like Like, tell me what you build and if it's interesting, We knew the founders. I mean, as you know, of the only services that you usually don't shard geographically. A lot of people talking about it, but how would you describe this distributed trend that's going on? like shared nothing architecture that allows you to kind of keep it running and horizontally scale the market now in terms of, I know the Alphas are all building all the great stuff and you And I know that's one of the things you like too. I mean we only founded the company two years ago, but we're actually getting Can you take a minute to talk about the Before that we were at CoreOS, so CoreOS acquisition and before that, One of the best acquisitions that ever happened for the value. So if you are a database, And as you know, Cockroach is based off of the Google Span paper and in the the Zanzibar paper, So the question is why didn't you get into obviously knows how it's pronounced, you know, it's the et cd argument, it's the co cuddl versus the control versus coo, you know, so we, we just like to have a little ambiguity Can you explain the relationship between Kubernetes, how you're handling Spice dv? And our strategy is to just run these single tenant stacks for people And the distributed architecture makes that possible because it's lighter way, can say, we're going going to take the provider, the cloud providers Kubernetes offering, You know, Jake, you made me think of something I wanted to bring up with other guests, but now since you're here, I think the trickier issues come up when you have larger data, you have huge binary blobs. And by the way, that that data problem also is compounded when the architecture goes to the edge. But as they start to move to the edge, we're going to have to move to the edge with them. You know, what, what's the, what's the, you know, the founders, so you know, We're, you know, we're, we're consuming it all. I mean the world's changing. And so really it's up to you how do you want to build your infrastructure? And one of the things we've been talking about, the super cloud concept that we've been issue getting a lot of contrary, but, but people are leaning into it I just came from a talk and I asked them, you know, what don't you wanna put in the cloud and God, that's, she was the, don't take that analogy. It. So I mean going macro and especially given where we are cncf, So I've always had that mindset, you know, and social coding and why I have three people, It's clear how passionate you are about it. Like when you look at I have this cool idea for an app or a company and Yeah. Or hire, you know, a bunch of PhDs to go and build that core component for me. you follow the digital transformation to its conclusion, developers and it aren't a department serving you riding it yourself in your garage with you start to see visibility into use cases, functionality. Oh. So I mean, you know, this is why you connect with It had the, you know, it had the credibility, it was sort of loosely based on Place, the timing consensus of hey, if we just let this happen, something good might come was like, you know, we, we had a thing called Fleet D or we had a tool called Fleet. It's clear we can feel the shift. I mean, you know, coming out of Google based on Go conferences, based on Go, it's no to coincidence that this Jake, I'm very curious since we learned on the way and you are a I am. That brought me to Detroit the first time. And it's just so interesting to me to see the accumulation, Well, I was wondering if it would give you a little bit of that hometown pride and also the joy of bringing your community together. It doesn't get more personal than that really. Well thanks for going on the queue. Yeah, thank you both so much. And to all of you watching the Cube today,

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
JakePERSON

0.99+

Alex PoviPERSON

0.99+

JohnPERSON

0.99+

Savannah PetersonPERSON

0.99+

AWSORGANIZATION

0.99+

LisaPERSON

0.99+

New York CityLOCATION

0.99+

DetroitLOCATION

0.99+

OracleORGANIZATION

0.99+

John FurrierPERSON

0.99+

twoQUANTITY

0.99+

20,000 starsQUANTITY

0.99+

PythonTITLE

0.99+

ZeedPERSON

0.99+

bothQUANTITY

0.99+

CockroachORGANIZATION

0.99+

San Francisco BayLOCATION

0.99+

second companyQUANTITY

0.99+

PostgresORGANIZATION

0.99+

FordORGANIZATION

0.99+

50,000 usersQUANTITY

0.99+

three peopleQUANTITY

0.99+

Red HatORGANIZATION

0.99+

Motor City, MichiganLOCATION

0.99+

WarrenLOCATION

0.99+

MichiganLOCATION

0.99+

Spice DvyORGANIZATION

0.99+

Detroit Auto ShowEVENT

0.99+

Cockroach LabsORGANIZATION

0.99+

oneQUANTITY

0.99+

OffsetORGANIZATION

0.99+

Cube StudiosORGANIZATION

0.99+

KubeConEVENT

0.99+

a month agoDATE

0.99+

two years agoDATE

0.98+

Jake MoshenkoPERSON

0.98+

OneQUANTITY

0.98+

one personQUANTITY

0.98+

first timeQUANTITY

0.98+

firstQUANTITY

0.98+

KubernetesTITLE

0.98+

Three daysQUANTITY

0.97+

GitHubORGANIZATION

0.97+

FirstQUANTITY

0.97+

DavePERSON

0.96+

this weekDATE

0.96+

CoreOSORGANIZATION

0.96+

QuayORGANIZATION

0.96+

Silicon ValleyLOCATION

0.96+

QuaORGANIZATION

0.95+

one applicationQUANTITY

0.95+

JakesPERSON

0.94+

first roundQUANTITY

0.94+

todayDATE

0.94+

OtedORGANIZATION

0.93+

Google ZansORGANIZATION

0.93+

AuthzedORGANIZATION

0.92+

CockroachPERSON

0.92+

Marie NamphyPERSON

0.92+

Jason Cook, Cyber Defense Labs & Mike Riolo, CrowdStrike | CrowdStrike Fal.Con 2022


 

(upbeat music) >> Welcome back to Fal.Con 2022. My name is Dave Vallante. We're here with my co-host Dave Nicholson. On the last earnings call George Kurts made a really big emphasis on the relationship with managed service providers. CrowdStrike has announced a new service provider capability. The powered service provider program. Jason Cook is here. He is the president of cyber defense labs. He's joined by Mike Riolo. Who's the vice president of global system integrators and service providers at CrowdStrike gents. Welcome to TheCube. Good to see you. >> Thank you very much. >> Thank you >> Jason, tell us about cyber defense labs. What do you guys do? Give us the bumper sticker, please. >> Cyber defense labs uses the best technology in the world to put together services that help protect our clients >> Simple. Like it. What's XDR? (people laughing) >> I've not heard of that before, sorry. >> So Mike, we've seen the rise of service providers. I saw a stat, I don't know, six, seven months ago that 50% of us companies don't even have a SOC. We're talking about mid to large companies. So service providers are crucial. What's the CrowdStrike powered service provider program all about? >> Well, it's an evolution for us. We've been dealing with this market for some time. And the idea is, is like how do we expand the opportunity to stop reaches? I mean, that's what it's all about. Like how more routes to market, more partners like cyber defense labs that can really go in and bring our technology coupled with their services to power their offerings to their customers and just help us reach every end user out there, to stop reaches. >> So Jason, how do you guys differentiate? Cause I see, you know, as an analyst, I'll look back, I'll read the press releases and they'll see, okay. They just look so similar. So how do you differentiate from the competition? What do you tell customers? >> So when it comes to our selection of technology we test it, we work it, we literally put it into real world situations with our clients. And then we differentiate ourselves with expert services. It's a white glove service from us. We embed ourselves right in with our clients. That's why we call 'em our client partners. And they see us as part of their team and extension of their team. They don't have the time to play with technology and work out what's best. They don't know the time to select it or even then the expertise to use it effectively in the environment. So that's where the trust comes in with us. And then for us, likewise, we are the technology provider such as CrowdStrick, we need to know the technology works and it does what it says. >> I always ask CISOs; What's your number one challenge? And they'll say lack of talent. The only time I didn't get that answer was at... The Mongo DB CISO at reinforced. I'm like yeah, it's cause you're Mongo, I guess reinforced or AWS doesn't have the same problem, but do you... Obviously you see that problem. And you compliment that, is that a fair? >> Yeah, absolutely. Many, many companies mid-market enterprises are really struggling to find talent and then retain the talent. So for us where that's all we are about and then we are there to enable your business to do what your business does. It is just working and I think more and more so you're going to see an industry clearly CrowdStrike's going in that direction. That it's the service provider that becomes a critical element of that trusted circle. >> Does that translate into a market segment by size of organization typically or? You mentioned the ever never ending quest for talent which is critical regardless of size but what does your target market look like? >> So I, I think the biggest gap in the market frankly, is still the mid-market. Many smaller companies still are really just struggling with 'what is the problem.' At least in the mid-market, in the enterprises they really beginning to understand the problem and want to invest and lean in. And here's the irony. They now want to partner to solve the problem cause they recognize they can't do it on their own. >> So Mike, what are the critical aspects of this program? I mean, got the press release out there, but put some meat on the bone for us. >> So if you look at what we were doing to enable managed service providers to go in and, and be powered by CrowdStrike before it was in a corporate market segment it was a specific set of product from us to really enable MDR, you know, sort of that, that generation of services that a lot of customers looked at MSPs for. And what the big message about this is is we are now expanding that. We're taking it out of corporate, we're going upmarket, we're going enterprise. We can leverage partners like cyber defense labs to package our software into their offering and help them power them more than just endpoint. Right? We've had a lot of exciting announcements and probably more to come around identity, you know XDR, the new buzz, right? Like what does it mean? And in, if you look at our approach, it's a very platform centric approach and that's something that partners can monetize. That's something that partners can really help clients grow with is that it's not just about endpoint. It's more about how do I make sure that I'm in a position with a partner that allows me to grow as a market decides it's necessary. So things like identity, cloud on and on and on, that we're investing in and continuing to grow. We are making that available to the CrowdStrike powered service about our marketplace. >> So Jason, service providers historically outsourcing, okay. And it used to be a lot of; 'okay, you know, I'll take over your mess for less kind of thing.' Right? And so the pattern was you would have one of everything and then, that limited your scale. The bigger you got, you had this economies of scale. So am I hearing that, like how do you partner with CrowdStrike? Are you kind of standardizing on that platform or not necessarily cause you have to be agnostic. What's your posture on that? >> So there's a level of, you have to be technology agnostic. We pride ourselves in just using the best technology that's out there. But at the same time, very much with the Fal.Con platform they're building out and maturing in a way that's making significant risk mitigation abilities for a solution provider like us to say we'll take one of those, one of those and put our service around it because that's the best fit service to reduce the risk of this particular client. And having that flexibility for us to do that really allows us then to stay within the same sort of product suite rather than going outside when integration is still one of the biggest challenges that you have. >> So you're one of those organizations that's consolidating a bevy of point tools. Is that right? I mean, you're going through that transformation now. Have you already gone through that? What's your journey look like there? >> Oh, we help companies do that. That's how they mitigate and reduce their risk. >> Okay. But you're using tools as, as well. Are you not? So I mean, you've got to also I mean you're like an extension of those clients. >> Absolutely. So it comes down to a lot of the time do you have the right team? We have a team of experts that deliver expert services. You get to a level of skillset and experience, which goes what's just the best tool out there. And it becomes that's our insight. So one of the reasons why we like the Fal.Con product is because regardless of what the mess is, that's happening you can rapidly deploy stuff to make a difference. And then you then work out how to fix the mess which is quite a change from how traditionally things are done, which is let's analyze the problem. Let's look at options around it. And by the time you've done that time has passed and you can't afford to just allow time to pass these days. So having the right technology allows you to rapidly deploy. Of course, we use what we sell. So we are proud to say that we use a number of the Fal.Con products to protect ourselves and consolidate onto that technology as we then offer that out as a service to our clients. >> So Mike, I'm thinking about the program in general and specifically how you are implementing this program thinking about the path to bringing the customer on board. There are a finite number of strategic seats at any customer's table. So who is at the customer's table? Is it CDL saying; 'Hey, I'm going to bring in my folks from CrowdStrike to have a conversation with you.' Is it CrowdStrike saying; 'Hey, it looks like a service provider might be the best solution for you. Let's go talk to CDL.' How does that work? >> It's a great question. And I think we talk a lot about how there's a gap in people to support cyber efforts inside of companies. But we don't talk about the gap in like experts that can go in and actually sit down with CISOs, with CIOs, with CFOs. And so for us, like it's all about the flexibility. It's it's what do you need in the moment? Because at the end of the day, it comes down to the people. If Jason has a great trusted relationship, he's like; 'Hey I just need some content.' 'Help me push why we're powered by CrowdStrike in this moment.' Great, go run. If we have an opportunity where we know that cyber defense labs has a presence then we go in together, right? Like that flexibility is there. We've done a lot. When you build a program like this, like it's easy to tell the market what they need. It's easy to tell everybody, but it's also you're looking at a cultural shift and how CrowdStrike goes to market, right? Like this is all about how do we get every possible route to market to stop reaches for customers of all size. >> I would echo that. there's three ways that that's working for our two companies at the moment. Many times a lot of the relationships that we have are trusted advisor at the owner or board level of these mid-market and enterprise companies. They're looking to ask for a number of things. And one of the things that we then say is, Hey for your technology roadmap, hey we want to bring in co-present coded us, co-discuss co-strategize with you what your roadmap is. And so we often bring CrowdStrike into the conversations that cyber defense lab is having at the board level. Then on the other side, CrowdStrike obviously has a significant sales force and trusted advisors. They go in with the product and then it's apparent that the you know, the client wants way more than just the product. They say, this is great. I love it. I've made my decision, but I can't operate it effectively. And so we then get pulled in from that perspective >> You get to all the time from product companies, right? It's like, okay, now what? How do I do this? And you go, oh, I'll call somebody. So this is going to accelerate. You go to market. >> Well, and everybody looks at it like, you know how does your sales play with their sales, right? Everyone's going after the same thing. And I'm, you know, that's important, but you have to look at CrowdStrike as more than sales, right? We have an amazing threat intel group that are helping clients understand the risk factors and what bad people are trying to do to them. We can bring so many experts to the side of a cyber defense labs in, in that realm. You know, we've been doing this a long time. >> This is what's interesting to me when I think about your threat hunting, because you guys are experts and you guys are experts. But the... Correct me if I'm wrong. But the advantage I see at the CrowdStrike has is your cloud platform allows you to have such a huge observation space. You got a ton of data and you bring that to the relationship as well and then you benefit from that? >> It's two way. It's absolutely two way. CrowdStrike has a whole bunch of experts and expertise in this space. So do cyber defense labs. We call it for us because we're providing a service to multiple clients. Many of them have a global presence. We call it our global threat view. And absolutely we are exchanging real time threat telemetry data with, with our friends at CrowdStrike Which is impacting the value that we have and the ability to respond extremely quickly when something's happening to one of our clients. >> Well, I just add to that, you know if you look at all of our alliances, right? We've got solution providers, tech reliant, everything. The one thing that's really interesting about the CrowdStrike powered service provider program; it lives in alliances, It's a partnership program, but they're our customer. They have chosen to standardize on our platform, right. To help drive the best results for their customers. And so we treat them like a partner because it's not for internal use. There's unlimited aspect to it. And so as that treating like partnership we have to enable them with more than just product. Right? We want to bring the right experts. We want to bring the right, you know, vision of where the market's going the threats out there, things of that nature. And that's something that we do every day with you guys. >> And it was even expressed earlier with the keynote speech that George gave. Look there's an ecosystem of very good technologies, very good providers. And there there's that sort of friend-of-me view here. You put the best thing together for the client at the end of the day. And if we all acknowledge, which I think is the maturity of our partnership, that one plus one equals, I always say at 51 now, if you play it right, then the partner sees... That the client sees the value of the partnership. And so they want more of that. >> So it sounds like... We got to wrap, but I wonder if we could close on this. It sounds like this was happening just organically in the field. Now you've codified it. So my question to each of you is; What's your vision for the future? Where do you guys want to take this thing? >> What a wrap question right there. I love it. Honestly, like we look at it in... Look at what does it mean to be a CrowdStrike powered service provider. It is more than just the platform. It's the program in general, offering them tools to go in and do early assessments. One thing about service providers, they're in there before vendors, right? We're still a vendor at the end of the day. And so they have that relationship, like how do we enable them to leverage our platform leverage our tools, leverage our programs in order to help a client understand, like, what is your risk factor Could a breach come, things of that nature. And so it's really building in really enabling a partner like cyber defense labs to take on the full suite of programs, services, platform that we can provide to them as a customer, treated them like a partner. >> And Jason, from your perspective, bring us on if you would. >> So our partnership with CrowdStrike is really enabling cyber defense labs to increase our share of wallet, our presence in very specific market segments; The mid-market to enterprise especially around banking, financial services auto dealerships, healthcare, manufacturing, where last year we saw a significant progress there. And we think we're going to double it between this year and next year. >> Jason Cook, Mike Riolo. thanks for coming in TheCube. Great story. >> Thank you for having us >> Alright, thank you for watching. Keep it right there. Dave Vallante and Dave Nicholson will be back right after this short break from Fal.Con 22. You're watching TheCube. (soft electronic music)

Published Date : Sep 20 2022

SUMMARY :

He is the president of cyber defense labs. What do you guys do? What's XDR? What's the CrowdStrike And the idea is, is like So how do you differentiate They don't have the time to play And you compliment that, is that a fair? to do what your business does. And here's the irony. I mean, got the press release out there, and probably more to come And so the pattern was you would have one of the biggest challenges that you have. Have you already gone through that? Oh, we help companies do that. Are you not? So it comes down to a lot of the time and specifically how you are and how CrowdStrike goes to market, right? And one of the things So this is going to accelerate. We can bring so many experts to the side and then you benefit from that? and the ability to Well, I just add to that, you know of the partnership. So my question to each of you is; It is more than just the platform. bring us on if you would. And we think we're going to double it Jason Cook, Mike Riolo. Alright, thank you for watching.

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
Mike RioloPERSON

0.99+

Dave NicholsonPERSON

0.99+

JasonPERSON

0.99+

Jason CookPERSON

0.99+

GeorgePERSON

0.99+

MikePERSON

0.99+

Dave VallantePERSON

0.99+

CrowdStrikeORGANIZATION

0.99+

two companiesQUANTITY

0.99+

AWSORGANIZATION

0.99+

50%QUANTITY

0.99+

Dave NicholsonPERSON

0.99+

CrowdStrickORGANIZATION

0.99+

George KurtsPERSON

0.99+

last yearDATE

0.99+

next yearDATE

0.99+

Cyber Defense LabsORGANIZATION

0.99+

two wayQUANTITY

0.99+

oneQUANTITY

0.99+

three waysQUANTITY

0.99+

this yearDATE

0.99+

MongoORGANIZATION

0.99+

eachQUANTITY

0.98+

CDLORGANIZATION

0.97+

Fal.Con 2022EVENT

0.97+

Fal.Con 22EVENT

0.96+

seven months agoDATE

0.91+

TheCubeORGANIZATION

0.89+

CrowdStrikeEVENT

0.85+

six,DATE

0.79+

one thingQUANTITY

0.78+

One thingQUANTITY

0.7+

MDRORGANIZATION

0.69+

Fal.ConTITLE

0.67+

Fal.ConORGANIZATION

0.65+

TheCubeTITLE

0.62+

thingsQUANTITY

0.58+

one challengeQUANTITY

0.58+

ton ofQUANTITY

0.49+

51OTHER

0.35+

CrowdStrikeTITLE

0.28+

Jim Walker, Cockroach Labs & Christian Hüning, finleap connect | Kubecon + Cloudnativecon EU 2022


 

>> (bright music) >> Narrator: The Cube, presents Kubecon and Cloudnativecon, year of 2022, brought to you by Red Hat, the cloud native computing foundation and its ecosystem partners. >> Now what we're opening. Welcome to Valencia, Spain in Kubecon Cloudnativecon, Europe, 2022. I'm Keith Townsend, along with my host, Paul Gillin, who is the senior editor for architecture at Silicon angle, Paul. >> Keith you've been asking me questions all these last two days. Let me ask you one. You're a traveling man. You go to a lot of conferences. What's different about this one. >> You know what, we're just talking about that pre-conference, open source conferences are usually pretty intimate. This is big. 7,500 people talking about complex topics, all in one big area. And then it's, I got to say it's overwhelming. It's way more. It's not focused on a single company's product or messaging. It is about a whole ecosystem, very different show. >> And certainly some of the best t-shirts I've ever seen. And our first guest, Jim has one of the better ones. >> I mean a bit cockroach come on, right. >> Jim Walker, principal product evangelist at CockroachDB and Christian Huning, tech director of cloud technologies at Finleap Connect, a financial services company that's based out of Germany, now offering services in four countries now. >> Basically all over Europe. >> Okay. >> But we are in three countries with offices. >> So you're CockroachDB customer and I got to ask the obvious question. Databases are hard and started the company in 2015 CockroachDB, been a customer since 2019, I understand. Why take the risk on a four year old database. I mean that just sounds like a world of risk and trouble. >> So it was in 2018 when we joined the company back then and we did this cloud native transformation, that was our task basically. We had very limited amount of time and we were faced with a legacy infrastructure and we needed something that would run in a cloud native way and just blend in with everything else we had. And the idea was to go all in with Kubernetes. Though early days, a lot of things were alpha beta, and we were running on mySQL back then. >> Yeah. >> On a VM, kind of small setup. And then we were looking for something that we could just deploy in Kubernetes, alongside with everything else. And we had to stack and we had to duplicate it many times. So also to maintain that we wanted to do it all the same like with GitOps and everything and Cockroach delivered that proposition. So that was why we evaluate the risk of relatively early adopting that solution with the proposition of having something that's truly cloud native and really blends in with everything else we do in the same way was something we considered, and then we jumped the leap of faith and >> The fin leap of faith >> The fin leap of faith. Exactly. And we were not dissatisfied. >> So talk to me a little bit about the challenges because when we think of MySQL, MySQL scales to amazing sizes, it is the de facto database for many cloud based architectures. What problems were you running into with MySQL? >> We were running into the problem that we essentially, as a finTech company, we are regulated and we have companies, customers that really value running things like on-prem, private cloud, on-prem is a bit of a bad word, maybe. So it's private cloud, hybrid cloud, private cloud in our own data centers in Frankfurt. And we needed to run it in there. So we wanted to somehow manage that and with, so all of the managed solution were off the table, so we couldn't use them. So we needed something that ran in Kubernetes because we only wanted to maintain Kubernetes. We're a small team, didn't want to use also like full blown VM solution, of sorts. So that was that. And the other thing was, we needed something that was HA distributable somehow. So we also looked into other solutions back at the time, like Vitis, which is also prominent for having a MySQL compliant interface and great solution. We also got into work, but we figured, this is from the scale, and from the sheer amount of maintenance it would need, we couldn't deliver that, we were too small for that. So that's where then Cockroach just fitted in nicely by being able to distribute BHA, be resilient against failure, but also be able to scale out because we had this problem with a single MySQL deployment to not really, as it grew, as the data amounts grew, we had trouble to operatively keep that under control. >> So Jim, every time someone comes to me and says, I have a new database, I think we don't need it, yet another database. >> Right. >> What problem, or how does CockroachDB go about solving the types of problems that Christian had? >> Yeah. I mean, Christian laid out why it exists. I mean, look guys, building a database isn't easy. If it was easy, we'd have a database for every application, but you know, Michael Stonebraker, kind of godfather of all database says it himself, it takes seven, eight years for a database to fully gestate to be something that's like enterprise ready and kind of, be relied upon. We've been billing for about seven, eight years. I mean, I'm thankful for people like Christian to join us early on to help us kind of like troubleshoot and go through some things. We're building a database, it's not easy. You're right. But building a distributor system is also not easy. And so for us, if you look at what's going on in just infrastructure in general, what's happening in Kubernetes, like this whole space is Kubernetes. It's all about automation. How do I automate scale? How do I automate resilience out of the entire equation of what we're actually doing? I don't want to have to think about active passive systems. I don't want to think about sharding a database. Sure you can scale MySQL. You know, how many people it takes to run three or four shards of MySQL database. That's not automation. And I tell you what, this world right now with the advances in data how hard it is to find people who actually understand infrastructure to hire them. This is why this automation is happening, because our systems are more complex. So we started from the very beginning to be something that was very different. This is a cloud native database. This is built with the same exact principles that are in Kubernetes. In fact, like Kubernetes it's kind of a spawn of borg, the back end of Google. We are inspired by Spanner. I mean, this started by three engineers that worked at Google, are frustrated, they didn't have the tools, they had at Google. So they built something that was, outside of Google. And how do we give that kind of Google like infrastructure for everybody. And that's, the advent of Cockroach and kind of why we're doing, what we're doing. >> As your database has matured, you're now beginning a transition or you're in a transition to a serverless version. How are you doing that without disrupting the experience for existing customers? And why go serverless at all? >> Yeah, it's interesting. So, you know, serverless was, it was kind of a an R&D project for us. And when we first started on a path, because I think you know, ultimately what we would love to do for the database is let's not even think about database, Keith. Like, I don't want to think about the database. What we're building too is, we want a SQL API in the cloud. That's it. I don't want to think about scale. I don't want to think about upgrades. I literally like. that stuff should just go away. That's what we need, right. As developers, I don't want to think about isolation levels or like, you know, give me DML and I want to be able to communicate. And for us the realization of that vision is like, if we're going to put a database on the planet for everybody to actually use it, we have to be really, really efficient. And serverless, which I believe really should be infrastructure less because I don't think we should be thinking of just about service. We got to think about, how do I take the context of regions out of this thing? How do I take the context of cloud providers out of what we're talking about? Let's just not think about that. Let's just code against something. Serverless was the answer. Now we've been building for about a year and a half. We launched a serverless version of Cockroach last October and we did it so that everybody in the public could have a free version of a database. And that's what serverless allows us to do. It's all consumption based up to certain limits and then you pay. But I think ultimately, and we spoke a little bit about this at the very beginning. I think as ISVs, people who are building software today the serverless vision gets really interesting because I think what's on the mind of the CTO is, how do I drive down my cost to the cloud provider? And if we can basically, drive down costs through either making things multi-tenant and super efficient, and then optimizing how much compute we use, spinning things down to zero and back up and auto scaling these sort of things in our software. We can start to make changes in the way that people are thinking about spend with the cloud provider. And ultimately we did that, so we could do things for free. >> So, Jim, I think I disagree Christian, I'm sorry, Jim. I think I disagree with you just a little bit. Christian, I think the biggest challenge facing CTOs are people. >> True. >> Getting the people to worry about cost and spend and implementation. So as you hear the concepts of CoachDB moving to a serverless model, and you're a large customer how does that make you think or react to your people side of your resources? >> Well, I can say that from the people side of resources luckily Cockroach is our least problem. So it just kind of, we always said, it's an operator stream because that was the part that just worked for us, so. >> And it's worked as you have scaled it? without you having ... >> Yeah. I mean, we use it in a bit of a, we do not really scale out like the Cockroach, like really large. It's like, more that we use it with the enterprise features of encryption in the stack and our customers then demand. If they do so, we have the Zas offering and we also do like dedicated stacks. So by having a fully cloud native solution on top of Kubernetes, as the foundational layer we can just use that and stamp it out and deploy it. >> How does that translate into services you can provide your customers? Are there services you can provide customers that you couldn't have, if you were running, say, MySQL? >> No, what we do is, we run this, so the SAS offering runs in our hybrid private cloud. And the other thing that we offer is that we run the entire stack at a cloud provider of their choosing. So if they are an AWS, they give us an AWS account, we put it in there. Theoretically, we could then also talk about using the serverless variant, if they like so, but it's not strictly required for us. >> So Christian, talk to me about that provisioning process because if I had a MySQL deployment before I can imagine how putting that into a cloud native type of repeatable CICD pipeline or Ansible script that could be difficult. Talk to me about that. How CockroachDB enables you to create new onboarding experiences for your customers? >> So what we do is, we use helm charts all over the place as probably everybody else. And then each application team has their parts of services, they've packaged them to helm charts, they've wrapped us in a super chart that gets wrapped into the super, super chart for the entire stack. And then at the right place, somewhere in between Cockroach is added, where it's a dependency. And as they just offer a helm chart that's as easy as it gets. And then what the teams do is they have an inner job, that once you deploy all that, it would spin up. And as soon as Cockroach is ready it's just the same reconcile loop as everything. It will then provision users, set up database schema, do all that. And initialize, initial data sets that might be required for a new setup. So with that setup, we can spin up a new cluster and then deploy that stack chart in there. And it takes some time. And then it's done. >> So talk to me about life cycle management. Because when I have one database, I have one schema. When I have a lot of databases I have a lot of different schemas. How do you keep your stack consistent across customers? >> That is basically part of the same story. We have get offs all over the place. So we have this repository, we see the super helm chart versions and we maintain like minus three versions and ensure that we update the customers and keep them up to date. It's part of the contract sometimes, down to the schedule of the customer at times. And Cockroach nicely supports also, these updates with these migrations in the background, the schema migrations in the background. So we use in our case, in that integration SQL alchemy, which is also nicely supported. So there was also part of the story from MySQL to Postgres, was supported by the ORM, these kind of things. So the skill approach together with the ease of helm charts and the background migrations of the schema is a very seamless upgrade operations. Before that we had to have downtime. >> That's right, you could have online schema changes. Upgrading the database uses the same concept of rolling upgrades that you have in Kubernetes. It's just cloud native. It just fits that same context, I think. >> Christian: It became a no-brainer. >> Yeah. >> Yeah. >> Jim, you mentioned the idea of a SQL API in the cloud, that's really interesting. Why does such a thing not exist? >> Because it's really difficult to build. You know, SQL API, what does that mean? Like, okay. What I'm going to, where does that endpoint live? Is there one in California one on the east coast, one in Europe, one in Asia? Okay. And I'm asking that endpoint for data. Where does that data live? Can you control where data lives on the planet? Because ultimately what we're fighting in software today in a lot of these situations is the speed of light. And so how do you intelligently place data on this planet? So that, you know, when you're asking for data, when you're maybe home, it's a different latency than when you're here in Valencia. Does that data follow and move you? These are really, really difficult problems to solve. And I think that we're at that layer of, we're at this moment in time in software engineering, we're solving some really interesting, interesting things cause we are budding against this speed of light problem. And ultimately that's one of the biggest challenges. But underneath, it has to have all this automation like the ease at which we can scale this database like the always on resilient, the way that we can upgrade the entire thing with just rolling upgrades. The cloud native concepts is really what's enabling us to do things at global scale it's automation. >> Let's alk about that speed of light in global scale. There's no better conference for speed of light, for scale, than Kubecon. Any predictions coming out of the show? >> It's less a prediction for me and more of an observation, you guys. Like look at two years ago, when we were here in Barcelona at QCon EU, it was a lot of hype. It's a lot of hype, a lot of people walking around, curious, fascinated, this is reality. The conversations that I'm having with people today, there's a reality. There's people really doing, they're becoming cloud native. And to me, I think what we're going to see over the next two to three years is people start to adopt this kind of distributed mindset. And it permeates not just within infrastructure but it goes up into the stack. We'll start to see much more developers using, Go and these kind of the threaded languages, because I think that distributed mindset, if it starts at the chip all the way to the fingertip of the person clicking and you're distributed everywhere in between. It is extremely powerful. And I think that's what Finleap, I mean, that's exactly what the team is doing. And I think there's a lot of value and a lot of power in that. >> Jim, Christian, thank you so much for coming on the Cube and sharing your story. You know what we're past the hype cycle of Kubernetes, I agree. I was a nonbeliever in Kubernetes two, three years ago. It was mostly hype. We're looking at customers from Microsoft, Finleap and competitors doing amazing things with this platform and cloud native in general. Stay tuned for more coverage of Kubecon from Valencia, Spain. I'm Keith Townsend, along with Paul Gillin and you're watching the Cube, the leader in high tech coverage. (bright music)

Published Date : May 19 2022

SUMMARY :

brought to you by Red Hat, Welcome to Valencia, Spain You go to a lot of conferences. I got to say it's overwhelming. And certainly some of the and Christian Huning, But we are in three and started the company and we were faced with So also to maintain that we And we were not dissatisfied. So talk to me a little and we have companies, customers I think we don't need it, And how do we give that kind disrupting the experience and we did it so that I think I disagree with Getting the people to worry because that was the part And it's worked as you have scaled it? It's like, more that we use it And the other thing that we offer is that So Christian, talk to me it's just the same reconcile I have a lot of different schemas. and ensure that we update the customers Upgrading the database of a SQL API in the cloud, the way that we can Any predictions coming out of the show? and more of an observation, you guys. so much for coming on the Cube

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
JimPERSON

0.99+

Paul GillinPERSON

0.99+

Jim WalkerPERSON

0.99+

CaliforniaLOCATION

0.99+

Keith TownsendPERSON

0.99+

Michael StonebrakerPERSON

0.99+

2018DATE

0.99+

GermanyLOCATION

0.99+

AWSORGANIZATION

0.99+

MicrosoftORGANIZATION

0.99+

2015DATE

0.99+

FrankfurtLOCATION

0.99+

KeithPERSON

0.99+

EuropeLOCATION

0.99+

sevenQUANTITY

0.99+

Red HatORGANIZATION

0.99+

Cockroach LabsORGANIZATION

0.99+

ChristiaPERSON

0.99+

BarcelonaLOCATION

0.99+

GoogleORGANIZATION

0.99+

ValenciaLOCATION

0.99+

AsiaLOCATION

0.99+

ChristianPERSON

0.99+

Finleap ConnectORGANIZATION

0.99+

MySQLTITLE

0.99+

KubernetesTITLE

0.99+

Valencia, SpainLOCATION

0.99+

threeQUANTITY

0.99+

two years agoDATE

0.99+

FinleapORGANIZATION

0.99+

three engineersQUANTITY

0.99+

three countriesQUANTITY

0.99+

first guestQUANTITY

0.99+

SQL APITITLE

0.99+

PaulPERSON

0.99+

KubeconORGANIZATION

0.98+

last OctoberDATE

0.98+

eight yearsQUANTITY

0.98+

2022DATE

0.98+

each applicationQUANTITY

0.98+

four countriesQUANTITY

0.98+

one databaseQUANTITY

0.98+

oneQUANTITY

0.98+

2019DATE

0.98+

three years agoDATE

0.98+

CockroachDBORGANIZATION

0.98+

one schemaQUANTITY

0.98+

Christian HuningPERSON

0.97+

about a year and a halfQUANTITY

0.97+

twoDATE

0.96+

firstQUANTITY

0.96+

Christian HüningPERSON

0.94+

todayDATE

0.94+

about sevenQUANTITY

0.93+

CloudnativeconORGANIZATION

0.93+

three yearsQUANTITY

0.93+

Aaron Suzuki, Prowess Labs | Does Hardware Matter?


 

>>Mm. Joining me is Aaron Suzuki, founder and CEO of Prowess. >>Aaron. Welcome. Thank you. Thanks so much for having me. >>Absolutely. Thanks for joining us. So let's dive right in. Tell us about prowess. >>Progress has been around for quite a while. We've been serving the technology industry from the very beginning, almost 20 years. We've always been able to bridge the gap between the story of the product and what it actually does. And a lot of times, there's a pretty fundamental disconnect between what engineering says and what marketing wants to claim. And so this is sort of how we got down this road of getting into testing and validation of products such as we do today quite quite extensively. And >>that's really what we're focusing on right now is this idea of your independence as a lab. And in this particular case, uh, it's a series of tests that you've done for, uh, you know, using Dell hardware combined with Broadcom cards. So talk a little more about that. About that the concept of independence and what that means. >>Yeah. You know, it's important to us that we stay vendor, agnostic, platform agnostic. Um, and there are a lot of things happening concurrently in the industry. A lot of people want to get a lot of work done really fast, and most customers are not sort of vendor exclusive. In fact, we're not sure we know of any. We always try to keep this objective point of view. That is to say that we don't allow our customers to buy results when we're doing quantitative testing. We really are out there trying to come up with a story or a narrative, and that really seemed to be The missing link in all of this is that there are the quantitative houses that do traditional benchmark testing on one side and then system integrators and kind of on the other extreme agencies. That would really do the narrative and the system integrator side build out a solution, but they wouldn't be able to tell you how it would perform. And so reconciling those two things really became challenging. So having a source that would be able to give you that insight that goes beyond just transactions, um, you know, per whatever unit of time and finding some of these metrics in between that we're more relevant to people's jobs. Where was really the inspiration for creating this unique practise that we call prowess? Labs? >>So, Erin, when I think about performance testing, uh, it's very easy to think of it from the perspective that it's a bunch of hardware slapped together in Iraq. You get some engineers, scientists to run some tests. Why prowess? What? What do you specifically bring to the table? That's meaningful? >>Performance testing is usually done in one of two ways, predominantly one way. It's a very academic approach, which says this specific benchmark test run this specific way gives us X. Another approach is more narrative in nature and more demonstrative. And there's this huge gap in between, and that's really what prowess labs exist to fulfil. >>So, Erin, give us an idea of the scale of prowess. How many of these projects have you worked on? How many how many customers have you worked with over >>over time? Um, we do this work with most of the leading global hardware and software manufacturers and a select number of emerging providers as well. So for us, you know, year to year dozens of projects of varying scope and scale. Various projects also running kind of programmatic form where we're kind of iterating constantly throughout the year. Um, so it's It's really a lot of fun for our team members to to do this. And some of them have been doing it for 10 or 12 years in continuity. >>Erin, Thanks for joining us to talk about practise today. >>My pleasure. Thanks for having me. Mhm. Yeah.

Published Date : May 5 2022

SUMMARY :

Thanks so much for having me. Thanks for joining us. And a lot of times, there's a pretty fundamental disconnect About that the concept of independence and what that means. and kind of on the other extreme agencies. from the perspective that it's a bunch of hardware slapped together in Iraq. And there's this huge gap in between, and that's really what prowess labs exist to fulfil. How many of these projects have you worked on? So for us, you know, year to year dozens Thanks for having me.

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
ErinPERSON

0.99+

10QUANTITY

0.99+

Aaron SuzukiPERSON

0.99+

AaronPERSON

0.99+

IraqLOCATION

0.99+

12 yearsQUANTITY

0.99+

DellORGANIZATION

0.99+

ProwessORGANIZATION

0.99+

two waysQUANTITY

0.99+

one wayQUANTITY

0.98+

oneQUANTITY

0.98+

two thingsQUANTITY

0.98+

prowessORGANIZATION

0.97+

almost 20 yearsQUANTITY

0.97+

todayDATE

0.97+

Prowess LabsORGANIZATION

0.96+

one sideQUANTITY

0.95+

dozensQUANTITY

0.87+

Steve Fazende, APEX FoD, Jud Barron, Silicon Labs, & Darren Fedorowicz, Dell Financial Services


 

>>The cube presents, Dell technologies world brought to you by Dell. >>Welcome back to Dell tech world 2022. This is the cube alive. My name is Dave Volante. We're here with our wall to wall coverage. This is day two. We actually started last night. Uh, the, the cube after dark John furry is here. Lisa Martin, Dave Nicholson. We're gonna talk about apex. The business value of apex flex on demand. Darren fedora is here. He's the senior vice president of Dell financial services, and we're joined by a customer and a partner Jud Barron is R and D infrastructure architect at Silicon labs. And Steve end is the regional VP of copy center comp computer center. I say that like I'm from Boston guys. Welcome to the queue. >>Thank you, >>Darren, take us through what's going on with, with apex, you got custom solutions, you know, people are gonna ask, is this just a financial gimick? What is this? >>No gimmicks, no gimmicks, Dave. So I think when we think about technology, historically customers purchased, they bought and they owned and they may have financed it and paid over time, but it was really an ownership model, especially in infrastructure and apex is about subscription. So think about Dell apex, as you can either buy, or you can subscribe to your technology and under apex subscription, we have options for custom based solutions or an outcome base. And I know today we're gonna talk about flex on demand and, and custom based solutions. So it's a high level pay for what you use when you use it with a high level of choice and flexibility. All >>Right, Steve, I'm gonna ask you to play little >>Co-host all right. I like >>This. Okay. So add some color color commentary, Jud, tell us a little bit about, uh, Silicon labs. I'm really interested in what your requirements were, your challenges and kinda why you landed on, on apex. Sure. >>Uh, Silicon labs is a semiconductor company were headquartered in Austin, 10 Xs, uh, just under a billion dollars a year right now. And, uh, at any ed shop or, uh, that, that people who are doing electronic design automation, that's not just in the semiconductor industry, but we have these HPC farms who are running, you know, millions of jobs a day. And the, a balance that you have to strike when you're doing capacity planning in one of these environments is we have these things called tape outs, and that's where we're finishing a project and there's a much higher volume of jobs that we have to run and you have to decide, do we buy for peak or do we, you know, come under that some amount and say, oh, we're gonna buy 80% of what we think >>As an over, over, over under, right. Do we over buy for peak normally, right, correct. Right >>Hard. One is geo Overy the under buy. It's always a hard decision. >>There's a tradeoff. Right? And, and so the, the challenge there is that you'll end up kind of linking the time and potentially miss a tape out window. And there's costs associated with that because you work with the Foundry and you kind of schedule based off that tape out when you're gonna deliver the photo mask to them. So anyway, the point is we in the past using a traditional like camp X, we're gonna buy a bunch of servers. We, we tend to undershoot whatever our peaks are. Cause we may have a peak every couple of months during, you know, these tape outs. Uh, but you know, sometimes tape outs, slip. And so one slips two months, another one comes in a little bit early and now you have multiple tape outs in the same months. And what was gonna be a, a small, uh, difference in from peak to what you actually purchased ends up being a big peak. And, uh, the thing that was interesting to us about flex on demand is the ability to have a commit rate that, you know, the customer can work with Dell financial services to figure out is that 80% is at 60% whatever. And they give us additional servers that we pay just when we're using them. Now I'm somewhat oversimplifying the process. Um, but we're, we gotta talk about that, >>But, but the point is, if I understand it correctly, that infrastructure was dominoing the, the time to tape out in a negative way, and you you've been able to address that more cost effectively. >>It, it can, it, it has on occasion. And so this, this basically gives us a way to lever to pull, to say, well, we can spend some additional OPEX this month and open up this additional capacity. So it's not like bursting to the cloud. Exactly. Uh, because I mean, you have to have the equipment in your data center already for you to be able to use it. But, um, it's under a traditional acquisition model. It's, it's just not a, a, a thing that was available to us before and looking at leasing or other types of, uh, you know, financing was wasn't really attractive previously, but the flex on demand model, when we first heard about it, we're like, that's very interesting. Tell me more. And we ended up using it in, in Austin, and then we built a whole data center in Asia and did the whole thing on flex on demand and >>Got it. Okay, Steve, uh, talk a little bit about your role what's going on at, at computer center and you know, why apex give us the background? Yeah. >>Um, computer center is a, one of the largest global VAs on the planet, right? Um, we, we have a lot of global and international reach, but at the end of the day, it's about one on one customer of relationships. Um, talking to them, understanding what their challenges are. And we've had a multiyear relationship with Jud. I've known you for a long time. And, and, um, typically that relationship, or initially that relationship was about collaborating, working hand in hand, kind of figure out what the solutions were that best fit their environment to solve their issues they need. And it was typically a procurement, a, a purchase based relationship and, and it worked well for a long time, but it, when Jud posed the challenge to us about kind of more pay as you go, uh, uh, subscription based modeling for, for how he want to do acquire in the future. >>Um, we just, we huddle with the Dell team collectively, um, and, and talked about what we could offer and how we could solve the problem. Uh, apex is a really nice brand today, but this was two and a half years ago, Uhhuh. Okay. So it was a little, we were a little early on on putting it together. I feel good that we were able to, to put that type of solution together for Jud and it's, and it's working today, working wonderful today. And it was good for it's good for the whenever it's good for the customer, the manufacturer and the partner altogether. It's a wonderful solution. >>So you took a little risk, but it worked out and you helped. >>Yeah, that was probably the infancy as we were growing our, as a service, think of this, you know, there's a, a lot of big words out there, Dave, right? As a service utility cloud, it doesn't matter what it is super cloud it's super cloud. It doesn't really matter. Super. This is really Jud was talking about a really important element, which is around flexibility choice. There's uncertainty oftentimes in a, in an environment, but they want to control. They still want have a level of control and leveraging partnerships, being able to deliver flexibility and choice. Don't worry about the words. Don't worry about cloud utility as a service we end up solving the customer need, right? And when we talk about flex on demand, I'll give you a little bit deeper into flex on demand. So when we think about flex on demand, it really is about understanding the customer needs and our capability and Jed reference this, determining what a baseline is. So if you think about your own utility bill, right, you, you go home and even if you're on vacation for a month, I'm sure you went on vacation for a month right. Month at a time. If I ever. >>Yeah, >>I know, but if you leave you your utility bill, even if you don't turn on a light, you still get a utility bill, it's your baseline. So we, we determine a baseline with our customers, with computer center, to understand in your environment, you're gonna use this minimum amount and that becomes your baseline. And that baseline can go as low as 25%. And up to 80% in a environment, it usually is typically in this 70, 80%. And then we determine what is gonna be optimal based on that 25 or above we charge based on the usage on a day to day basis, average by a month. And if you go up one month during your peak, you get charged at that peak. If you then a couple months are lower, then you're gonna pay only for the usage. And so for a customer that's growing has variability or seasonality. >>Um, this is a great model cuz they can still control their environment either within their own domain or um, in a colo. They also have the capability to pick anything within the Dell ISG catalog, any product, configure it to meet their environment, be able to work with a trusted partner like computer center. That it's a solution based on a partner relationship and delivers choice and flexibility on the catalog of anything Dell sells within your control of how you can configure it. So it gives this ability to say, instead of buying and instead of paying a predictable payment, a I E a financing I'm gonna pay for use. Yeah. If I turn on my light switch more or if it's during the summer in Texas where I am the ACS a lot higher. So your utilities go up and if you are a much lower because you're on vacation in Hawaii, maybe you've been in vacation in Hawaii for a month, you're gonna have a much lower and you're gonna hit your baseline. Right. So it gives flexibility choice and it gives the control back to the customer. >>Okay. So the whole ISD portfolio. So you're like the tip of the spear for future apex, right? >>We, we, we absolutely are the tip and that's why, you know, Steve referenced a couple years ago as we were still in our infancy, growing, listening to our customers, listening to our partners, we've evolved to become a more robust program, um, 35 countries today. So we can cover 35 countries over the globe, all ISG you products that are sold with a high level of flexibility and it, and it's Jud and feedback over time that we've continued to evolve this program. Mm-hmm >>So Jud you, if I understood correctly, the business impact to you was gonna better predict predictability. You didn't have to over buy or undery and take all that risk. Is that right? You maybe could quantify. Did you ever quantify that? What can you tell us about the, the business impact? Yeah, >>Sure. So, I mean, traditionally we will, uh, base our capacity demands on, uh, complex calculation that effectively just boils down to number of engineers, like head count, uh, and you know, kind of personas within that. And we figure out, okay, well how many compute do we need? And then we say, okay, well how many tape outs are we doing? And when are those tape outs gonna land? And try to figure out which months are gonna be the hot months and the design teams have to kind of vary their tape out schedules so that they don't pile up all into like July or something. And then there's not enough compute capacity. So with, with something like flex on and where I can turn additional capacity on in our HBC farm, it, you know, we just go in and make some changes to the LSF configuration and say, Hey, you know, now you've got these extra nodes available. >>We don't really have to worry about that as much. Uh, in fact, last year we, we ended up with one month where for us, it was unusual. We had five tape outs, uh, at all land within two weeks of one and a other. And they all finished, which in previous years before we had deployed that that would not have been the outcome things we would've had multiple, uh, tape outs delayed. And you know, that that's a seven figure impact for each one of those commits that we miss with the foundries. So it it's a big deal. >>Yeah. That's real dollars. And >>It is. And you know what else, this, as, as Joe's going through this, we all know their supply chain chain constraints, right? And this solves a lot of supply constraints because Joe, if you would be purchasing today, you'd be buying, you're looking at had, and you're actually having to purchase today where if you go into an apex flex on demand, you don't have that full commitment of having to purchase, but you can get ahead of the supply chain. So you can be looking six months in advance, you can be doing capacity planning and I'm Jed. I'm sure you're doing that leveraging. Like what's my future and not be worried about, I have this huge burden upfront. >>Yeah. And I mean, we have two levers right now. One is we have this extra capacity there. I can, you know, pick up the phone and, and call our Dell rep and say, Hey, I'm gonna modify my commit rate. And so now that's, you know, the new baseline I can use all day every day. Uh, and, and, you know, we still have some burstability and then separately, we can say, we want to expand the contract or, or, or, you know, basically acquire more hardware for additional burst or additional commit. Both of those things are, are options. We only had the, we had to go buy it and we need to know when we have to have it available. So you kind of back into this ordering schedule for, uh, you know, like a traditional CapEx purchase. >>So Steve, obviously Silicon labs is, is leaning again. Are you seeing any other patterns in your customer base, uh, where this is being applied? What can you share >>With us there? Yeah, it's it, I believe this is a fairly horizontal solution. Any customer can really utilize it. I mean, traditionally people would buy for two and three years worth of capacity and slowly consume it over time, but you paid up front. Right. That's how it, that's kind of how it worked. Cause I didn't want to go back to the well year after year after year. Right. So, um, you know, and I, and I think, I think if anything, the, the, the cloud, the hyperscalers has, uh, taught the world, some things taught the industry. Some things, you know, in a, in a perfect world customers like to consume and pay for what they use, you know, and in the increments that they use it as much as possible as closely aligned to that as they could get. And what I see, what I see in this, you know, cuz I, I kind of put solu in my role, I'm putting solutions and customers and bringing those together other right. And, and complimenting that with services of our own. Right. But, but what I see over time that, that almost all the manufacturers and Dells does a wonderful job, but almost all the manufacturers will be delivering technology on a subscription basis. So the more I learn, the more I know, the more I understand about how to deliver those and provide those to customers is better off we are >>Because it aligns with business value. And that's what you're seeing Jud correct. >>Steve made an interesting comment in there. Uh, you know, he was talking about the cloud and for us, there's always pressure to say, Hey, you know, can we burst in the cloud? And for Edda workloads, every time we look at this, it's a data problem. It, it, it's not a computing problem for us. EA workloads tend to generate a lot of data and you know, there's a, there are a lot of tools, uh, you know, there's just a bunch of stuff that you have to have available to run those jobs. And so you have to look at that very carefully. The company that I work for Silicon labs has been around for a long time and we have a lot of development effort. That's been put into automating and simplifying things for our design engineering and trying to, you know, manipulate that and make it to where we can burst just certain jobs out to the cloud efficiently and cost effectively. Hasn't really resonated for us. But the flex on demand thing gave a us the ability to kind of achieve some of that burst ability. I mean, not to the same level of scale of course, but you know, we, we can do that at, you know, our own speed in our own data centers with our own data. And we don't have to worry about trying to, you know, peel an onion and put something new together, make it cloud friendly. It's >>Substantially similar. We gotta go. But to Aaron bring us home. >>Yeah. Hey, I think when we think about Dell, it's about listening to our customers and our partners. Mm-hmm <affirmative>, which we continue to do. We continue to evolve our products and, and apex is around choice and flexibility in delivering to customers an option to pay for what they use. It's a great solution. Appreciate the time guys. >>Great conversation. Thanks so much for coming on the cube. All right. Thank you. Good luck. All right. And thank you for watching. This is Dave VoLTE for the cube. We've been back with more wall to wall coverage. John furry, you'll be back Lisa Martin and Dave Nicholson. You're watching the queue >>And.

Published Date : May 3 2022

SUMMARY :

And Steve end is the regional VP So it's a high level pay for what you use when you use it with a high level of I like I'm really interested in what your requirements were, of jobs that we have to run and you have to decide, do we buy for peak or Do we over buy for peak normally, right, correct. It's always a hard decision. Cause we may have a peak every couple of months during, you know, the, the time to tape out in a negative way, and you you've been able to address other types of, uh, you know, financing was wasn't really attractive previously, at computer center and you know, why apex give us the background? I've known you for a long time. So it was a little, we were a little early on on putting it together. And when we talk about flex on demand, I'll give you a little bit deeper into flex on demand. And if you go up one month during So it gives flexibility choice and it gives the control back to the customer. So you're like the tip of the spear for future apex, We, we, we absolutely are the tip and that's why, you know, Steve referenced a couple years ago as we were still What can you tell us about the, of engineers, like head count, uh, and you know, kind of personas within that. And you know, And you know what else, this, as, as Joe's going through this, we all know their supply And so now that's, you know, the new baseline I can use all day every day. Are you seeing any other patterns in your And what I see, what I see in this, you know, cuz I, I kind of put solu in my role, And that's what you're seeing Jud correct. And we don't have to worry about trying to, you know, peel an onion and put something new together, But to Aaron bring us home. and apex is around choice and flexibility in delivering to customers an option to pay And thank you for watching.

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
Lisa MartinPERSON

0.99+

Dave NicholsonPERSON

0.99+

StevePERSON

0.99+

Dave VolantePERSON

0.99+

Steve FazendePERSON

0.99+

AaronPERSON

0.99+

HawaiiLOCATION

0.99+

Dell Financial ServicesORGANIZATION

0.99+

one monthQUANTITY

0.99+

70QUANTITY

0.99+

AustinLOCATION

0.99+

DellORGANIZATION

0.99+

Silicon LabsORGANIZATION

0.99+

twoQUANTITY

0.99+

JoePERSON

0.99+

80%QUANTITY

0.99+

60%QUANTITY

0.99+

last yearDATE

0.99+

TexasLOCATION

0.99+

AsiaLOCATION

0.99+

25QUANTITY

0.99+

DavePERSON

0.99+

Silicon labsORGANIZATION

0.99+

BostonLOCATION

0.99+

two monthsQUANTITY

0.99+

todayDATE

0.99+

Jud BarronPERSON

0.99+

three yearsQUANTITY

0.99+

Darren FedorowiczPERSON

0.99+

25%QUANTITY

0.99+

two weeksQUANTITY

0.99+

DarrenPERSON

0.99+

OneQUANTITY

0.99+

35 countriesQUANTITY

0.99+

35 countriesQUANTITY

0.99+

CapExORGANIZATION

0.99+

apexORGANIZATION

0.99+

JudPERSON

0.99+

JedPERSON

0.99+

a monthQUANTITY

0.98+

DellsORGANIZATION

0.98+

BothQUANTITY

0.98+

2022DATE

0.98+

two and a half years agoDATE

0.98+

JulyDATE

0.98+

APEX FoDORGANIZATION

0.98+

last nightDATE

0.98+

two leversQUANTITY

0.97+

John furryPERSON

0.96+

oneQUANTITY

0.95+

five tapeQUANTITY

0.95+

six monthsQUANTITY

0.95+

firstQUANTITY

0.94+

flexORGANIZATION

0.93+

multiyearQUANTITY

0.93+

HBCORGANIZATION

0.92+

couple years agoDATE

0.92+

up to 80%QUANTITY

0.91+

this monthDATE

0.91+

Aamir Lakhani, FortiGuard Labs | CUBE Conversation, July 2021


 

(upbeat music) >> Welcome to this cube conversation. I'm Lisa Martin. I'm joined by Aamir Lakhani, the Lead Researcher and Cybersecurity Expert at FortiGuard Labs at Fortinet. Aamir, welcome back to theCube. >> Hey, it's always good to be back on. >> It is, even though we're still in this work from anywhere environment, and that's one of the things that I want to talk to you about. We're in this environment now, I've lost count, 16 months, 17 months? And we now have this distribution of folks working still from home, maybe some in the office, and a good portion that probably want to remain remote. And one of the things that, that you guys have seen in this time is this huge uptick and sophistication in phishing attacks. Talk to me about what's going on. >> You know, it's a funny thing you mention that, Lisa, every attack that I've seen in the last 16 months usually has a phishing component, and over the last, even just the last couple of weeks, we've seen some really sophisticated attacks, attacks that are against industrial control systems, against critical infrastructure, against large corporations, government entities, and almost every one of those attacks, whether it's a ransomware attack, whether it's a denial of service attack, usually has a phishing component. And the sad part is usually the initial attack vector, how attackers are getting into the network, a lot of times as the first step is through phishing. And, you know, it works, it's a method that has always worked. It works just as well today as it always did, so attackers are basically going back to the well and basically making their phishing attacks more complicated, and more sophisticated, and it's much more effective than it ever used to be. >> Tell me how they're making it more sophisticated because I know, I've seen interesting examples through Twitter, for example, of people that are very well-versed, you might even consider them cybersecurity experts, who've just almost fallen for a phishing email that looks so legitimate. How is it getting more sophisticated? >> Well, what attackers are doing is they're definitely playing on your emotions. They understand that there's a lot of things happening in the world, and sometimes we get a little emotion about it, whether it's, "Hey, how do you get the latest vaccine?" Maybe information, you know, around getting jobs, going back to work, LinkedIn, is a good example. A lot of people are looking for jobs. When the U.S. elections were happening, and there was a lot of phishing attacks around, political donations, and affiliations. They kind of kind of find these hot button items that they know people are really going to not think first about security, and really think like, "Hey, how do I respond back to this?" and really attack them that way. The other thing that we're seeing on how it's getting complicated is, it used to be like a phishing attack. You know, it used to be pretty simple, like click on a link. Now what they're doing is they're actually targeting organizations and what you do as a job. For example, I've seen a lot of phishing attacks against the HR, the human resource departments, and I feel sad for anyone in human resources because their job all day is to basically open files, and emails from strangers, and that's what attackers are doing. They're like, "Hey, I want to apply for a cybersecurity position. "And by the way, my resume is encrypted. "Please click on this link to see "my secure version of my resume". And when they do that, you know, HR person may be thinking, "Hey, this is a cybersecurity guy, like good. "He's actually sending me an encrypted link." In reality, when they click on that button, it's attacking their machine, and actually getting into their organization. The attacks are getting into the organization. So they're using more and more tricks to actually technically bypass some of the security tools you may have. >> So getting more sophisticated by preying on emotions, and also using technology, and things that an HR person, like you said, would think, "Great, this is the level of sophistication that this applicant has. How do they, how do organizations start reducing those attacks, that are falling victim to these attacks? >> Yeah, so I was thinking, at Fortinet we always mention, like at FortiGuard labs, that training and security awareness is some of the best ways you can protect against this attack. At Fortinet we have our training advancement agenda, that's out of Fortinet.com/training/taa. Basically what that does, well what we emphasize, what we preach, is that training is the key and education is the key, in helping protect against those attacks. And, you know, you can train anyone these days, at least some level of, you know, awareness. My mom used to call me up, and used to tell me like, "Hey, I got the IRS calling me, "should I answer these questions?" I was like, "No, absolutely not, like this is dangerous, "the IRS doesn't call you up and asking you "for your credit card number." I actually had my mum go for our level, one of our training, and she actually gets it. She's like, "Okay, I get why I shouldn't call the, you know, "answer the questions from the IRS now." So I say any type of training, to anyone you can give, and you can start it off like with people in high school, with people in elementary school, all the way up to professionals, I think it helps in all levels. >> So first of all, your mom sounds like my mom, and I need to get my mom to do this training, I really do. But one of the things that kind of highlights is the fact that there are five generations in the workforce. So there, and in every industry, there is a huge variety of people that understand technology, and know to be suspicious. And that's one of the things I think that's challenging for organizations, because if a lot of that responsibility falls on the person, the more sophisticated, the more personalized this phishing email is, the more likely I'm to think this is legitimate instead of questioning it. So that training that you're talking about, tell me a little bit more about that. You mentioned a variety of ages and generations, that folks as young as high school kids, and then folks in our parents' generation can also go on and learn how to navigate through basic emails, for example, to look for, to see what to look for. >> Yeah, it's not only emails. So attackers, like I said, they are getting sophisticated. We are seeing phishing attacks, not only through emails, but through applications, mobile applications. There's actually like some advanced phishing techniques now on smart speakers. When you ask your smart speaker, a certain skill like, "Hey, tell me my balance, "tell me what the weather is." There's like some phishing attacks there. So there's phishing attacks all across the board. Obviously, when we talk about phishing we're mostly talking about email attacks, but every generation kind of has their tools kind of has their, you know, techniques or apps that they're comfortable with. So, and we're trained, like a lot of my friends are trained to basically click on any app, download any app, allow, they don't really read the pop-ups that say like, "Do you want to share information?" They'll just start sharing information. People in the workforce, like sometimes that are not paying attention, they're just clicking on emails, and attackers realize this, most of the time when attacks happen, it's not when you're paying attention. It's like when we're on our Zoom calls, and we're actually like looking at our phones, looking at emails, multitasking, and that's when your attention kind of diverts a little bit, And that's when attackers are really jumping in, and really trying to take advantage of that situation. And that's, I think that's a good idea about the training is because it opens up your eyes to understand, hey, it's more about just emails, it's really about every way we can use technology, can be a vector on how we get attacked, and we have a couple of good examples on that as well. >> Let's talk about that, cause I want to see how easy it is for the bad actors to create phishing attacks. You were saying, it's not just email, it's through apps, it's through my smart speaker, which is one of the reasons I don't have one. But talk to me about how easy it is for them to actually set these up. >> Yeah, so we have, I think we have a demo we can show, an example that we can show, of what's going on. And what I'm showing here is basically how easy you can download proof of concept apps. Now, what I'm showing here is actually a defensive tool, it's for defenders, and people that want to test for security on testing, phishing, and how susceptible their organization may be to phishing. But you can see like attackers could do something very similar. This tool is called Black Eye. And what it does is allows me to create multiple different types of phishing websites. I can create a custom one, or I can use a template that's already created. Once I use this template, for example I'm using the LinkedIn template here, it's going to create a website for me. It already, this website, I can embed into a link if I was, if I was potentially a bad guy, I could hide it behind a link. I could potentially change the website to make it look more like LinkedIn. But when I go to the LinkedIn fake website, this phishing website, which is hosted, you'll see, it kind of looks like LinkedIn. It actually has that little security box, that little green box, because it generates a certificate as well. And when I go to the real LinkedIn website, yes, the real LinkedIn website does look a little different. It's using a more updated template, a more updated website, but most people aren't going to notice the difference between the real LinkedIn website, and here, where we have the fake LinkedIn website. And I'll just show you like, if I log in and I'm going to log in with a demo account, this is actually a honeypot demo account that we have, just to showcase this tool. But I'll log in here, and you'll see from our test box, as soon as we log in, and we go back to the attacker's point of view, he's captured the username, the password, but not only that he has the IP address, the ISP, the location of where the victim is coming from. So they have a lot of different types of information that they've captured. And this is just one simple way of doing the attack. Now, one thing to remember, I know I speak very fast, but at the same time, this is real time. I didn't like copy and paste anything, I just recorded this in real time, and replayed this. And this is how easy it is for an attacker to potentially start setting up a system where they can attack victims. >> That's remarkable, because I mean, I'm in LinkedIn every day, and I don't know, you talked about, we're all busy, multitasking, and things like that. I don't know that I would've, nothing that you showed caught my attention. So how would I know to, what would I know to look for as a user, as a potential victim? How do I look for something on that page to tell me "think twice about this? >> Yeah, it's getting much more difficult these days. I mean, one of the things that I do is I try and make sure I type in like the addresses, especially when I get links in emails, I try not to like, just click on the link directly. I try and look at what's behind that link, is it really going to the LinkedIn website, you know, I'll try and go ahead and type in it, type in the website in the web browser. But mostly I think the thing that we can do to all protect ourselves is like kind of slow down. One of the reasons I mentioned LinkedIn is not because LinkedIn is doing anything bad. They're actually taking a lot precautions on being secure. But you know, people, these days are very emotion, they're going back to work, they're maybe looking for new jobs, or they're trying to get back into the workforce after a pandemic. So there's a lot of people that are getting phishing attacks from attackers, and it's a really mean thing. They're taking once again, advantage of that emotion, like someone needs a job, so let me go ahead and send them a LinkedIn link, and this time they're just stealing their username and passwords. >> That's remarkable. I think another thing you can do, can you hover over the link, and if it looks suspicious, if it doesn't go to like linkedin.com, for example, in this case, that's one way, right, is to check out what that actual URL is. >> Yeah, absolutely, and that's a great way of doing that, so we definitely recommend that. Look at the, hover over the link, look over the links, type in the links directly if you can. And you can see like, you know, attackers are getting sophisticated.. We used to tell people, look for that green lock box, attackers can now generate that green lockbox, so you have to do a little more due diligence. Just keep your eyes a little sharper these days. >> Do you thing phishing is, and I know a lot of us understand what it is, but do you think it's as common ransomware was up? I think Derek told me 7X in the second half of calendar year, 2020, Is phishing becoming more of a household word like ransomware is? Or is that something that you think actually will help more organizations, and more people and more generations be just more aware of let me just take a step back, and check that this is legitimate. >> Yeah, so phishing, you have to remember is it's like the initial attack. So the demo that I just showed you, you could say the true attack was me possibly stealing the username and password, but a phishing would be the way that someone would get to get to that. Like by essentially mimicking the LinkedIn website, as I showed in the example. So ransomware is an attack, it's the main attack. Usually the attack that attackers are going for, but how they get into the system is usually through a phishing site. They'll usually try and phish your username and password to your corporate site, maybe your VPN services, or your remote desktop services. So phishing is usually in conjunction with another attack, and that's the scary part is attackers have a lot of attacks that you can choose from, but the attacks that they're normally normally conducting to get that initial access to your system is phishing. >> So besides training, which is obviously absolutely critical, how can organizations protect themselves against this threat landscape that I imagine is only going to continue to grow? >> Yeah, no, it's definitely going to continue to grow. And as I said, I really believe education is the best thing you can do. But on top of that, you know, just I would say, you know, cyber hygiene. The basic things that we always mention every time, it was like, make sure like your security products are up to date, make sure they're installed, make sure your patches are up to date, which is very difficult, but that does start helping things. Make sure you're using the latest version of your web browser. There's a lot of web browsers these days has some sort of anti-phishing type of tools in them as well, especially for websites. So they can kind of detect things. There's a once again, a lot of just even free plugins, security plugins, that are available, that kind of detect a lot of phishing sites as well. So there's a lot of things I think people can do to protect themselves from a technology standpoint. You know, with basic cyber hygiene, as well as security awareness. >> So you think this is really preventable, essentially. >> I don't think it's 100% preventable, because I think, you know, attackers are always going to take advantage of those times in our emotion when our emotions are heightened, and they're going to take advantage of just us sometimes like not paying as much attention to as we can. But I think you can definitely reduce that attack surface. The more we educate ourselves. >> Absolutely, tell me that training website again. >> Sure things, so it's basically Fortinet.com/training/taa. >> Excellent, and can you access different levels? Like if I literally point my mom to that website, can she access something that would be at her 75 year old brain level? >> Absolutely, so we have different levels out there. I would suggest that I go trying, everyone should try basically Level 1, NSC Level 1. That's our Security Institute. So that's really good awareness for everyone on all sorts of different levels. But we have training, geared towards specific individuals, and different age groups as well. >> Excellent, and it's one of those things that culturally is difficult I think for Americans, slow down, right? We don't do that, especially when people are still working from home, and probably now it's summertime, kids are out of school, things are a little bit more chaotic. That that best practice of an organization really keeping up with their cyber hygiene and us as individuals slowing down, checking something are really some of the best ways. Aamir, this is such an interesting topic. Thank you for showing us how easy it is to create phishing attacks, and what some of the things are that we as individuals, and companies can do to protect ourselves against it. >> Hey, no problem, glad to be here. >> For Aamir Lakhani, I'm Lisa Martin, you're watching this Cube conversation. (soft music)

Published Date : Jul 26 2021

SUMMARY :

the Lead Researcher and and that's one of the things that I want and over the last, even just of people that are very well-versed, some of the security tools you may have. that this applicant has. is some of the best ways you can protect And that's one of the things I think most of the time when attacks happen, for the bad actors to but not only that he has the IP address, on that page to tell me I mean, one of the things that I do I think another thing you can do, And you can see like, you know, and check that this is legitimate. and that's the scary part is the best thing you can do. So you think this is really and they're going to take advantage Absolutely, tell me that But we have training, geared towards are really some of the best ways. you're watching this Cube conversation.

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
Aamir LakhaniPERSON

0.99+

Lisa MartinPERSON

0.99+

FortinetORGANIZATION

0.99+

LinkedInORGANIZATION

0.99+

AamirPERSON

0.99+

July 2021DATE

0.99+

DerekPERSON

0.99+

100%QUANTITY

0.99+

LisaPERSON

0.99+

16 monthsQUANTITY

0.99+

17 monthsQUANTITY

0.99+

FortiGuardORGANIZATION

0.99+

FortiGuard LabsORGANIZATION

0.99+

IRSORGANIZATION

0.99+

first stepQUANTITY

0.99+

OneQUANTITY

0.99+

oneQUANTITY

0.99+

twiceQUANTITY

0.98+

7XQUANTITY

0.98+

75 year oldQUANTITY

0.98+

five generationsQUANTITY

0.98+

Security InstituteORGANIZATION

0.97+

Level 1OTHER

0.97+

one simple wayQUANTITY

0.97+

todayDATE

0.97+

rtinet.com/training/taaOTHER

0.97+

pandemicEVENT

0.95+

TwitterORGANIZATION

0.94+

one thingQUANTITY

0.94+

Fortinet.com/training/taaOTHER

0.94+

last couple of weeksDATE

0.93+

firstQUANTITY

0.93+

2020DATE

0.93+

AmericansPERSON

0.91+

last 16 monthsDATE

0.84+

second half of calendar yearDATE

0.84+

CubeORGANIZATION

0.82+

one wayQUANTITY

0.82+

NSCOTHER

0.81+

U.S. electionsEVENT

0.75+

every oneQUANTITY

0.67+

Black EyeTITLE

0.65+

lot of thingsQUANTITY

0.55+

linkedin.comOTHER

0.52+

CUBEEVENT

0.49+

Richard Hartmann, Grafana Labs | KubeCon + CloudNativeCon Europe 2021 - Virtual


 

>>from around the >>globe. It's the >>cube with coverage of Kublai >>Khan and Cloud Native Con Europe 2021 >>virtual brought to >>you by red hat, the cloud native computing foundation and ecosystem partners. Hello, welcome back to the cubes coverage of coupon 21 Cloud Native Con 21 Virtual, I'm John Ferrier Host of the Cube. We're here with a great gas to break down one of the hottest trends going on in the industry and certainly around cloud native as this new modern architecture is evolving so fast. Richard Hartman, director of community at Griffon, a lab's involved with Prometheus as well um, expert and fun to have on and also is going to share a lot here. Richard, thanks for coming. I appreciate it. >>Thank you >>know, we were chatting before we came on camera about the human's ability to to handle all this new shift uh and the and the future of observe ability is what everyone has been talking about. But you know, some say the reserve abilities, just network management was just different, you know, scale Okay, I can buy that, but it's got a lot more than that. It involves data involves a new architecture, new levels of scale that cloud native has brought to the table that everyone is agreeing on. It scales their new capabilities, thus setting up new architectures, new expectations and new experiences are all happening. Take us through the future of observe ability. >>Mhm. Yes, so um 11 of the things which many people find when they onboard themselves onto the cloud native space is um you can scale along different and new axis, which you couldn't scale along before, uh which is great. Of course, it enables growth, it enables different operating models, it enables you to choose different or more modern engineering trade offs, like the underlying problems are still the same, but you just slice and dice your problems and compartmentalize your services differently. But the problem is um it becomes more spread out and the more classic tooling tends to be built for those more classic um setups and architectures as your architecture becomes more malleable and as you can can choose and pick how to grow it along with which access a lot more directly and you have to um that limits the ability of the humans actually operating that system to understand what is truly going on. Um Obviously everyone is is fully fully all in on A. I. M. L. And all those things. But one of the dirty secrets is you will keep needing domain specific experts who know what they're doing and what that thing should look like, what should be working hard to be working. But enable those people to actually to actually understand the current state of the system and compare this to the desired state of the system. Is highly nontrivial in particular, once you have not machine lifetimes of month or years which he had before, which came down to two sometimes hours and when you go to Microsoft to surveillance and such sometimes even into sub seconds. So a lot of this is about enabling this, this this higher volume of data, this higher scale of data, this higher cardinality of what what you actually attach as metadata on your data and then still be able to carry all this and makes sense of it at scale and at speed because if you just toss it into a data lake and do better analysis like half a day later no one cares about it anymore. It needs to be life it needs or at least the largest part of it needs to be life. You need to be able to alert right now if something is imminently customer facing. >>Well, that's awesome. I love totally agree this new observe ability horizontally scalable, more surface area, more axes, as you point out, changes the data equation on the automation plays a big role in mention machine learning and ai great, great grounds for that. I gotta ask you just well before we move on to the next topic around this is that the most people that come from the old world with the tooling and come from that old school vendor mentality or old soup architecture, old school architecture tend to kind of throw stones at the future and say, well the economics are all wrong and the performance metrics. So I want to ask you so I assume that we believe we do believe because assume that's going to happen. What is the economic picture? What's the impact that people are missing? When you look at the benefits of what this system is going to enable the impact? Specifically whether it's economics, productivity, efficient code, what are some of the things that maybe the VCS or other people in the naysayers side? Old school will, will throw stones at what's the, what's the big upside here? >>Mhm. So this will not be true for everyone and there will still be certain situations where it makes sense to choose different sets of of trade offs, but most everyone will be moving into the cloud for for convenience and speed reasons. And I'm deliberately not saying cost reasons. Um the reason being um usually or in the past you had simply different standard service delineations and all of the proserve, the consulting your hiring pool was all aligned with this old type of service delineation, which used to be a physical machine or a service or maybe even a service and you had a hot standby or something. If we, if we got like really a hugely respect from the same things still need to operate under laying what you do. But as we grow as an industry, more of more of this is commoditized and same as we commoditize service and storage network. We commoditized actually running off that machine and with service and such go even further. Um so it's not so much about about this fundamentally changing how it's built. It's just that a larger or a previously thing which was part of your value at and of what you did in your core is now just off the shelf infrastructure which you just by as much as you need again at certain scales and for certain specific use cases, this will not be true for the foreseeable future, but most everyone um will be moving there simply because where they actually add value and the people they can hire for and who are interested in that type of problem. I just mean that it's a lot more more sensical to to choose this different delineation but it's not cheaper >>and the commoditization and disintermediation is definitely happening, totally agree. And the complexity that's gonna be abstracted away with software is novell and it's also systematic. There's just it's new and there's some systems involved, so great insight there. I totally agree with you. The disruption is happening majority of almost all areas, so in all verticals and all industries, so so great point. I think this is where I think everyone's so excited and some people are paranoid actually frankly, but we cover that in depth on the Cuban other segments. But great point. We'll get back to what you're where you're spending your time right now. Um You're spending a lot of time on open metrics. What is that enabling take us through that? >>So um the super quick history of Prometheus, of course, we need that for open metrics. Promises was actually created in 2012. Um and the wire format which he used to in the exposition format, which he used to transport metrics into Prometheus is stable since 2014. Um But there is a large problem here. Um It carries the promise his name and a lot of competing projects and a lot of competing vendors of course there are vendors which compete with just the project. Um It's simply refused to to to take anything in which carried the promise his name. Of course, this doesn't align with their food um strategy, which they ran back then. So um together with scenes, the f we decided to just have a new different name for just that wire format for the underlying data model for everything which you need to make one complete exposition or a bunch of expositions towards towards permissions. So that's it at the corn, that's been ongoing since 2000 and 15 16 something. Um But there's also changes on the one hand, there is a super careful, a super super careful um Clean up and backwards compatible cleanup of a few things which the permit this exposition former serious here for didn't get right. But also we enable two features within this and as permitted chose open metrics as its official format. We also uplift committees and varying both heads. Obviously it's easier to get the synchronization. Um Ex employers stand out which is a completely new, at least outside of certain large search companies google. Um Who who used who use ex employers to do something different with with their traces. Um it was in 2017 when they told me that for them searching for traces didn't scale by labels. Uh and at that point I wanted to have both. I wanted to have traces and logs also with the same label set as permitting system. But when they tell you searching doesn't scale like they tell you you better listen. So uh the thing is this you have your index where you store all your data or your where you have the reference to enter your database and you have these label sets and they are super efficient and and quite powerful when compared to more traditional systems but they still carry a cost and that cost becomes non trivial at scale. So instead of storing the same labels for your metrics and your logs and your traces, the idea is to just store an I. D. For your trace which is super lightweight and it's literally just one idea. So your index is super tiny. Um And then you touch this information to your logs to your metrics and in the meantime also two year to year logs. Um So you know already that trace has certain properties because historically you have this needle estate problem. You have endless amounts of traces and you need to figure out what are the useful are they are the judicial and interesting aero state highlight and see some error occurring whatever if that information is already attached to your other signals. That's a lot easier. Of course. You see you're highlighting see bucket and you see a trace ID which is for that high latency bucket. So going into that trace, I already know it is a highlight and see trace for for a service which has a high latency, it has visited that labor. It was running this in that context, blah blah blah blah blah. Same for logs. There is an error. There is an exception, maybe a security breach, what have you and I can jump directly into a trace and I have all this mental context and the most expensive part is the humans. So enabling that human to not need to break mental uh train of thought to just jump directly from all the established state which they already have here in debugging just right into the trace, went back and just see why that thing behave that way. It's super powerful and it's also a lot cheaper to store this on the back and a four year traces which in our case internally we just run at 100% something. We do not throw data way, which means you don't have the super interesting thing. And by the way the trace just doesn't exist for us a good job. And that's the one thing to to from day one this intent to to marry those three pillars more closely. The other thing is by having a true lingua franca. It gave that concept of of of promises compatibility on the wire, its own name and it's its own distinct concept. And that is something which a lot of people simply attached to. So just by having that name, allow the completely different conversation over the last half decade or so and to close >>them close it >>up and to close that point because I come from the network, from the networking space and, and basically I T f r f C s are the currency within the networking space and how you force your vendors to support something, which is why I brought open metrics into the I. D. F. To to give it an official stamp of approval in Rfc number which is currently hopefully successful. Um So all of a sudden you can slip this into your tender and just tell your vendor, ex wife said okay, you need to support this. But I've seen all of a sudden by contract they're bound to to support communities native. So >>I support that Rfc yet or no, is that still coming? >>I, so at the last uh TF meeting, which was virtual, obviously I presented everything to the L. A W G. Um there was very good feedback. Um they want to adopt it as an informational uh I. D. Reason being it is most or it is a documentation of an already widely existed standard. So it gets different bits and pieces in the heather. Um Currently I'm waiting for a few rounds of feedback on specific wording how to make it more clear and such. Um looking >>good. It's looking good. >>Oh yes while presenting it. They actually told me that I have a conference with promises and performance. Well >>that's how you get things done in the old school internet. That's the way it was talking to Vince serving all of my friends and that generation we grew up, I mean I was telling a story on the clubhouse, just random that I grew up in the era. We used to pirate software used to deal software back in the old days. Pre open source. This is how things get done. So I gotta ask you the impact question. The, the deal with open metrics potentially could disrupt all those startups. So what, how does this impact all these stars because everyone is jockeying for land grabbing the observe ability space? Is that just because it's just too many people competing for one spot or do they all have differentiation? What happens to all those observe ability startups that got minted and funded? >>So I have, I think we have to split this into two answers, the first one open metrics and also Prometheus we're trying really hard to standardize what we're doing and to make this reusable as much as we possibly can um simply because premises itself does not have any any profit motivation or anything, it is just a project run by people. Um so we gain by, by users using our stuff and working in the way, which we think is a good way to operate. So anyone who just supports all those open standards, just on boards themselves onto a huge ecosystem of already installed base. And we're talking millions and millions and millions of installations, we don't have hard numbers, but the millions and millions I am certain of and thats installations, not users, so that's several orders of magnitude more. Um, so that that actually enables an ecosystem within which to move as to the second question. It is a super hot topic. So obviously that we see money starts coming in from all right. Um, I don't think that everyone will survive, but that is just how it usually is. There is a lot of of not very differentiated offerings, be the software, be they as a service, be their distributions? Well, you don't really see much much value and not not a lot of, not a lot of much anything in ways of innovation. So this is more about about making it easier to run or or taking that pain away, which obviously makes you open to attack by by all the hyper scale. Of course, they can just do this at a higher scale than you. Um, so unless you actually really in a way in that space and actually shape and lead in that space, at least to some extent, it will probably be relatively hard. That being said. >>Yeah, when you ride, when you ride the big waves like this, I mean, you you got to be on the right side of this. Uh, Pat Gelsinger's when he was that VM Where now is that intel told me on the cube one time. If you're not, you don't get it right on these waves, your driftwood, Right? So, so, you know, and we've seen this movie before, when you start to see the standards bodies like the I E T. F. Start to look at standards. You start to think there's a broader market opportunities, a need for some standards, which is good. It enables more value, right value creation, whether it's out in the open or if it's innovative from a commercialization standpoint, you know, these are good things and then you have everyone who's jockeying around from the land grab incomes, a standard momentum, you gotta be on the right side of these things. We know what we know it's gonna look like. If you're not on the right side of the standard, then your proprietary, >>precisely. >>And so that's the endgame. Okay, well, I really appreciate the impact. Final question. Um, as the world evolved post Covid as cloud Native goes mainstream, the enterprises in the cloud scale are demanding more things. Enterprises are are, you know, they want more stuff than just straight up in the cloud startups, for instance. So you start to see, you know, faster, more agility obviously, uh, with deploying modern apps, when you start getting into enterprise grade scale, you gotta start thinking, you know, this is an engineering and computer science discipline. Coming together, you've got to look at the architecture. What's your future vision of how the next gen programmable infrastructure looks like? >>You mean, as in actually manage those services or limited to observe ability to >>observe ability, role, observe ability. Just you're in the urine. The survivability speaks to the operating system of what's going on, distributed computing you're looking at, you gotta have a good observe ability if you want to deploy services. So, you know, as it evolves and this is not a fringe thing anymore. This is real deal. This observe abilities a key linchpin in the architecture. >>So, um, maybe to approach us from two sides. One of the things which, which, I mean I come from very much non cloud native background. One of the things which tends to be overlooked in cloud native is that not everything is green field. Matter of fact, legacy is the code word for makes actual money. Um, so a lot of brownfield installations, which still make money, which we keep making money and all of those existence, they will not go away anytime soon. And as soon as you go to actually industry trying to uplift themselves to industry that foreign, all those passwords you get a lot more complexity in, in just the availability of systems than just the cloud native scheme. So being able to to actually put all of those data types together and not just have you. Okay, nice. I have my micro service events fully instrumented and if anything happens on the layer below, I'm simply unable to make any any effort on debugging um things like for example, Prometheus course they are so widely adopted enable you to literally, and I did this myself um from the Diesel Genset of your data center over the network down to down to the office. If if someone is in there, if if if your station and your pager is is uh stepped in such to the database to the extra service which is facing your end customers, all of those use the same labels that use the same metadata to actually talk about this. So all of a sudden I can really drill down into my data, not only from you. Okay. I have my microservices, my database. Big deal. No, I can actually go down as deep in my infrastructure as my infrastructure is. And this is especially important for anyone who's from the more traditional enterprise because most of them will for the foreseeable future have tons and tons and tons of those installations and the ability to just marry all this data together no matter where it's coming from. Of course you have this lingual franklin, you have these widely adopted open standards. I think that is one of the main drivers in >>jail. I think you just nailed the hybrid and surprised use case, you know, operation at scale and integrating the systems. So great job Richard, thank you so much for coming on. Richard Hartman, Director of community Griffon A labs. I'm talking, observe ability here on the cube. I'm john for your host covering cube con 21 cognitive content. One virtual. Thanks for watching. Mhm Yeah. Mhm.

Published Date : May 4 2021

SUMMARY :

It's the 21 Virtual, I'm John Ferrier Host of the Cube. But you know, some say the reserve abilities, just network management was just different, like the underlying problems are still the same, but you just slice and dice your problems and compartmentalize So I want to ask you so I assume that we believe we do believe because assume that's at and of what you did in your core is now just off the shelf infrastructure And the complexity that's gonna be abstracted away with software is novell and it's also systematic. We do not throw data way, which means you don't have the super interesting of a sudden you can slip this into your tender and just tell your vendor, ex wife said okay, I, so at the last uh TF meeting, which was virtual, It's looking good. have a conference with promises and performance. So I gotta ask you the impact question. or or taking that pain away, which obviously makes you open to attack by and we've seen this movie before, when you start to see the standards bodies like the I E T. F. So you start to see, you know, faster, more agility obviously, uh, with deploying modern apps, So, you know, as it evolves and this is not a fringe thing anymore. One of the things which tends to be overlooked in cloud native is that not everything is green field. I think you just nailed the hybrid and surprised use case, you know, operation at scale

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
RichardPERSON

0.99+

Richard HartmanPERSON

0.99+

John FerrierPERSON

0.99+

2017DATE

0.99+

2012DATE

0.99+

MicrosoftORGANIZATION

0.99+

second questionQUANTITY

0.99+

100%QUANTITY

0.99+

Richard HartmannPERSON

0.99+

OneQUANTITY

0.99+

11QUANTITY

0.99+

twoQUANTITY

0.99+

millionsQUANTITY

0.99+

two sidesQUANTITY

0.99+

one spotQUANTITY

0.99+

PrometheusTITLE

0.99+

VincePERSON

0.99+

2014DATE

0.99+

two answersQUANTITY

0.99+

Grafana LabsORGANIZATION

0.99+

Pat GelsingerPERSON

0.99+

four yearQUANTITY

0.99+

2000DATE

0.99+

KubeConEVENT

0.99+

one ideaQUANTITY

0.99+

two featuresQUANTITY

0.99+

three pillarsQUANTITY

0.98+

two yearQUANTITY

0.98+

bothQUANTITY

0.98+

googleORGANIZATION

0.97+

oneQUANTITY

0.97+

one thingQUANTITY

0.96+

first oneQUANTITY

0.96+

GriffonORGANIZATION

0.95+

halfDATE

0.95+

one timeQUANTITY

0.94+

15DATE

0.93+

both headsQUANTITY

0.93+

day oneQUANTITY

0.9+

Griffon A labsORGANIZATION

0.87+

CloudNativeCon Europe 2021EVENT

0.86+

Cloud Native ConEVENT

0.84+

last half decadeDATE

0.82+

CubanOTHER

0.81+

Cloud Native Con EuropeEVENT

0.81+

red hatORGANIZATION

0.79+

CovidTITLE

0.77+

tonsQUANTITY

0.76+

too many peopleQUANTITY

0.76+

a day laterDATE

0.74+

johnPERSON

0.73+

con 21COMMERCIAL_ITEM

0.71+

21 VirtualCOMMERCIAL_ITEM

0.7+

L. A WORGANIZATION

0.7+

KublaiPERSON

0.68+

intelORGANIZATION

0.65+

VCSORGANIZATION

0.65+

16DATE

0.63+

RfcORGANIZATION

0.54+

franklinORGANIZATION

0.53+

KhanPERSON

0.47+

2021DATE

0.47+

21COMMERCIAL_ITEM

0.34+

Derek Manky, FortiGuard Labs | CUBE Conversation 2021


 

(upbeat music) >> Welcome to this CUBE conversation. I am Lisa Martin, excited to welcome back one of our distinguished alumni, Derek Manky joins me next. Chief security Insights and Global Threat Alliances at Fortinet's FortiGuard Labs. Derek, welcome back to the program. >> Yes, it's great to be here and great to see you again, Lisa. Thanks for having me. >> Likewise, yeah, so a lot has happened. I know we've seen you during this virtual world, but so much has happened with ransomware in the last year. It's unbelievable, we had this dramatic shift to a distributed workforce, you had personal devices on in network perimeters and non-trusted devices or trusted devices on home networks and lots of change there. Talk to me about some of the things that you and FortiGuard Labs have seen with respect to the evolution of ransomware. >> Yeah, sure, so it's becoming worse, no doubt. We highlighted this in our Threat Landscape Report. If we just take a step back looking at ransomware itself, it actually started in the late 1980s. And it didn't, that was very, they relied on snail mail. It was obviously there was no market for it at the time. It was just a proof of concept, a failed experiment if you will. But it really started getting hot a decade ago, 10 years ago but the technology back then wasn't the cryptography they're using, the technique wasn't as strong as easily reversed. And so they didn't really get to a lot of revenue or business from the cyber criminal perspective. That is absolutely not the case today. Now they have very smart cryptography they're experts when say they, the cyber criminals at their game. They know there's a lot of the attack surfaces growing. There's a lot of vulnerable people out there. There's a lot of vulnerable devices. And this is what we saw in our threat landscape group. What we saw at seven times increase in ransomware activity in the second half of 2020. And that momentum is continuing in 2021. It's being fueled by what you just talked about. By the work from anywhere, work from home environment a lot of vulnerable devices unpatched. And these are the vehicles that the ransomware is the payload of course, that's the way that they're monetizing this. But the reality is that the attack surface has expanded, there's more vulnerable people and cyber criminals are absolutely capitalizing on that. >> Right, we've even seen cyber criminals capitalizing on the pandemic fears with things that were around the World Health Organization or COVID-19 or going after healthcare. Did you see an uptick in healthcare threats and activities as well in the last year? >> Yeah, definitely, so I would start to say that first of all, the... Nobody is immune when it comes to ransomware. This is such again, a hot target or a technique that the cybercriminals are using. So when we look at the verticals, absolutely healthcare is in the top five that we've seen, but the key difference is there's two houses here, right? You have what we call the broad blanketed ransomware attacks. So these aren't going after any particular vertical. They're really just trying to spray as much as they can through phishing campaigns, not through... there's a lot of web traffic out there. We see a lot of things that are used to open playing on that COVID-19 theme we got, right? Emails from HR or taxes and scams. It's all related to ransomware because these are how they're trying to get the masses to open that up, pay some data sorry, pay some cryptocurrency to get access to their data back. Oftentimes they're being held for extortions. They may have photos or video or audio captures. So it's a lot of fear they're trying to steal these people but probably the more concern is just what you talked about, healthcare, operational technology. These are large business revenue streams. These are take cases of targeted ransoms which is much different because instead of a big volumetric attack, these are premeditated. They're going after with specific targets in mind specific social engineering rules. And they know that they're hitting the corporate assets or in the case of healthcare critical systems where it hurts they know that there's high stakes and so they're demanding high returns in terms of ransoms as well. >> With respect to the broad ransomware attacks versus targeted a couple of questions to kind of dissect that. Are the targeted attacks, are they in like behind the network firewall longer and faster, longer and getting more information? Are they demanding higher ransom versus the broader attacks? What's what are some of the distinctions there besides what you mentioned? >> Yeah, absolutely so the targeted texts are more about execution, right? So if we look at the attack chain and they're doing more in terms of reconnaissance, they're spending more cycles and investment really on their end in terms of weaponization, how they can actually get into the system, how they can remain undetected, collecting and gathering information. What we're seeing with groups like Ragnar Locker as an example, they're going in and they're collecting in some cases, terabytes of information, a lot, they're going after definitely intellectual property, things like source code, also PII for customers as an example, and they're holding them. They have a whole business strategy and plan in mind on their place, right? They hold them for ransom. They're often, it's essentially a denial of service in some cases of taking a revenue stream or applications offline so a business can't function. And then what they're doing is that they're actually setting up crime services on their end. They, a lot of the the newest ransom notes that we're seeing in these targeted attacks are setting up channels to what they call a live chat support channel that the victim would log into and actually talk directly live to the cybercriminal or one of their associates to be able to negotiate the ransom. And they're trying to have in their point of view they're trying frame this as a good thing and say, we're going to show you that our technology works. We can decrypt some of the files on your system as an example just to prove that we are who we say we are but then they go on to say, instead of $10 million, we can negotiate down to 6 million, this is a good deal, you're getting 30% off or whatever it is but the fact is that they know by the time they've gotten to this they've done all their homework before that, right? They've done the targets, they've done all the things that they can to know that they have the organization in their grasp, right? >> One of the things that you mentioned just something I never thought about as ransomware as a business, the sophistication level is just growing and growing and growing and growing. And of course, even other bad actors, they have access to all the emerging technologies that the good guys do. But talk to me about this business of ransomware because that's what it seems like it really has become. >> Absolutely, it is massively sad. If you look at the cybercrime ecosystem like the way that they're actually pulling this off it's not just one individual or one cyber crime ring that, let's say five to 10 people that are trying to orchestrate this. These are big rings, we actually work closely as an example to, we're doing everything from the FortiGuard Labs with following the latest ransomware trends doing the protection and mitigation but also working to find out who these people are, what are their tactics and really attribute it and paint a picture of these organizations. And they're big, we worked on some cases where there's over 50 people just in one ransomware gang. One of the cases we worked on, they were making over $60 million US in three months, as an example. And in some cases, keep in mind one of these targeted attacks like in terms of ransom demands and the targeted cases they can be an excess of $10 million just for one ransom attack. And like I said, we're seeing a seven times increase in the amount of attack activity. And what they're doing in terms of the business is they've set up affiliate marketing. Essentially, they have affiliates in the middle that will actually distribute the ransomware. So they're basically outsourcing this to other individuals. If they hit people with their ransomware and the people pay then the affiliate in the middle will actually get a commission cut of that, very high, typically 40 to 50%. And that's really what's making this lucrative business model too. >> Wow, My jaw is dropping just the sophistication but also the different levels to which they've put a business together. And unfortunately, for every industry it sounds very lucrative, so how then Derek do organizations protect themselves against this, especially knowing that a lot of this work from home stuff is going to persist. Some people want to stay home, what not. The proliferation of devices is only going to continue. So what are organizations start and how can you guys help? >> Start with the people, so we'll talk about three things, people, technology and processes. The people, unfortunately, this is not just about ransomware but definitely applies to ransomware but any attack, humans are still often the weakest link in terms of education, right? A lot of these ransomware campaigns will be going after people using nowadays seems like tax themes purporting to be from the IRS as an example or human resources departments or governments and health authorities, vaccination scams all these things, right? But what they're trying to do is to get people to click on that link, still to open up a malicious attachment that will then infect them with the ransomware. This of course, if an employee is up to date and hones their skills so that they know basically a zero trust mentality is what I like to talk about. You wouldn't just invite a stranger into your house to open a package that you didn't order but people are doing this a lot of the times with email. So really starting with the people first is important. There's a lot of free training information and security. There is awareness training, we offer that at Fortinet. There's even advanced training we do through our NSC program as an example. But then on top of that there's things like phishing tests that you can do regularly, penetration testing as well, exercises like that are very important because that is really the first line of defense. Moving past that you want to get into the technology piece. And of course, there's a whole, this is a security fabric. There's a whole array of solutions. Like I said, everything needs to be integrated. So we have an EDR and XDR as an example sitting on the end point, cause oftentimes they still need to get that ransomware payload to run on the end point. So having a technology like EDR goes a long way to be able to detect the threat, quarantine and block it. There's also of course a multi-factor authentication when it comes to identifying who's connecting to these environments. Patch management, we talk about all the time. That's part of the technology piece. The reality is that we highlight in the threat landscape report the software vulnerabilities that these rats more gangs are going after are two to three years old. They're not breaking within the last month they're two to three years old. So it's still about the patch management cycle, having that holistic integrated security architecture and the fabric is really important. NAC network access control is zero trust, network access is really important as well. One of the biggest culprits we're seeing with these ransom attacks is using IOT devices as launchpads as an example into networks 'cause they're in these work from home environments and there's a lot of unsecured or uninspected devices sitting on those networks. Finally process, right? So it's always good to have it all in your defense plan training and education, technology for mitigation but then also thinking about the what if scenario, right? So incident response planning, what do we do if we get hit? Of course we never recommend to pay the ransom. So it's good to have a plan in place. It's good to identify what your corporate assets are and the likely targets that cyber-criminals are going to go after and make sure that you have rigid security controls and threat intelligence like FortiGuard Labs applied to that. >> Yeah, you talk about the weakest link they are people I know you and I talked about that on numerous segments. It's one of the biggest challenges but I've seen some people that are really experts in security read a phishing email and almost fall for it. Like it looked so legitimately from like their bank for example. So in that case, what are some of the things that businesses can do when it looks so legitimate that it probably is going to have a unfortunately a good conversion rate? >> Yeah, so this is what I was talking about earlier that these targeted attacks especially when it comes to spear, when it comes to the reconnaissance they got so clever, it can be can so realistic. That's the, it becomes a very effective weapon. That's why the sophistication and the risk is rising like I said but that's why you want to have this multilayered approach, right? So if that first line of defense does yield, if they do click on the link, if they do try to open the malicious attachment, first of all again through the next generation firewall Sandboxing solutions like that, this technology is capable of inspecting that, acting like is this, we even have a FortiAI as an example, artificial intelligence, machine learning that can actually scan this events and know is this actually an attack? So that element goes a long way to actually scrub it like content CDR as well, content disarm as an example this is a way to actually scrub that content. So it doesn't actually run it in the first place but if it does run again, this is where EDR comes in like I said, at the end of the day they're also trying to get information out of the network. So having things like a Platinum Protection through the next generation firewall like with FortiGuard security subscription services is really important too. So it's all about that layered approach. You don't want just one single point of failure. You really want it, this is what we call the attack chain and the kill chain. There's no magic bullet when it comes to attackers moving, they have to go through a lot of phases to reach their end game. So having that layer of defense approach and blocking it at any one of those phases. So even if that human does click on it you're still mitigating the attack and protecting the damage. Keep in mind a lot of damages in some cases kind of a million dollars plus. >> Right, is that the average ransom, 10 million US dollars. >> So the average cost of data breaches that we're seeing which are often related to ransom attacks is close to that in the US, I believe it's around just under $9 million about 8.7 million, just for one data breach. And often those data breaches now, again what's happening is that the data it's not just about encrypting the data, getting access because a lot of organizations part of the technology piece and the process that we recommend is backups as well of data. I would say, organizations are getting better at that now but it's one thing to back up your data. But if that data is breached again, cybercriminals are now moving to this model of extorting that saying, unless you pay us this money we're going to go out and make this public. We're going to put it on paste and we're going to sell it to nefarious people on the dark web as well. >> One more thing I want to ask you in terms of proliferation we talked about the distributed workforce but one of the things, and here we are using Zoom to talk to each other, instead of getting to sit together in person we saw this massive proliferation in collaboration tools to keep people connected, families businesses. I talked a bit a lot of businesses who initially will say, oh we're using Microsoft 365 and they're protecting the data while they're not or Salesforce or Slack. And that shared responsibility model is something that I've been hearing a lot more about lately that businesses needing to recognize for those cloud applications that we're using and in which there's a lot of data traversing it could include PII or IP. We're responsible for that as the customer to protect our data, the vendor's responsible for protecting the integrity of the infrastructure. Share it with us a little bit about that in terms of your thoughts on like data protection and backup for those SaaS applications. >> Yeah, great question, great question tough one. It is so, I mean ultimately everybody has to have, I believe it has to have their position in this. It's not, it is a collaborative environment. Everyone has to be a stakeholder in this even down to the end users, the employees being educated and up-to-date as an example, the IT departments and security operation centers of vendors being able to do all the threat intelligence and scrubbing. But then when you extend that to the public cloud what is the cloud security stack look at, right? How integrated is that? Are there scrubbing and protection controls sitting on the cloud environments? What data is being sent to that, should it be cited center as an example? what's the retention period? How long does the data live on there? It's the same thing as when you go out and you buy one of these IOT devices as an example from say, a big box store and you go and just plug it into your network. It's the same questions we should be asking, right? What's the security like on this device model? Who's making it, what data is it going to ask for me? The same thing when you're installing an application on your mobile phone, this is what I mean about that zero trust environment. It should be earned trust. So it's a big thing, right? To be able to ask those questions and then only do it on a sort of need to know and medium basis. The good news is that a lot of CloudStack now and environments are integrating security controls. We integrated quite well with Fortinet as an example but this is an issue of supply chain. It's really important to know what lives upstream and how they're handling the data and how they're protecting it absolutely. >> Such interesting information and it's a topic ransomware that we could continue talking about, Derek, thank you for joining me on the program today updating us on what's going on, how it's evolving and ultimately what organizations in any industry need to do with protecting people and technology and processes to really start reducing their risks. I thank you so much for joining me today. >> All right it's a pleasure, thank you. >> Likewise Derek Manky I'm Lisa Martin. You're watching this CUBE conversation. (upbeat music)

Published Date : May 3 2021

SUMMARY :

I am Lisa Martin, excited to welcome back and great to see you again, Lisa. ransomware in the last year. that the ransomware on the pandemic fears with things that the cybercriminals are using. Are the targeted attacks, are they in like They, a lot of the the newest One of the things that you mentioned One of the cases we worked but also the different levels lot of the times with email. of the things that businesses can do and protecting the damage. Right, is that the average is that the data it's not just We're responsible for that as the customer It's the same thing as when you go out on the program today updating (upbeat music)

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
Lisa MartinPERSON

0.99+

30%QUANTITY

0.99+

Derek MankyPERSON

0.99+

DerekPERSON

0.99+

FortiGuard LabsORGANIZATION

0.99+

2021DATE

0.99+

FortinetORGANIZATION

0.99+

twoQUANTITY

0.99+

$10 millionQUANTITY

0.99+

LisaPERSON

0.99+

seven timesQUANTITY

0.99+

10 millionQUANTITY

0.99+

40QUANTITY

0.99+

fiveQUANTITY

0.99+

World Health OrganizationORGANIZATION

0.99+

OneQUANTITY

0.99+

three yearsQUANTITY

0.99+

USLOCATION

0.99+

over $60 millionQUANTITY

0.99+

two housesQUANTITY

0.99+

6 millionQUANTITY

0.99+

last yearDATE

0.99+

10 peopleQUANTITY

0.99+

todayDATE

0.99+

late 1980sDATE

0.99+

three monthsQUANTITY

0.99+

IRSORGANIZATION

0.99+

oneQUANTITY

0.99+

first lineQUANTITY

0.99+

10 years agoDATE

0.98+

over 50 peopleQUANTITY

0.98+

MicrosoftORGANIZATION

0.97+

pandemicEVENT

0.97+

50%QUANTITY

0.97+

about 8.7 millionQUANTITY

0.97+

one individualQUANTITY

0.97+

last monthDATE

0.96+

one single pointQUANTITY

0.96+

one ransom attackQUANTITY

0.96+

Threat Landscape ReportTITLE

0.96+

Ragnar LockerPERSON

0.96+

one thingQUANTITY

0.96+

a decade agoDATE

0.96+

three thingsQUANTITY

0.96+

firstQUANTITY

0.93+

COVID-19OTHER

0.92+

NACORGANIZATION

0.9+

million dollarsQUANTITY

0.89+

second half of 2020DATE

0.89+

SalesforceORGANIZATION

0.87+

CloudStackTITLE

0.87+

one ransomware gangQUANTITY

0.87+

under $9 millionQUANTITY

0.86+

CUBEORGANIZATION

0.86+

Global Threat AlliancesORGANIZATION

0.86+

first placeQUANTITY

0.85+

three years oldQUANTITY

0.84+

zero trustQUANTITY

0.84+

SlackORGANIZATION

0.82+

FortiGuardTITLE

0.81+

top fiveQUANTITY

0.78+

one data breachQUANTITY

0.77+

One more thingQUANTITY

0.75+

one cyber crime ringQUANTITY

0.75+

One of the casesQUANTITY

0.66+

lot of vulnerableQUANTITY

0.57+

vulnerableQUANTITY

0.56+

Derek Manky Chief, Security Insights & Global Threat Alliances at Fortinet's FortiGuard Labs


 

>>As we've been reporting, the pandemic has called CSOs to really shift their spending priorities towards securing remote workers. Almost overnight. Zero trust has gone from buzzword to mandate. What's more as we wrote in our recent cybersecurity breaking analysis, not only Maseca pro secured increasingly distributed workforce, but now they have to be wary of software updates in the digital supply chain, including the very patches designed to protect them against cyber attacks. Hello everyone. And welcome to this Q conversation. My name is Dave Vellante and I'm pleased to welcome Derek manky. Who's chief security insights, and global threat alliances for four guard labs with fresh data from its global threat landscape report. Derek. Welcome. Great to see you. >>Thanks so much for, for the invitation to speak. It's always a pleasure. Multicover yeah, >>You're welcome. So first I wonder if you could explain for the audience, what is for guard labs and what's its relationship to fortunate? >>Right. So 40 grand labs is, is our global sockets, our global threat intelligence operation center. It never sleeps, and this is the beat. Um, you know, it's, it's been here since inception at port in it. So it's it's 20, 21 years in the making, since Fortinet was founded, uh, we have built this in-house, uh, so we don't go yum technology. We built everything from the ground up, including creating our own training programs for our, our analysts. We're following malware, following exploits. We even have a unique program that I created back in 2006 to ethical hacking program. And it's a zero-day research. So we try to meet the hackers, the bad guys to their game. And we of course do that responsibly to work with vendors, to close schools and create virtual patches. Um, and, but, you know, so it's, it's everything from, uh, customer protection first and foremost, to following, uh, the threat landscape and cyber. It's very important to understand who they are, what they're doing, who they're, uh, what they're targeting, what tools are they using? >>Yeah, that's great. Some serious DNA and skills in that group. And it's, it's critical because like you said, you can, you can minimize the spread of those malware very, very quickly. So what, what now you have, uh, the global threat landscape report. We're going to talk about that, but what exactly is that? >>Right? So this a global threat landscape report, it's a summary of, uh, all, all the data that we collect over a period of time. So we released this, that biannually two times a year. Um, cyber crime is changing very fast, as you can imagine. So, uh, while we do release security blogs, and, uh, what we call threat signals for breaking security events, we have a lot of other vehicles to release threat intelligence, but this threat landscape report is truly global. It looks at all of our global data. So we have over 5 million censorship worldwide in 40 guard labs, we're processing. I know it seems like a very large amount, but North of a hundred billion, uh, threat events in just one day. And we have to take the task of taking all of that data and put that onto scale for half a year and compile that into something, um, that is, uh, the, you know, that that's digestible. That's a, a very tough task, as you can imagine, so that, you know, we have to work with a huge technologies back to machine learning and artificial intelligence automation. And of course our analyst view to do that. >>Yeah. So this year, of course, there's like the every year is a battle, but this year was an extra battle. Can you explain what you saw in terms of the hacker dynamics over the past? Let's say 12 months. I know you do this twice a year, but what trends did you see evolving throughout the year and what have you seen with the way that attackers have exploited this expanded attack surface outside of corporate network? >>Yeah, it was quite interesting last year. It certainly was not normal. Like we all say, um, and that was no exception for cybersecurity. You know, if we look at cyber criminals and how they pivoted and adapted to the scrap threat landscape, cyber cyber criminals are always trying to take advantage of the weakest link of the chain. They're trying to always prey off here and ride waves of global trends and themes. We've seen this before in, uh, natural disasters as an example, you know, um, trying to do charity kind of scams and campaigns. And they're usually limited to a region where that incident happened and they usually live about two to three weeks, maybe a month at the most. And then they'll move on to the next to the next trip. That's braking, of course, because COVID is so global and dominant. Um, we saw attacks coming in from, uh, well over 40 different languages as an example, um, in regions all across the world that wasn't lasting two to three weeks and it lasted for the better part of a year. >>And of course, what they're, they're using this as a vehicle, right? Not preying on the fear. They're doing everything from initial lockdown, uh, fishing. We were as COVID-19 movers to, um, uh, lay off notices then to phase one, reopenings all the way up to fast forward to where we are today with vaccine rollover development. So there's always that new flavor and theme that they were rolling out, but because it was so successful for them, they were able to, they didn't have to innovate too much, right. They didn't have to expand and shifted to new to new trends. And themes are really developed on new rats families as an example, or a new sophisticated malware. That was the first half of the year and the second half of the year. Um, of course people started to experience COVID fatigue, right? Um, people started to become, we did a lot of education around this. >>People started to become more aware of this threat. And so, um, cyber criminals have started to, um, as we expected, started to become more sophisticated with their attacks. We saw an expansion in different ransomware families. We saw more of a shift of focus on, on, um, uh, you know, targeting the digital supply chain as an example. And so that, that was, that was really towards Q4. Uh, so it, it was a long lived lead year with success on the Google themes, um, targeting healthcare as an example, a lot of, um, a lot of the organizations that were, you know, really in a vulnerable position, I would say >>So, okay. I want to clarify something because my assumption was that they actually did really increase the sophistication, but it sounds like that was kind of a first half trends. Not only did they have to adapt and not have to, but they adapt it to these new vulnerabilities. Uh, my sense was that when you talk about the digital supply chain, that that was a fairly sophisticated attack. Am I, am I getting that right? That they did their sort of their, their, their increased sophistication in the first half, and then they sort of deployed it, did it, uh, w what actually happened there from your data? >>Well, if we look at, so generally there's two types of attacks that we look at, we look at the, uh, the premeditated sophisticated attacks that can have, um, you know, a lot of ramp up work on their end, a lot of time developing the, the, the, the weaponization phase. So developing, uh, the exploits of the sophisticated malware that they're gonna use for the campaign reconnaissance, understanding the targets, where platforms are developed, um, the blueprinting that DNA of, of, of the supply chain, those take time. Um, in fact years, even if we look back to, um, uh, 10 plus years ago with the Stuxnet attacks, as an example that was on, uh, nuclear centrifuges, um, and that, that had four different zero-day weapons at the time. That was very sophisticated, that took over two years to develop as an example. So some of these can take years of time to develop, but they're, they're, uh, very specific in terms of the targets are going to go after obviously the ROI from their end. >>Uh, the other type of attack that we see is as ongoing, um, these broad, wide sweeping attacks, and the reality for those ones is they don't unfortunately need to be too sophisticated. And those ones were the ones I was talking about that were really just playing on the cool, the deem, and they still do today with the vaccine road and development. Uh, but, but it's really because they're just playing on, on, um, you know, social engineering, um, using, uh, topical themes. And in fact, the weapons they're using these vulnerabilities are from our research data. And this was highlighted actually the first pop landscape before last year, uh, on average were two to three years old. So we're not talking about fresh vulnerabilities. You've got to patch right away. I mean, these are things that should have been patched two years ago, but they're still unfortunately having success with that. >>So you mentioned stuck next Stuxnet as the former sort of example, of one of the types of attacks that you see. And I always felt like that was a watershed moment. One of the most sophisticated, if not the most sophisticated attack that we'd ever seen. When I talk to CSOs about the recent government hack, they, they, they suggest I infer maybe they don't suggest it. I infer that it was of similar sophistication. It was maybe thousands of people working on this for years and years and years. Is that, is that accurate or not necessarily? >>Yeah, there's definitely a, there's definitely some comparisons there. Uh, you know, one of the largest things is, uh, both attacks used digital circuits certificate personation, so they're digitally signed. So, you know, of course that whole technology using cryptography is designed by design, uh, to say that, you know, this piece of software installed in your system, hassles certificate is coming from the source. It's legitimate. Of course, if that's compromised, that's all out of the window. And, um, yeah, this is what we saw in both attacks. In fact, you know, stocks in that they also had digitally designed, uh, certificates that were compromised. So when it gets to that level of students or, uh, sophistication, that means definitely that there's a target that there has been usually months of, of, uh, homework done by cyber criminals, for reconnaissance to be able to weaponize that. >>W w what did you see with respect to ransomware? What were the trends there over the past 12 months? I've heard some data and it's pretty scary, but what did you see? >>Yeah, so we're actually, ransomware is always the thorn in our side, and it's going to continue to be so, um, you know, in fact, uh, ransomware is not a new itself. It was actually first created in 1989, and they demanded ransom payments through snail mail. This was to appeal a box, obviously that, that, that didn't take off. Wasn't a successful on the internet was porn at the time. But if you look at it now, of course, over the last 10 years, really, that's where it ran. The ransomware model has been, uh, you know, lucrative, right? I mean, it's been, um, using, uh, by force encrypting data on systems, so that users had to, if they were forced to pay the ransom because they wanted access to their data back data was the target currency for ransomware. That's shifted now. And that's actually been a big pivotal over the last year or so, because again, before it was this let's cast a wide net, in fact, as many people as we can random, um, and try to see if we can hold some of their data for ransom. >>Some people that data may be valuable, it may not be valuable. Um, and that model still exists. Uh, and we see that, but really the big shift that we saw last year and the threat landscape before it was a shift to targeted rats. So again, the sophistication is starting to rise because they're not just going out to random data. They're going out to data that they know is valuable to large organizations, and they're taking that a step further now. So there's various ransomware families. We saw that have now reverted to extortion and blackmail, right? So they're taking that data, encrypting it and saying, unless you pay us as large sum of money, we're going to release this to the public or sell it to a buyer on the dark web. And of course you can imagine the amount of, um, you know, damages that can happen from that. The other thing we're seeing is, is a target of going to revenue services, right? So if they can cripple networks, it's essentially a denial of service. They know that the company is going to be bleeding, you know, X, millions of dollars a day, so they can demand Y million dollars of ransom payments, and that's effectively what's happening. So it's, again, becoming more targeted, uh, and more sophisticated. And unfortunately the ransom is going up. >>So they go to where the money is. And of course your job is to, it's a lower the ROI for them, a constant challenge. Um, we talked about some of the attack vectors, uh, that you saw this year that, that cyber criminals are targeting. I wonder if, if, you know, given the work from home, if things like IOT devices and cameras and, you know, thermostats, uh, with 75% of the work force at home, is this infrastructure more vulnerable? I guess, of course it is. But what did you see there in terms of attacks on those devices? >>Yeah, so, uh, um, uh, you know, unfortunately the attack surface as we call it, uh, so the amount of target points is expanding. It's not shifting, it's expanding. We still see, um, I saw, I mentioned earlier vulnerabilities from two years ago that are being used in some cases, you know, over the holidays where e-commerce means we saw e-commerce heavily under attack in e-commerce has spikes since last summer, right. It's been a huge amount of traffic increase everybody's shopping from home. And, uh, those vulnerabilities going after a shopping cart, plugins, as an example, are five to six years old. So we still have this theme of old vulnerabilities are still new in a sense being attacked, but we're also now seeing this complication of, yeah, as you said, IOT, uh, B roll out everywhere, the really quick shift to work from home. Uh, we really have to treat this as if you guys, as the, uh, distributed branch model for enterprise, right. >>And it's really now the secure branch. How do we take, um, um, you know, any of these devices on, on those networks and secure them, uh, because yeah, if you look at the, what we highlighted in our landscape report and the top 10 attacks that we're seeing, so hacking attacks hacking in tabs, this is who our IPS triggers. You know, we're seeing attempts to go after IOT devices. Uh, right now they're mostly, uh, favoring, uh, well in terms of targets, um, consumer grade routers. Uh, but they're also looking at, um, uh, DVR devices as an example for, uh, you know, home entertainment systems, uh, network attached storage as well, and IP security cameras, um, some of the newer devices, uh, what, the quote unquote smart devices that are now on, you know, virtual assistance and home networks. Uh, we actually released a predictions piece at the end of last year as well. So this is what we call the new intelligent edge. And that's what I think is we're really going to see this year in terms of what's ahead. Um, cause we always have to look ahead and prepare for that. But yeah, right now, unfortunately, the story is, all of this is still happening. IOT is being targeted. Of course they're being targeted because they're easy targets. Um, it's like for cybercriminals, it's like shooting fish in a barrel. There's not just one, but there's multiple vulnerabilities, security holes associated with these devices, easy entry points into networks. >>I mean, it's, um, I mean, attackers they're, they're highly capable. They're organized, they're well-funded they move fast, they're they're agile, uh, and they follow the money. As we were saying, uh, you, you mentioned, you know, co vaccines and, you know, big pharma healthcare, uh, where >>Did you see advanced, persistent >>Threat groups really targeting? Were there any patterns that emerged in terms of other industry types or organizations being targeted? >>Yeah. So just to be clear again, when we talk about AP teams, um, uh, advanced, specific correct group, the groups themselves they're targeting, these are usually the more sophisticated groups, of course. So going back to that theme, these are usually the target, the, um, the premeditated targeted attacks usually points to nation state. Um, sometimes of course there's overlap. They can be affiliated with cyber crime, cyber crime, uh, uh, groups are typically, um, looking at some other targets for ROI, uh, bio there's there's a blend, right? So as an example, if we're looking at the, uh, apt groups I had last year, absolutely. Number one I would say would be healthcare. Healthcare was one of those, and it's, it's, it's, uh, you know, very unfortunate, but obviously with the shift that was happening at a pop up medical facilities, there's a big, a rush to change networks, uh, for a good cause of course, but with that game, um, you know, uh, security holes and concerns the targets and, and that's what we saw IPT groups targeting was going after those and, and ransomware and the cyber crime shrine followed as well. Right? Because if you can follow, uh, those critical networks and crippled them on from cybercriminals point of view, you can, you can expect them to pay the ransom because they think that they need to buy in order to, um, get those systems back online. Uh, in fact, last year or two, unfortunately we saw the first, um, uh, death that was caused because of a denial of service attack in healthcare, right. Facilities were weren't available because of the cyber attack. Patients had to be diverted and didn't make it on the way. >>All right. Jericho, sufficiently bummed out. So maybe in the time remaining, we can talk about remediation strategies. You know, we know there's no silver bullet in security. Uh, but what approaches are you recommending for organizations? How are you consulting with folks? >>Sure. Yeah. So a couple of things, um, good news is there's a lot that we can do about this, right? And, um, and, and basic measures go a long way. So a couple of things just to get out of the way I call it housekeeping, cyber hygiene, but it's always worth reminding. So when we talk about keeping security patches up to date, we always have to talk about that because that is reality as et cetera, these, these vulnerabilities that are still being successful are five to six years old in some cases, the majority two years old. Um, so being able to do that, manage that from an organization's point of view, really treat the new work from home. I don't like to call it a work from home. So the reality is it's work from anywhere a lot of the times for some people. So really treat that as, as the, um, as a secure branch, uh, methodology, doing things like segmentations on network, secure wifi access, multi-factor authentication is a huge muscle, right? >>So using multi-factor authentication because passwords are dead, um, using things like, uh, XDR. So Xers is a combination of detection and response for end points. This is a mass centralized management thing, right? So, uh, endpoint detection and response, as an example, those are all, uh, you know, good security things. So of course having security inspection, that that's what we do. So good threat intelligence baked into your security solution. That's supported by labs angles. So, uh, that's, uh, you know, uh, antivirus, intrusion prevention, web filtering, sandbox, and so forth, but then it gets that that's the security stack beyond that it gets into the end user, right? Everybody has a responsibility. This is that supply chain. We talked about. The supply chain is, is, is a target for attackers attackers have their own supply chain as well. And we're also part of that supply chain, right? The end users where we're constantly fished for social engineering. So using phishing campaigns against employees to better do training and awareness is always recommended to, um, so that's what we can do, obviously that's, what's recommended to secure, uh, via the endpoints in the secure branch there's things we're also doing in the industry, um, to fight back against that with prime as well. >>Well, I, I want to actually talk about that and talk about ecosystems and collaboration, because while you have competitors, you all want the same thing. You, SecOps teams are like superheroes in my book. I mean, they're trying to save the world from the bad guys. And I remember I was talking to Robert Gates on the cube a couple of years ago, a former defense secretary. And I said, yeah, but don't, we have like the best security people and can't we go on the offensive and weaponize that ourselves. Of course, there's examples of that. Us. Government's pretty good at it, even though they won't admit it. But his answer to me was, yeah, we gotta be careful because we have a lot more to lose than many countries. So I thought that was pretty interesting, but how do you collaborate with whether it's the U S government or other governments or other other competitors even, or your ecosystem? Maybe you could talk about that a little bit. >>Yeah. Th th this is what, this is what makes me tick. I love working with industry. I've actually built programs for 15 years of collaboration in the industry. Um, so, you know, we, we need, I always say we can't win this war alone. You actually hit on this point earlier, you talked about following and trying to disrupt the ROI of cybercriminals. Absolutely. That is our target, right. We're always looking at how we can disrupt their business model. Uh, and, and in order, there's obviously a lot of different ways to do that, right? So a couple of things we do is resiliency. That's what we just talked about increasing the security stack so that they go knocking on someone else's door. But beyond that, uh, it comes down to private, private sector collaborations. So, uh, we, we, uh, co-founder of the cyber threat Alliance in 2014 as an example, this was our fierce competitors coming in to work with us to share intelligence, because like you said, um, competitors in the space, but we need to work together to do the better fight. >>And so this is a Venn diagram. What's compared notes, let's team up, uh, when there's a breaking attack and make sure that we have the intelligence so that we can still remain competitive on the technology stack to gradation the solutions themselves. Uh, but let's, let's level the playing field here because cybercriminals moved out, uh, you know, um, uh, that, that there's no borders and they move with great agility. So, uh, that's one thing we do in the private private sector. Uh, there's also, uh, public private sector relationships, right? So we're working with Interpol as an example, Interfor project gateway, and that's when we find attribution. So it's not just the, what are these people doing like infrastructure, but who, who are they, where are they operating? What, what events tools are they creating? We've actually worked on cases that are led down to, um, uh, warrants and arrests, you know, and in some cases, one case with a $60 million business email compromise fraud scam, the great news is if you look at the industry as a whole, uh, over the last three to four months has been for take downs, a motet net Walker, uh, um, there's also IE Gregor, uh, recently as well too. >>And, and Ian Gregor they're actually going in and arresting the affiliates. So not just the CEO or the King, kind of these organizations, but the people who are distributing the ransomware themselves. And that was a unprecedented step, really important. So you really start to paint a picture of this, again, supply chain, this ecosystem of cyber criminals and how we can hit them, where it hurts on all angles. I've most recently, um, I've been heavily involved with the world economic forum. Uh, so I'm, co-author of a report from last year of the partnership on cyber crime. And, uh, this is really not just the pro uh, private, private sector, but the private and public sector working together. We know a lot about cybercriminals. We can't arrest them. Uh, we can't take servers offline from the data centers, but working together, we can have that whole, you know, that holistic effect. >>Great. Thank you for that, Derek. What if people want, want to go deeper? Uh, I know you guys mentioned that you do blogs, but are there other resources that, that they can tap? Yeah, absolutely. So, >>Uh, everything you can see is on our threat research blog on, uh, so 40 net blog, it's under expired research. We also put out, uh, playbooks, w we're doing blah, this is more for the, um, the heroes as he called them the security operation centers. Uh, we're doing playbooks on the aggressors. And so this is a playbook on the offense, on the offense. What are they up to? How are they doing that? That's on 40 guard.com. Uh, we also release, uh, threat signals there. So, um, we typically release, uh, about 50 of those a year, and those are all, um, our, our insights and views into specific attacks that are now >>Well, Derek Mackie, thanks so much for joining us today. And thanks for the work that you and your teams do. Very important. >>Thanks. It's yeah, it's a pleasure. And, uh, rest assured we will still be there 24 seven, three 65. >>Good to know. Good to know. And thank you for watching everybody. This is Dave Volante for the cube. We'll see you next time.

Published Date : Feb 26 2021

SUMMARY :

but now they have to be wary of software updates in the digital supply chain, Thanks so much for, for the invitation to speak. So first I wonder if you could explain for the audience, what is for guard labs Um, and, but, you know, so it's, it's everything from, uh, customer protection first And it's, it's critical because like you said, you can, you can minimize the um, that is, uh, the, you know, that that's digestible. I know you do this twice a year, but what trends did you see evolving throughout the year and what have you seen with the uh, natural disasters as an example, you know, um, trying to do charity Um, people started to become, we did a lot of education around this. on, um, uh, you know, targeting the digital supply chain as an example. in the first half, and then they sort of deployed it, did it, uh, w what actually happened there from um, you know, a lot of ramp up work on their end, a lot of time developing the, on, um, you know, social engineering, um, using, uh, topical themes. So you mentioned stuck next Stuxnet as the former sort of example, of one of the types of attacks is designed by design, uh, to say that, you know, um, you know, in fact, uh, ransomware is not a new of, um, you know, damages that can happen from that. and cameras and, you know, thermostats, uh, with 75% Yeah, so, uh, um, uh, you know, unfortunately the attack surface as we call it, uh, you know, home entertainment systems, uh, network attached storage as well, you know, big pharma healthcare, uh, where and it's, it's, it's, uh, you know, very unfortunate, but obviously with So maybe in the time remaining, we can talk about remediation strategies. So a couple of things just to get out of the way I call it housekeeping, cyber hygiene, So, uh, that's, uh, you know, uh, antivirus, intrusion prevention, web filtering, And I remember I was talking to Robert Gates on the cube a couple of years ago, a former defense secretary. Um, so, you know, we, we need, I always say we can't win this war alone. cybercriminals moved out, uh, you know, um, uh, that, but working together, we can have that whole, you know, that holistic effect. Uh, I know you guys mentioned that Uh, everything you can see is on our threat research blog on, uh, And thanks for the work that you and your teams do. And, uh, rest assured we will still be there 24 seven, And thank you for watching everybody.

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
Dave VellantePERSON

0.99+

2006DATE

0.99+

Derek MackiePERSON

0.99+

1989DATE

0.99+

2014DATE

0.99+

Ian GregorPERSON

0.99+

fiveQUANTITY

0.99+

15 yearsQUANTITY

0.99+

75%QUANTITY

0.99+

DerekPERSON

0.99+

Dave VolantePERSON

0.99+

20QUANTITY

0.99+

FortinetORGANIZATION

0.99+

twoQUANTITY

0.99+

$60 millionQUANTITY

0.99+

InterpolORGANIZATION

0.99+

two typesQUANTITY

0.99+

Robert GatesPERSON

0.99+

last yearDATE

0.99+

Derek MankyPERSON

0.99+

first halfQUANTITY

0.99+

U S governmentORGANIZATION

0.99+

12 monthsQUANTITY

0.99+

40 guard labsQUANTITY

0.99+

todayDATE

0.99+

FortiGuard LabsORGANIZATION

0.99+

one caseQUANTITY

0.99+

one dayQUANTITY

0.99+

firstQUANTITY

0.99+

last summerDATE

0.99+

GoogleORGANIZATION

0.99+

half a yearQUANTITY

0.99+

a monthQUANTITY

0.98+

three weeksQUANTITY

0.98+

oneQUANTITY

0.98+

both attacksQUANTITY

0.98+

COVID-19OTHER

0.98+

this yearDATE

0.98+

10 plus years agoDATE

0.98+

Security InsightsORGANIZATION

0.98+

over two yearsQUANTITY

0.98+

InterforORGANIZATION

0.98+

two years agoDATE

0.97+

two times a yearQUANTITY

0.96+

million dollarsQUANTITY

0.96+

40 grand labsQUANTITY

0.96+

Zero trustQUANTITY

0.96+

four monthsQUANTITY

0.95+

Derek mankyPERSON

0.95+

JerichoPERSON

0.95+

millions of dollars a dayQUANTITY

0.95+

OneQUANTITY

0.95+

40 netQUANTITY

0.94+

pandemicEVENT

0.94+

COVIDOTHER

0.94+

thousands of peopleQUANTITY

0.94+

over 5 million censorshipQUANTITY

0.94+

fourQUANTITY

0.93+

twice a yearQUANTITY

0.92+

one thingQUANTITY

0.9+

40 guard.comOTHER

0.9+

a hundred billionQUANTITY

0.89+

about 50QUANTITY

0.89+

six years oldQUANTITY

0.89+

ChiefPERSON

0.89+

over 40 different languagesQUANTITY

0.88+

threeQUANTITY

0.87+

about twoQUANTITY

0.86+

Stuxnet attacksEVENT

0.86+

zero-day weaponsQUANTITY

0.86+

Q4DATE

0.86+

21 yearsQUANTITY

0.85+

Maseca proORGANIZATION

0.85+

two years oldQUANTITY

0.85+

Global Threat AlliancesORGANIZATION

0.83+

EMBARGO Derek Manky Chief, Security Insights & Global Threat Alliances, FortiGuard Labs


 

>>As we've been reporting, the pandemic has called CSOs to really shift their spending priorities towards securing remote workers. Almost overnight. Zero trust has gone from buzzword to mandate. What's more as we wrote in our recent cybersecurity breaking analysis, not only Maseca pro secured increasingly distributed workforce, but now they have to be wary of software updates in the digital supply chain, including the very patches designed to protect them against cyber attacks. Hello everyone. And welcome to this Q conversation. My name is Dave Vellante and I'm pleased to welcome Derek manky. Who's chief security insights, and global threat alliances for four guard labs with fresh data from its global threat landscape report. Derek. Welcome. Great to see you. >>Thanks so much for, for the invitation to speak. It's always a pleasure. Multicover yeah, >>You're welcome. So first I wonder if you could explain for the audience, what is for guard labs and what's its relationship to fortunate? >>Right. So 40 grand labs is, is our global sockets, our global threat intelligence operation center. It never sleeps, and this is the beat. Um, you know, it's, it's been here since inception at port in it. So it's it's 20, 21 years in the making, since Fortinet was founded, uh, we have built this in-house, uh, so we don't go yum technology. We built everything from the ground up, including creating our own training programs for our, our analysts. We're following malware, following exploits. We even have a unique program that I created back in 2006 to ethical hacking program. And it's a zero-day research. So we try to meet the hackers, the bad guys to their game. And we of course do that responsibly to work with vendors, to close schools and create virtual patches. Um, and, but, you know, so it's, it's everything from, uh, customer protection first and foremost, to following, uh, the threat landscape and cyber. It's very important to understand who they are, what they're doing, who they're, uh, what they're targeting, what tools are they using? >>Yeah, that's great. Some serious DNA and skills in that group. And it's, it's critical because like you said, you can, you can minimize the spread of those malware very, very quickly. So what, what now you have, uh, the global threat landscape report. We're going to talk about that, but what exactly is that? >>Right? So this a global threat landscape report, it's a summary of, uh, all, all the data that we collect over a period of time. So we released this, that biannually two times a year. Um, cyber crime is changing very fast, as you can imagine. So, uh, while we do release security blogs, and, uh, what we call threat signals for breaking security events, we have a lot of other vehicles to release threat intelligence, but this threat landscape report is truly global. It looks at all of our global data. So we have over 5 million censorship worldwide in 40 guard labs, we're processing. I know it seems like a very large amount, but North of a hundred billion, uh, threat events in just one day. And we have to take the task of taking all of that data and put that onto scale for half a year and compile that into something, um, that is, uh, the, you know, that that's digestible. That's a, a very tough task, as you can imagine, so that, you know, we have to work with a huge technologies back to machine learning and artificial intelligence automation. And of course our analyst view to do that. >>Yeah. So this year, of course, there's like the every year is a battle, but this year was an extra battle. Can you explain what you saw in terms of the hacker dynamics over the past? Let's say 12 months. I know you do this twice a year, but what trends did you see evolving throughout the year and what have you seen with the way that attackers have exploited this expanded attack surface outside of corporate network? >>Yeah, it was quite interesting last year. It certainly was not normal. Like we all say, um, and that was no exception for cybersecurity. You know, if we look at cyber criminals and how they pivoted and adapted to the scrap threat landscape, cyber cyber criminals are always trying to take advantage of the weakest link of the chain. They're trying to always prey off here and ride waves of global trends and themes. We've seen this before in, uh, natural disasters as an example, you know, um, trying to do charity kind of scams and campaigns. And they're usually limited to a region where that incident happened and they usually live about two to three weeks, maybe a month at the most. And then they'll move on to the next to the next trip. That's braking, of course, because COVID is so global and dominant. Um, we saw attacks coming in from, uh, well over 40 different languages as an example, um, in regions all across the world that wasn't lasting two to three weeks and it lasted for the better part of a year. >>And of course, what they're, they're using this as a vehicle, right? Not preying on the fear. They're doing everything from initial lockdown, uh, fishing. We were as COVID-19 movers to, um, uh, lay off notices then to phase one, reopenings all the way up to fast forward to where we are today with vaccine rollover development. So there's always that new flavor and theme that they were rolling out, but because it was so successful for them, they were able to, they didn't have to innovate too much, right. They didn't have to expand and shifted to new to new trends. And themes are really developed on new rats families as an example, or a new sophisticated malware. That was the first half of the year and the second half of the year. Um, of course people started to experience COVID fatigue, right? Um, people started to become, we did a lot of education around this. >>People started to become more aware of this threat. And so, um, cyber criminals have started to, um, as we expected, started to become more sophisticated with their attacks. We saw an expansion in different ransomware families. We saw more of a shift of focus on, on, um, uh, you know, targeting the digital supply chain as an example. And so that, that was, that was really towards Q4. Uh, so it, it was a long lived lead year with success on the Google themes, um, targeting healthcare as an example, a lot of, um, a lot of the organizations that were, you know, really in a vulnerable position, I would say >>So, okay. I want to clarify something because my assumption was that they actually did really increase the sophistication, but it sounds like that was kind of a first half trends. Not only did they have to adapt and not have to, but they adapt it to these new vulnerabilities. Uh, my sense was that when you talk about the digital supply chain, that that was a fairly sophisticated attack. Am I, am I getting that right? That they did their sort of their, their, their increased sophistication in the first half, and then they sort of deployed it, did it, uh, w what actually happened there from your data? >>Well, if we look at, so generally there's two types of attacks that we look at, we look at the, uh, the premeditated sophisticated attacks that can have, um, you know, a lot of ramp up work on their end, a lot of time developing the, the, the, the weaponization phase. So developing, uh, the exploits of the sophisticated malware that they're gonna use for the campaign reconnaissance, understanding the targets, where platforms are developed, um, the blueprinting that DNA of, of, of the supply chain, those take time. Um, in fact years, even if we look back to, um, uh, 10 plus years ago with the Stuxnet attacks, as an example that was on, uh, nuclear centrifuges, um, and that, that had four different zero-day weapons at the time. That was very sophisticated, that took over two years to develop as an example. So some of these can take years of time to develop, but they're, they're, uh, very specific in terms of the targets are going to go after obviously the ROI from their end. >>Uh, the other type of attack that we see is as ongoing, um, these broad, wide sweeping attacks, and the reality for those ones is they don't unfortunately need to be too sophisticated. And those ones were the ones I was talking about that were really just playing on the cool, the deem, and they still do today with the vaccine road and development. Uh, but, but it's really because they're just playing on, on, um, you know, social engineering, um, using, uh, topical themes. And in fact, the weapons they're using these vulnerabilities are from our research data. And this was highlighted actually the first pop landscape before last year, uh, on average were two to three years old. So we're not talking about fresh vulnerabilities. You've got to patch right away. I mean, these are things that should have been patched two years ago, but they're still unfortunately having success with that. >>So you mentioned stuck next Stuxnet as the former sort of example, of one of the types of attacks that you see. And I always felt like that was a watershed moment. One of the most sophisticated, if not the most sophisticated attack that we'd ever seen. When I talk to CSOs about the recent government hack, they, they, they suggest I infer maybe they don't suggest it. I infer that it was of similar sophistication. It was maybe thousands of people working on this for years and years and years. Is that, is that accurate or not necessarily? >>Yeah, there's definitely a, there's definitely some comparisons there. Uh, you know, one of the largest things is, uh, both attacks used digital circuits certificate personation, so they're digitally signed. So, you know, of course that whole technology using cryptography is designed by design, uh, to say that, you know, this piece of software installed in your system, hassles certificate is coming from the source. It's legitimate. Of course, if that's compromised, that's all out of the window. And, um, yeah, this is what we saw in both attacks. In fact, you know, stocks in that they also had digitally designed, uh, certificates that were compromised. So when it gets to that level of students or, uh, sophistication, that means definitely that there's a target that there has been usually months of, of, uh, homework done by cyber criminals, for reconnaissance to be able to weaponize that. >>W w what did you see with respect to ransomware? What were the trends there over the past 12 months? I've heard some data and it's pretty scary, but what did you see? >>Yeah, so we're actually, ransomware is always the thorn in our side, and it's going to continue to be so, um, you know, in fact, uh, ransomware is not a new itself. It was actually first created in 1989, and they demanded ransom payments through snail mail. This was to appeal a box, obviously that, that, that didn't take off. Wasn't a successful on the internet was porn at the time. But if you look at it now, of course, over the last 10 years, really, that's where it ran. The ransomware model has been, uh, you know, lucrative, right? I mean, it's been, um, using, uh, by force encrypting data on systems, so that users had to, if they were forced to pay the ransom because they wanted access to their data back data was the target currency for ransomware. That's shifted now. And that's actually been a big pivotal over the last year or so, because again, before it was this let's cast a wide net, in fact, as many people as we can random, um, and try to see if we can hold some of their data for ransom. >>Some people that data may be valuable, it may not be valuable. Um, and that model still exists. Uh, and we see that, but really the big shift that we saw last year and the threat landscape before it was a shift to targeted rats. So again, the sophistication is starting to rise because they're not just going out to random data. They're going out to data that they know is valuable to large organizations, and they're taking that a step further now. So there's various ransomware families. We saw that have now reverted to extortion and blackmail, right? So they're taking that data, encrypting it and saying, unless you pay us as large sum of money, we're going to release this to the public or sell it to a buyer on the dark web. And of course you can imagine the amount of, um, you know, damages that can happen from that. The other thing we're seeing is, is a target of going to revenue services, right? So if they can cripple networks, it's essentially a denial of service. They know that the company is going to be bleeding, you know, X, millions of dollars a day, so they can demand Y million dollars of ransom payments, and that's effectively what's happening. So it's, again, becoming more targeted, uh, and more sophisticated. And unfortunately the ransom is going up. >>So they go to where the money is. And of course your job is to, it's a lower the ROI for them, a constant challenge. Um, we talked about some of the attack vectors, uh, that you saw this year that, that cyber criminals are targeting. I wonder if, if, you know, given the work from home, if things like IOT devices and cameras and, you know, thermostats, uh, with 75% of the work force at home, is this infrastructure more vulnerable? I guess, of course it is. But what did you see there in terms of attacks on those devices? >>Yeah, so, uh, um, uh, you know, unfortunately the attack surface as we call it, uh, so the amount of target points is expanding. It's not shifting, it's expanding. We still see, um, I saw, I mentioned earlier vulnerabilities from two years ago that are being used in some cases, you know, over the holidays where e-commerce means we saw e-commerce heavily under attack in e-commerce has spikes since last summer, right. It's been a huge amount of traffic increase everybody's shopping from home. And, uh, those vulnerabilities going after a shopping cart, plugins, as an example, are five to six years old. So we still have this theme of old vulnerabilities are still new in a sense being attacked, but we're also now seeing this complication of, yeah, as you said, IOT, uh, B roll out everywhere, the really quick shift to work from home. Uh, we really have to treat this as if you guys, as the, uh, distributed branch model for enterprise, right. >>And it's really now the secure branch. How do we take, um, um, you know, any of these devices on, on those networks and secure them, uh, because yeah, if you look at the, what we highlighted in our landscape report and the top 10 attacks that we're seeing, so hacking attacks hacking in tabs, this is who our IPS triggers. You know, we're seeing attempts to go after IOT devices. Uh, right now they're mostly, uh, favoring, uh, well in terms of targets, um, consumer grade routers. Uh, but they're also looking at, um, uh, DVR devices as an example for, uh, you know, home entertainment systems, uh, network attached storage as well, and IP security cameras, um, some of the newer devices, uh, what, the quote unquote smart devices that are now on, you know, virtual assistance and home networks. Uh, we actually released a predictions piece at the end of last year as well. So this is what we call the new intelligent edge. And that's what I think is we're really going to see this year in terms of what's ahead. Um, cause we always have to look ahead and prepare for that. But yeah, right now, unfortunately, the story is, all of this is still happening. IOT is being targeted. Of course they're being targeted because they're easy targets. Um, it's like for cybercriminals, it's like shooting fish in a barrel. There's not just one, but there's multiple vulnerabilities, security holes associated with these devices, easy entry points into networks. >>I mean, it's, um, I mean, attackers they're, they're highly capable. They're organized, they're well-funded they move fast, they're they're agile, uh, and they follow the money. As we were saying, uh, you, you mentioned, you know, co vaccines and, you know, big pharma healthcare, uh, where >>Did you see advanced, persistent >>Threat groups really targeting? Were there any patterns that emerged in terms of other industry types or organizations being targeted? >>Yeah. So just to be clear again, when we talk about AP teams, um, uh, advanced, specific correct group, the groups themselves they're targeting, these are usually the more sophisticated groups, of course. So going back to that theme, these are usually the target, the, um, the premeditated targeted attacks usually points to nation state. Um, sometimes of course there's overlap. They can be affiliated with cyber crime, cyber crime, uh, uh, groups are typically, um, looking at some other targets for ROI, uh, bio there's there's a blend, right? So as an example, if we're looking at the, uh, apt groups I had last year, absolutely. Number one I would say would be healthcare. Healthcare was one of those, and it's, it's, it's, uh, you know, very unfortunate, but obviously with the shift that was happening at a pop up medical facilities, there's a big, a rush to change networks, uh, for a good cause of course, but with that game, um, you know, uh, security holes and concerns the targets and, and that's what we saw IPT groups targeting was going after those and, and ransomware and the cyber crime shrine followed as well. Right? Because if you can follow, uh, those critical networks and crippled them on from cybercriminals point of view, you can, you can expect them to pay the ransom because they think that they need to buy in order to, um, get those systems back online. Uh, in fact, last year or two, unfortunately we saw the first, um, uh, death that was caused because of a denial of service attack in healthcare, right. Facilities were weren't available because of the cyber attack. Patients had to be diverted and didn't make it on the way. >>All right. Jericho, sufficiently bummed out. So maybe in the time remaining, we can talk about remediation strategies. You know, we know there's no silver bullet in security. Uh, but what approaches are you recommending for organizations? How are you consulting with folks? >>Sure. Yeah. So a couple of things, um, good news is there's a lot that we can do about this, right? And, um, and, and basic measures go a long way. So a couple of things just to get out of the way I call it housekeeping, cyber hygiene, but it's always worth reminding. So when we talk about keeping security patches up to date, we always have to talk about that because that is reality as et cetera, these, these vulnerabilities that are still being successful are five to six years old in some cases, the majority two years old. Um, so being able to do that, manage that from an organization's point of view, really treat the new work from home. I don't like to call it a work from home. So the reality is it's work from anywhere a lot of the times for some people. So really treat that as, as the, um, as a secure branch, uh, methodology, doing things like segmentations on network, secure wifi access, multi-factor authentication is a huge muscle, right? >>So using multi-factor authentication because passwords are dead, um, using things like, uh, XDR. So Xers is a combination of detection and response for end points. This is a mass centralized management thing, right? So, uh, endpoint detection and response, as an example, those are all, uh, you know, good security things. So of course having security inspection, that that's what we do. So good threat intelligence baked into your security solution. That's supported by labs angles. So, uh, that's, uh, you know, uh, antivirus, intrusion prevention, web filtering, sandbox, and so forth, but then it gets that that's the security stack beyond that it gets into the end user, right? Everybody has a responsibility. This is that supply chain. We talked about. The supply chain is, is, is a target for attackers attackers have their own supply chain as well. And we're also part of that supply chain, right? The end users where we're constantly fished for social engineering. So using phishing campaigns against employees to better do training and awareness is always recommended to, um, so that's what we can do, obviously that's, what's recommended to secure, uh, via the endpoints in the secure branch there's things we're also doing in the industry, um, to fight back against that with prime as well. >>Well, I, I want to actually talk about that and talk about ecosystems and collaboration, because while you have competitors, you all want the same thing. You, SecOps teams are like superheroes in my book. I mean, they're trying to save the world from the bad guys. And I remember I was talking to Robert Gates on the cube a couple of years ago, a former defense secretary. And I said, yeah, but don't, we have like the best security people and can't we go on the offensive and weaponize that ourselves. Of course, there's examples of that. Us. Government's pretty good at it, even though they won't admit it. But his answer to me was, yeah, we gotta be careful because we have a lot more to lose than many countries. So I thought that was pretty interesting, but how do you collaborate with whether it's the U S government or other governments or other other competitors even, or your ecosystem? Maybe you could talk about that a little bit. >>Yeah. Th th this is what, this is what makes me tick. I love working with industry. I've actually built programs for 15 years of collaboration in the industry. Um, so, you know, we, we need, I always say we can't win this war alone. You actually hit on this point earlier, you talked about following and trying to disrupt the ROI of cybercriminals. Absolutely. That is our target, right. We're always looking at how we can disrupt their business model. Uh, and, and in order, there's obviously a lot of different ways to do that, right? So a couple of things we do is resiliency. That's what we just talked about increasing the security stack so that they go knocking on someone else's door. But beyond that, uh, it comes down to private, private sector collaborations. So, uh, we, we, uh, co-founder of the cyber threat Alliance in 2014 as an example, this was our fierce competitors coming in to work with us to share intelligence, because like you said, um, competitors in the space, but we need to work together to do the better fight. >>And so this is a Venn diagram. What's compared notes, let's team up, uh, when there's a breaking attack and make sure that we have the intelligence so that we can still remain competitive on the technology stack to gradation the solutions themselves. Uh, but let's, let's level the playing field here because cybercriminals moved out, uh, you know, um, uh, that, that there's no borders and they move with great agility. So, uh, that's one thing we do in the private private sector. Uh, there's also, uh, public private sector relationships, right? So we're working with Interpol as an example, Interfor project gateway, and that's when we find attribution. So it's not just the, what are these people doing like infrastructure, but who, who are they, where are they operating? What, what events tools are they creating? We've actually worked on cases that are led down to, um, uh, warrants and arrests, you know, and in some cases, one case with a $60 million business email compromise fraud scam, the great news is if you look at the industry as a whole, uh, over the last three to four months has been for take downs, a motet net Walker, uh, um, there's also IE Gregor, uh, recently as well too. >>And, and Ian Gregor they're actually going in and arresting the affiliates. So not just the CEO or the King, kind of these organizations, but the people who are distributing the ransomware themselves. And that was a unprecedented step, really important. So you really start to paint a picture of this, again, supply chain, this ecosystem of cyber criminals and how we can hit them, where it hurts on all angles. I've most recently, um, I've been heavily involved with the world economic forum. Uh, so I'm, co-author of a report from last year of the partnership on cyber crime. And, uh, this is really not just the pro uh, private, private sector, but the private and public sector working together. We know a lot about cybercriminals. We can't arrest them. Uh, we can't take servers offline from the data centers, but working together, we can have that whole, you know, that holistic effect. >>Great. Thank you for that, Derek. What if people want, want to go deeper? Uh, I know you guys mentioned that you do blogs, but are there other resources that, that they can tap? Yeah, absolutely. So, >>Uh, everything you can see is on our threat research blog on, uh, so 40 net blog, it's under expired research. We also put out, uh, playbooks, w we're doing blah, this is more for the, um, the heroes as he called them the security operation centers. Uh, we're doing playbooks on the aggressors. And so this is a playbook on the offense, on the offense. What are they up to? How are they doing that? That's on 40 guard.com. Uh, we also release, uh, threat signals there. So, um, we typically release, uh, about 50 of those a year, and those are all, um, our, our insights and views into specific attacks that are now >>Well, Derek Mackie, thanks so much for joining us today. And thanks for the work that you and your teams do. Very important. >>Thanks. It's yeah, it's a pleasure. And, uh, rest assured we will still be there 24 seven, three 65. >>Good to know. Good to know. And thank you for watching everybody. This is Dave Volante for the cube. We'll see you next time.

Published Date : Feb 23 2021

SUMMARY :

but now they have to be wary of software updates in the digital supply chain, Thanks so much for, for the invitation to speak. So first I wonder if you could explain for the audience, what is for guard labs Um, and, but, you know, so it's, it's everything from, uh, customer protection first And it's, it's critical because like you said, you can, you can minimize the um, that is, uh, the, you know, that that's digestible. I know you do this twice a year, but what trends did you see evolving throughout the year and what have you seen with the uh, natural disasters as an example, you know, um, trying to do charity Um, people started to become, we did a lot of education around this. on, um, uh, you know, targeting the digital supply chain as an example. in the first half, and then they sort of deployed it, did it, uh, w what actually happened there from um, you know, a lot of ramp up work on their end, a lot of time developing the, on, um, you know, social engineering, um, using, uh, topical themes. So you mentioned stuck next Stuxnet as the former sort of example, of one of the types of attacks is designed by design, uh, to say that, you know, um, you know, in fact, uh, ransomware is not a new of, um, you know, damages that can happen from that. and cameras and, you know, thermostats, uh, with 75% Yeah, so, uh, um, uh, you know, unfortunately the attack surface as we call it, uh, you know, home entertainment systems, uh, network attached storage as well, you know, big pharma healthcare, uh, where and it's, it's, it's, uh, you know, very unfortunate, but obviously with So maybe in the time remaining, we can talk about remediation strategies. So a couple of things just to get out of the way I call it housekeeping, cyber hygiene, So, uh, that's, uh, you know, uh, antivirus, intrusion prevention, web filtering, And I remember I was talking to Robert Gates on the cube a couple of years ago, a former defense secretary. Um, so, you know, we, we need, I always say we can't win this war alone. cybercriminals moved out, uh, you know, um, uh, that, but working together, we can have that whole, you know, that holistic effect. Uh, I know you guys mentioned that Uh, everything you can see is on our threat research blog on, uh, And thanks for the work that you and your teams do. And, uh, rest assured we will still be there 24 seven, And thank you for watching everybody.

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
Dave VellantePERSON

0.99+

2006DATE

0.99+

Derek MackiePERSON

0.99+

1989DATE

0.99+

2014DATE

0.99+

Ian GregorPERSON

0.99+

fiveQUANTITY

0.99+

15 yearsQUANTITY

0.99+

75%QUANTITY

0.99+

DerekPERSON

0.99+

20QUANTITY

0.99+

Dave VolantePERSON

0.99+

FortinetORGANIZATION

0.99+

twoQUANTITY

0.99+

$60 millionQUANTITY

0.99+

InterpolORGANIZATION

0.99+

two typesQUANTITY

0.99+

Robert GatesPERSON

0.99+

last yearDATE

0.99+

FortiGuard LabsORGANIZATION

0.99+

first halfQUANTITY

0.99+

U S governmentORGANIZATION

0.99+

12 monthsQUANTITY

0.99+

40 guard labsQUANTITY

0.99+

todayDATE

0.99+

one caseQUANTITY

0.99+

one dayQUANTITY

0.99+

firstQUANTITY

0.99+

last summerDATE

0.99+

GoogleORGANIZATION

0.99+

half a yearQUANTITY

0.99+

a monthQUANTITY

0.98+

three weeksQUANTITY

0.98+

oneQUANTITY

0.98+

both attacksQUANTITY

0.98+

COVID-19OTHER

0.98+

this yearDATE

0.98+

10 plus years agoDATE

0.98+

EMBARGOPERSON

0.98+

over two yearsQUANTITY

0.98+

InterforORGANIZATION

0.98+

two years agoDATE

0.97+

two times a yearQUANTITY

0.96+

million dollarsQUANTITY

0.96+

40 grand labsQUANTITY

0.96+

Zero trustQUANTITY

0.96+

four monthsQUANTITY

0.95+

Derek mankyPERSON

0.95+

JerichoPERSON

0.95+

millions of dollars a dayQUANTITY

0.95+

OneQUANTITY

0.95+

40 netQUANTITY

0.94+

pandemicEVENT

0.94+

COVIDOTHER

0.94+

thousands of peopleQUANTITY

0.94+

over 5 million censorshipQUANTITY

0.94+

fourQUANTITY

0.93+

twice a yearQUANTITY

0.92+

one thingQUANTITY

0.9+

40 guard.comOTHER

0.9+

Derek MankyPERSON

0.89+

a hundred billionQUANTITY

0.89+

about 50QUANTITY

0.89+

six years oldQUANTITY

0.89+

over 40 different languagesQUANTITY

0.88+

ChiefPERSON

0.87+

Security Insights & Global Threat AlliancesORGANIZATION

0.87+

threeQUANTITY

0.87+

about twoQUANTITY

0.86+

Stuxnet attacksEVENT

0.86+

zero-day weaponsQUANTITY

0.86+

Q4DATE

0.86+

21 yearsQUANTITY

0.85+

Maseca proORGANIZATION

0.85+

two years oldQUANTITY

0.85+

cyber threat AllianceORGANIZATION

0.83+

Chetan Kapoor, AWS & Eitan Medina, Habana Labs | AWS re:Invent 2020


 

>>from around the globe. It's the Cube with digital coverage of AWS >>reinvent 2020 sponsored >>by Intel, AWS and our community partners. Welcome back to the cubes. Virtual coverage of AWS reinvent 2020. It's virtual this year. We're not in person, so we're doing remote interviews. Part of the three weeks we'll be covering wall to wall a lot of great conversations. News to cover and joining me today Off Fresh off the news off Andy Jackson's keynote, We have two great guests here. Jason Kapoor, senior product manager for Accelerated Computing at A. W S and eight time Medina Chief business officer, Havana Labs, which was recently acquired by Intel Folks. Thanks for coming on, gentlemen. Thank you for spending the time for coming on the key. Appreciate it. >>Thanks for having us. >>J Town. So talk about the news, actually. Uh, computers changing. It's being reinvented. That's the theme from Andy's keynote. What did Andy announced? Could you take a minute to explain the announcement? What services? What ap What's gonna be supported? What's this about? Take a minute to explain. >>Yeah, absolutely. Yeah. So today >>we >>announced our plans to launch and easy to instance based on hardware accelerators from Havana labs. We expect these businesses to be available in the first time from next year. And these air custom designed for accelerating training off deep learning models, a zoo we all know like training of deep learning models is a really competition. Aly extensive task. Oftentimes it takes too long and cost too much. And we're really excited about getting these instances out of the market as we expect for them to provide up to 40% better price performance. Thani on top of the line GPU instances, >>a lot of improvements. Why did anybody do this? Why heaven or what's the what the working backwards document tell you? What is it customers looking for here is or specific use case? >>Yeah, absolutely. So, you know, over the years, uh, the use of machine learning and deep learning has, like, really skyrocketed, right? So we're seeing companies from all the way like 14, 500 to like start ups just reinventing their business models and use using deep learning more pervasively. Right. So we have companies like Pinterest, you know, you'd use deep learning for content recommendations and object detection to Toyota Research Institute that are advancing the science behind autonomous vehicles. And there's a consistent cream from a lot of these customers that are, you know, innovating in the deep learning space that you know the cost it takes to experiment, train and optimize the deep learning models. It's too high. And, you know, they're looking at us as one of their partners to help them optimize their costs, you know, bring them as well as possible while giving them really performing products and enable them to actually bring their markets, their innovations to market as soon as possible. Right? S o. Do you answer your questions straight on your wants? The working backwards. It's a feedback from customers that they want choice on. They want our help Thio lower. Uh, the amount of compute resources and the cost it takes to train the new planning models. >>Hey, Tom, why don't you weigh in here on Havana and now part of intel? What trends are driving this? What's the motivation? Were you guys fit in? What's your view on this? >>Yeah, So Havana was founded in 2016 to deliver a I processors for the data center and cloud for training and inference deep learning models. So while building chips is hard, building, the software and ecosystem is even harder. So joining forces with intel simply helps us connect the dots. Ever since the acquisition last year, we were able to significantly boost our armed. The resource is, and now we're leveraging inter scale in number of customers and ecosystem and partner support. >>So what's the name of the product? Is there a chip name got? Was it Gowdy is the name? >>Yes, the product is man angle. >>Okay. And so it's gonna be hardware. So it's the hardware software. What's involved? Take us through the product. >>Yes. So Gandhi was designed from the ground up to do one task which is training deep learning models. To do that well, we focus the architectural to aspect efficiency and scalability. The computer architectures is a combination of fully programmable TPC tensile process, of course, and a central g M n G. These DPC course are programmable Villa W seen the machines that we designed with custom instruction, set architecture, er and special functions that will developed specifically for a I. The Gandhi cheap integrates also 32 gigabyte off H B M to memory which makes it easy to port to. For GPU developers, Gandhi is unique in integrating 10 parts of 100 gigabit Internet rocky on cheap. And this is opposed to other architectural, which use proprietary interfaces. So overall, improving the cost performance is achieved through efficiency, namely higher utilization off the computer and memory resource is on cheap and the native integration off the rocky interfaces >>J Town. This is actually interesting, as this is the theme for reinvent. We're seeing it right on stage today. Play out again another command performance by Andy Jassy. Slew of announcements. How does Gowdy fit into the AI portfolio or Amazon strategy? Because what a town saying is it sounds like he's doing the heavy lifting on all this training stuff when people want to just get to the outcome. I mean, the theme has been, just let the product do what they do kind of put stuff under the covers and just let it scale. Is that the theme here is this. >>What does this >>all fit in? Take us through how this fits into the A, I strategy for Amazon and also what what what is Havana Intel bring to the table? >>Absolutely. Yeah. So with respect to our overall strategy and portfolio units, it's relatively straightforward, right? So we're laser focused on making sure we have the broadest and deepest portfolio off services for machine learning, right? So these range from infrastructure services specifically compute networking and storage all the way up to, like, managed and all services, which come with pre trained models and customers can simply invoke them using an A P. I call right eso. So from a strategy perspective, you want to make sure that we provide a customer to a choice, uh, enable them to pick the right platform for the right use case, help them get to the Khan structure they actually want, right eso with Havana. And you know, their acquisition with Intel, we finally have access to hardware software and the ability to kind of build out a ecosystem beyond what you know judicially is being used. Which is was a GP used right eso. So the engagement with with Havana, you know, allows us to take their products and capabilities, wrap it around, and easy to instance, which is what customers will be able to launch right on doing so. We're enabling them to tap into the innovation that Teton the rest of the Havana team are working on while having a solution that is integrated with the full AWS stack. Right? So you don't you don't have to rack in stock hard. Bring your data center thes. They're gonna be available standard. Easy to instances. You can just click and launch them. Get access to software that's already pre integrated and big den and ready to go right. Eso so it actually comes down to taking their innovations, coupling it with an AWS solution and making it too easy for customers together. I've been running with the respective training the deepened models. >>Well, here is the question that I want to get to. I think everyone's on everyone's mind is how is it Gowdy different or similar than other GPU? Specifically, you mentioned the software stack on the AWS What you get the software stack inside the chip. How is this different or similar? Two other GP use. And what's the difference between the software stack versus a traditional libraries? >>So from day one, we were focused on the software experience and we were mindful in the need to make it easy for developers to use the innovations we have in the hardware. Most developers, if not all of them, are using deep learning frameworks such as tensile flowing pytorch for building their deep learning models. So God is synapse AI software suite comes integrated and optimized for tensorflow and pilotage, so we expect most developers to be able to take their existing models and with minor changes to the training strips to be able to run them on Gowdy based instances. In addition, expert developers that are familiar with writing their own kernels will be provided with food too sweet for writing their own TPC kernels that can augment the Havana provided library. >>So that's the user experience for the developers, right? That's what you're saying >>exactly, exactly, and we will provide detailed guides for developers. In doing that, Havana will provide open access to documentation library software models and left toe Havana's kita and bi directional communication with the Havana developer community. All these resources will be available concurrently with the AWS Instances launch. >>Okay, so I'm a developer. How did I get involved? It's software on git hub I use the hardware is on Amazon, obviously, in their instances. It's a new instance. Take me through the workflow develop. I'm into this. I wanna I wanna get involved. What I what am I doing? Take me >>through? Yes, I think it s so If the developer is accustomed to using GPS for training the deep learning models three experience is gonna be practically the same, right? So they'll have multiple options to get started. One of them would be, for example, to take our deep learning, Um, it's or Amazon machine images that will come integrated with software from Havana labs. Right. So customers will take the deep Learning Army and launch it on an easy to instance, featuring the gaudy accelerators. Right? So when with that, they'll have, you know, the baseline construct off software and hardware available to get up and running with right, we'll support, you know, all different types of work flows. So if customers want to use containerized solutions, thes instances will be supported R E C s and E s services. Eso using containerized kubernetes you know, thes the solution will just work on. Lastly, we also intend to support these instances through sage maker eso. Just a quick recap on stage maker. That's a manage service that does end to end that provides end to end capabilities for training, debugging, building and deploying machine learning applications. Eso these instances will also be supporting sage maker. So if you're fiddling with sage maker, you can get up and running with this. This is fairly quickly. >>It sounds like it's gonna enable a lot of action and sage maker level. Then can that layer on the use cases? I gotta ask you guys quickly, What's the low hanging fruit use case applications for this product thing? This partnership, Because you know that's gonna be the first Traction said, What are some of these applications gonna be used for? What can we expect to see? >>So typical applications would be image classifications, object detection, natural language processing, the recommendation systems. You'll find reference models in our get up for that and will be growing at least a Z you can imagine. >>Okay, where can people find more info? Give us the data. Take him in to explain. Put a plug in for how What's all the coordinates? U r l sites support how people create, Um, how people get involved. The community. >>Yeah, so customers will be able to access information on AWS websites and also on Havana Labs website. So you will be kicking off a preview early next year. Eso I would highly recommend for customers to find our product pages and signed up for already access and previous information. Utah. >>Yes, and you'll find more information on Havana. A swell a Savannah's get up over time. >>Great announcement. Congratulations. Thanks for sharing the news and some commentary on it. This is really the big theme. You know what Cove in 19 and this pandemic has shown is massive acceleration of digital transformation and having the software and hardware out there that accelerates the heavy lifting and creates value around the data. Super valuable. Thanks for for doing that. Appreciate taking the time. Thank >>you so much. >>Yeah. Thanks for having >>us. Okay, this is the cubes coverage at 80. Best reinvent next three weeks. We're here on the ground. Will remote. We're live inside the studio. We wish we could be there in person, but it's remote this year. But stay tuned. Check out silicon angle dot com. Exclusive interviews with Andy Jassy and Amazon executives and the big news covering. They're all there in one spot. Check it out. We'll be back with more coverage after this break. Thanks for watching. Yeah.

Published Date : Dec 8 2020

SUMMARY :

It's the Cube with digital coverage Part of the three weeks we'll be covering wall That's the theme from Andy's keynote. Yeah, absolutely. the first time from next year. What is it customers looking for here is or specific use case? So we have companies like Pinterest, you know, for the data center and cloud for training and inference deep learning models. So it's the hardware software. So overall, improving the cost performance is achieved through efficiency, Is that the theme here is this. the ability to kind of build out a ecosystem beyond what you know judicially Well, here is the question that I want to get to. be able to take their existing models and with minor changes to the training strips to be able the Havana developer community. is on Amazon, obviously, in their instances. to get up and running with right, we'll support, you know, all different types of work flows. Then can that layer on the use cases? in our get up for that and will be growing at least a Z you can imagine. Put a plug in for how What's all the coordinates? So you will be kicking off a preview early next year. Yes, and you'll find more information on Havana. This is really the big theme. We're here on the ground.

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
AndyPERSON

0.99+

2016DATE

0.99+

Andy JassyPERSON

0.99+

Jason KapoorPERSON

0.99+

AmazonORGANIZATION

0.99+

Andy JacksonPERSON

0.99+

Havana LabsORGANIZATION

0.99+

AWSORGANIZATION

0.99+

TomPERSON

0.99+

Toyota Research InstituteORGANIZATION

0.99+

Chetan KapoorPERSON

0.99+

last yearDATE

0.99+

todayDATE

0.99+

HavanaORGANIZATION

0.99+

next yearDATE

0.99+

IntelORGANIZATION

0.99+

UtahLOCATION

0.99+

GowdyPERSON

0.99+

GandhiPERSON

0.99+

OneQUANTITY

0.99+

14, 500QUANTITY

0.99+

HavanaLOCATION

0.99+

three weeksQUANTITY

0.99+

Habana LabsORGANIZATION

0.98+

10 partsQUANTITY

0.98+

PinterestORGANIZATION

0.98+

firstQUANTITY

0.98+

oneQUANTITY

0.98+

one spotQUANTITY

0.97+

intelORGANIZATION

0.97+

Intel FolksORGANIZATION

0.97+

eight timeQUANTITY

0.97+

early next yearDATE

0.97+

this yearDATE

0.97+

two great guestsQUANTITY

0.97+

100 gigabitQUANTITY

0.97+

J TownPERSON

0.97+

first timeQUANTITY

0.96+

32 gigabyteQUANTITY

0.96+

Havana IntelORGANIZATION

0.96+

Eitan MedinaPERSON

0.96+

up to 40%QUANTITY

0.95+

pandemicEVENT

0.95+

TwoQUANTITY

0.95+

one taskQUANTITY

0.91+

EsoORGANIZATION

0.87+

SavannahLOCATION

0.86+

next three weeksDATE

0.86+

day oneQUANTITY

0.84+

A. W SORGANIZATION

0.82+

GowdyTITLE

0.81+

MedinaORGANIZATION

0.78+

80QUANTITY

0.73+

2020DATE

0.69+

TetonPERSON

0.69+

threeQUANTITY

0.65+

ThaniORGANIZATION

0.64+

themQUANTITY

0.6+

synapseTITLE

0.56+

2020TITLE

0.55+

ThioORGANIZATION

0.54+

InventEVENT

0.53+

esoORGANIZATION

0.51+

Bryce Cracco, NetApp and Jim Sarale, Rancher Labs | CUBE Conversation, December 2020


 

>> [Female VoiceOver] From the CUBE studios in Palo Alto in Boston, connecting with our leaders all around the world, this is a CUBE conversation. >> Hello and welcome to the CUBE conversation here in the Palo Alto studios, I'm John Furrier. Cloud Native News and industry coverage. There are two great guests here to break down what's going on in Cloud Native. we got Rancher Labs, Jim Sarale, Vice President of Global Channels and Alliances and Bryce Cracco Product Manager for NetApp HCI. Guys, thanks for coming on this breaking news around Cloud Native. I mean, this has been really all about Cloud Native for the past year and a half, but this year, certainly with the pandemic, the modern applications are being pushed out faster and faster. A lot of pressure. So congratulations on this announcement, Jim set us up. What is the News? I saw some articles, we've got a story get hit and SiliconANGLE. What's the news with NetApp with Rancher Labs? >> Yeah, thank you. And you're right, we are seeing a vast push with, with the crazy times that we're in right now, but the news really is, you know, Rancher formerly launching our OEM program and launching that with with our Marquee partner with NetApp, you know, when companies get to a certain juncture, you know, an OEM relationship and sometimes means just more of a marketing type relationship but as everybody knows, Rancher is, you know, one of the industry leading multicloud, multi Kubernetes cluster management solutions, open source. And you know, what that means is we're an agnostic play for, for those that are trying to leverage Kubernetes, we've talked with NetApp, we struck a deal with them for them to embed us on their HCI platform. And when you talk about our early in program and, and the things that it entails is really around, you know, how do you get contract vehicles to map go to market strategies? How do you get support, engineering, integration, development, all of those things align with partners. It's not an easy task. It's very important to the go to the kind of go to market strategy that we have. And I think, you know, not only with the market adoption around Kubernetes, Ranchers agnostic play in open source and then obviously, you know, Ranchers come a long way. Our products tried and true. We have nearly 500 customers. We're seeing those customers lean back into some of the OEMs and to the software vendors to have them do more and get them more, I guess, ready for the things that they're doing, an IT operations, how the have dev you know, the app DevOps folks are trying to do more and get applications to market faster. So we're really suited well for organizations like NetApp to take our technology bundle in it and really make it better for their customers experience. So the program allows for contract vehicles, direct integration, support, engineering, pricing, because not one size fits all. As you see the evolution from On-prem to cloud IoT Edge, a lot of different devices from 100s of dollars to 1000s. So Ranchers committed to making sure that we align our products and pricing to fit some of those low compute platforms and also be able to right size our business model to make them successful. >> Well, congratulations, I love the term OEM still kind of hangs around, I'm old enough to remember when it was actually equipment not software, original equipment manufacturer, which essentially, you're essentially letting NetApp embed your code into their equipment or their software. But this is the relationship of a channel and indirect channel for Rancher which you guys are launching, which is total validation. Appreciate that, I like to get into the NetApp side. Bryce, if you don't mind, because, you know, obviously cloud's not new to NetApp storage becoming more critical, hybrid clouds more important. Tell us about the transformation of HCI because I think this is where Kubernetes and it starts to fit in when you see the cloud native surge coming in. How are you guys looking at this opportunity? >> Yeah, you bet when you, when you look at it from a converged infrastructure or hyper-converged infrastructure or hybrid cloud infrastructure perspective. It's always been about simplicity, right. We're not doing anything in the HCI market in general that can't be otherwise done. It's just making it much simpler, reducing that that learning curve and reducing that time to value that our IT customers get. And so I think we saw it, you know, converged infrastructure and hyper-converged infrastructure, all start out with virtualization is kind of the top layer that's facilitated but now obviously Kubernetes is becoming table stakes in the enterprise. So I think we're seeing all the vendors in the space, put in some kind of automatic deployment of Kubernetes or some easier deployment of Kubernetes, making Kubernetes that top layer rather than just virtualization. And, you know, this is a really great opportunity for us at NetApp to be able to do that. Not only with just any Kubernetes package but one that's very well regarded and beloved in the DevOps communities and that's Rancher. So what we have here is kind of something that's great for IT, and really great for DevOps in terms of being able to centralize multi cluster management across a hybrid cloud ecosystem and really empower those DevOps teams, what they to do what they need to do but still keeping IT at the center of it. >> You know, it's interesting, you know, shift left for security DevOps here, DevSecOps, it's all kind of happening with software, software defined, software operated. This is what this is the new operating environment. What is the use cases that presents itself well for this is it from a customer standpoint? Is it they're looking for certain things when you look at the product definition, you say, okay we have NetApp, we have Rancher. Take me through that thinking, what's the customer use case? What are they getting out of this? >> Sure, I think there's a variety of use cases where you see Kubernetes coming into play. And one of the great things about NetApp HCI, is it's not just simple infrastructure but it's also very scalable infrastructure. So that's where a lot of these types of products fall down. As we get to such such a scale point they don't work because of our scalability and our ability to handle mixed workloads. We can really handle any number of use cases. So in a Kubernetes context, this could be anything from IT departments who are going to containerized applications for their own, you know, the applications that they themselves manage, like ERP systems and so forth that are starting to get containerized. It could also be for bespoke applications that the companies are writing themselves, the DevOps teams that actually write the code that makes the company work. And so there, there's kind of a wide variety of use cases in there that are starting to go to Kubernetes. If not there already, the DevOps teams largely are already using Kubernetes. And this is just a great way to centralize it on on one kind of easy button, but yet very scalable and highly performing infrastructure for that kind of consolidation. >> Jim, this is the holy grail we've you guys have been doing since the beginning of Rancher Labs, programmable infrastructure, infrastructure as code, you couldn't get any clear or here when you start to have mainstream, you know, programmable storage and still programmable networking. All of this is happening. This is what we had hoped for the world's now gone full containers. Now you've got Kubernetes and IDC still shows that the enterprises are only like 30 to 40%. Even deep in their toes in on containers. If that, so you see a coupe call and you see all that at VM world, you'll see that re-invent you're going to see mainstream IT, the classic IT with DevOps. What's your reaction to that? Because there this, you know, what's your, what's your what's your take on this? >> Yeah I think you're absolutely right, we are scratching the surface and I think that we will see IT really embrace, right. This, this becomes the opportunity for business enablement to take, to take shape across all different avenues, IT is building infrastructure and make it, you know, allowing compute to be available. And this is kind of, we'll see this surge, not just the IT operations but really having the different groups from app devs to the business line owners, to those pushing applications, understanding the entire ecosystem. You know, we're talking about NetApp and HCI today but you can think of cross the edge, data center edge cloud, retail point of sale systems, getting immediate updates, dealing with IT operations and the compute platforms. It's really just endless. And we're excited. I think the OEM program is going to allow companies like NetApp and in other verticals and industries to really take shape and take advantage of what Rancher's offering to help them be more efficient across what their critical business apps are trying to do. >> Well, congratulations on NetApp, they're very smart company. They've got savvy customers and they're very loyal. Bryce, with that in mind, what's been the reaction you laid out the use cases when you bring this to market with your customers and partners? What's the feedback thumbs up on this and what's the vibe? >> Yeah, we've had some really enthusiastic early reaction, a couple early customers looking at it. You know, it's been a lot of fun and people are really excited that one of the great things about doing this with Rancher is that it's, it's purely open source software. So, you know, our customers love that. It's, there's, it's kind of a low risk proposition for them. They're very well, well hedged they can push this button and get it started on their NetApp HCI with very little, very little lead up to that very little advanced knowledge and just kind of get started. It's actually there's no incremental costs to use it on NetApp HCI. It's just, if you want a joint support model that it, that that there's a fee. And so you can kind of think of it as an indefinite trial period in a way. And I think that's created a lot of early interest and I think yeah I think it's going to be a really great option for our customers. It's going to add a lot of value to the NetApp HCI product. And so far, everyone's been very excited about it. >> You know, I was talking with Dave Vellante, my co-host in the CUBE also does a lot of storage research, knows NetApp as well. We were also commenting about this dynamic and we kind of call this out in 2016 when VMware was having trouble with the cloud operations. And then they decided to get rid of everything and just partner with Amazon. Everyone's like, that's horrible. It's going to be terrible. They're going to lose all their customers but we pointed out and I think this is true here. And I want to get your reaction, both of you guys, if you don't mind commenting what turned out to be the case was is that there was a clear distinction and operator of infrastructure and software development environments with higher level cloud native services. And they're not necessarily competing directly. They're kind of coming together, this idea of operating infrastructure and IT concept when it goes software and goes cloud, it's not a win, lose dynamic. You have software and you get people often need to operate that either code it or run it. So at large scale, this is where HCI kind of fits in Bryce, right? I mean, because now you got the edge, it's more devices. I mean, this is more infrastructure to run. So more, more stuff you've got to operate all this stuff. It's not going to ever go away. You guys react to that. What do you think? >> Sure. Yeah, I think I mean, from a NetApp perspective our customers use all kinds of infrastructure. They use public cloud infrastructure and NetApp has a really great public cloud focused portfolio, around public cloud services. So that's certainly a market that would be playing in our customers use. And it's part of the landscape, as you say, edge, of course also, and you know, with this solution I think it fits right into that because Rancher becomes this kind of container orchestration control plane. That's hosted on an HCI but can span this hybrid multi-cloud and edge environment all from that kind of centralized location. >> I think the simplification of the workloads is a huge deal. Jim, your, your thoughts on this? I see you've got this great program. You have the OEM program and you got an indirect partner, rising tide floats all boats here with, with this market. What's your take? >> Absolutely. And what better way to launch this program with somebody like NetApp? So yeah, you know, Rancher from its inception has been an open source platform agnostic. I think that will help, you know, help us, not just us but NetApp and other OEM partners, depending on operating system, legacy systems, verticals, industries, we're all playing a part in it. On-prem cloud, hybrid cloud, you know, I think Ranchers really well suited, for this advancement strictly by the way that we've continued in our philosophy of building an open source agnostic platform to help organizations, OEMs, ISBs, cloud providers, you name it. I think that Rancher is really well suited for, you know, kind of taking this additional ride, if you will, right. We're seeing we're all seeing it. And as you pointed out, it's less than 30% adoption today. We're all hoping for that to increase exponentially. >> Yeah, when you go mainstream, you get a lot of issues. Bryce, final question on the news analysis here. Why Rancher Labs from a NetApp perspective, what was the what was the deciding factor for you guys? >> Well, they just made a lot of sense for us to partner with. Again, the open source nature of it and the free nature of it made it really low barrier to entry for our customers. We really liked that. We also like they're very open and agnostic approach. So, you know, nothing that we're doing here with Rancher has to be at the expense of any other relationships that we have. And that was really that was really an important consideration. You know, it's, it's a very low risk, low cost, easy to get going solution for our customers. And there's very, there's no fear of lock-in with it. And so it's basically just all potential upsides and no potential downsides. And I think it's a really great solution for both IT and for DevOps, which was really critical. >> Real quick question on the customer expectation. Are you guys going to support Rancher? How does a customer get impacted by this? Obviously NetApp has, has their own supporters or is there a joint support? Is you guys going to handle that? How does the customer deal with that touches? >> Yeah, that's, that's really the crux of the deal. There is NetApp is able to provide frontline support for our customers or NetApp HCI customers, if they've, if they've purchased the Rancher support package through NetApp, they can get support for it through NetApp. And we're able to pass tickets back and forth between the companies as needed. So you don't have to have any guesswork about where where the problem and the stack might lie. You just opened your support ticket with NetApp and we can make sure it gets resolved. So that's been a really great part of the deal. >> Well, gentlemen, thanks for coming on. Appreciate the news insight. I do want to ask one final question, while I got you both here. If you don't mind, as we come in to the end of the year 2020, what a crazy year it's been between the pandemic and just the just the shift and the massive sea change of how virtual virtualization, not, you know, server or storage virtualization, but you know, the virtual world we live in remote everything, pandemic, uncertainty the digital transformation is just full throttle just more and more pressure. As we come out of cloud native CUBE con and AWS reinvent, we had VM all this activity. What do you guys think of the most important stories that customers should pay attention to in cloud native? What's what's the high order bit? What's the one thing or two things that really are notable that people should pay attention to that's important? Bryce, we'll start with you. >> I think it's bringing Kubernetes into the mainstream, right? I mean, that's what we see happening. How do you do that in a way that continues to give DevOps the flexibility they need and empower them and the way that Kubernetes does, but but also brings it into the mainstream. That's what I think what everyone's trying to solve right now >> Jim, your take on the most important story people should pay attention to. >> I think the same, I think Kubernetes adoption and really getting that education and people up to speed to start making that transformation. You know, quicker and getting that adoption rate up. I think we'll see a lot of benefits. Like you said, remote virtual in Kubernetes is kind of that framework that needs to get out there, be prevalent and and all of us take advantage, and start working together. >> All right, we'll leave it there. Guys, congratulations on the deal. NetApp embedding Kubernetes and Rancher support inside their hyper-converged infrastructure HCI. Bryce, Jim, thanks for coming on the CUBE. >> Thank you. >> Okay, I'm John Furrier with CUBE conversation here in Palo Alto. Normally when we do these in person but it's remote with the pandemic, giving you the latest continuing the cube virtual coverage, here in Palo Alto. Thanks for watching. (gentle music)

Published Date : Dec 8 2020

SUMMARY :

all around the world, What's the news with but the news really is, you know, and it starts to fit in And so I think we saw it, you know, You know, it's interesting, you know, of use cases where you see and you see all that at VM and make it, you know, allowing when you bring this to market that one of the great I mean, because now you got edge, of course also, and you know, of the workloads is a huge deal. I think that Rancher is really well suited for, you know, what was the deciding factor for you guys? of it and the free nature Is you guys going to handle that? and forth between the companies as needed. and the massive sea change but also brings it into the mainstream. the most important story that framework that needs to Bryce, Jim, thanks for coming on the CUBE. giving you the latest continuing

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
AmazonORGANIZATION

0.99+

Dave VellantePERSON

0.99+

JimPERSON

0.99+

BrycePERSON

0.99+

RancherORGANIZATION

0.99+

Jim SaralePERSON

0.99+

2016DATE

0.99+

December 2020DATE

0.99+

Palo AltoLOCATION

0.99+

John FurrierPERSON

0.99+

Rancher LabsORGANIZATION

0.99+

Bryce CraccoPERSON

0.99+

30QUANTITY

0.99+

less than 30%QUANTITY

0.99+

NetAppTITLE

0.99+

bothQUANTITY

0.99+

AWSORGANIZATION

0.99+

1000sQUANTITY

0.99+

two thingsQUANTITY

0.99+

CUBEORGANIZATION

0.99+

BostonLOCATION

0.99+

todayDATE

0.98+

40%QUANTITY

0.98+

this yearDATE

0.98+

one final questionQUANTITY

0.98+

NetAppORGANIZATION

0.98+

oneQUANTITY

0.98+

nearly 500 customersQUANTITY

0.97+

past year and a halfDATE

0.97+

KubernetesTITLE

0.97+

Global Channels and AlliancesORGANIZATION

0.96+

pandemicEVENT

0.95+

NetApp HCITITLE

0.95+

one thingQUANTITY

0.95+

MarqueeORGANIZATION

0.94+

Cloud NativeORGANIZATION

0.93+

two great guestsQUANTITY

0.91+

DevSecOpsTITLE

0.91+

VMwareORGANIZATION

0.91+

100s of dollarsQUANTITY

0.89+

HCIORGANIZATION

0.87+

end of the year 2020DATE

0.87+

CloudORGANIZATION

0.86+

RanchersORGANIZATION

0.85+

DevOpsTITLE

0.84+

Derek Manky and Aamir Lakhani, FortiGuard Labs | CUBE Conversation, August 2020


 

>>from the Cube Studios in Palo Alto in Boston, connecting with thought leaders all around the world. This is a cube conversation, >>Everyone. Welcome to this cube conversation. I'm John for host of the Cube here in the Cubes Palo Alto studios during the co vid crisis. Square Quarantine with our crew, but we got the remote interviews. Got great to get great guests here from 44 to guard Fortinet, 40 Guard Labs, Derek Manky chief Security Insights and Global Threat alliances. At 14 it's 40 guard labs and, um, are Lakhani. Who's the lead researcher for the Guard Labs. Guys, great to see you. Derek. Good to see you again. Um, are you meet you? >>Hey, it's it's it's been a while and that it happened so fast, >>it just seems, are say it was just the other day. Derek, we've done a couple interviews in between. A lot of flow coming out of Florida net for the guards. A lot of action, certainly with co vid everyone's pulled back home. The bad actors taking advantage of the situation. The surface areas increased really is the perfect storm for security. Uh, in terms of action, bad actors are at all time high new threats here is going on. Take us through what you guys were doing. What's your team makeup look like? What are some of the roles and you guys were seeing on your team? And how's that transcend to the market? >>Yeah, sure, Absolutely. So you're right. I mean, like, you know, like I was saying earlier this this is all this always happens fast and furious. We couldn't do this without, you know, a world class team at 40 guard labs eso we've grown our team now to over 235 globally. There's different rules within the team. You know, if we look 20 years ago, the rules used to be just very pigeonholed into, say, anti virus analysis. Right now we have Thio account for when we're looking at threats. We have to look at that growing attack surface. We have to look at where these threats coming from. How frequently are they hitting? What verticals are they hitting? You know what regions? What are the particular techniques? Tactics, procedures, You know, we have threat. This is the world of threat Intelligence, Of course. Contextualizing that information and it takes different skill sets on the back end, and a lot of people don't really realize the behind the scenes. You know what's happening on bears. A lot of magic happen not only from what we talked about before in our last conversation from artificial intelligence and machine learning, that we do a 40 yard labs and automation, but the people. And so today we want to focus on the people on and talk about you know how on the back ends, we approach a particular threat. We're going to talk to the world, a ransom and ransomware. Look at how we dissect threats. How correlate that how we use tools in terms of threat hunting as an example, And then how we actually take that to that last mile and and make it actionable so that, you know, customers are protected. How we share that information with Keith, right until sharing partners. But again it comes down to the people. We never have enough people in the industry. There's a big shortages, we know, but it it's a really key critical element, and we've been building these training programs for over a decade within 40 guard lab. So you know, you know, John, this this to me is why, exactly why, I always say, and I'm sure Americans share this to that. There's never a dull day in the office. I know we hear that all the time, but I think today you know, all the viewers really get a new idea of why that is, because this is very dynamic. And on the back end, there's a lot of things that doing together our hands dirty with this, >>you know, the old expression started playing Silicon Valley is if you're in the arena, that's where the action and it's different than sitting in the stands watching the game. You guys are certainly in that arena. And, you know, we've talked and we cover your your threat report that comes out, Um, frequently. But for the folks that aren't in the weeds on all the nuances of security, can you kind of give the 101 ransomware. What's going on? What's the state of the ransomware situation? Um, set the stage because that's still continues to be a threat. I don't go a week, but I don't read a story about another ransomware and then it leaks out. Yeah, they paid 10 million in Bitcoin or something like I mean, this Israel. That's a real ongoing threat. What is it, >>quite a bit? Yeah, eso I'll give sort of the one on one and then maybe capacity toe mark, who's on the front lines dealing with this every day. You know, if we look at the world of I mean, first of all, the concept to ransom, obviously you have people that that has gone extended way, way before, you know, cybersecurity. Right? Um, in the world of physical crime s Oh, of course. You know the world's first ransom, where viruses actually called PC cyborg. This is in 1989. The ransom payment was demanded to appeal box from leave. It was Panama City at the time not to effective on floppy disk. Very small audience. Not a big attack surface. I didn't hear much about it for years. Um, you know, in really it was around 2000 and 10. We started to see ransomware becoming prolific, and what they did was somewhat cybercriminals. Did was shift on success from ah, fake antivirus software model, which was, you know, popping up a whole bunch of, you know said your computer is infected with 50 or 60 viruses. Chaos will give you an anti virus solution, Which was, of course, fake. You know, people started catching on. You know, the giggles up people caught onto that. So they weren't making a lot of money selling this project software. Uh, enter Ransomware. And this is where ransomware really started to take hold because it wasn't optional to pay for the software. It was mandatory almost for a lot of people because they were losing their data. They couldn't reverse engineer the current. Uh, the encryption kind of decrypt it with any universal tool. Ransomware today is very rigid. We just released our threat report for the first half of 2020. And we saw we've seen things like master boot record nbr around somewhere. This is persistent. It sits before your operating system when you boot up your computer. So it's hard to get rid of, um, very strong. Um, you know, public by the key cryptography that's being so each victim is infected with the different key is an example. The list goes on, and you know I'll save that for for the demo today. But that's basically it's It's very it's prolific and we're seeing shit. Not only just ransomware attacks for data, we're now starting to see ransom for extortion, for targeted ransom cases that we're going after, you know, critical business. Essentially, it's like a D O s holding revenue streams around too. So the ransom demands were getting higher because of this is Well, it's complicated. >>Yeah, I was mentioning, Omar, I want you to weigh in. I mean, 10 million is a lot we reported earlier this month. Garment was the company that was act I t guy completely locked down. They pay 10 million. Um, garment makes all those devices and a Z. We know this is impacting That's real numbers. So I mean, it's another little ones, but for the most part, it's new. It's, you know, pain in the butt Thio full on business disruption and extortion. Can you explain how it all works before I got it? Before we go to the demo, >>you know, you're you're absolutely right. It is a big number, and a lot of organizations are willing to pay that number to get their data back. Essentially their organization and their business is at a complete standstill. When they don't pay, all their files are inaccessible to them. Ransomware in general, what does end up from a very basic or review is it basically makes your files not available to you. They're encrypted. They have a essentially a pass code on them that you have to have the correct pass code to decode them. Ah, lot of times that's in the form of a program or actually a physical password you have type in. But you don't get that access to get your files back unless you pay the ransom. Ah, lot of corporations these days, they are not only paying the ransom, they're actually negotiating with the criminals as well. They're trying to say, Oh, you want 10 million? How about four million? Sometimes that it goes on as well, but it's Ah, it's something that organizations know that if they don't have the proper backups and the Attackers are getting smart, they're trying to go after the backups as well. They're trying to go after your duplicate files, so sometimes you don't have a choice, and organizations will will pay the ransom >>and it's you know they're smart. There's a business they know the probability of buy versus build or pay versus rebuild, so they kind of know where to attack. They know the tactics. The name is vulnerable. It's not like just some kitty script thing going on. This is riel system fistic ated stuff. It's and it's and this highly targeted. Can you talk about some use cases there and what's goes on with that kind of attack? >>Absolutely. The cybercriminals are doing reconnaissance. They're trying to find out as much as they can about their victims. And what happens is they're trying to make sure that they can motivate their victims in the fastest way possible to pay the ransom as well. Eh? So there's a lot of attacks going on. We usually we're finding now is ransomware is sometimes the last stage of an attack, so an attacker may go into on organization. They may already be taking data out of that organization. They may be stealing customer data P I, which is personal, identifiable information such as Social Security numbers or or driver's licenses or credit card information. Once they've done their entire attack, once they've gone, everything they can Ah, lot of times their end stage. There last attack is ransomware, and they encrypt all the files on the system and try and try and motivate the victim to pay as fast as possible and as much as possible as well. >>You know, it's interesting. I thought of my buddy today. It's like casing the joint. They check it out. They do their re kon reconnaissance. They go in, identify what's the move that's move to make. How to extract the most out of the victim in this case, Target. Um, and it really I mean, it's just go on a tangent, you know? Why don't we have the right to bear our own arms? Why can't we fight back? I mean, the end of the day, Derek, this is like, Who's protecting me? I mean, >>e do >>what? To protect my own, build my own army, or does the government help us? I mean, that's at some point, I got a right to bear my own arms here, right? I mean, this is the whole security paradigm. >>Yeah, so I mean, there's a couple of things, right? So first of all, this is exactly why we do a lot of that. I was mentioning the skills shortage and cyber cyber security professionals. Example. This is why we do a lot of the heavy lifting on the back end. Obviously, from a defensive standpoint, you obviously have the red team blue team aspect. How do you first, Um, no. There is what is to fight back by being defensive as well, too, and also by, you know, in the world that threat intelligence. One of the ways that we're fighting back is not necessarily by going and hacking the bad guys, because that's illegal in jurisdictions, right? But how we can actually find out who these people are, hit them where it hurts. Freeze assets go after money laundering that works. You follow the cash transactions where it's happening. This is where we actually work with key law enforcement partners such as Inter Pool is an example. This is the world, the threat intelligence. That's why we're doing a lot of that intelligence work on the back end. So there's other ways toe actually go on the offense without necessarily weaponizing it per se right like he's using, you know, bearing your own arms, Aziz said. There's different forms that people may not be aware of with that and that actually gets into the world of, you know, if you see attacks happening on your system, how you how you can use security tools and collaborate with threat intelligence? >>Yeah, I think that I think that's the key. I think the key is these new sharing technologies around collective intelligence is gonna be, ah, great way to kind of have more of an offensive collective strike. But I think fortifying the defense is critical. I mean, that's there's no other way to do that. >>Absolutely. I mean the you know, we say that's almost every week, but it's in simplicity. Our goal is always to make it more expensive for the cyber criminal to operate. And there's many ways to do that right you could be could be a pain to them by by having a very rigid, hard and defense. That means that if if it's too much effort on their end, I mean, they have roos and their in their sense, right, too much effort on there, and they're gonna go knocking somewhere else. Um, there's also, you know, a zay said things like disruption, so ripping infrastructure offline that cripples them. Yeah, it's wack a mole they're going to set up somewhere else. But then also going after people themselves, Um, again, the cash networks, these sorts of things. So it's sort of a holistic approach between anything. >>Hey, it's an arms race. Better ai better cloud scale always helps. You know, it's a ratchet game. Okay, tomorrow I want to get into this video. It's of ransomware four minute video. I'd like you to take us through you to lead you to read. Researcher, >>take us >>through this video and, uh, explain what we're looking at. Let's roll the video. >>All right? Sure s. So what we have here is we have the victims. That's top over here. We have a couple of things on this. Victims that stop. We have ah, batch file, which is essentially going to run the ransom where we have the payload, which is the code behind the ransomware. And then we have files in this folder, and this is where you typically find user files and, ah, really world case. This would be like Microsoft Microsoft Word documents or your Power point presentations. Over here, we just have a couple of text files that we've set up we're going to go ahead and run the ransomware and sometimes Attackers. What they do is they disguise this like they make it look like a like, important word document. They make it look like something else. But once you run, the ransomware usually get a ransom message. And in this case, the ransom message says your files are encrypted. Uh, please pay this money to this Bitcoin address. That obviously is not a real Bitcoin address that usually they look a little more complicated. But this is our fake Bitcoin address, but you'll see that the files now are encrypted. You cannot access them. They've been changed. And unless you pay the ransom, you don't get the files. Now, as the researchers, we see files like this all the time. We see ransomware all the all the time. So we use a variety of tools, internal tools, custom tools as well as open source tools. And what you're seeing here is open source tool is called the cuckoo sandbox, and it shows us the behavior of the ransomware. What exactly is a ransom we're doing in this case? You can see just clicking on that file launched a couple of different things that launched basically a command execute herbal, a power shell. It launched our windows shell and then it did things on the file. It basically had registry keys. It had network connections. It changed the disk. So this kind of gives us behind the scenes. Look at all the processes that's happening on the ransomware and just that one file itself. Like I said, there's multiple different things now what we want to do As researchers, we want to categorize this ransomware into families. We wanna try and determine the actors behind that. So we dump everything we know in the ransomware in the central databases. And then we mind these databases. What we're doing here is we're actually using another tool called malt ego and, uh, use custom tools as well as commercial and open source tools. But but this is a open source and commercial tool. But what we're doing is we're basically taking the ransomware and we're asking malty, go to look through our database and say, like, do you see any like files? Or do you see any types of incidences that have similar characteristics? Because what we want to do is we want to see the relationship between this one ransomware and anything else we may have in our system because that helps us identify maybe where the ransom that's connecting to where it's going thio other processes that may be doing. In this case, we can see multiple I P addresses that are connected to it so we can possibly see multiple infections weaken block different external websites. If we can identify a command and control system, we can categorize this to a family. And sometimes we can even categorize this to a threat actor that has claimed responsibility for it. Eso It's essentially visualizing all the connections and the relationship between one file and everything else we have in our database in this example. Off course, we put this in multiple ways. We can save these as reports as pdf type reports or, you know, usually HTML or other searchable data that we have back in our systems. And then the cool thing about this is this is available to all our products, all our researchers, all our specialty teams. So when we're researching botnets when we're researching file based attacks when we're researching, um, you know, I P reputation We have a lot of different IOC's or indicators of compromise that we can correlate where attacks goes through and maybe even detective new types of attacks as well. >>So the bottom line is you got the tools using combination of open source and commercial products. Toe look at the patterns of all ransomware across your observation space. Is that right? >>Exactly. I should you like a very simple demo. It's not only open source and commercial, but a lot of it is our own custom developed products as well. And when we find something that works, that logic that that technique, we make sure it's built into our own products as well. So our own customers have the ability to detect the same type of threats that we're detecting as well. At four of our labs intelligence that we acquire that product, that product of intelligence, it's consumed directly by our projects. >>Also take me through what, what's actually going on? What it means for the customers. So border guard labs. You're looking at all the ransom where you see in the patterns Are you guys proactively looking? Is is that you guys were researching you Look at something pops on the radar. I mean, take us through What is what What goes on? And then how does that translate into a customer notification or impact? >>So So, yeah, if you look at a typical life cycle of these attacks, there's always proactive and reactive. That's just the way it is in the industry, right? So of course we try to be a wear Some of the solutions we talked about before. And if you look at an incoming threat, first of all, you need visibility. You can't protect or analyze anything that you can't see. So you got to get your hands on visibility. We call these I, O. C s indicators a compromise. So this is usually something like, um, actual execute herbal file, like the virus from the malware itself. It could be other things that are related to it, like websites that could be hosting the malware as an example. So once we have that seed, we call it a seed. We could do threat hunting from there, so we can analyze that right? If it's ah piece of malware or a botnet weaken do analysis on that and discover more malicious things that this is doing. Then we go investigate those malicious things and we really you know, it's similar to the world of C. S. I write have these different gods that they're connecting. We're doing that at hyper scale on DWI. Use that through these tools that Omar was talking. So it's really a life cycle of getting, you know, the malware incoming seeing it first, um, analyzing it on, then doing action on that. Right? So it's sort of a three step process, and the action comes down to what tomorrow is saying water following that to our customers so that they're protected. But then in tandem with that, we're also going further. And I'm sharing it, if if applicable to, say, law enforcement partners, other threat Intel sharing partners to And, um, there's not just humans doing that, right? So the proactive peace again, This is where it comes to artificial intelligence machine learning. Um, there's a lot of cases where we're automatically doing that analysis without humans. So we have a I systems that are analyzing and actually creating protection on its own. Two. So it Zack white interest technology. >>A decision. At the end of the day, you want to protect your customers. And so this renders out if I'm afford a net customer across the portfolio. The goal here is to protect them from ransomware. Right? That's the end of game. >>Yeah, And that's a very important thing when you start talking these big dollar amounts that were talking earlier comes Thio the damages that air down from estimates. >>E not only is a good insurance, it's just good to have that fortification. Alright, So dark. I gotta ask you about the term the last mile because, you know, we were before we came on camera. You know, I'm band with junkie, always want more bandwidth. So the last mile used to be a term for last mile to the home where there was telephone lines. Now it's fiber and by five. But what does that mean to you guys and security is that Does that mean something specific? >>Yeah, Yeah, absolutely. The easiest way to describe that is actionable, right? So one of the challenges in the industry is we live in a very noisy industry when it comes thio cybersecurity. What I mean by that is because of that growing attacks for fists on do you know, you have these different attack vectors. You have attacks not only coming in from email, but websites from, you know, DDOS attacks. There's there's a lot of volume that's just going to continue to grow is the world of I G N O T. S O. What ends up happening is when you look at a lot of security operation centers for customers as an example, um, there are it's very noisy. It's, um you can guarantee that every day you're going to see some sort of probe, some sort of attack activity that's happening. And so what that means is you get a lot of protection events, a lot of logs, and when you have this worldwide shortage of security professionals, you don't have enough people to process those logs and actually started to say, Hey, this looks like an attack. I'm gonna go investigate it and block it. So this is where the last mile comes in because ah, lot of the times that you know these logs, they light up like Christmas. And I mean, there's a lot of events that are happening. How do you prioritize that? How do you automatically add action? Because The reality is, if it's just humans, doing it on that last mile is often going back to your bandwidth terms. There's too much too much lately. See right, So how do you reduce that late and see? That's where the automation the AI machine learning comes in. Thio solve that last mile problem toe automatically either protection. Especially important because you have to be quicker than the attacker. It's an arms race like E. >>I think what you guys do with four to Guard Labs is super important. Not like the industry, but for society at large, as you have kind of all this, you know, shadow, cloak and dagger kind of attacks systems, whether it's National Security international or just for, you know, mafias and racketeering and the bad guys. Can you guys take a minute and explain the role of 40 guards specifically and and why you guys exist? I mean, obviously there's a commercial reason you both on the four net that you know trickles down into the products. That's all good for the customers. I get that, but there's more to the fore to guard than just that. You guys talk about this trend and security business because it is very clear that there's a you know, uh, collective sharing culture developing rapidly for societal benefit. Can you take them into something that, >>Yeah, sure, I'll get my thoughts. Are you gonna that? So I'm going to that Teoh from my point of view, I mean, there's various functions, So we've just talked about that last mile problem. That's the commercial aspect we create through 40 yard labs, 40 yards, services that are dynamic and updated to security products because you need intelligence products to be ableto protect against intelligence attacks. That's just the defense again, going back to How can we take that further? I mean, we're not law enforcement ourselves. We know a lot about the bad guys and the actors because of the intelligence work that you do. But we can't go in and prosecute. We can share knowledge and we can train prosecutors, right? This is a big challenge in the industry. A lot of prosecutors don't know how to take cybersecurity courses to court, and because of that, a lot of these cybercriminals rain free. That's been a big challenge in the industry. So, you know, this has been close to my heart over 10 years, I've been building a lot of these key relationships between private public sector as an example, but also private sector things like Cyber Threat Alliance, where a founding member of the Cyber Threat Alliance, if over 28 members and that alliance. And it's about sharing intelligence to level that playing field because Attackers room freely. What I mean by that is there's no jurisdictions for them. Cybercrime has no borders. Um, they could do a million things, uh, wrong and they don't care. We do a million things right. One thing wrong, and it's a challenge. So there's this big collaboration that's a big part of 40 guard. Why exists to is to make the industry better. Thio, you know, work on protocols and automation and and really fight fight this together. Well, remaining competitors. I mean, we have competitors out there, of course, on DSO it comes down to that last mile problem. John is like we can share intelligence within the industry, but it's on Lee. Intelligence is just intelligence. How do you make it useful and actionable? That's where it comes down to technology integration. And, >>um, are what's your take on this, uh, societal benefit because, you know, I've been saying since the Sony hack years ago that, you know, when you have nation states that if they put troops on our soil, the government would respond. Um, but yet virtually they're here, and the private sector's defend for themselves. No support. So I think this private public partnership thing is very relevant. I think is ground zero of the future build out of policy because, you know, we pay for freedom. Why don't we have cyber freedom is if we're gonna run a business. Where's our help from the government? Pay taxes. So again, if a military showed up, you're not gonna see, you know, cos fighting the foreign enemy, right? So, again, this is a whole new change over it >>really is. You have to remember that cyberattacks puts everyone on even playing field, right? I mean, you know, now don't have to have a country that has invested a lot in weapons development or nuclear weapons or anything like that, right? Anyone can basically come up to speed on cyber weapons as long as they have an Internet connection. So it evens the playing field, which makes it dangerous, I guess, for our enemies, you know, But absolutely that I think a lot of us, You know, from a personal standpoint, a lot of us have seen researchers have seen organizations fail through cyber attacks. We've seen the frustration we've seen. Like, you know, besides organization, we've seen people like, just like grandma's loser pictures of their, you know, other loved ones because they can being attacked by ransom, where I think we take it very personally when people like innocent people get attacked and we make it our mission to make sure we can do everything we can to protect them. But But I will add that the least here in the U. S. The federal government actually has a lot of partnerships and ah, lot of programs to help organizations with cyber attacks. Three us cert is always continuously updating, you know, organizations about the latest attacks. Infra Guard is another organization run by the FBI, and a lot of companies like Fortinet and even a lot of other security companies participate in these organizations so everyone can come up to speed and everyone share information. So we all have a fighting chance. >>It's a whole new wave paradigm. You guys on the cutting edge, Derek? Always great to see a mark. Great to meet you remotely looking forward to meeting in person when the world comes back to normal as usual. Thanks for the great insights. Appreciate it. >>All right. Thank God. Pleasure is always >>okay. Q conversation here. I'm John for a host of the Cube. Great insightful conversation around security Ransomware with a great demo. Check it out from Derek and, um, are from 14 guard labs. I'm John Ferrier. Thanks for watching.

Published Date : Sep 4 2020

SUMMARY :

from the Cube Studios in Palo Alto in Boston, connecting with thought leaders all around the world. I'm John for host of the Cube here in the Cubes Palo Alto studios during What are some of the roles and you guys were seeing on your team? I know we hear that all the time, but I think today you know, all the viewers really get a new idea you know, the old expression started playing Silicon Valley is if you're in the arena, that's where the action and it's different You know, if we look at the world of I mean, first of all, the concept to ransom, obviously you have people that that has gone It's, you know, pain in the butt Thio full on business disruption and lot of times that's in the form of a program or actually a physical password you have type and it's you know they're smart. in the fastest way possible to pay the ransom as well. I mean, the end of the day, To protect my own, build my own army, or does the government help us? the world of, you know, if you see attacks happening on your system, how you how you can use security I mean, that's there's no other way to do that. I mean the you know, we say that's almost every week, I'd like you to take us through you to lead you to read. Let's roll the video. and this is where you typically find user files and, ah, So the bottom line is you got the tools using combination of open source and commercial So our own customers have the ability to detect the same type of threats that we're detecting as well. You're looking at all the ransom where you see in the patterns Are you guys proactively looking? Then we go investigate those malicious things and we really you know, it's similar to the world of C. At the end of the day, you want to protect your customers. Yeah, And that's a very important thing when you start talking these big dollar amounts that were talking earlier comes I gotta ask you about the term the last mile because, you know, we were before we came on camera. ah, lot of the times that you know these logs, they light up like Christmas. I mean, obviously there's a commercial reason you both on the four net that you know because of the intelligence work that you do. I've been saying since the Sony hack years ago that, you know, when you have nation states that if they put troops I mean, you know, now don't have to have a country that has invested a lot in weapons Great to meet you remotely looking forward to meeting in person when the world comes back to normal I'm John for a host of the Cube.

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
Aamir LakhaniPERSON

0.99+

FBIORGANIZATION

0.99+

DerekPERSON

0.99+

FortinetORGANIZATION

0.99+

August 2020DATE

0.99+

JohnPERSON

0.99+

AzizPERSON

0.99+

OmarPERSON

0.99+

Derek MankyPERSON

0.99+

Cyber Threat AllianceORGANIZATION

0.99+

1989DATE

0.99+

10 millionQUANTITY

0.99+

Cyber Threat AllianceORGANIZATION

0.99+

50QUANTITY

0.99+

Panama CityLOCATION

0.99+

Palo AltoLOCATION

0.99+

KeithPERSON

0.99+

John FerrierPERSON

0.99+

40 yardsQUANTITY

0.99+

40 yardQUANTITY

0.99+

Guard LabsORGANIZATION

0.99+

tomorrowDATE

0.99+

60 virusesQUANTITY

0.99+

BostonLOCATION

0.99+

FortiGuard LabsORGANIZATION

0.99+

todayDATE

0.99+

OneQUANTITY

0.99+

LeePERSON

0.99+

each victimQUANTITY

0.99+

Infra GuardORGANIZATION

0.98+

over 10 yearsQUANTITY

0.98+

MicrosoftORGANIZATION

0.98+

ThioPERSON

0.98+

FloridaLOCATION

0.98+

14 guard labsQUANTITY

0.98+

four minuteQUANTITY

0.98+

over 28 membersQUANTITY

0.98+

20 years agoDATE

0.98+

over a decadeQUANTITY

0.98+

fiveQUANTITY

0.98+

Cube StudiosORGANIZATION

0.98+

ChristmasEVENT

0.98+

40 guard labsQUANTITY

0.97+

first half of 2020DATE

0.97+

TwoQUANTITY

0.97+

first ransomQUANTITY

0.97+

U. S.LOCATION

0.97+

Inter PoolORGANIZATION

0.97+

a weekQUANTITY

0.97+

three stepQUANTITY

0.96+

firstQUANTITY

0.96+

IntelORGANIZATION

0.96+

GarmentORGANIZATION

0.96+

earlier this monthDATE

0.95+

101 ransomwareQUANTITY

0.95+

C. S.PERSON

0.95+

four millionQUANTITY

0.95+

40 guardsQUANTITY

0.95+

oneQUANTITY

0.95+

One thingQUANTITY

0.94+

ThreeQUANTITY

0.94+

windowsTITLE

0.93+

CubeORGANIZATION

0.93+

over 235QUANTITY

0.93+

bothQUANTITY

0.93+

one fileQUANTITY

0.93+

TargetORGANIZATION

0.92+

AltoLOCATION

0.9+

SonyORGANIZATION

0.88+

four netQUANTITY

0.87+

IsraelLOCATION

0.86+

LakhaniPERSON

0.81+

garmentORGANIZATION

0.8+

BitcoinOTHER

0.8+

Silicon ValleyTITLE

0.79+

Sheng Liang, Rancher Labs & Murli Thirumale, Portworx | KubeCon + CloudNativeCon Europe - Virtual


 

>>from around the globe. It's the Cube with coverage of Coop con and cloud, native con Europe 2020 Virtual brought to you by Red Hat, The Cloud Native Computing Foundation and its ecosystem partners >>Welcome back. This is the Cube coverage of Cube Con Cloud, native con, the European show for 2020. I'm your host to Minuteman. And when we talk about the container world, we talk about what's happening in cloud. Native storage has been one of those sticking points. One of those things that you know has been challenging, that we've been looking to mature and really happy to welcome back to the program two of our cube alumni to give us the update on the state of storage for the container world. Both of them are oh, founders and CEOs. First of all, we have Xiang Yang from Rancher Labs, of course, was recently acquired by Sue Save it and the intention to acquire on and also joining us from early the relay. Who is with port works? Shang Amerli. Thanks so much for joining us. Thank you. Thank you. Alright. So early. I actually I'm going to start with you just cause you know we've seen, you know, a couple of waves of companies working on storage. In this environment, we know storage is difficult. Um, And when we change how we're building things, there's architectural things that can happen. Eso maybe if you could just give us a snapshot, you know, Port works, you know, was created to help unpack this. You know, straight on here in 2020 you know, where you see things in the overall kind of computer storage landscape? >>Absolutely. Still, before I kind of jump into port works. I just want to take a minute to publicly congratulate the the whole rancher team, and and Shang and Shannon And will China have known those folks for a while there? They're kind of true entrepreneurs. They represent the serial entrepreneur spirit that that so many folks know in the valley, and so, you know, great outcome for them. We're very happy for them and ah, big congrats and shout out to the whole team. What works is is a little over five years old, and we've been kind of right from the inception of the company recognized that to put containers in production, you're gonna have to solve, not just the orchestration problem. But the issue of storage and data orchestration and so in a natural kubernetes orchestrates containers and what works orchestrates storage and data. And more specifically, by doing that, what we enable is enterprises to be able to take APS that are containerized into production at scale and and have high availability. Disaster recovery, backup all of the things that for decades I t has had to do and has done to support application, reliability and availability. But essentially we're doing it for purpose with the purpose build solution for containerized workloads. >>Alright, shaming. Of course, storage is a piece of the overall puzzle that that ranchers trying to help with. Maybe if you could just refresh our audience on Longhorn, which your organization has its open source. It's now being managed by the CN. CF is my understanding. So help us bring Longhorn into the discussion >>thanks to. So I'm really glad to be here. We've I think rancher and port work started about the same time, and we started with a slightly different focus. More is exactly right to get containers going, you really need both so that the computer angle orchestrating containers as well as orchestrating the storage and the data. So rancher started with, ah, it's slightly stronger focus on orchestrating containers themselves, but pretty quickly, we realized, as adoption of containers grow, we really need it to be able to handle ah, storage feather. And like any new technology, you know, uh, Kubernetes and containers created some interesting new requirements and opportunities, and at the time, really, they weren't. Ah, a lot of good technologies available, you know, technologies like rook and SEF at the time was very, very premature, I think, Ah, the You know, we actually early on try to incorporate ah, the cluster technology. And it was just it was just not easy. And And at the time I think port Works was, ah, very busy developing. Ah, what turned out to be there flagship product, which we end up, end up, uh, partnering very, very closely. But but early on, we really had no choice but to start developing our own storage technology. So Long horn. As a piece of container storage technology, it's actually almost as oh, there's rancher itself. When about funding engineers, we hired he he ended up, you know, working on it and Then over the years, you know the focus shift that I think the original version was written in C plus plus, and over the years it's now being completely re written in Golan. It was originally written more for Docker workload. Now, of course, everything is kubernetes centric. And last year we you know, we we decided to donate the Longhorn Open Source project to CN CF. And now it's a CN CF sandbox project, and the adoption is just growing really quickly. And just earlier this year, we we finally ah decided to we're ready to offer a commercial support for it. So So that's that's where rancher is. And with longhorn and container storage technology. >>Yeah, it has been really interesting to watch in this ecosystem. A couple of years ago, one of the Q con shows I was talking to people coming out of the Believe It was the Sigs, the special interest group for storage, and it was just like, Wow, it was heated. Words were, you know, back and forth. There's not a lot of agreement there. Anybody that knows the storage industry knows that you know standards in various ways of doing things often are contentious and there's there's differences of opinion. Look at the storage industry. You know, there's a reason why there's so many different solutions out there. So maybe it love to hear from early. From your standpoint, things are coming to get a little bit more. There are still a number of options out there. So you know, why is this kind of coop petition? I actually good for the industry? >>Yeah, I think this is a classic example of Coop petition. Right? Let's let's start with the cooperation part right? The first part of time the you know, the early days of CN, CF, and even sort of the Google Communities team, I think, was really very focused on compute and and subsequent years. In the last 34 years, there's been a greater attention to making the whole stack works, because that's what it's going to take to take a the enterprise class production and put it in, you know, enterprise class application and put it in production. So extensions like C and I for networking and CS I container storage interface. We're kind of put together by a working group and and ah ah you know both both in the CN CF, but also within the kubernetes Google community. That's you talked about six storage as an example. And, you know, as always happens, right? Like it It looks a little bit in the early days. Like like a polo game, right where folks are really? Ah, you know, seemingly, uh, you know, working with each other on on top of the pool. But underneath they're kicking each other furiously. But that was a long time back, and we've graduated from then into really cooperating. And I think it's something we should all be proud of. Where now the CS I interface is really a A really very, very strong and complete solution tow, allowing communities to orchestrate storage and data. So it's really strengthened both communities and the kubernetes ecosystem. Now the competition part. Let's kind of spend. I want to spend a couple of minutes on that too, right? Um, you know, one of the classic things that people sometimes confuse is the difference between an overlay and an interface. CSC is wonderful because it defines how the two layers off essentially kind of old style storage. You know, whether it's a san or ah cloud, elastic storage bucket or all of those interact with community. So the the definition of that interface kind of lay down some rules and parameters for how that interaction should happen. However, you still always need an overlay like Port Works that that actually drives that interface and enables Kubernetes to actually manage that storage. And that's where the competition is. And, you know, she mentioned stuff and bluster and rook and kind of derivatives of those. And I think those have been around really venerable and and really excellent products for born in a different era for a different time open stack, object storage and all of that not really meant for kind of primary workloads. And they've been they've been trying to be adapted for, for for us, for this kind of workload. Port Works is really a built from right from the inception to be designed for communities and for kubernetes workloads at enterprise scale. And so I think, you know, as I as I look at the landscape, we welcome the fact that there are so many more people acknowledging that there is a vital need for data orchestration on kubernetes right, that that's why everybody and their brother now has a CS I interface. However, I think there's a big difference between having an interface. This is actually having the software that provides the functionality for H. A, D R. And and for backup, as as the kind of life cycle matures and doing it not just at scale, but in a way that allows kind of really significant removal or reduction off the storage admin role and replaces it with self service that is fully automated within communities. Yeah, if I >>can, you know, add something that that I completely agree. I mean, over the Longhorns been around for a long time. Like I said, I'm really happy that over the years it hasn't really impacted our wonderful collaborative partnership with what works. I mean, Poll works has always been one of our premier partners. We have a lot of, ah, common customers in this fight. I know these guys rave about what works. I don't think they'll ever get out for works. Ah, home or not? Uh huh. Exactly. Like Morissette, you know, in the in the storage space, there's interface, which a lot of different implementations can plugging, and that's kind of how rancher works. So we always tell people Rancher works with three types of storage implementations. One is let we call legacy storage. You know, your netapp, your DMC, your pure storage and those are really solid. But they were not suddenly not designed to work with containers to start with, but it doesn't matter. They've all written CS I interfaces that would enable containers to take advantage of. The second type is some of the cloud a block storage or file storage services like EBS, GFS, Google Cloud storage and support for these storage back and the CS I drivers practically come with kubernetes itself, so those are very well supported. But there's still a huge amount of opportunities for the third type of you know, we call container Native Storage. So that is where Port Works and the Longhorn and other solutions like open EBS storage OS. All these guys fitting is a very vibrant ecosystem of innovation going on there. So those solutions are able to create basically reliable storage from scratch. You know, when you from from just local disks and they're actually also able to add a lot of value on top of whatever traditional or cloud based, persistent storage you already have. So so the whole system, the whole ecosystem, is developing very quickly. A lot of these solutions work with each other, and I think to me it's really less of a competition or even Coop petition. It's really more off raising the bar for for the capabilities so that we can accelerate the amount of workload that's been moved onto this wonderful kubernetes platform in the end of the benefit. Everyone, >>Well, I appreciate you both laying out some of the options, you know, showing just a quick follow up on that. I think back if you want. 15 years ago was often okay. I'm using my GMC for my block. I'm using my netapp for the file. I'm wondering in the cloud native space, if we expect that you might have multiple different data engine types in there you mentioned you know, I might want port works for my high performance. You said open EBS, very popular in the last CN CF survey might be another one there. So is do we think some of it is just kind of repeating itself that storage is not monolithic and in a micro service architecture. You know, different environments need different storage requirements. >>Yeah, I mean quick. I love to hear more is view as well, especially about you know, about how the ecosystem is developing. But from my perspective, just just the range of capabilities that's now we expect out of storage vendors or data management vendors is just increased tremendously. You know, in the old days, if you can store blocks to object store file, that's it. Right. So now it's this is just table stakes. Then then what comes after that? There will be 345 additional layers of requirements come all the way from backup, restore the our search indexing analytics. So I really think all of this potentially off or in the in the bucket of the storage ecosystem, and I just can't wait to see how this stuff will play out. I think we're still very, very early stages, and and there, you know what? What, what what containers did is they made fundamentally the workload portable, but the data itself still holds a lot of gravity. And then just so much work to do to leverage the fundamental work load portability. Marry that with some form of universal data management or data portability. I think that would really, uh, at least the industry to the next level. Marie? >>Yeah. Shanghai Bean couldn't. Couldn't have said it better. Right? Let me let me let me kind of give you Ah, sample. Right. We're at about 160 plus customers now, you know, adding several by the month. Um, just with just with rancher alone, right, we are. We have common customers in all common video expedient Roche March X, Western Asset Management. You know, charter communications. So we're in production with a number off rancher customers. What are these customers want? And why are they kind of looking at a a a Port works class of solution to use, You know, Xiang's example of the multiple types, right? Many times, people can get started with something in the early days, which has a CS I interface with maybe say, $10 or 8 to 10 nodes with a solution that allows them to at least kind of verify that they can run the stack up and down with, say, you know, a a rancher type orchestrator, workloads that are containerized on and a network plug in and a storage plugging. But really, once they start to get beyond 20 notes or so, then there are problems that are very, very unique to containers and kubernetes that pop up that you don't see in a in a non containerized environment, right? Some. What are some of these things, right? Simple examples are how can you actually run 10 to hundreds of containers on a server, with each one of those containers belonging to a different application and having different requirements? How do you actually scale? Not to 16 nodes, which is sort of make typically, maybe Max of what a San might go to. But hundreds and thousands of notes, like many of our customers, are doing like T Mobile Comcast. They're running this thing at 600 thousands of notes or scale is one issue. Here is a critical critical difference that that something that's designed for Kubernetes does right. We are providing all off the storage functions that Shang just described at container granted, granularity versus machine granularity. One way to think about this is the old Data center was in machine based construct. Construct everything you know. VM Ware is the leader, sort of in that all of the way. You think of storage as villains. You think of compute and CPUs, everything. Sub sub nets, right? All off. Traditional infrastructure is very, very machine centric. What kubernetes and containers do is move it into becoming an app defined control plane, right? One of the things were super excited about is the fact that Kubernetes is really not just a container orchestrator, but actually a orchestrator for infrastructure in an app defined way. And by doing that, they have turned, uh, you know, control off the infrastructure via communities over to a kubernetes segment. The same person who uses rancher uses port works at NVIDIA, for example to manage storage as they use it, to manage the compute and to manage containers. And and that's marvellous, because now what has happened is this thing is now fully automated at scale and and actually can run without the intervention off a storage admin. No more trouble tickets, right? No more requests to say, Hey, give me another 20 terabytes. All of that happens automatically with the solution like port works. And in fact, if you think about it in the world of real time services that we're all headed towards right Services like uber now are expected in enterprises machine learning. Ai all of these things analytics that that change talk about are things that you expect to run in a fully automated way across vast amounts of data that are distributed sometimes in the edge. And you can't do that unless you're fully automated and and not really the storage admin intervention. And that's kind of the solution that we provide. >>Alright, well, we're just about out of time. If I could just last piece is, you know, early and saying to talk about where we are with long for and what we should expect to see through the rest of this year and get some early for you to you know, what differentiates port works from Just, you know, the open source version. So And maybe if we start with just kind of long or in general and then really from from your standpoint, >>yeah, so it's so so the go along one is really to lower the bar for folks to run state for workloads on on kubernetes we want you know, the the Longhorn is 100% open source and it's owned by CN cf now. So we in terms of features and functionalities is obviously a small subset of what a true enterprise grade solution like Port Works or, um, CEO on that that could provide. So there's just, you know, the storage role. Ah, future settle. The roadmap is very rich. I don't think it's not really Ranchers go Oh, our Longhorns goal to, you know, to try to turn itself into a into a plug in replacement for these enterprise, great storage or data management solutions. But But they're you know, there's some critical critical feature gaps that we need address. And that's what the team is gonna be focusing on, perhaps for the rest of the year. >>Yeah, uh, still, I would I would kind of, you know, echo what Chang said, right? I think folks make it started with solutions, like longer or even a plug in connector plug in with one of their existing storage vendors, whether it's pure netapp or or EMC from our viewpoint, that's wonderful, because that allows them to kind of graduate to where they're considering storage and data as part of the stack. They really should that's the way they're going to succeed by by looking at it as a whole and really with, You know, it's a great way to get started on a proof of concept architecture where your focus initially is very much on the orchestration and the container ization part. But But, as Xiang pointed out, you know what what rancher did, what I entered it for Kubernetes was build a simple, elegant, robust solution that kind of democratized communities. We're doing the same thing for communities storage right? What Port works does is have a solution that is simple, elegant, fully automated, scalable and robust. But more importantly, it's a complete data platform, right? We we go where all these solutions start, but don't kind of venture forward. We are a full, complete lifecycle management for data across that whole life cycle. So there's many many customers now are buying port works and then adding deal right up front, and then a few months later they might come back and I'd backup from ports. So two shanks point right because of the uniqueness of the kubernetes workload, because it is an app defined control plane, not machine to find what is happening is it's disrupting, Just like just like virtualization day. VM exist today because because they focused on a VM version off. You know, the their backup solution. So the same thing is happening. Kubernetes workloads are district causing disruption of the D r and backup and storage market with solutions like sports. >>Wonderful. Merlin Chang. Thank you so much for the updates. Absolutely. The promise of containers A Z you were saying? Really, is that that Atomic unit getting closer to the application really requires storage to be a full and useful solution. So great to see the progress that's being made. Thank you so much for joining us. >>Welcome, Shannon. We look forward to ah, working with you as you reach for the stars. Congratulations again. We look >>forward to the containing partnership morally and thank you. Still for the opportunity here. >>Absolutely great talking to both of you And stay tuned. Lots more coverage of the Cube Cube Con cloud, native con 2020 Europe. I'm stew minimum. And thank you for watching the Cube. Yeah, yeah, yeah, yeah, yeah, yeah

Published Date : Aug 18 2020

SUMMARY :

and cloud, native con Europe 2020 Virtual brought to you by Red Hat, I actually I'm going to start with you just cause you know we've seen, of the things that for decades I t has had to do and has done to Of course, storage is a piece of the overall puzzle that that ranchers trying to help Ah, a lot of good technologies available, you know, Anybody that knows the storage industry knows that you know standards in various ways And so I think, you know, the third type of you know, we call container Native Storage. I think back if you want. I love to hear more is view as well, especially about you know, And that's kind of the solution that we provide. the rest of this year and get some early for you to you know, to run state for workloads on on kubernetes we want you know, causing disruption of the D r and backup and storage market with solutions like sports. Thank you so much for the updates. We look forward to ah, working with you as you reach for the stars. Still for the opportunity here. Absolutely great talking to both of you And stay tuned.

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
Red HatORGANIZATION

0.99+

$10QUANTITY

0.99+

hundredsQUANTITY

0.99+

Rancher LabsORGANIZATION

0.99+

Shang AmerliPERSON

0.99+

NVIDIAORGANIZATION

0.99+

2020DATE

0.99+

ShannonPERSON

0.99+

uberORGANIZATION

0.99+

Western Asset ManagementORGANIZATION

0.99+

last yearDATE

0.99+

BothQUANTITY

0.99+

20 terabytesQUANTITY

0.99+

CN CF.ORGANIZATION

0.99+

20 notesQUANTITY

0.99+

MariePERSON

0.99+

MorissettePERSON

0.99+

bothQUANTITY

0.99+

100%QUANTITY

0.99+

T Mobile ComcastORGANIZATION

0.99+

one issueQUANTITY

0.99+

Xiang YangPERSON

0.99+

firstQUANTITY

0.99+

10QUANTITY

0.99+

8QUANTITY

0.99+

OneQUANTITY

0.98+

Sheng LiangPERSON

0.98+

second typeQUANTITY

0.98+

C plus plusTITLE

0.98+

ChangPERSON

0.98+

KubeConEVENT

0.98+

XiangPERSON

0.98+

Sue SavePERSON

0.98+

15 years agoDATE

0.98+

GoogleORGANIZATION

0.98+

longhornORGANIZATION

0.97+

ShangPERSON

0.97+

two layersQUANTITY

0.97+

earlier this yearDATE

0.97+

LonghornORGANIZATION

0.97+

oneQUANTITY

0.97+

Roche March XORGANIZATION

0.97+

345 additional layersQUANTITY

0.97+

GMCORGANIZATION

0.97+

16 nodesQUANTITY

0.96+

CN cfORGANIZATION

0.96+

third typeQUANTITY

0.96+

each oneQUANTITY

0.96+

about 160 plus customersQUANTITY

0.95+

a few months laterDATE

0.95+

both communitiesQUANTITY

0.94+

FirstQUANTITY

0.94+

over five years oldQUANTITY

0.94+

CN CFORGANIZATION

0.93+

EBSORGANIZATION

0.93+

three typesQUANTITY

0.93+

twoQUANTITY

0.93+

600 thousands of notesQUANTITY

0.93+

Merlin ChangPERSON

0.93+

SigsORGANIZATION

0.92+

hundreds of containersQUANTITY

0.91+

One wayQUANTITY

0.91+

The Cloud Native Computing FoundationORGANIZATION

0.9+

this yearDATE

0.89+

CoopORGANIZATION

0.89+

EuropeLOCATION

0.89+

Port WorksORGANIZATION

0.89+

CloudNativeCon EuropeEVENT

0.88+

CubeCOMMERCIAL_ITEM

0.87+

CSCTITLE

0.87+

A couple of years agoDATE

0.86+

Coop conORGANIZATION

0.86+

KubernetesTITLE

0.86+

PortworxORGANIZATION

0.86+

six storageQUANTITY

0.85+

todayDATE

0.84+

rancherORGANIZATION

0.84+

Cube ConCOMMERCIAL_ITEM

0.84+

GolanTITLE

0.83+

Port WorksORGANIZATION

0.82+

10 nodesQUANTITY

0.82+

Derek Manky and Aamir Lakhani, FortiGuard Labs | CUBE Conversation, August 2020


 

>> Announcer: From theCUBE studios in Palo Alto in Boston, connecting with thought leaders all around the world. This is a CUBE conversation. >> Hi everyone. Welcome to this CUBE Conversation. I'm John Furrier host of theCUBE here in the CUBEs, Palo Alto studios during the COVID crisis. We're quarantine with our crew, but we got the remote interviews. Got two great guests here from Fortinet FortiGuard Labs, Derek Mankey, Chief Security Insights and global threat alliances at Fortinet FortiGuard Labs. And Aamir Lakhani who's the Lead Researcher for the FortiGuard Labs. You guys is great to see you. Derek, good to see you again, Aamir, good to meet you too. >> It's been a while and it happens so fast. >> It just seems was just the other day, Derek, we've done a couple of interviews in between a lot of flow coming out of Fortinet FortiGuard, a lot of action, certainly with COVID everyone's pulled back home, the bad actors taking advantage of the situation. The surface areas increased really is the perfect storm for security in terms of action, bad actors are at an all time high, new threats. Here's going on, take us through what you guys are doing. What's your team makeup look like? What are some of the roles and you guys are seeing on your team and how does that transcend to the market? >> Yeah, sure, absolutely. So you're right. I mean like I was saying earlier that is, this always happens fast and furious. We couldn't do this without a world class team at FortiGuard Labs. So we've grown our team now to over 235 globally. There's different rules within the team. If we look 20 years ago, the rules used to be just very pigeonholed into say antivirus analysis, right? Now we have to account for, when we're looking at threats, we have to look at that growing attack surface. We have to look at where are these threats coming from? How frequently are they hitting? What verticals are they hitting? What regions, what are the particular techniques, tactics, procedures? So we have threat. This is the world of threat intelligence, of course, contextualizing that information and it takes different skill sets on the backend. And a lot of people don't really realize the behind the scenes, what's happening. And there's a lot of magic happening, not only from what we talked about before in our last conversation from artificial intelligence and machine learning that we do at FortiGuard Labs and automation, but the people. And so today we want to focus on the people and talk about how on the backend we approached a particular threat, we're going to talk to the word ransom and ransomware, look at how we dissect threats, how correlate that, how we use tools in terms of threat hunting as an example, and then how we actually take that to that last mile and make it actionable so that customers are protected. I would share that information with keys, right, until sharing partners. But again, it comes down to the people. We never have enough people in the industry, there's a big shortage as we know, but it's a really key critical element. And we've been building these training programs for over a decade with them FortiGuard Labs. So, you know John, this to me is exactly why I always say, and I'm sure Aamir can share this too, that there's never a adult day in the office and all we hear that all the time. But I think today, all of you is really get an idea of why that is because it's very dynamic and on the backend, there's a lot of things that we're doing to get our hands dirty with this. >> You know the old expression startup plan Silicon Valley is if you're in the arena, that's where the action is. And it's different than sitting in the stands, watching the game. You guys are certainly in that arena and you got, we've talked and we cover your, the threat report that comes out frequently. But for the folks that aren't in the weeds on all the nuances of security, can you kind of give the 101 ransomware, what's going on? What's the state of the ransomware situation? Set the stage because that's still continues to be threat. I don't go a week, but I don't read a story about another ransomware. And then at least I hear they paid 10 million in Bitcoin or something like, I mean, this is real, that's a real ongoing threat. What is it? >> The (indistinct) quite a bit. But yeah. So I'll give sort of the 101 and then maybe we can pass it to Aamir who is on the front lines, dealing with this every day. You know if we look at the world of, I mean, first of all, the concept of ransom, obviously you have people that has gone extended way way before cybersecurity in the world of physical crime. So of course, the world's first ransom where a virus is actually called PC Cyborg. This is a 1989 around some payment that was demanded through P.O Box from the voters Panama city at the time, not too effective on floppiness, a very small audience, not a big attack surface. Didn't hear much about it for years. Really, it was around 2010 when we started to see ransomware becoming prolific. And what they did was, what cyber criminals did was shift on success from a fake antivirus software model, which was, popping up a whole bunch of, setting here, your computer's infected with 50 or 60 viruses, PaaS will give you an antivirus solution, which was of course fake. People started catching on, the giggles out people caught on to that. So they, weren't making a lot of money selling this fraudulent software, enter ransomware. And this is where ransomware, it really started to take hold because it wasn't optional to pay for this software. It was mandatory almost for a lot of people because they were losing their data. They couldn't reverse engineer that the encryption, couldn't decrypt it, but any universal tool. Ransomware today is very rigid. We just released our threat report for the first half of 2020. And we saw, we've seen things like master boot record, MVR, ransomware. This is persistent. It sits before your operating system, when you boot up your computer. So it's hard to get rid of it. Very strong public private key cryptography. So each victim is effective with the direct key, as an example, the list goes on and I'll save that for the demo today, but that's basically, it's just very, it's prolific. We're seeing shuts not only just ransomware attacks for data, we're now starting to see ransom for extortion, for targeted around some cases that are going after critical business. Essentially it's like a DoS holding revenue streams go ransom too. So the ransom demands are getting higher because of this as well. So it's complicated. >> Was mentioning Aamir, why don't you weigh in, I mean, 10 million is a lot. And we reported earlier in this month. Garmin was the company that was hacked, IT got completely locked down. They pay 10 million, Garmin makes all those devices. And as we know, this is impact and that's real numbers. I mean, it's not other little ones, but for the most part, it's nuance, it's a pain in the butt to full on business disruption and extortion. Can you explain how it all works before we go to the demo? >> You know, you're absolutely right. It is a big number and a lot of organizations are willing to pay that number, to get their data back. Essentially their organization and their business is at a complete standstill when they don't pay, all their files are inaccessible to them. Ransomware in general, what it does end up from a very basic overview is it basically makes your files not available to you. They're encrypted. They have essentially a passcode on them that you have to have the correct passcode to decode them. A lot of times that's in a form of a program or actually a physical password you have to type in, but you don't get that access to get your files back unless you pay the ransom. A lot of corporations these days, they are not only paying the ransom. They're actually negotiating with the criminals as well. They're trying to say, "Oh, you want 10 million? "How about 4 million?" Sometimes that goes on as well. But it's something that organizations know that if they didn't have the proper backups and the hackers are getting smart, they're trying to go after the backups as well. They're trying to go after your duplicated files. So sometimes you don't have a choice in organizations. Will pay the ransom. >> And it's, they're smart, there's a business. They know the probability of buy versus build or pay versus rebuild. So they kind of know where to attack. They know that the tactics and it's vulnerable. It's not like just some kitty script thing going on. This is real sophisticated stuff it's highly targeted. Can you talk about some use cases there and what goes on with that kind of a attack? >> Absolutely. The cyber criminals are doing reconnaissance and trying to find out as much as they can about their victims. And what happens is they're trying to make sure that they can motivate their victims in the fastest way possible to pay the ransom as well. So there's a lot of attacks going on. We usually, what we're finding now is ransomware is sometimes the last stage of an attack. So an attacker may go into an organization. They may already be taking data out of that organization. They may be stealing customer data, PII, which is personal identifiable information, such as social security numbers, or driver's licenses, or credit card information. Once they've done their entire tap. Once they've gone everything, they can. A lot of times their end stage, their last attack is ransomware. And they encrypt all the files on the system and try and motivate the victim to pay as fast as possible and as much as possible as well. >> I was talking to my buddy of the day. It's like casing the joint there, stay, check it out. They do their recon, reconnaissance. They go in identify what's the best move to make, how to extract the most out of the victim in this case, the target. And it really is, I mean, it's just to go on a tangent, why don't we have the right to bear our own arms? Why can't we fight back? I mean, at the end of the day, Derek, this is like, who's protecting me? I mean, what to protect my, build my own arms, or does the government help us? I mean, at some point I got a right to bear my own arms here. I mean, this is the whole security paradigm. >> Yeah. So, I mean, there's a couple of things. So first of all, this is exactly why we do a lot of, I was mentioning the skill shortage in cyber cybersecurity professionals as an example. This is why we do a lot of the heavy lifting on the backend. Obviously from a defensive standpoint, you obviously have the red team, blue team aspect. How do you first, there's what is to fight back by being defensive as well, too. And also by, in the world of threat intelligence, one of the ways that we're fighting back is not necessarily by going and hacking the bad guys because that's illegal jurisdictions. But how we can actually find out who these people are, hit them where it hurts, freeze assets, go after money laundering networks. If you follow the cash transactions where it's happening, this is where we actually work with key law enforcement partners, such as Interpol as an example, this is the world of threat intelligence. This is why we're doing a lot of that intelligence work on the backend. So there's other ways to actually go on the offense without necessarily weaponizing it per se, right? Like using, bearing your own arms as you said, there there's different forms that people may not be aware of with that. And that actually gets into the world of, if you see attacks happening on your system, how you can use the security tools and collaborate with threat intelligence. >> I think that's the key. I think the key is these new sharing technologies around collective intelligence is going to be a great way to kind of have more of an offensive collective strike. But I think fortifying, the defense is critical. I mean, that's, there's no other way to do that. >> Absolutely, I mean, we say this almost every week, but it's in simplicity. Our goal is always to make it more expensive for the cybercriminal to operate. And there's many ways to do that, right? You can be a pain to them by having a very rigid, hardened defense. That means if it's too much effort on their end, I mean, they have ROIs and in their sense, right? It's too much effort on there and they're going to go knocking somewhere else. There's also, as I said, things like disruption, so ripping infrastructure offline that cripples them, whack-a-mole, they're going to set up somewhere else. But then also going after people themselves, again, the cash networks, these sorts of things. So it's sort of a holistic approach between- >> It's an arms race, better AI, better cloud scale always helps. You know, it's a ratchet game. Aamir, I want to get into this video. It's a ransomware four minute video. I'd like you to take us through as you the Lead Researcher, take us through this video and explain what we're looking at. Let's roll the video. >> All right. Sure. So what we have here is we have the victims that's top over here. We have a couple of things on this victim's desktop. We have a batch file, which is essentially going to run the ransomware. We have the payload, which is the code behind the ransomware. And then we have files in this folder. And this is where you would typically find user files and a real world case. This would be like Microsoft or Microsoft word documents, or your PowerPoint presentations, or we're here we just have a couple of text files that we've set up. We're going to go ahead and run the ransomware. And sometimes attackers, what they do is they disguise this. Like they make it look like an important word document. They make it look like something else. But once you run the ransomware, you usually get a ransom message. And in this case, a ransom message says, your files are encrypted. Please pay this money to this Bitcoin address. That obviously is not a real Bitcoin address. I usually they look a little more complicated, but this is our fake Bitcoin address. But you'll see that the files now are encrypted. You cannot access them. They've been changed. And unless you pay the ransom, you don't get the files. Now, as researchers, we see files like this all the time. We see ransomware all the time. So we use a variety of tools, internal tools, custom tools, as well as open source tools. And what you're seeing here is an open source tool. It's called the Cuckoo Sandbox, and it shows us the behavior of the ransomware. What exactly is ransomware doing. In this case, you can see just clicking on that file, launched a couple of different things that launched basically a command executable, a power shell. They launched our windows shell. And then at, then add things on the file. It would basically, you had registry keys, it had on network connections. It changed the disk. So that's kind of gives us a behind the scenes, look at all the processes that's happening on the ransomware. And just that one file itself, like I said, does multiple different things. Now what we want to do as a researchers, we want to categorize this ransomware into families. We want to try and determine the actors behind that. So we dump everything we know in a ransomware in the central databases. And then we mine these databases. What we're doing here is we're actually using another tool called Maldito and use custom tools as well as commercial and open source tools. But this is a open source and commercial tool. But what we're doing is we're basically taking the ransomware and we're asking Maldito to look through our database and say like, do you see any like files? Or do you see any types of incidences that have similar characteristics? Because what we want to do is we want to see the relationship between this one ransomware and anything else we may have in our system, because that helps us identify maybe where the ransomware is connecting to, where it's going to other processes that I may be doing. In this case, we can see multiple IP addresses that are connected to it. So we can possibly see multiple infections. We can block different external websites that we can identify a command and control system. We can categorize this to a family, and sometimes we can even categorize this to a threat actor as claimed responsibility for it. So it's essentially visualizing all the connections and the relationship between one file and everything else we have in our database. And this example, of course, I'd put this in multiple ways. We can save these as reports, as PDF type reports or usually HTML or other searchable data that we have back in our systems. And then the cool thing about this is this is available to all our products, all our researchers, all our specialty teams. So when we're researching botnets, when we're researching file-based attacks, when we're researching IP reputation, we have a lot of different IOC or indicators of compromise that we can correlate where attacks go through and maybe even detect new types of attacks as well. >> So the bottom line is you got the tools using combination of open source and commercial products to look at the patterns of all ransomware across your observation space. Is that right? >> Exactly. I showed you like a very simple demo. It's not only open source and commercial, but a lot of it is our own custom developed products as well. And when we find something that works, that logic, that technique, we make sure it's built into our own products as well. So our own customers have the ability to detect the same type of threats that we're detecting as well. At FortiGuard Labs, the intelligence that we acquire, that product, that product of intelligence it's consumed directly by our prospects. >> So take me through what what's actually going on, what it means for the customer. So FortiGuard Labs, you're looking at all the ransomware, you seeing the patterns, are you guys proactively looking? Is it, you guys are researching, you look at something pops in the radar. I mean, take us through what goes on and then how does that translate into a customer notification or impact? >> So, yeah, John, if you look at a typical life cycle of these attacks, there's always proactive and reactive. That's just the way it is in the industry, right? So of course we try to be (indistinct) as we look for some of the solutions we talked about before, and if you look at an incoming threat, first of all, you need visibility. You can't protect or analyze anything that you can see. So you got to get your hands on visibility. We call these IOC indicators of compromise. So this is usually something like an actual executable file, like the virus or the malware itself. It could be other things that are related to it, like websites that could be hosting the malware as an example. So once we have that SEED, we call it a SEED. We can do threat hunting from there. So we can analyze that, right? If we have to, it's a piece of malware or a botnet, we can do analysis on that and discover more malicious things that this is doing. Then we go investigate those malicious things. And we really, it's similar to the world of CSI, right? These different dots that they're connecting, we're doing that at hyper-scale. And we use that through these tools that Aamir was talking about. So it's really a lifecycle of getting the malware incoming, seeing it first, analyzing it, and then doing action on that. So it's sort of a three step process. And the action comes down to what Aamir was saying, waterfall and that to our customers, so that they're protected. But then in tandem with that, we're also going further and I'm sharing it if applicable to say law enforcement partners, other threat Intel sharing partners too. And it's not just humans doing that. So the proactive piece, again, this is where it comes to artificial intelligence, machine learning. There's a lot of cases where we're automatically doing that analysis without humans. So we have AI systems that are analyzing and actually creating protection on its own too. So it's quite interesting that way. >> It say's at the end of the day, you want to protect your customers. And so this renders out, if I'm a Fortinet customer across the portfolio, the goal here is protect them from ransomware, right? That's the end game. >> Yeah. And that's a very important thing. When you start talking to these big dollar amounts that were talking earlier, it comes to the damages that are done from that- >> Yeah, I mean, not only is it good insurance, it's just good to have that fortification. So Derek, I going to ask you about the term the last mile, because, we were, before we came on camera, I'm a band with junkie always want more bandwidth. So the last mile, it used to be a term for last mile to the home where there was telephone lines. Now it's fiber and wifi, but what does that mean to you guys in security? Does that mean something specific? >> Yeah, absolutely. The easiest way to describe that is actionable. So one of the challenges in the industry is we live in a very noisy industry when it comes to cybersecurity. What I mean by that is that because of that growing attacks for FIS and you have these different attack factors, you have attacks not only coming in from email, but websites from DoS attacks, there's a lot of volume that's just going to continue to grow is the world that 5G and OT. So what ends up happening is when you look at a lot of security operations centers for customers, as an example, there are, it's very noisy. It's you can guarantee almost every day, you're going to see some sort of probe, some sort of attack activity that's happening. And so what that means is you get a lot of protection events, a lot of logs. And when you have this worldwide shortage of security professionals, you don't have enough people to process those logs and actually start to say, "Hey, this looks like an attack." I'm going to go investigate it and block it. So this is where the last mile comes in, because a lot of the times that, these logs, they light up like Christmas. And I mean, there's a lot of events that are happening. How do you prioritize that? How do you automatically add action? Because the reality is if it's just humans doing it, that last mile is often going back to your bandwidth terms. There's too much latency. So how do you reduce that latency? That's where the automation, the AI machine learning comes in to solve that last mile problem to automatically add that protection. It's especially important 'cause you have to be quicker than the attacker. It's an arms race, like you said earlier. >> I think what you guys do with FortiGuard Labs is super important, not only for the industry, but for society at large, as you have kind of all this, shadow, cloak and dagger kind of attack systems, whether it's national security international, or just for, mafias and racketeering, and the bad guys. Can you guys take a minute and explain the role of FortiGuards specifically and why you guys exist? I mean, obviously there's a commercial reason you built on the Fortinet that trickles down into the products. That's all good for the customers, I get that. But there's more at the FortiGuards. And just that, could you guys talk about this trend and the security business, because it's very clear that there's a collective sharing culture developing rapidly for societal benefit. Can you take a minute to explain that? >> Yeah, sure. I'll give you my thoughts, Aamir will add some to that too. So, from my point of view, I mean, there's various functions. So we've just talked about that last mile problem. That's the commercial aspect. We created a through FortiGuard Labs, FortiGuard services that are dynamic and updated to security products because you need intelligence products to be able to protect against intelligent attacks. That's just a defense again, going back to, how can we take that further? I mean, we're not law enforcement ourselves. We know a lot about the bad guys and the actors because of the intelligence work that we do, but we can't go in and prosecute. We can share knowledge and we can train prosecutors, right? This is a big challenge in the industry. A lot of prosecutors don't know how to take cybersecurity courses to court. And because of that, a lot of these cyber criminals reign free, and that's been a big challenge in the industry. So this has been close my heart over 10 years, I've been building a lot of these key relationships between private public sector, as an example, but also private sector, things like Cyber Threat Alliance. We're a founding member of the Cyber Threat Alliance. We have over 28 members in that Alliance, and it's about sharing intelligence to level that playing field because attackers roam freely. What I mean by that is there's no jurisdictions for them. Cyber crime has no borders. They can do a million things wrong and they don't care. We do a million things right, one thing wrong and it's a challenge. So there's this big collaboration. That's a big part of FortiGuard. Why exists too, as to make the industry better, to work on protocols and automation and really fight this together while remaining competitors. I mean, we have competitors out there, of course. And so it comes down to that last mile problems on is like, we can share intelligence within the industry, but it's only intelligence is just intelligence. How do you make it useful and actionable? That's where it comes down to technology integration. >> Aamir, what's your take on this societal benefit? Because, I would say instance, the Sony hack years ago that, when you have nation States, if they put troops on our soil, the government would respond, but yet virtually they're here and the private sector has to fend for themselves. There's no support. So I think this private public partnership thing is very relevant, I think is ground zero of the future build out of policy because we pay for freedom. Why don't we have cyber freedom if we're going to run a business, where is our help from the government? We pay taxes. So again, if a military showed up, you're not going to see companies fighting the foreign enemy, right? So again, this is a whole new changeover. What's your thought? >> It really is. You have to remember that cyber attacks puts everyone on an even playing field, right? I mean, now don't have to have a country that has invested a lot in weapons development or nuclear weapons or anything like that. Anyone can basically come up to speed on cyber weapons as long as an internet connection. So it evens the playing field, which makes it dangerous, I guess, for our enemies. But absolutely I think a lot of us, from a personal standpoint, a lot of us have seen research does I've seen organizations fail through cyber attacks. We've seen the frustration, we've seen, like besides organization, we've seen people like, just like grandma's lose their pictures of their other loved ones because they kind of, they've been attacked by ransomware. I think we take it very personally when people like innocent people get attacked and we make it our mission to make sure we can do everything we can to protect them. But I will add that at least here in the U.S. the federal government actually has a lot of partnerships and a lot of programs to help organizations with cyber attacks. The US-CERT is always continuously updating, organizations about the latest attacks and regard is another organization run by the FBI and a lot of companies like Fortinet. And even a lot of other security companies participate in these organizations. So everyone can come up to speed and everyone can share information. So we all have a fighting chance. >> It's a whole new wave of paradigm. You guys are on the cutting edge. Derek always great to see you, Aamir great to meet you remotely, looking forward to meeting in person when the world comes back to normal as usual. Thanks for the great insights. Appreciate it. >> Pleasure as always. >> Okay. Keep conversation here. I'm John Furrier, host of theCUBE. Great insightful conversation around security ransomware with a great demo. Check it out from Derek and Aamir from FortiGuard Labs. I'm John Furrier. Thanks for watching.

Published Date : Aug 13 2020

SUMMARY :

leaders all around the world. Derek, good to see you again, and it happens so fast. advantage of the situation. and automation, but the people. But for the folks that aren't in the weeds and I'll save that for the demo today, it's a pain in the butt to and the hackers are getting smart, They know that the tactics is sometimes the last stage of an attack. the best move to make, And that actually gets into the world of, the defense is critical. for the cybercriminal to operate. Let's roll the video. And this is where you would So the bottom line is you got the tools the ability to detect you look at something pops in the radar. So the proactive piece, again, It say's at the end of the day, it comes to the damages So Derek, I going to ask you because a lot of the times that, and the security business, because of the intelligence the government would respond, So it evens the playing field, Aamir great to meet you remotely, I'm John Furrier, host of theCUBE.

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
DerekPERSON

0.99+

JohnPERSON

0.99+

FBIORGANIZATION

0.99+

GarminORGANIZATION

0.99+

Aamir LakhaniPERSON

0.99+

AamirPERSON

0.99+

Derek MankeyPERSON

0.99+

August 2020DATE

0.99+

FortinetORGANIZATION

0.99+

10 millionQUANTITY

0.99+

FortiGuard LabsORGANIZATION

0.99+

John FurrierPERSON

0.99+

Palo AltoLOCATION

0.99+

MicrosoftORGANIZATION

0.99+

Derek MankyPERSON

0.99+

50QUANTITY

0.99+

Cyber Threat AllianceORGANIZATION

0.99+

PanamaLOCATION

0.99+

Fortinet FortiGuard LabsORGANIZATION

0.99+

FortiGuardORGANIZATION

0.99+

todayDATE

0.99+

FortiGuardsORGANIZATION

0.99+

60 virusesQUANTITY

0.99+

ChristmasEVENT

0.99+

1989DATE

0.99+

BostonLOCATION

0.99+

four minuteQUANTITY

0.99+

over 10 yearsQUANTITY

0.99+

oneQUANTITY

0.98+

SonyORGANIZATION

0.98+

each victimQUANTITY

0.98+

first ransomQUANTITY

0.98+

first half of 2020DATE

0.98+

over 28 membersQUANTITY

0.98+

101 ransomwareQUANTITY

0.98+

20 years agoDATE

0.98+

three stepQUANTITY

0.98+

windowsTITLE

0.97+

MalditoTITLE

0.97+

InterpolORGANIZATION

0.97+

P.O BoxORGANIZATION

0.96+

firstQUANTITY

0.96+

one fileQUANTITY

0.96+

over 235QUANTITY

0.96+

US-CERTORGANIZATION

0.95+

Silicon ValleyLOCATION

0.95+

FISORGANIZATION

0.94+

PowerPointTITLE

0.94+

a weekQUANTITY

0.94+

two great guestsQUANTITY

0.94+

IOCORGANIZATION

0.93+

2010DATE

0.91+

one thingQUANTITY

0.9+

BitcoinOTHER

0.9+

Ben Golub, Storj Labs | CUBE Conversation, August 2020


 

>> From the Cube studios in Palo, Alto and Boston, connecting with thought leaders all around the world, this is a Cube conversation. >> Welcome to this Cube conversation. I'm Paul Gillin, Enterprise Editor at SiliconAngle. We've been talking a lot about cloud native on SiliconAngle lately, and my guest is someone who had a seminal role in defining the the principal architecture, some of the foundational technologies for cloud native applications. Ben Golub is the CEO of Storj, a company that has a really interesting new approach to storage management that we'll talk about in just a bit. Ben is probably best known to many people as the former CEO of Docker, which pioneered software containers and was one of the fastest growing companies in Silicon Valley, he's great. Ben, thanks for joining us, feel appreciated you being here today. >> Thank you, it's great to be here. >> So, let's get into the question of cloud native is a theme that we're focusing on right now. How important is it for organizations you believe that are moving to the cloud to choose to re architect around cloud native principles? >> Well, I think it's, I mean, two points. First of all, I think that the cloud native is sort of a spectrum. And for many people, there is a point along the spectrum that makes sense. At the far end of the spectrum is applications that are deployed on a massive scale. They're components to thousands of microservices, heavily orchestrated with things like Kubernetes, scaling up scaling down, and for many organizations, they don't need to go all the way there to get real benefits. And maybe the related thing is that I think, for organizations, there's absolutely, for most organizations, there's value in moving along that spectrum, but they should be thoughtful about where it is that they're going, and why they're going there. >> Either or thing and they applications can live along the spectrum. you submitted some comments recently for an article we did on this topic and among them you said that some applications may make sense being containerized or Dockerized but not being orchestrator with Kubernetes. Can you give an example of something that meets that criteria? >> Sure, well, I can I think that almost all applications can benefit from running on more cloud like infrastructure. There's certainly value in having infrastructure that that scales up, or that scales out there, where people are able to sort of dynamically use resources and not have it have to rely on big iron. But in terms of the applications themselves traditional applications can run well in cloud environments provided that some steps are taken. And often for many organizations, the first step with a traditional application is simply to containerize your Docker engine. That gives a lot of benefits including, ease of migration, greater ease of adopting things like CICD, and you don't necessarily have to take all of your traditional applications, break them into lots of micro services, start orchestrating them with Kubernetes on day one, for some reasons, case may never make sense because they're not going to be run at massive scale. >> Many people assume that containers and cloud native architecture are inextricably linked. Is that your opinion? >> Well, so I think that cloudy infrastructure tends to benefit from from containerization. But really, it's more of an application question. If you are breaking your application or you're writing applications that are composed of lots of different services, almost inevitably, you want to have those services in containers so that they have clean interfaces between them. And so, that you can do the things people want to do with cloud native, which is, make changes to your microservice A with a small team and do so rapidly without unintentionally screwing up microservice, B, C, D, et cetera. And Dockers in a containerization, among other things, provides that nice clean interface. >> All right, how have you seen I mean, since you left Docker three years ago, how have you seen the container technology evolve? What do you think are some of the most important evolutions we've seen in container technology since then? >> Yeah, so I think, what has been really important for us to see that the community continues to grow. So, once the Docker community continues to grow, there are now lots of other communities around it the cloud native computing Foundation, Kubernetes. And I think what you're seeing is really the maturing of this technology. So that applications can be written in a cloud native way much more more easily. The barriers to making an application cloud native really come down, but also the potential for running applications and really massive scale have have have increased and there are certainly a number of interesting things that have happened in the storage space in terms of persistent volumes. things that have happened in terms of service technology service measures, like STO these are all really great examples of how the community is filling in around containers. >> We've heard a lot about the benefits of portability that come from using containers. But being portable can involve some trade offs, because you have to give up some of the native functionality of branded cloud platforms. Do you think the goal of multi cloud is overblown? >> I think there is real value in being multi cloud. And I think that while you know, the larger stock traders have provided great services, it is in their names, of course, we're trying to get have all of the workloads run within their four walls. And I think for most organizations, locking is a bad idea, regardless, right? We're in a distributed world, most people want to be able to run their applications at scale in a distributed way and they want to be able to take advantage of spare cycles and the most efficient way and concise way of doing so. And so, having locking, I think is a bad idea. And for most organizations, the investment to become portable, while not trivial pays off in the long run. >> How about of the cultural issues is something that you also mentioned in the comments you contributed to us earlier, we hear often that the biggest impediments are not technical or even skills but actually changing the culture to adapt to a cloud native way of building applications. How should organizations prepare for that shift? >> Well, I mean, I think they should recognize what those differences are going to be. And if you're writing, the traditional method was you write a large monolithic application, because it's so big and complicated. Generally speaking, people follow sort of a waterfall procedure. They have large teams working on it, and you update the application once or twice a year. The cloud native approach is let's write applications that are composed of lots of smaller services produced by smaller teams that move very rapidly. And a lot of the testing and the deployment happens in a very automated way. And the cultural barriers are pretty large. I think most people are happy at the end of the journey. But there's a period in between where things are difficult that you're, you're breaking glass as it were. So, I think for a lot of large organizations, the approach that often works best is to have a few sort of isolated, Greenfield application approaches, where you have a small team that is sort of proving out and becoming good ambassadors for doing things in cloud native way. But there's also a an evolutionary way to bring the older applications along there for many organizations is really helpful. That doesn't have any running head on it. Other cultural issues with the traditional application. >> So, break them up into teams and have different teams at different stages of evolution. >> Right, and so, I think you can have a small advanced team that is working on new applications at Greenfield, cloud native way. But then the transition path for the teams that are working on the older application, traditional applications that were not initially architected in a cloud native way is to break them down in an evolutionary way, first dockerize, containerize, the traditional applications, then maybe break them down from a monolith into, say, three tiers, each of those tiers being containerized. And then potentially pull out one of those services if it's a common service across all the applications and start using that and the process. I think we find organizations get the sort of muscle memory around doing things in a more continuous way in a more agile way. And they get experienced with tools like CICD, Docker, Kubernetes te cetera in a more organic way. >> Do you find that people who come from the traditional waterfall development background eventually can't make that shift? >> I think some can, there are pluses and minuses. But I think that most organizations find that as they get more agile things that used to be very difficult become a lot easier, right? So, rather than having big masses of code that needs to be rewritten and changed, you change something in one area and it breaks things and unexpected way in another area. Right, then you're trying to get large teams of people to sort of agree on things which we know is not the way the world works. When you get to smaller teams working on more atomic pieces of the code with clean interfaces between them, and can iterate more rapidly without having unintended consequences. For most organizations that not only makes them faster, but it gives higher quote, quality, safer et cetera. >> Another topic we hear a lot about today is application modernization, what does that mean to you? >> So, I think for me application modernization means that you're re architect, you're making the application itself more cloud like, which doesn't mean that you made it full scale cloud native on day one, right? But that you, for example, taking a traditional application and Docker rising, or containerizing it, just containers in the monolith actually gives some real advantages. And that then sets people off to say, let's not only take the advantages that we now have in terms of portability, but let's start exploring the advantages that we can get from having more frequent deployments or more automated testing. And so, really it's modernizing the application but also modernizing the environment around it and in the culture for how you build and deploy applications. >> Let's turn to your current venture Storj. You've been CEO there for about two and a half years now. Very interesting decentralized approach to storj using blockchain. Just tell us quickly how you're re imagining Storj? >> Sure, sure, well I mean for, for of course, most of computing history storage was done, like people buying their own disk drives and then storing data on it. And if they failed or got lost as a problem, or if they had to buy too much, I was expensive. Then we move to centralized clouds where you were storing data on drives that one organization was running, we started taking it a step further, where we built a storage service. But we don't run your own any disk drives. We're sort of like ABNB, for restaurants, right? But we've gotten 10s of thousand people around the globe. Generally, data centers who have spare capacity enabled them to rent out that spare capacity. And we're offering our customers a way to do storage that is much safer, much more private, faster and far less expensive, than with the traditional cloud. >> Certainly intuitively, it would be less expensive. How is it faster? Well, it's faster for a lot of the same reason the the internet, if you will is faster than the traditional approach was landlines, right? We were able to take advantage of parallelism, right? So, we break every file up into a large number of pieces, which are then distributed across the network. And so, first of all, we don't get slowed down. If some of the drives are slow, or they happen to be in an area where there's network congestion. It doesn't slow down. We also end up having, generally speaking, have our data much closer to the edge. So, if you're in Kenya, and you're viewing a video that sort of serve from our network, chances are the data is getting served from graduate cluster view rather than driving or in Kansas. >> It sounds like there are some sort of cloud native aspects to what you're doing. In fact, are you adopting some cloud native principle on-- >> Well, so kind of we put our service in the cloud native way. But it really takes the cloud native notion of distribution and takes it even a step further, which is that things are highly decentralized. And so, we built our service in a very particular way because we are not directly controlling the disk drives, so, we basically use algorithms and math to make sure that we're resilient against any failure. and things are done in a highly automated and scalable way so that there's really no single points of failure. And there's infinite scalability, which is which is really the goal of cloud native, but we take it a step further. >> And blockchain is what knits us all together, right? Well, it tracks the location of all the all the data. >> I don't know, cause actually none of us 'cause we use blockchain for certain purposes, namely, compensating the people who are running the drives. So, they do cryptographic proofs to prove that the data they have, they shouldn't have to get compensated for running it. But then we've tried to use a large range of different kinds of peer to peer technologies. And even frankly, some very cool very old technology like racial coding which is on the on the Voyager spacecraft to make sure that it all fits together in a way that's safe, secure, private and super fast. >> All right, there other applications of this technology have developed be on Storj? >> Well, so we are working on decentralized storage. Other people are out there working on decentralized computing, where the application can be written and run on. Sorry, can be run on using CPUs that are all around the globe, we happen to think storage is probably the most important problem to solve first. Because, death, taxes and data are things that never go away. And the world's creating more and more every year, it would actually, the data created this year would have filled a stack of CD ROMs to orbit of Mars and back. It's going to grow from there. >> I love those analogies. >> Yeah, some of that's cat videos, but a lot of it is really super critical data on finding, therapeutics for COVID are the cure for cancer or new forms of energy. And so, find a way to use to give people the ability to store their data in a highly secure, highly efficient and very cost effective way we think is really important. >> And what should we be looking for from Storj for the next year, >> Let's say Storj is in production. We are adding end users. We're starting to see some larger users, which is a very 10 for us, today, we're used primarily for sort of second tier storage, but we expect to be moving into sort of primary storage and even CDN down the road. It turns out that what we built is a really great way to distribute large files, including video and photos and x-rays and satellite images and things like that. >> Well, Ben, thanks for joining us today. I know you're a Cube alum you've been many times on the Cube. I think this is the first time we've done it virtually though. >> I know, I do miss being in the same room as you and you're colleagues but this is a very nice thing too. >> So, do we believe me? Ben Golub, CEO of Storj. Thanks for taking time for being with us today. This has been a Cube conversation. I'm Paul Gillin. Thank you for joining us, be well. (bright upbeat music)

Published Date : Aug 4 2020

SUMMARY :

leaders all around the world, in defining the the that are moving to the cloud And maybe the related can live along the spectrum. But in terms of the and cloud native architecture And so, that you can do the the community continues to grow. the benefits of portability and the most efficient way but actually changing the culture to adapt And a lot of the testing So, break them up into Right, and so, I think you masses of code that needs to be and in the culture for how you build to storj using blockchain. people around the globe. lot of the same reason aspects to what you're doing. in the cloud native way. of all the all the data. the on the Voyager spacecraft that are all around the globe, the ability to store their and even CDN down the road. I think this is the first time being in the same room So, do we believe me?

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
Ben GolubPERSON

0.99+

Paul GillinPERSON

0.99+

August 2020DATE

0.99+

KenyaLOCATION

0.99+

KansasLOCATION

0.99+

Silicon ValleyLOCATION

0.99+

PaloLOCATION

0.99+

BostonLOCATION

0.99+

BenPERSON

0.99+

eachQUANTITY

0.99+

Storj LabsORGANIZATION

0.99+

StorjORGANIZATION

0.99+

next yearDATE

0.99+

DockerORGANIZATION

0.99+

MarsLOCATION

0.99+

10QUANTITY

0.99+

SiliconAngleORGANIZATION

0.99+

three tiersQUANTITY

0.99+

KubernetesORGANIZATION

0.99+

two pointsQUANTITY

0.99+

first stepQUANTITY

0.99+

GreenfieldORGANIZATION

0.98+

todayDATE

0.98+

10s of thousand peopleQUANTITY

0.98+

ABNBORGANIZATION

0.98+

onceQUANTITY

0.98+

first timeQUANTITY

0.98+

oneQUANTITY

0.98+

one areaQUANTITY

0.98+

three years agoDATE

0.98+

COVIDOTHER

0.97+

FirstQUANTITY

0.97+

this yearDATE

0.97+

about two and a half yearsQUANTITY

0.97+

one organizationQUANTITY

0.95+

thousandsQUANTITY

0.95+

CubeORGANIZATION

0.95+

firstQUANTITY

0.88+

KubernetesTITLE

0.87+

single pointsQUANTITY

0.87+

CICDTITLE

0.86+

twice a yearQUANTITY

0.85+

second tierQUANTITY

0.84+

day oneQUANTITY

0.83+

DockerTITLE

0.8+

microservicesQUANTITY

0.8+

CubeCOMMERCIAL_ITEM

0.8+

CEOPERSON

0.75+

VoyagerCOMMERCIAL_ITEM

0.69+

computing FoundationORGANIZATION

0.67+

every yearQUANTITY

0.63+

AltoLOCATION

0.52+

cloudORGANIZATION

0.51+

Sheng Liang, Rancher Labs | CUBE Conversation, July 2020


 

>> Announcer: From theCUBE studios in Palo Alto and Boston, connecting with thought leaders all around the world, this is a CUBE Conversation. >> Hi, I'm Stu Miniman coming to you from our Boston area studio and this is a special CUBE Conversation, we always love talking to startups around the industry, understanding how they're creating innovation, doing new things out there, and oftentimes one of the exits for those companies is they do get acquired, and happy to welcome back to the program one of our CUBE alumni, Sheng Liang, he is the cofounder and CEO of Rancher, today there was an announcement for a definitive acquisition of SUSE, who our audience will know well, we were at SUSECON, so Sheng, first of all, thank you for joining us, and congratulations to you and the team on joining SUSE here in the near future. >> Thank you, Stu, I'm glad to be here. >> All right, so Sheng, why don't you give our audience a little bit of context, so I've known Rancher since the very early days, I knew Rancher before most people had heard the word Kubernetes, it was about containerization, it was about helping customers, there was that cattles versus pets, so that Rancher analogy was, hey, we're going to be your rancher and help you deal with that sprawl and all of those pieces out there, where you don't want to know them by name and the like, so help us understand how what was announced today is meeting along the journey that you set out for with Rancher. >> Absolutely, so SUSE is the largest independent opensource software company in the world, and they're a leader in enterprise Linux. Today they announced they have signed a definitive agreement to acquire Rancher, so we started Rancher about six years ago, as Stu said, to really build the next generation enterprise compute platform. And in the beginning, we thought we're going to just base our technology based on Docker containers, but pretty soon Kubernetes was just clearly becoming an industry standard, so Rancher actually became the most widely used enterprise Kubernetes platform, so really with the combination of Rancher and SUSE going forward, we're going to be able to supply the enterprise container platform of choice for lots and lots of customers out there. >> Yeah, just for our audience that might not be as familiar with Rancher, why don't you give us your position in where we are with the Kubernetes landscape, I've talked about many times on theCUBE, a few years ago it was all about "Hey, are we going to have some distribution war?" Rancher has an option in that space, but today it's multicloud, Rancher works with all of the cloud Kubernetes versions, so what is it that Rancher does uniquely, and of course as you mentioned, opensource is a key piece of what you're doing. >> Exactly, Stu, thanks for the question. So this is really a good lead-up into describing what Rancher does, and some of the industry dynamics, and the great opportunity we see with SUSE. So many of you, I'm sure, have heard about Kubernetes, Kubernetes is this container orchestration platform that basically works everywhere, and you can deploy all kinds of applications, and run these applications through Kubernetes, it doesn't really matter, fundamentally, what infrastructure you use anymore, so the great thing about Kubernetes is whether you deploy your apps on AWS or on Azure, or on on-premise bare metal, or vSphere clusters, or out there in IoT gateways and 5G base stations and surveillance cameras, literally everywhere, Kubernetes will run, so it's, in our world I like to think about Kubernetes as the standard for compute. If you kind of make the analogy, what's the standard of networking, that's TCPIP, so networking used to be very different, decades ago, there used to be different kinds of networking and at best you had a local area network for a small number of computers to talk to each other, but today with TCPIP as a standard, we have internet, we have Cisco, we have Google, we have Amazon, so I really think as successful as cloud computing has been, and how much impact it has had to actually push digital transformation and app modernization forward, a lot of organizations are kind of stuck between their desire to take advantage of a cloud provider, one specific cloud provider, all the bells and whistles, versus any cloud provider, not a single cloud provider can actually supply infrastructure for everything that a large enterprise would need. You may be in a country, you may be in some remote locations, you may be in your own private data center, so the market really really demands a standard form of compute infrastructure, and that turned out to be Kubernetes, that is the true, Kubernetes started as a way Google internally ran their containers, but what it really hit the stride was a couple years ago, people started realizing for once, compute could be standardized, and that's where Rancher came in, Rancher is a Kubernetes management platform. We help organizations tie together all of their Kubernetes clusters, regardless where they are, and you can see this is a very natural evolution of organizations who embark on this Kubernetes journey, and by definition Rancher has to be open, because who, this is such a strategic piece of software, who would want their single point of control for all compute to be actually closed and proprietary? Rancher is 100% opensource, and not only that, Rancher works with everyone, it really doesn't matter who implements Kubernetes for you, I mean Rancher could implement Kubernetes for you, we have a Kubernetes distro as well, we actually have, we're particularly well-known for Kubernetes distro design for resource constrained deployments on the edge, called K3S, some of you might have heard about it, but really, we don't care, I mean we work with upstream Kubernetes distro, any CNCF-compliant Kubernetes distro, or one of many many other popular cloud hosted Kubernetes services like EKS, GKE, AKS, and with Rancher, enterprise can start to treat all of these Kubernetes clusters as fungible resources, as catalysts, so that is basically our vision, and they can focus on modernizing their application, running their application reliably, and that's really what Rancher's about. >> Okay, so Sheng, being acquired by SUSE, I'd love to hear a little bit, what does this mean for the product, what does it mean for your customers, what does it mean for you personally? According to Crunchbase, you'd raised 95 million dollars, as you said, over the six years. It's reported by CNBC, that the acquisition's in the ballpark of 600 to 700 million, so that would be about a 6X increment over what was invested, not sure if you can comment on the finances, and would love to hear what this means going forward for Rancher and its ecosystem. >> Yeah, actually, I know there's tons of rumors going around, but the acquisition price, SUSE's decided not to disclose the acquisition price, so I'm not going to comment on that. Rancher's been a very cash-efficient business, there's been no shortage of funding, but even amounts to 95 million dollars that we raised, we really haven't spent majority of it, we probably spent just about a third of the money we raised, in fact our last run to fundraise was just three, four month ago, it was a 40 million dollar series D, and we didn't even need that, I mean we could've just continued with the series C money that we raised a couple years ago, which we barely started spending either. So the great thing about Rancher's business is because we're such a product-driven company, with opensource software, you develop a unique product that actually solves a real problem, and then there's just no barrier to adoption, so this stuff just spreads organically, people download and install, and then they put it in mission-critical production. Then they seek us out for commercial subscription, and the main value they're getting out of commercial subscription is really the confidence that they can actually rely on the software to power their mission-critical workload, so once they really start using Rancher, they recognize that Rancher as an organization provide, so this business model's worked out really well for us. Vast majority of our deals are based on inbound leads, and that's why we've been so efficient, and that's I think one of the things that really attracted SUSE as well. It's just, these days you don't just want a business that you have to do heavy weight, heavy duty, old fashioned enterprise (indistinct), because that's really expensive, and when so much of that value is building through some kind of a bundling or locking, sooner or later customers know better, right? They want to get away. So we really wanted to provide a opensource, and open, more important than opensource is actually open, lot of people don't realize there are actually lots of opensource software even in the market that are not really quite open, that might seem like a contradiction, but you can have opensource software which you eventually package it in a way, you don't even make the source code available easily, you don't make it easy to rebuild the stuff, so Rancher is truly open and opensource, people just download opensource software, run it in the day they need it, our Enterprise subscription we will support, the day they don't need it, they will actually continue to run the same piece of software, and we'd be happy to continue to provide them with patches and security fixes, so as an organization we really have to provide that continuous value, and it worked out really well, because, this is such a important piece of software. SUSE has this model that I saw on their website, and it really appeals to us, it's called the power of many, so SUSE, turns out they not only completely understand and buy into our commitment to open and opensource, but they're completely open in terms of supporting the whole ecosystem, the software stack, that not only they produce, but their partners produce, in many cases even their competitors produce, so that kind of mentality really resonated with us. >> Yeah, so Sheng, you wrote in the article announcing the acquisition that when the deal closes, you'll be running engineering and innovation inside of SUSE, if I remember right, Thomas Di Giacomo has a similar title to that right now in SUSE, course Melissa Di Donato is the CEO of SUSE. Of course the comparison that everyone will have is you are now the OpenShift to SUSE. You're no stranger to OpenShift, Rancher competes against RedHat OpenShift out on the market. I wonder if you could share a little bit, what do you see in your customer base for people out there that says "Hey, how should I think of Rancher "compared to what RedHat's been doing with OpenShift?" >> Yeah, I mean I think RedHat did a lot of good things for opensource, for Linux, for Kubernetes, and for the community, OpenShift being primarily a Kubernetes distro and on top of that, RedHat built a number of enhanced capabilities, but at the end of the day, we don't believe OpenShift by itself actually solves the kind of problem we're seeing with customers today, and that's why as much investment has gone into OpenShift, we just see no slowdown, in fact an acceleration of demand of Rancher, so we don't, Rancher always thrived by being different, and the nice thing about SUSE being a independent company, as opposed to a part of a much larger organization like RedHat, is where we're going to be as an organization 100% focused on bringing the best experience to customers, and solve customers' business problems, as they transform their legacy application suite into cloud-native infrastructure. So I think the opportunity is so large, and there's going to be enough market there for multiple players, but we measure our success by how many people, how much adoption we're actually getting out of our software, and I said in the beginning, Rancher is the most widely used enterprise Kubernetes platform, and out of that, what real value we're delivering to our customers, and I think we solve those problems, we'll be able to build a fantastic business with SUSE. >> Excellent. Sheng, I'm wondering if we could just look back a little bit, you're no stranger to acquisitions, remember back when Cloud.com was acquired by Citrix, back when we had the stack wars between CloudStack and OpenStack and the like, I'm curious what lessons you learned having gone through that, that you took away, and prepared you for what you're doing here, and how you might do things a little bit differently, with the SUSE acquisition. >> Yeah, my experience with Cloud.com acquired by Citrix was very good, in fact, and a lot of times, you really got to figure out a way to adapt to actually make sure that Rancher as a standalone business, or back then, Cloud.com was a standalone business, how are they actually fitting to the acquirer's business as a whole? So when Cloud.com was acquired, it was pretty clear, as attractive as the CloudStack business was, really the bigger prize for Citrix was to actually modernize and cloudify their desktop business, which absolutely was like a two billion dollar business, growing to three billion dollars back then, I think it's even bigger now, with now everyone working remote. So we at Citrix, we not only continued to grow the CloudStack business, but more importantly, one of the things I'm the most proud of is we really played up a crucial role in modernizing and cloudifying the Citrix mainline business. So this time around, I think the alignment between what Rancher does and what SUSE does is even more apparent, obviously, until the deal actually closes, we're not really allowed to actually plan or execute on some of the integration synergies, but at a higher level, I don't see any difficulty for SUSE to be able to effectively market, and service their global base of customers, using the Rancher technology, so it's just the synergy between Kubernetes and Linux is just so much stronger, and in some sense, I think I've used this term before, Kubernetes is almost like the new Linux, so it just seems like a very natural place for SUSE to evolve into anyway, so I'm very very bullish about the potential synergy with the acquisition, I just can't wait to roll up my hands and get going as soon as the deal closes. >> All right, well Sheng, thank you so much for joining us, absolutely from our standpoint, we look at it, it's a natural fit of what Rancher does into SUSE, as you stated. The opensource vision, the community, and customer-focused absolutely align, so best of luck with the integration, looking forward to seeing you when you have your new role and hearing more about Rancher's journey, now part of SUSE. Thanks for joining us. >> Thank you Stu, it's always great talking to you. >> All right, and be sure, we'll definitely catch up with Rancher's team at the KubeCon + CloudNativeCon European show, which is of course virtual, as well as many other events down the road. I'm Stu Miniman, and thank you for watching theCUBE.

Published Date : Jul 8 2020

SUMMARY :

leaders all around the world, and oftentimes one of the is meeting along the journey And in the beginning, we and of course as you mentioned, and the great opportunity that the acquisition's in the ballpark and the main value they're getting is the CEO of SUSE. and for the community, CloudStack and OpenStack and the like, and cloudifying the looking forward to seeing you always great talking to you. events down the road.

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
CitrixORGANIZATION

0.99+

Melissa Di DonatoPERSON

0.99+

Thomas Di GiacomoPERSON

0.99+

CiscoORGANIZATION

0.99+

Sheng LiangPERSON

0.99+

SUSEORGANIZATION

0.99+

Stu MinimanPERSON

0.99+

CNBCORGANIZATION

0.99+

100%QUANTITY

0.99+

three billion dollarsQUANTITY

0.99+

RancherORGANIZATION

0.99+

Palo AltoLOCATION

0.99+

BostonLOCATION

0.99+

ShengPERSON

0.99+

AmazonORGANIZATION

0.99+

Sheng LiangPERSON

0.99+

600QUANTITY

0.99+

GoogleORGANIZATION

0.99+

95 million dollarsQUANTITY

0.99+

July 2020DATE

0.99+

StuPERSON

0.99+

KubeConEVENT

0.99+

TodayDATE

0.99+

oneQUANTITY

0.99+

two billion dollarQUANTITY

0.99+

CrunchbaseORGANIZATION

0.98+

700 millionQUANTITY

0.98+

Rancher LabsORGANIZATION

0.98+

RedHatORGANIZATION

0.98+

KubernetesTITLE

0.98+

OpenShiftTITLE

0.98+

AWSORGANIZATION

0.98+

LinuxTITLE

0.97+

SUSECONORGANIZATION

0.97+

CloudStackTITLE

0.96+

todayDATE

0.96+

four month agoDATE

0.96+

CUBEORGANIZATION

0.96+

decades agoDATE

0.96+

Peter Guagenti, Cockroach Labs | DockerCon 2020


 

>> Male narrator: From around the globe, it's the CUBE with digital coverage of DockerCon Live 2020 brought to you by Docker and its ecosystem partners. >> Hey, welcome back everyone to the DockerCon Virtual Conference. DockerCon 20 being held digitally online is the CUBE's coverage. I'm John for your host of the CUBE. This is the CUBE virtual CUBE digital. We're getting all the remote interviews. We're here in our Palo Alto studio, quarantined crew, all getting the data for you. Got Peter Guangeti who's the Chief Marketing Officer Cockroach Labs, a company that we became familiar with last year. They had the first multicloud event in the history of the industry last year, notable milestone. Hey first, it's always good you're still around. So first you got the first position, Peter. Great to see you. Thanks for coming on the CUBE for DockerCon 20. >> Thank you, John. Thanks for having me. >> So it's kind of interesting, I mentioned that tidbit to give you a little bit of love on the fact that you guys ran or were a part of the first multicloud conference in the industry. Okay, now that's all everyone's talking about. You guys saw this early. Take a minute to explain Cockroach Labs. Why you saw this trend? Why you guys took the initiative and took the risk to have the first ever multicloud conference last year? >> So that's news to me that we were the first, actually. That's a bit of a surprise, cause for us we see multicloud and hybrid cloud as the obvious. I think the credit really for this belongs with folks like Gartner and others who took the time to listen to their customer, right? Took the time to understand what was the need in the market, which, you know, what I hear when I talk to CEOs is cloud is a capability, not a place, right? They're looking at us and saying, "yes, I have a go to cloud strategy, "but I also have made massive investments in my data center. "I believe I don't want to be locked in yet again "to another vendor with proprietary PIs, "proprietary systems, et cetera." So, what I hear when I talk to customers is, "I want to be multicloud show me how, "show me how to do that in a way "that isn't just buying from multiple vendors, right?" Where I've cost arbitrage, show me a way where I actually use the infrastructure in a creative way. And that really resonates with us. And it resonates with us for a few reasons. First is, we built a distributed SQL database for a reason, right? We believed that what you really need in the modern age for global applications is something that is truly diverse and distributed, right? You can have a database that behaves like a single database that lives in multiple locations around the world. But then you also have things like data locality. It's okay with German data stays in Germany because of German law. But when I write my application, I never write each of these things differently. Now, the other reason is, customers are coming to us and saying, "I want a single database that I can deploy "in any of the cloud providers." Azure SQL, and that is a phenomenal product. Google Spanner is a phenomenal product. But once I do that, I'm locked in. Then all I have is theirs. But if I'm a large global auto manufacturer, or if I'm a startup, that's trying to enter multiple markets at the same time. I don't want that. I want to be able to pick my infrastructure and deploy where I want, how I want. And increasingly, we talk to the large banks and they're saying, "I spent tens or even hundreds of millions of dollars "on data centers. "I don't want to throw them out. "I just want better utilization. "And the 15 to 20% that I get "from deploying software on bare metal, right? "I want to be able to containerize. "I want to be able to cloudify my data center "and then have ultimately what we see more and more "as what they call a tripod strategy "where your own data center and two cloud providers "behaving as a single unit "for your most important applications." >> That's awesome. I want to thank you for coming on to, for DockerCon 20, because this is an interesting time where developers are going to be called to the table in a very aggressive way because of COVID-19 crisis is going to accelerate until they pull the future forward ahead of most people thought. I mean, we, in the industry, we are inside the ropes, if you will. So we've been talking about stainless applications, stateful databases, and all the architectural things that's got that longer horizon. But this is an interesting time because now companies are realizing from whether it's the shelter in place at scale problems that emerge to the fact that I got to have high availability at a whole nother level. This kind of exposes a major challenge and a major opportunity. We're expecting projects to be funded, some not to be funded, things to move around. I think it's going to really change the conversation as developers get called in and saying, "I really got to look at my resources at scale. "The database is a critical one because you want data "to be part of that, this data plane, if you will, "across clouds." What's your reaction to this? Do you agree with that, the future has been pulled forward? And what's Cockroach doing to help developers do manage this? >> Yeah, John, I think you're exactly right. And I think that is a story that I'm glad that you're telling. Because, I think there's a lot of signal that's happening right now. But we're not really thinking about what the implications are. And we're seeing something that's I think quite remarkable. We're seeing within our existing customer base and the people we've been talking to, feast or famine. And in some cases, feast and famine in the same company. And what does that really mean? We've looked at these graphs for what's going to happen, for example, with online delivery services. And we've seen the growth rates and this is why they're all so valued. Why Uber invested so big in Uber eats and these other vendors. And we've seen these growth rates the same, and this is going to be amazing in the next 10 years, we're going to have this adoption. That five, 10 years happened overnight, right? We were so desperate to hold onto the things that are what mattered to us. And the things that make us happy on any given day. We're seeing that acceleration, like you said. It's all of that, the future got pulled forward, like you had said. >> Yeah. >> That's remarkable, but were you prepared for it? Many people were absolutely not prepared for it, right? They were on a steady state growth plan. And we have been very lucky because we built an architecture that is truly distributed and dynamic. So, scaling and adding more resilience to a database is something we all learned to do over the last 20 years, as data intensive applications matter. But with a distributed SQL and things like containerization on the stateless side, we know we can just truly elastically scale, right? You need more support for the application of something like Cockroach. You literally just add more nodes and we absorb it, right? Just like we did with containerization, where you need more concurrency, you just add more containers. And thank goodness, right, because I think those who were prepared for those things need to be worked with one of the large delivery services. Overnight, they saw a jump to what was their peak day at any point in time now happening every single day. And they were prepared for that because they already made these architectural decisions. >> Yeah. >> But if you weren't in that position, if you were still on legacy infrastructure, you were still trying to do this stuff manually, or you're manually sharding databases and having to increase the compute on your model, you are in trouble and you're feeling it. >> That's interesting Peter to bring that up and reminds me of the time, if you go back in history a little bit, just not too far back, I mean, I'm old enough to go back to the 80s, I remember all the different inflection points. And they all had their key characteristics as a computer revolution, TCP IP, and you pick your spots, there's always been that demarcation point or lions in where things change. But let's go back to around 2004 and then 2008. During that time, those legacy players out there kind of was sitting around, sleeping at the switch and incomes, open-source, incomes, Facebook, incomes, roll your own. Hey, I'm going to just run. I'm going to run open-source. I'm going to build my own database. And that was because there was nothing in the market. And most companies were buying from general purpose vendors because they didn't have to do all the due diligence. But the tech-savvy folks could build their own and scale. And that changed the game that became the hyperscale and the rest is history. Fast forward to today, because what you're getting at is, this new inflection point. There's going to be another tipping point of trajectory of knowledge, skill that's completely different than what we saw just a year ago. What's your reaction to that? >> I think you're exactly right. We saw and I've been lucky enough, same like you, I've been involved in the web since the very early days. I started my career at the beginning. And what we saw with web 1.0 and the shift to web 2.0, web 2.0 would not have happened without source. And I don't think we give them enough credit if it wasn't for the lamp stack, if it wasn't for Linux, if it wasn't for this wave of innovation and it wasn't even necessarily about rolling around. Yeah, the physics of the world to go hire their own engineers, to go and improve my SQL to make it scale. That was of course a possibility. But the democratization of that software is where all of the success really came from. And I lived on both sides of it in my career, as both an app developer and then as a software executive. In that window and got to see it from both sides and see the benefit. I think what we're entering now is yet another inflection point, like you said. We were already working at it. I think, the move from traditional applications with simple logic and simple rules to now highly data intensive applications, where data is driving the experience, models are driving the experience. I think we were already at a point where ML and AI and data intensive decision-making was going to make us rewrite every application we had and not needed a new infrastructure. But I think this is going to really force the issue. And it's going to force the issue at two levels. First is the people who are already innovating in each of these industries and categories, were already doing this. They were already cloud native. They were already built on top of very modern third generation databases, third generation programming languages, doing really interesting things with machine learning. So they were already out innovating, but now they have a bigger audience, right? And if you're a traditional and all of a sudden your business is under duress because substantial changes in what is happening in the market. Retailers still had strength with footprint as of last year, right? We don't be thinking about e-commerce versus traditional retail. Yeah, it was on a slow decline. There were lots of problems, but there was still a strength there, that happened changed overnight. Right now, that new sources have dried up, so what are you going to do? And how are you going to act? If you've built your entire business, for example, on legacy databases from folks like Oracle and old monolithic ways of building out patients, you're simply not adaptable enough to move with changing times. You're going to have to start, we used to talk about every company needed to become a software company. That mostly happened, but they weren't all very good software companies. I would argue that the next generation used to to be a great software company and great data scientists. We'll look at the software companies that have risen to prominence in the last five to 10 years. Folks like Facebook, folks like Google, folks like Uber, folks like Netflix, they use data better than anyone else in their category. So they have this amazing app experience and leverage data and innovate in such a way that allow them to just dominate their category. And I think that is going to be the change we see over the next 10 years. And we'll see who exits what is obviously going to be a jail term. We'll see who exits on top. >> Well, it's interesting to have you on. I love the perspective and the insights. I think that's great for the folks out there who haven't seen those ways before. Again, this wave is coming. Let's go back to the top when we were talking about what's in it for the developer. Because I believe there's going to be not a renaissance, cause it's always been great, but the developers even more are going to be called to the front lines for solutions. I mean, these are first-generation skill problems that are going to be in this whole next generation, modern era. That's upon us. What are some of the things that's going to be that lamp stack, like experience? What are some of the things that you see cause you guys are kind of at a tail sign, in my opinion, Cockroach, because you're thinking about things in a different construct. You're thinking about multicloud. You're thinking about state, which is a database challenge. Stateless has kind of been around restful API, stateless data service measures. Kubernetes is also showing a cloud native and the microservices or service orientation is the future. There's no debate on that. I think that's done. Okay, so now I'm a developer. What the hell am I going to be dealing with for the next five years? What's your thoughts? >> Well, I think the developer knows what they're already facing from an app perspective. I think you see the rapid evolution in languages, and then, in deployment and all of those things are super obvious. You need just need to go and say I'm sure that all the DockerCon sessions to see what the change to deployment looks like. I think there are a few other key trends that developers should start paying attention to, they are really critical. The first one, and only loosely related to us, is ML apps, right? I think just like we saw with dev and ops, suddenly come together so we can actually develop and deploy in a super fast iterative manner. The same things now are going to start happening with data and all of the work that we do around deploying models. And I think that that's going to be a pretty massive change. You think about the rise of tools like TensorFlow, some of the developments that have happened inside of the cloud providers. I think you're seeing a lot there as a developer, you have to start thinking as much like a data scientist and a data engineer as simply somebody writing front end code, right? And I think that's a critical skill that the best developers already building will continue. I think then the data layer has become as important or more important than any other layer in the stack because of this. And you think about once again, how the leaders are using data and the interesting things that they're doing, the tools you use matter, right? If you are spending a lot of your time trying to figure out how to shard something how to make it scale, how to make it durable when instead you should be focused on just the pure capability, that's a ridiculous use of your time, right? That is not a good use of your time. We're still using 20 to 25 year old open-source databases for many of these applications when they gave up their value probably 10 years ago. Honestly, you know, we keep all paper over it, but it's not a great solution. And unfortunately, no SQL will fix some of the issues with scaling elasticity, it's like you and I starting a business and saying, "okay, everyone speaks English, "but because we're global, "everyone's going to learn Esperanto, right?" That doesn't work, right? So works for a developer. But if you're trying to do something where everyone can interact, this is why this entire new third generation of new SQL databases have risen. We took the distributed architecture SQL. >> Hold up for a second. Can you explain what that means? Cause I think a key topic. I want to just call that out. What is this third generation database mean? Sorry, I speak about it. Like everyone sees it. >> I think it's super important. It's just a highlight. Just take a minute to explain it and we can get into it. There is an entire new wave of database infrastructure that has risen in the last five years. And it started actually with Google. So it started with Google Spanner. So Google was the first to face most of these problems, right? They were the first to face web scale. At least at the scale, we now know it. They were the first to really understand the complexity of working with data. They have their own no SQL. They have their own way of doing things internally and they realized it wasn't working. And what they really needed was a relational database that spoke traditional ANSI SQL, but scaled, like there are no SQL counterparts. And there was a white paper that was released. That was the birth of Spanner. Spanner was an internal product for many, many years. They released the thinking into the wild and then they just started this way with innovation. That's where our company came from. And there were others like us who said, "you're right. "Let's go build something that behaves," like we expect a database to behave with structure and this relational model and like anyone can write simple to use it. It's the simplest API for most people with data, but it behaves like all the best distributed software that we've been using. And so that's how we were born. Our company was founded by ex Googlers who had lived in this space and decided to go and scratch the itch, right? And instead of doing a product that would be locked into a single cloud provider, a database that could be open-source, it could be deployed anywhere. It could cross actual power providers without hiccups and that's been the movement. And it's not just us, there were other vendors in this space and we're all focused on really trying to take the best of the both worlds that came before us. The traditional relational structure, the consistency and asset compliance that we all loved from tools like Oracle, right? And Microsoft who we really enjoyed. But then the developer friendly nature and the simple elastic scalability of distributed software and, that's what we're all seeing. Our company, for example, has only been selling a product for the last two years. We found it five years ago, it took us three years just to rank in the software that we would be happy selling to a customer. We're on what we believe is probably a 10 to 15 year product journey to really go and replace things like Oracle. But we started selling the product two years ago and there is 300% growth year over year. We're probably one of the fastest growing software companies in America, right? And it's all because of the latent demand for this kind of a tool. >> Yeah, that's a great point. I'm a big fan of this third wave. Can I see it? If you look at just the macro tailwinds in the industry, billions of edged devices, immersion of all kinds of software. So that means you can't have one database. I always said to someone, in (mumbles) and others. You can't have one database. It's physically impossible. You need data and whatever database fits the scene, wherever you want to have data being stored, but you got to have it real time. You got to have actionable, you have to have software intelligence into how to manage the data. So I think the data control plane or that layer, I think it's the next interoperability wave. Because without data, nothing really works. Machine learning doesn't really work well. You want the most data. I think cybersecurity is a great early use case because they have to leverage data fast. And so you start to see some interesting financial services, cyber, what's your thoughts on this? Can you share from the Cockroach Labs perspective, from your database, you've got a cloud. What are some of the adoption use cases? Who are those leaders? You can name names if you have them, if not, name the use case. What's the Cockroach approach? Who's winning with it? What's it look like? >> Yeah, that's a great question. And you nailed it, right? The data volumes are so large and they're so globally distributed. And then when you start layering again, the data streaming in from devices that then have to be weighed against all of these things. You want a single database. But you need one that will behave in a way that's going to support all of that and actually is going to live at the edge like you're saying. And that's where we have been shining. And so our use cases are, and unfortunate, I can't name any names, but, for example, in retail. We're seeing retailers who have that elasticity and that skill challenge with commerce. And what they're using us for is then, we're in all of the locations where they do business, right? And so we're able to have data locality associated with the businesses and the purchases in those countries. And however, only have single apps that actually bridge across all of those environments. And with the distributed nature, we were able to scale up and scale down truly elastically, right? Because we spread out the data across the nodes automatically. And, what we see there is, you know, retailers do you have up and down moments? Can you talk about people who can leverage the financial structure of the cloud in a really thoughtful way? Retail is a shining example of that. I remember having customers that had 64 times the amount of traffic on cyber Monday that they had on the average day. In the old data center world, that's what you bought for. That was horrendous. In a cloud environment, still horrendous, even public cloud providers. If you're having to go and change your app to ramp every time, that's a problem with something like a distributed database. and with containerization, you could scale much more quickly and scale down much more. That's a big one for streaming media, is another one. Same thing with data locality in each of these countries, you think about it, somebody like Netflix or Hulu, right? They have shows that are unique to specific countries, right? They haven't have that user behavior, all that user data. You know data sovereignty, you know, what you watch on Netflix, there's some very rich personal data. And we all know how that metadata has been used against people. Or so it's no surprise that you now have countries that I know there's going to be regulation around where that data can live and how it can. And so once again, something like Cockroach where you can have that global distribution, but take a locality, or we can lock data to certain nodes in certain locations. That's a big one. >> There's no doubt in my mind. I think there's such a big topic. We probably do more interviews just on the COVID-19 data problem that they have. The impact of getting this right, is a nerd problem today. But it is a technology solution for society globally in the future. Zero doubt in my mind on that. So, Peter, I want you to get the last word and to give a plugin to the developers that are watching out there about Cockroach. Why should they engage with you guys? What can you offer? Is there anything new you want to share about the company to the audience here at DockerCon 2020? Take us home in the next segment. >> Thank you, John. I'll keep the sales pitch to a minimum. I'm a former developer myself. I don't like being sold, so I appreciate it. But we believe we're building, what is the right database for the coming wave of cognitive applications. And specifically we've built what we believe is the ideal database for distributed applications and for containerized applications. So I would strongly encourage you to try it. It is open-source. It is truly cloud native. We have free education, so you can try it yourself. And once you get into it, it is traditional SQL that behaves like Postgres and other tools that you've already known of. And so it should be very familiar, you know, if you've come up through any of these other spaces will be very natural. Postgres compatible integrates with a number of ORM. So as a developer, just plugged right into the tools you use and we're on a rapid journey. We believe we can replace that first generation of technology built by the Oracles of the world. And we're committed to doing it. We're committed to spending the next five to 10 years in hard engineering to build that most powerful database to solve this problem. >> Well, thanks for coming on, sharing your awesome insight and historical perspective. get it out of experience. We believe and we want to share the audience in this time of crisis, more than ever to focus on critical nature of operations, because coming out of this, it is going to be a whole new reality. And I think the best tech will win the day and people will be building new things to grow, whether it's for profit or for societal benefit. The impact of what we do in the next year or two will determine a big trajectory and new technology, new approaches that are dealing with the realities of infrastructure, scale, working at home , sheltering in place to coming back to the hybrid world. We're coming virtualized, Peter. We've been virtualized, the media, the lifestyle, not just virtualization in the networking sense, but, fun times it was going to be challenging. So thanks for coming on. >> Thank you very much, John. >> Okay, we're here for DockerCon 20 virtual conferences, the CUBE Virtual Segment. I want to thank you for watching. Stay with me. We've got stream all day today and check out the sessions. Jump in, it's going to be on demand. There's a lot of videos it's going to live on and thanks for watching and stay with us for more coverage and analysis. Here at DockerCon 20, I'm John Furrier. Thanks for watching >> Narrator: From the CUBE studios in Palo Alto in Boston, connecting with thought leaders all around the world. This is the CUBE conversation.

Published Date : May 29 2020

SUMMARY :

brought to you by Docker in the history of the industry Thanks for having me. I mentioned that tidbit to "And the 15 to 20% that I get I think it's going to really and this is going to be for the application of and having to increase And that changed the game and the shift to web 2.0, What are some of the things that you see the tools you use matter, right? Cause I think a key topic. And it's all because of the latent demand I always said to someone, that then have to be weighed about the company to the the next five to 10 years in the next year or two and check out the sessions. This is the CUBE conversation.

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
JohnPERSON

0.99+

UberORGANIZATION

0.99+

PeterPERSON

0.99+

15QUANTITY

0.99+

20QUANTITY

0.99+

John FurrierPERSON

0.99+

Peter GuangetiPERSON

0.99+

MicrosoftORGANIZATION

0.99+

GermanyLOCATION

0.99+

Peter GuagentiPERSON

0.99+

AmericaLOCATION

0.99+

10QUANTITY

0.99+

Cockroach LabsORGANIZATION

0.99+

Palo AltoLOCATION

0.99+

64 timesQUANTITY

0.99+

fiveQUANTITY

0.99+

NetflixORGANIZATION

0.99+

2008DATE

0.99+

GoogleORGANIZATION

0.99+

FirstQUANTITY

0.99+

tensQUANTITY

0.99+

DockerORGANIZATION

0.99+

three yearsQUANTITY

0.99+

HuluORGANIZATION

0.99+

both sidesQUANTITY

0.99+

GartnerORGANIZATION

0.99+

last yearDATE

0.99+

OracleORGANIZATION

0.99+

todayDATE

0.99+

firstQUANTITY

0.99+

both sidesQUANTITY

0.99+

FacebookORGANIZATION

0.99+

CockroachORGANIZATION

0.99+

2004DATE

0.99+

two levelsQUANTITY

0.99+

two years agoDATE

0.99+

DockerCon 20EVENT

0.99+

COVID-19OTHER

0.99+

15 yearQUANTITY

0.99+

DockerConEVENT

0.99+

eachQUANTITY

0.99+

bothQUANTITY

0.99+

five years agoDATE

0.98+

20%QUANTITY

0.98+

25 yearQUANTITY

0.98+

next yearDATE

0.98+

80sDATE

0.98+

EnglishOTHER

0.98+

single appsQUANTITY

0.98+

BostonLOCATION

0.98+

first oneQUANTITY

0.98+

both worldsQUANTITY

0.98+

first positionQUANTITY

0.97+

first generationQUANTITY

0.97+

two cloud providersQUANTITY

0.97+

third generationQUANTITY

0.97+

DockerCon Live 2020EVENT

0.97+

hundreds of millions of dollarsQUANTITY

0.97+

CUBEORGANIZATION

0.97+

a year agoDATE

0.96+

10 yearsQUANTITY

0.96+

SQLTITLE

0.96+

LinuxTITLE

0.96+

single databaseQUANTITY

0.96+

Renee Tarun, Fortinet & Derek Manky, FortiGuard Labs | CUBEConversation, March 2020


 

(soft music) >> Narrator: From theCUBE studios in Palo Alto in Boston, connecting with thought leaders all around the world: this is a CUBE conversation. >> Everyone, welcome to this special cube conversation. We're here in the Palo Alto studios, where I am; here during this critical time during the corona virus and this work at home current situation across the United States and around the world. We've got a great interview here today around cybersecurity and the threats that are out there. The threats that are changing as a result of the current situation. We got two great guests; Derek Manky, Chief Security Insights and Global Threat Alliances at FortiGuard labs. And Renee Tarun, deputy Chief Information Security Officer with Fortinet net. Guys, thanks for remotely coming in. Obviously, we're working remotely. Thanks for joining me today on this really important conversation. >> It's a pleasure to be here. >> Thanks for having us. >> So Renee and Derek. Renee, I want to start with you as deputing CISO. There's always been threats. Every day is a crazy day. But now more than ever over the past 30 to 45 days we've seen a surge in activity with remote workers. Everyone's working at home. It's disrupting family's lives. How people do business. And also they're connected to the internet. So it's an endpoint. It's a (laughs) hackable environment. We've had different conversation with you guys about this. But now more than ever, it's an at scale problem. What is the impact of the current situation for that problem statement of from working at home, at scale. Are there new threats? What's happening? >> Yeah, I think you're seeing some organizations have always traditionally had that work at home ability. But now what you're seeing is now entire workforces that are working home and now some companies are scrambling to ensure that they have a secure work at home for teleworkers at scale. In addition some organizations that never had a work from home practice are now being forced into that and so a lot of organizations now are faced with the challenge that employees are now bringing their own device into connecting to their networks. 'Cause employees can't be bring their workstations home with them. And if they don't have a company laptop they're of course using their own personal devices. And some personal devices are used by their kids. They're going out to gaming sites that could be impacted with malware. So it creates a lot of different challenges from a security perspective that a lot of organizations aren't necessarily prepared for. It's not only from a security but also from a scalability perspective. >> When I'm at home working... I came into the studio to do this interview. So I really wanted to talk to you guys. But when I'm at home, this past couple weeks. My kids are home. My daughter is watching Netflix. My son's gaming, multiplayer gaming. The surface area from a personnel standpoint or people standpoint is increased. My wife's working at home. My daughters there, two daughters. So this is also now a social issue because there are more people on the WiFi, there's more bandwidth being used. There's more fear. This has been an opportunity for the hackers. This crime of fear using the current situation. So is it changing how you guys are recommending people protect themselves at home? Or is it just accelerating a core problem that you've seen before? >> Yeah, so I think it's not changing. It's changing in terms of priority. I mean, all the things that we've talked about before it's just becoming much more critical. I think, at this point in time. If you look at any histories that we've... Lessons we've learned from the past or haven't learned (laughs). That's something that is just front and center right now. We've seen attack campaigns on any high level news. Anything that's been front and center. And we've seen successful attack campaigns in the past owing to any sort of profile events. We had Olympic destroyer last last Olympic period, when we have them in Korea as an example, in South Korea. We've seen... I can go back 10 years plus and give a History timeline, every single there's been something dominating the news. >> John: Yeah. And there's been attack campaigns that are leveraged on that. Obviously this is a much higher focus now given the global news domination that's happening with COVID. The heightened fear and anxiety. Just the other day FortiGuard labs, we pulled up over 600 different phishing emails and scam attempts for COVID-19. And we're actively poring through those. I expect that number to increase. Everybody is trying to hop on this bandwagon. I was just talking to our teams from the labs today. Groups that we haven't seen active since about 2011, 2012. Malware campaign authors. They're riding this bandwagon right now as well. So it's really a suction if you will, for these cyber criminals. So all of the things that we recommend in the past, obviously being vigilant, looking at those links coming in. Obviously, there's a lot of impersonators. There's a lot of spoofing out there. People prefer pretending to be the World Health Organization. We wrote a blog on this a couple of weeks back. People have to have this zero trust mentality coming in. Is everyone trying to ride on this? Especially on social networks, on emails. Even phishing and voice vishing. So the voice phishing. You really have to put more... People have to put more of a safeguard up. Not only for their personal health like everyone's doing the social distancing but also virtual (laughs) social distancing when it comes to really trusting who's trying to send you these links. >> Well, I'm glad you guys have the FortiGuard guard labs there. And I think folks watching should check it out and keep sending us that data. I think watching the data is critical. Everyone's watching the data. They want the real data. You brought up a good point, Rene. I want to get your thoughts on this because the at scale thing really gets my attention because there's more people at home as I mentioned from a social construct standpoint. Work at home is opening up new challenges for companies that haven't been prepared. Even though ones that are prepared have known at scale. So you have a spectrum of challenges. The social engineering is the big thing on Phishing. You're seeing all kinds of heightened awareness. It is a crime of opportunity for hackers. Like Derek just pointed out. What's your advice? What's your vision of what's happening? How do you see it evolving? And what can people do to protect themselves? What's the key threats? And what steps are people taking? >> Yeah, I think, like Derek said, kind of similar how in the physical world we're washing our hands. We're keeping 6 feet away from people. We could distance from our adversaries, as well. Again when you're looking at your emails ensuring that you're only opening attachments from people that you know. Hovering over the links to ensure that they are from legitimate sources. And being mindful that when you're seeing these type of attacks coming in, whether they are coming through emails. Through your phones. Take a moment and pause and think about would someone be contacting me through my cell phone? Through sending me a text message? or emails asking me for personal information? Asking me for user IDs and passwords, credential and information. So you kind of need to take that second and really think before you start taking actions. And similar to opening attachments we've seen a lot of cases where someone attaches a PDF file to an email but when you open up the PDF it's actually a malware. So you need to be careful and think to yourself, was I expecting this attachment? Do I know the person? And take steps to actually follow up and call that person directly and say, "Hey, did you really send this to me? "Is this legitimate?" >> And the thing-- >> You got to to be careful what you're opening up. Which links you click on. But while I got you here, I want to get your opinion on this because there's digital attacks and then there's phone based attacks. We all have mobile phones. I know this might be a little bit too elementary, but I do want to get it out there. Can you define the difference in phishing and spear phishing for the folks that are trying to understand the difference in phishing and spear phishing techniques. >> The main difference is spear phishing is really targeting a specific individual, or within a specific role within a company. For example, targeting like the CEO or the CFO. So those are attacks that are specifically targeting a specific individual or specific role. Where phishing emails are targeting just mass people regardless of their roles and responsibilities. >> So I'm reading the blog post that you guys put out. Which I think everyone... I'll put the link on SiliconANGLE later. But it's on fortinet.com Under digital attacks you've got the phishing and spear phishing which is general targeting an email or individually spear spearing someone specifically. But you guys list social media deception, pre-texting and water holing as the key areas. Is that just based on statistics? Or just the techniques that people are using? Can you guys comment on and react to those different techniques? >> Yeah, so I think with the water holing specifically as well. The water holing attack refers to people that every day as part of their routine going to some sort of, usually a news source. It could be their favorite sites, social media, etc. Those sorts of sources because it's expected for people to go and drink from a water hole, are prime targets to these attackers. They can be definitely used for spear phishing but also for the masses for these phishing campaigns. Those are more effective. Attackers like to cast a wide net. And it's especially effective if you think of the climate that's happening right now, like you said earlier at the start of this conversation. That expanded attack surface. And also the usage of bandwidth and more platforms now applications. There's more traffic going to these sites simply. People have more time at home through telework. To virtually go to these sites. And so, yeah. Usually what we see in these water holing attacks can be definitely phishing sites that are set up on these pages. 'Cause they might have been compromised. So this is something even for people who are hosting these websites, right? There's always two sides of the coin. You got security of your client side security And your service side security-- >> So spear phishing is targeting an individual, water holing is the net that gets a lot of people and then they go from there. Can you guys, Renee or Derek talk about social media deception and pretexting. These are other techniques as well that are popular. Can you guys comment and define those? >> Yeah, so some of the pretexting that you're saying is what's happening is adversaries are either sending text, trying to get people to click on links, go to malicious sites. And they're also going setting up these fabricated stories and they're trying to call. Acting like they're a legitimate source. And again, trying to use tactics and a lot of times scare tactics. Trying to get people to divulge information, personal information. Credit card numbers, social security numbers, user IDs and passwords to gain access to either-- >> So misinformation campaigns would be an example that like, "I got a coven virus vaccine, put your credit card down now and get on the mailing list." Is that was that kind of the general gist there? >> Absolutely. >> Okay. >> And we've also seen as another example, and this was in one of our blogs I think about a couple weeks ago some of the first waves of these attacks that we saw was also again, impersonating to be the World Health Organization as part of pretexting. Saying that there's important alerts and updates that these readers must read in their regions, but they're of course malicious documents that are attached. >> Yeah, how do people just get educated on this? This is really challenging because if you're a nerd like us you can know what a URL looks like. And you can tell it's a host server or host name, it's not real. But when they're embedded in these social networks, how do you know? what's the big challenge? Just education and kind of awareness? >> Yeah, so I'll just jump in quickly on that. From my point of view, it's the whole ecosystem, right? There's no just one silver bullet. Education, cyber hygiene for sure. But beyond that obviously, this is where the security solutions pop in. So having that layered defense, right? That goes a long way of everything from anti-spam to antivirus. To be able to scan those malicious attachments. Endpoint security. Especially now in the telework force that we're dealing with having managed endpoint security from distributed enterprise angle is very important because all of these workstations that were within the corporate network before are now roaming--quote unquote--roaming or from home. So it's a multi-pronged approach, really. But education is of course a very good line of defense for our employees. And I think updated education on a weekly basis. >> Okay, before we get to the remote action steps, 'Cause I think the remote workers at scales like the critical problem that we're seeing now. I want to just close out this attack social engineering thing. There's also phone based attacks. We all have mobile phones, right? So we use such smartphones. There's other techniques in that. What are the techniques for the phone based attacks? >> Yeah, a lot of times you'll see adversaries, they're spoofing other phones. So what happens is that when you receive a call or a text it looks like it's coming from a number in your local area. So a lot of times that kind of gives you a false sense of security thinking in that it is a legitimate call when in reality they're simply just spoofing the number. And it's really coming from somewhere else in the country or somewhere else in the world. >> So I get a call from Apple support and it's not Apple support. They don't have a callback, that's spoofing? >> That's one way but also the number itself. When you see the number coming in. For example, I'm in the 410 area code. Emails coming in from my area code with my exchange is another example where it looks like it's someone that's either a close friend or someone within my community when in reality, it's not. >> And at the end of the day too the biggest red flags for these attacks are unsolicited information, right? If they're asking for any information always, always treat that as a red flag. We've seen this in the past. Just as an example with call centers, hotels too. Hackers have had access right to the switchboards to call guests rooms and say that there's a problem at the front desk and they just want to register the users information and they asked for credit card guest information to confirm all sorts of things. So again, anytime information is asked for always think twice. Try to verify. Callback numbers are a great thing. Same thing in social media if someone's messaging you, right? Try to engage in that dialect conversation, verify their identity. >> So you got-- >> That's also another good example of social media, is another form of essential engineering attacks is where people are creating profiles in say for example, LinkedIn. And they're acting like they're either someone from your company or a former colleague or friend as another way to try and make that human to human connection in order to do malicious things. >> Well, we've discussed with you guys in the past around LinkedIn as a feeding ground for spear phishing because, "Hey, here, don't tell your boss but here's "a PDF job opening paying huge salary. "You're qualified." Of course I'm going to look at that, right? So and a lot of that goes on. We see that happen a lot. I want to get your thoughts, Renee on the the vishing and phishing. Smishing is the legitimate source spoofing and vishing is the cloaking or spoofing, right? >> Yeah, smishing is really the text based attacks that you're seeing through your phones. Vishing is using more of a combination of someone that is using a phone based attack but also creating a fake profile, creating a persona. A fabricated story that's ultimately fake but believable. And to try and encourage you to provide information, sensitive information. >> Well, I really appreciate you guys coming on and talking about the attackers trying to take advantage of the current situation. The remote workers again, this is the big at scale thing. What are the steps that people can take, companies can take to protect themselves from or the at scale remote worker situation that could be going on for quite some time now? >> Yeah. So again, at that scale with people in this new normal as we call it, teleworking. Being at scale is... Everyone has to do their part. So I would recommend A from an IT standpoint, keeping all employees virtually in the loop. So weekly updates from security teams. The cyber hygiene practice, especially patch management is critically important too, right? You have a lot of these other devices connected to networks, like you said. IoT devices, all these things that are all prime attack targets. So keeping all the things that we've talked about before, like patch management. Be vigilant on that from an end user perspective. I think especially putting into the employees that they have to be aware that they are highly at risk for this. And I think there has to be... We talked about changes earlier. In terms of mentality education, cyber hygiene, that doesn't change. But I think the way that this isn't forced now, that starts with the change, right? That's a big focus point especially from an IT security standpoint. >> Well, Derek, keep that stat and keep those stats coming in to us. We are very interested. You got the insight. You're the chief of the insights and the global threat. You guys do a great job at FortiGuard guard labs. That's phenomenal. Renee, I'd like you to have the final word on the segment here and we can get back to our remote working and living. What is going on the mind of the CISO right now? Because again, a lot of people are concerned. They don't know how long it's going to last. Certainly we're now in a new normal. Whatever happens going forward as post pandemic world, what's going on in the mind of the CISO right now? What are they thinking? What are they planning for? What's going on? >> Yeah, I think there's a lot of uncertainty. And I think the remote teleworking, again, making sure that employees have secure remote access that can scale. I think that's going to be on the forefront. But again, making sure that people connecting remotely don't end up introducing additional potential vulnerabilities into your network. And again, just keeping aware. Working closely with the IT teams to ensure that we keep our workforces updated and trained and continue to be vigilant with our monitoring capabilities as well as ensuring that we're prepared for potential attacks. >> Well, I appreciate your insights, folks, here. This is great. Renee and Derek thanks for coming on. We want to bring you back in when should do a digital event here in the studio and get the data out there. People are interested. People are making changes. Maybe this could be a good thing. Make some lemonade out of the lemons that are in the industry right now. So thank you for taking the time to share what's going on in the cyber risks. Thank you. >> Thank you, we'll keep those stats coming. >> Okay, CUBE conversation here in Palo Alto with the remote guests. That's what we're doing now. We are working remotely with all of our CUBE interviews. Thanks for watching. I'm John Furrier, co-host to theCUBE. (soft music)

Published Date : Mar 27 2020

SUMMARY :

this is a CUBE conversation. We're here in the Palo Alto studios, where I am; But now more than ever over the past 30 to 45 days are now being forced into that I came into the studio to do this interview. I mean, all the things that we've talked about before I expect that number to increase. The social engineering is the big thing on Phishing. from people that you know. for the folks that are trying to understand For example, targeting like the CEO or the CFO. So I'm reading the blog post that you guys put out. that every day as part of their routine going to Can you guys comment and define those? Yeah, so some of the pretexting Is that was that kind of the general gist there? some of the first waves of these attacks that we saw And you can tell it's So having that layered defense, right? What are the techniques for the phone based attacks? So a lot of times that kind of gives you and it's not Apple support. For example, I'm in the 410 area code. And at the end of the day too that human to human connection So and a lot of that goes on. And to try and encourage you and talking about the attackers trying And I think there has to be... What is going on the mind of the CISO right now? I think that's going to be on the forefront. that are in the industry right now. I'm John Furrier, co-host to theCUBE.

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
ReneePERSON

0.99+

DerekPERSON

0.99+

Derek MankyPERSON

0.99+

John FurrierPERSON

0.99+

World Health OrganizationORGANIZATION

0.99+

Renee TarunPERSON

0.99+

JohnPERSON

0.99+

AppleORGANIZATION

0.99+

FortiGuardORGANIZATION

0.99+

March 2020DATE

0.99+

Palo AltoLOCATION

0.99+

KoreaLOCATION

0.99+

RenePERSON

0.99+

6 feetQUANTITY

0.99+

LinkedInORGANIZATION

0.99+

two daughtersQUANTITY

0.99+

FortiGuard LabsORGANIZATION

0.99+

South KoreaLOCATION

0.99+

United StatesLOCATION

0.99+

OlympicEVENT

0.99+

two sidesQUANTITY

0.99+

todayDATE

0.99+

BostonLOCATION

0.99+

twiceQUANTITY

0.99+

COVID-19OTHER

0.98+

over 600 different phishing emailsQUANTITY

0.98+

Global Threat AlliancesORGANIZATION

0.98+

CUBEORGANIZATION

0.98+

two great guestsQUANTITY

0.97+

one wayQUANTITY

0.97+

oneQUANTITY

0.96+

410OTHER

0.96+

secondQUANTITY

0.94+

fortinet.comOTHER

0.92+

45 daysQUANTITY

0.92+

theCUBEORGANIZATION

0.92+

past couple weeksDATE

0.89+

firstEVENT

0.89+

one silver bulletQUANTITY

0.87+

2011,DATE

0.87+

corona virusOTHER

0.87+

a couple weeks agoDATE

0.87+

NetflixORGANIZATION

0.84+

CISOORGANIZATION

0.83+

10 yearsQUANTITY

0.83+

zero trustQUANTITY

0.82+

wavesEVENT

0.79+

Fortinet netORGANIZATION

0.79+

30QUANTITY

0.78+

lot of peopleQUANTITY

0.77+

COVIDOTHER

0.77+

couple of weeks backDATE

0.76+

Chief Information Security OfficerPERSON

0.73+

pandemicEVENT

0.72+

PDFOTHER

0.68+

FortinetORGANIZATION

0.62+

periodDATE

0.62+

SiliconANGLEORGANIZATION

0.61+

Chief SecurityPERSON

0.59+

CUBEConversationEVENT

0.59+

covenOTHER

0.52+

2012DATE

0.51+

singleQUANTITY

0.49+

lastDATE

0.34+

Derek Manky, FortiGuard Labs | RSAC USA 2020


 

>> Narrator: Live from San Francisco. It's theCUBE, covering RSA Conference 2020, San Francisco. Brought to you by, SiliconANGLE Media. >> Welcome back everyone. CUBE coverage here in Moscone in San Francisco for RSA, 2020. I'm John Furrier host of theCUBE. We've got a great guest here talking about cybersecurity and the impact with AI and the role of data. It's always great to have Derek Manky on Chief Security Insights Global Threat Alliances with FortiGuard Lab, part of Fortinet, FortiGuard Labs is great. Great organization. Thanks for coming on. >> It's a pleasure always to be here-- >> So you guys do a great threat report that we always cover. So it covers all the bases and it really kind of illustrates state of the art of viruses, the protection, threats, et cetera. But you're part of FortiGuard Labs. >> Yeah, that's right. >> Part of Fortinet, which is a security company, public. What is FortiGuard Labs? What do you guys do, what's your mission? >> So FortiGuard Labs has existed since day one. You can think of us as the intelligence that's baked into the product, It's one thing to have a world-class product, but you need a world-class intelligence team backing that up. We're the ones fighting those fires against cybercrime on the backend, 24/7, 365 on a per second basis. We're processing threat intelligence. We've got over 10 million attacks or processing just per minute, over a hundred billion events, in any given day that we have to sift through. We have to find out what's relevant. We have to find gaps that we might be missing detection and protection. We got to push that out to a customer base of 450,000 customers through FortiGuard services and 5 million firewalls, 5 million plus firewalls we have now. So it's vitally important. You need intelligence to be able to detect and then protect and also to respond. Know the enemy, build a security solution around that and then also be able to act quickly about it if you are under active attack. So we're doing everything from creating security controls and protections. So up to, real time updates for customers, but we're also doing playbooks. So finding out who these attackers are, why are they coming up to you. For a CSO, why does that matter? So this is all part of FortiGuard Labs. >> How many people roughly involved ? Take us a little inside the curtain here. What's going on? Personnel size, scope. >> So we're over 235. So for a network security vendor, this was the largest global SOC, that exists. Again, this is behind the curtain like you said. These are the people that are, fighting those fires every day. But it's a large team and we have experts to cover the entire attack surface. So we're looking at not just a viruses, but we're looking at as zero-day weapons, exploits and attacks, everything from cyber crime to, cyber warfare, operational technology, all these sorts of things. And of course, to do that, we need to really heavily rely on good people, but also automation and artificial intelligence and machine learning. >> You guys are walking on a tight rope there. I can only imagine how complex and stressful it is, just imagining the velocity alone. But one of the trends that's coming up here, this year at RSA and is kind of been talking about in the industry is the who? Who is the attacker because, the shifts could shift and change. You got nation states are sitting out there, they're not going to have their hands dirty on this stuff. You've got a lot of dark web activity. You've got a lot of actors out there that go by different patterns. But you guys have an aperture and visibility into a lot of this stuff. >> Absolutely. >> So, you can almost say, that's that guy. That's the actor. That's a really big part. Talk about why that's important. >> This is critically important because in the past, let's say the first generation of, threat intelligence was very flat. It was to watch. So it was just talking about here's a bad IP, here's a bad URL, here's a bad file block hit. But nowadays, obviously the attackers are very clever. These are large organizations that are run a lot of people involved. There's real world damages happening and we're talking about, you look at OT attacks that are happening now. There's, in some cases, 30, $40 million from targeted ransom attacks that are happening. These people, A, have to be brought to justice. So we need to understand the who, but we also need to be able to predict what their next move is. This is very similar to, this is what you see online or CSI. The police trynna investigate and connect the dots like, plotting the strings and the yarn on the map. This is the same thing we're doing, but on a way more advanced level. And it's very important to be able to understand who these groups are, what tools they use, what are the weapons, cyber weapons, if you will, and what's their next move potentially going to be. So there's a lot of different reasons that's important. >> Derek, I was riffing with another guest earlier today about this notion of, government protection. You've got a military troops drop on our shores and my neighborhood, the Russians drop in my neighborhood. Guess what, the police will probably come in, and, or the army should take care of it. But if I got to run a business, I got to build my own militia. There's no support out there. The government's not going to support me. I'm hacked. Damage is done. You guys are in a way providing that critical lifeline that guard or shield, if you will, for customers. And they're going to want more of it. So I've got to ask you the hard question, which is, how are you guys going to constantly be on the front edge of all this? Because at the end of the day, you're in the protection business. Threats are coming at the speed of milliseconds and nanoseconds, in memory. You need memory, you need database. You've got to have real time. It's a tsunami of attack. You guys are the front lines of this. You're the heat shield. >> Yes, absolutely. >> How do you take it to the next level? >> Yeah, so collaboration, integration, having a broad integrated platform, that's our bread and butter. This is what we do. End-to-end security. The attack surface is growing. So we have to be able to, A, be able to cover all aspects of that attack surface and again, have intelligence. So we're doing sharing through partners. We have our core intelligence network. Like I said, we're relying heavily on machine learning models. We're able to find that needle in the haystack. Like, as I said earlier, we're getting over a hundred billion potential threat events a day. We have to dissect that. We have to break it down. We have to say, is this affecting endpoint? Is this effect affecting operational technology? What vertical, how do we process it? How do we verify that this is a real threat? And then most importantly, get that out in time and speed to our customers. So I started with automation years ago, but now really the way that we're doing this is through broad platform coverage. But also machine learning models for and-- >> I want to dig into machine learning because, I love that needle in the haystack analogy, because, if you take that to the next step, you got to stack a needles now. So you find the needle in the haystack. Now you got a bunch of needles, where do you find that? You need AI, you got to have some help. But you still got the human component. So talk about how you guys are advising customers on how you're using machine learning and get that AI up and running for customers and for yourselves. >> So we're technology people. I always look at this as the stack. The stack model, the bottom of the stack, you have automation. You have layer one, layer two. That's like the basic things for, feeds, threat feeds, how we can push out, automate, integrate that. Then you have the human. So the layer seven. This is where our human experts are coming in to actually advise our customers. We're creating a threat signals with FortiGuard Labs as an example. These are bulletins that's a quick two to three page read that a CSO can pick up and say, here's what FortiGuard Labs has discovered this week. Is this relevant to my network? Do I have these protections in place. There's also that automated, and so, I refer to this as a centaur model. It's half human half machine and, the machines are driving a lot of that, the day to day mundane tasks, if you will, but also finding, collecting the needles of needles. But then ultimately we have our humans that are processing that, analyzing it, creating the higher level strategic advice. We recently, we've launched a FortiAI, product as well. This has a concept of a virtual-- >> Hold on, back up a second. What's it called? >> FortiAI. >> So it's AI components. Is it a hardware box or-- >> This is a on-premise appliance built off of five plus years of learning that we've done in the cloud to be able to identify threats and malware, understand what that malware does to a detailed level. And, where we've seen this before, where is it potentially going? How do we protect against it? Something that typically you would need, four to five headcount in your security operations center to do, we're using this as an assist to us. So that's why it's a virtual analyst. It's really a bot, if you will, something that can actually-- >> So it's an enabling opportunity for the customers. So is this virtual assistant built into the box. What does that do, virtual analyst. >> So the virtual analyst is able to, sit on premises. So it's localized learning, collect threats to understand the nature of those threats, to be able to look at the needles of the needles, if you will, make sense of that and then automatically generate reports based off of that. So it's really an assist tool that a network admin or a security analyst was able to pick up and virtually save hours and hours of time of resources. >> So, if you look at the history of like our technology industry from a personalization standpoint, AI and data, whether you're a media business, personalization is ultimately the result of good data AI. So personalization for an analyst, would be how not to screw up their job. (laughs) One level. The other one is to be proactive on being more offensive. And then third collaboration with others. So, you starting to see that kind of picture form. What's your reaction to that? >> I think it's great. There's stepping stones that we have to go through. The collaboration is not always easy. I'm very familiar with this. I mean I was, with the Cyber Threat Alliance since day one, I head up and work with our Global Threat Alliances. There's always good intentions, there's problems that can be created and obviously you have things like PII now and data privacy and all these little hurdles they have to come over. But when it works right together, this is the way to do it. It's the same thing with, you talked about the data naturally when he started building up IT stacks, you have silos of data, but ultimately those silos need to be connected from different departments. They need to integrate a collaborate. It's the same thing that we're seeing from the security front now as well. >> You guys have proven the model of FortiGuard that the more you can see, the more visibility you can see and more access to the data in real time or anytime scale, the better the opportunity. So I got to take that to the next level. What you guys are doing, congratulations. But now the customer. How do I team up with, if I'm a customer with other customers because the bad guys are teaming up. So the teaming up is now a real dynamic that companies are deploying. How are you guys looking at that? How is FortiGuard helping that? Is it through services? Is it through the products like virtual assistant? Virtual FortiAI? >> So you can think of this. I always make it an analogy to the human immune system. Artificial neural networks are built off of neural nets. If I have a problem and an infection, say on one hand, the rest of the body should be aware of that. That's collaboration from node to node. Blood cells to blood cells, if you will. It's the same thing with employees. If a network admin sees a potential problem, they should be able to go and talk to the security admin, who can go in, log into an appliance and create a proper response to that. This is what we're doing in the security fabric to empower the customer. So the customer doesn't have to always do this and have the humans actively doing those cycles. I mean, this is the integration. The orchestration is the big piece of what we're doing. So security orchestration between devices, that's taking that gap out from the human to human, walking over with a piece of paper to another or whatever it is. That's one of the key points that we're doing within the actual security fabric. >> So that's why silos is problematic. Because you can't get that impact. >> And it also creates a lag time. We have a need for speed nowadays. Threats are moving incredibly fast. I think we've talked about this on previous episodes with swarm technology, offensive automation, the weaponization of artificial intelligence. So it becomes critically important to have that quick response and silos, really create barriers of course, and make it slower to respond. >> Okay Derek, so I got to ask you, it's kind of like, I don't want to say it sounds like sports, but it's, what's the state of the art in the attack vectors coming in. What are you guys seeing as some of the best of breed tax that people should really be paying attention to? They may, may not have fortified down. What are SOCs looking at and what are security pros focused on right now in terms of the state of the art. >> So the things that keep people up at night. We follow this in our Threat Landscape Report. Obviously we just released our key four one with FortiGuard Labs. We're still seeing the same culprits. This is the same story we talked about a lot of times. Things like, it used to be a EternalBlue and now BlueKeep, these vulnerabilities that are nothing new but still pose big problems. We're still seeing that exposed on a lot of networks. Targeted ransom attacks, as I was saying earlier. We've seen the shift or evolution from ransomware from day to day, like, pay us three or $400, we'll give you access to your data back to going after targeted accounts, high revenue business streams. So, low volume, high risk. That's the trend that we're starting to see as well. And this is what I talk about for trying to find that needle in the haystack. This is again, why it's important to have eyes on that. >> Well you guys are really advanced and you guys doing great work, so congratulations. I got to ask you to kind of like, the spectrum of IT. You've got a lot of people in the high end, financial services, healthcare, they're regulated, they got all kinds of challenges. But as IT and the enterprise starts to get woke to the fact that everyone's vulnerable. I've heard people say, well, I'm good. I got a small little to manage, I'm only a hundred million dollar business. All I do is manufacturing. I don't really have any IP. So what are they going to steal? So that's kind of a naive approach. The answer is, what? Your operations and ransomware, there's a zillion ways to get taken down. How do you respond to that. >> Yeah, absolutely. Going after the crown jewels, what hurts? So it might not be a patent or intellectual property. Again, the things that matter to these businesses, how they operate day to day. The obvious examples, what we just talked about with revenue streams and then there's other indirect problems too. Obviously, if that infrastructure of a legitimate organization is taken over and it's used as a botnet and an orchestrated denial-of-service attack to take down other organizations, that's going to have huge implications. >> And they won't even know it. >> Right, in terms of brand damage, has legal implications as well that happened. This is going even down to the basics with consumers, thinking that, they're not under attack, but at the end of the day, what matters to them is their identity. Identity theft. But this is on another level when it comes to things to-- >> There's all kinds of things to deal with. There's, so much more advanced on the attacker side. All right, so I got to ask you a final question. I'm a business. You're a pro. You guys are doing great work. What do I do, what's my strategy? How would you advise me? How do I get my act together? I'm working the mall every day. I'm trying my best. I'm peddling as fast as I can. I'm overloaded. What do I do? How do I go the next step? >> So look for security solutions that are the assist model like I said. There's never ever going to be a universal silver bullet to security. We all know this. But there are a lot of things that can help up to that 90%, 95% secure. So depending on the nature of the threats, having a first detection first, that's always the most important. See what's on your network. This is things where SIM technology, sandboxing technology has really come into play. Once you have those detections, how can you actually take action? So look for a integration. Really have a look at your security solutions to see if you have the integration piece. Orchestration and integration is next after detection. Finally from there having a proper channel, are there services you looked at for managed incident response as an example. Education and cyber hygiene are always key. These are free things that I push on everybody. I mean we release weekly threat intelligence briefs. We're doing our quarterly Threat Landscape Reports. We have something called threat signals. So it's FortiGuard response to breaking industry events. I think that's key-- >> Hygiene seems to come up over and over as the, that's the foundational bedrock of security. >> And then, as I said, ultimately, where we're heading with this is the AI solution model. And so that's something, again that I think-- >> One final question since it's just popped into my head. I wanted, and that last one. But I wanted to bring it up since you kind of were, we're getting at it. I know you guys are very sensitive to this one topic cause you live it every day. But the notion of time and time elapsed is a huge concern because you got to know, it's not if it's when. So the factor of time is a huge variable in all kinds of impact. Positive and negative. How do you talk about time and the notion of time elapsing. >> That's great question. So there's many ways to stage that. I'll try to simplify it. So number one, if we're talking about breaches, time is money. So the dwell time. The longer that a threat sits on a network and it's not cleaned up, the more damage is going to be done. And we think of the ransom attacks, denial-of-service, revenue streams being down. So that's the incident response problem. So time is very important to detect and respond. So that's one aspect of that. The other aspect of time is with machine learning as well. This is something that people don't always think about. They think that, artificial intelligence solutions can be popped up overnight and within a couple of weeks they're going to be accurate. It's not the case. Machines learn like humans too. It takes time to do that. It takes processing power. Anybody can get that nowadays, data, most people can get that. But time is critical to that. It's a fascinating conversation. There's many different avenues of time that we can talk about. Time to detect is also really important as well, again. >> Let's do it, let's do a whole segment on that, in our studio, I'll follow up on that. I think it's a huge topic, I hear about all the time. And since it's a little bit elusive, but it kind of focuses your energy on, wait, what's going on here? I'm not reacting. (laughs) Time's a huge issue. >> I refer to it as a latency. I mean, latency is a key issue in cybersecurity, just like it is in the stock exchange. >> I mean, one of the things I've been talking about with folks here, just kind of in fun conversation is, don't be playing defense all the time. If you have a good time latency, you going to actually be a little bit offensive. Why not take a little bit more offense. Why play defense the whole time. So again, you're starting to see this kind of mentality not being, just an IT, we've got to cover, okay, respond, no, hold on the ballgame. >> That comes back to the sports analogy again. >> Got to have a good offense. They must cross offense. Derek, thanks so much. Quick plug for you, FortiGuard, share with the folks what you guys are up to, what's new, what's the plug. >> So FortiGuard Labs, so we're continuing to expand. Obviously we're focused on, as I said, adding all of the customer protection first and foremost. But beyond that, we're doing great things in industry. So we're working actively with law enforcement, with Interpol, Cyber Threat Alliance, with The World Economic Forum and the Center for Cyber Security. There's a lot more of these collaboration, key stakeholders. You talked about the human to human before. We're really setting the pioneering of setting that world stage. I think that is, so, it's really exciting to me. It's a lot of good industry initiatives. I think it's impactful. We're going to see an impact. The whole goal is we're trying to slow the offense down, the offense being the cyber criminals. So there's more coming on that end. You're going to see a lot great, follow our blogs at fortinet.com and all-- >> Great stuff. >> great reports. >> I'm a huge believer in that the government can't protect us digitally. There's going to be protection, heat shields out there. You guys are doing a good job. It's only going to be more important than ever before. So, congratulations. >> Thank you. >> Thanks for coming I really appreciate. >> Never a dull day as we say. >> All right, it's theCUBE's coverage here in San Francisco for RSA 2020. I'm John Furrier, your host. Thanks for watching. (upbeat music)

Published Date : Feb 27 2020

SUMMARY :

Brought to you by, SiliconANGLE Media. and the impact with AI and the role of data. and it really kind of illustrates state of the art of viruses, What do you guys do, what's your mission? and then protect and also to respond. How many people roughly involved ? And of course, to do that, But one of the trends that's coming up here, That's the actor. This is the same thing we're doing, So I've got to ask you the hard question, but now really the way that we're doing this I love that needle in the haystack analogy, the day to day mundane tasks, if you will, Hold on, back up a second. So it's AI components. to be able to identify threats and malware, So it's an enabling opportunity for the customers. So the virtual analyst is able to, sit on premises. The other one is to be proactive on being more offensive. It's the same thing that we're seeing that the more you can see, So the customer doesn't have to always do this So that's why silos is problematic. and make it slower to respond. focused on right now in terms of the state of the art. So the things that keep people up at night. I got to ask you to kind of like, the spectrum of IT. Again, the things that matter to these businesses, This is going even down to the basics with consumers, All right, so I got to ask you a final question. So depending on the nature of the threats, that's the foundational bedrock of security. is the AI solution model. So the factor of time is a huge variable So that's the incident response problem. but it kind of focuses your energy on, I refer to it as a latency. I mean, one of the things I've been talking about share with the folks what you guys are up to, You talked about the human to human before. that the government can't protect us digitally. I really appreciate. I'm John Furrier, your host.

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
InterpolORGANIZATION

0.99+

DerekPERSON

0.99+

Derek MankyPERSON

0.99+

Center for Cyber SecurityORGANIZATION

0.99+

FortiGuard LabsORGANIZATION

0.99+

John FurrierPERSON

0.99+

$400QUANTITY

0.99+

95%QUANTITY

0.99+

five plus yearsQUANTITY

0.99+

FortiGuardORGANIZATION

0.99+

San FranciscoLOCATION

0.99+

FortinetORGANIZATION

0.99+

FortiGuard LabORGANIZATION

0.99+

Cyber Threat AllianceORGANIZATION

0.99+

5 millionQUANTITY

0.99+

fiveQUANTITY

0.99+

twoQUANTITY

0.99+

SiliconANGLE MediaORGANIZATION

0.99+

threeQUANTITY

0.99+

450,000 customersQUANTITY

0.98+

fortinet.comOTHER

0.98+

oneQUANTITY

0.98+

RSA Conference 2020EVENT

0.98+

MosconeLOCATION

0.98+

RSAORGANIZATION

0.98+

365QUANTITY

0.98+

Global Threat AlliancesORGANIZATION

0.98+

One levelQUANTITY

0.97+

RSAEVENT

0.97+

this weekDATE

0.97+

fourQUANTITY

0.97+

RSACORGANIZATION

0.97+

One final questionQUANTITY

0.97+

EternalBlueORGANIZATION

0.96+

over a hundred billion eventsQUANTITY

0.95+

this yearDATE

0.95+

firstQUANTITY

0.94+

30, $40 millionQUANTITY

0.94+

first generationQUANTITY

0.94+

first detectionQUANTITY

0.94+

three pageQUANTITY

0.94+

one aspectQUANTITY

0.93+

over 10 million attacksQUANTITY

0.93+

over a hundred billion potential threat events a dayQUANTITY

0.92+

RussiansPERSON

0.92+

third collaborationQUANTITY

0.91+

one topicQUANTITY

0.9+

hundred million dollarQUANTITY

0.89+

Threat Landscape ReportTITLE

0.88+

one thingQUANTITY

0.87+

yearsDATE

0.86+

5 million firewallsQUANTITY

0.85+

World Economic ForumORGANIZATION

0.85+

day oneQUANTITY

0.84+

90%QUANTITY

0.81+

layer oneQUANTITY

0.78+

layer sevenQUANTITY

0.76+

earlier todayDATE

0.75+

zillion waysQUANTITY

0.74+

theCUBEORGANIZATION

0.74+

over 235QUANTITY

0.72+

RSA 2020TITLE

0.72+

Narrator: LiveTITLE

0.7+

secondQUANTITY

0.69+

CSIORGANIZATION

0.69+

nanosecondsQUANTITY

0.65+

PIIORGANIZATION

0.64+

key four oneQUANTITY

0.63+

BlueKeepORGANIZATION

0.63+

Security Insights Global Threat AlliancesORGANIZATION

0.62+

Tom Wilkie, Grafana Labs | KubeCon + CloudNativeCon NA 2019


 

>>Live from San Diego, California. It's the cube covering to clock in cloud native con brought to you by red hat, the cloud native computing foundation and its ecosystem. >>Welcome back to the queue bumps to men. And my cohost is John Troyer and you're watching the cube here at CubeCon, cloud-native con 2019 in beautiful and sunny San Diego today. Happy to welcome to the program a first time guest, Tom Willkie, who's vice president of product ECRO funnel labs. Thank you. Thank you so much for joining us. All right, so it's on your tee shirt. We've been hearing, uh, customers talking about it and the like, but, uh, why don't you introduce the company to our audience in a, where you fit in this broad landscape, uh, here at the CNCF show. Thank you. Yes. So Grafana is probably the most popular open source project for dashboarding and visualization. Um, started off focused on time series data on metrics, um, but really recently has branched out into log analysis and tracing and, and all, all of the kinds of aspects of your observability stack. >>Alright, so really big, uh, you know, broad topic there. Uh, we know many of the companies in that space. Uh, there's been many acquisitions, uh, you know, uh, recently in this, um, where, where do you fit in your system? I saw like databases, like a big focus, uh, when, when I, when I look at the company website, uh, bring us inside a little bit. Yeah. As a product to the offering. The customers most, um, >> most, most vendors in this space will sell you a monitoring product that includes the time series database normally includes visualization and some agent as well where pharma Lampson Griffon open source projects, very focused on the visualization aspects. So we are data source agnostic and we have back ends for more than 60 different data sources. So if you want to bring together data from let's say Datadog and combine it with some open source monitoring from, you can do that with. >>Uh, you can, you can have the dashboards and the individual panels in that dashboard combined data from multiple different data sources and we're pretty much the only game in town for that. You can, you can think of it like Tableau allows you to plug into a whole bunch of different databases for your BI with that. But for monitoring and for metrics. Well, so Tom, maybe let's, before we get into the exit products and more of the service and the, and the conference here, let's talk a little well on the front page of your website, you use the Oh 11, why word? So we've said where it's like monitoring here we use words like management, we use words like ops. Observability is a hot topic in the space and for people in a space that has some nuances. And so can you just maybe let the viewers and us know a little bit about what, how the space is looking at this and how you all feel about observability and what everybody here who's running some cloud native apps needs to actually function in production. >>Yeah. So I think, um, you can't talk about observability without either being pro or, or for, um, uh, the three pillars, right? So people talk about metrics, logs and traces. Um, I think what people miss here is that it's more about the experience for the developer, you know, Gruffalo and what we're trying to achieve is all about giving engineers and developers the tools they need to understand what their applications and their infrastructure doing, right? So we're not actually particularly picky about which pillars you use and which products you use to implement those pillars. But what we want to do is provide you with an experience that allows you to bring it all into a single, a single user interface and allows you to seamlessly move between the different sources of data and, and hopefully, uh, combine them in your analysis and in your root cause of any particular incident. >>And that for me is what observability means. It's about helping you understand the behavior of your application in particular. I mean, I'm, I'm a, I'm a software engineer by trade. I'm still on call. I still get paged at 3:00 AM occasionally. And, and having the right tools at 3:00 AM to allow me to as quickly as possible, figure out what happened and then dive into a fix. That's what we're about over funnel labs. All right. So Tom, one of the things we always need to understand and show here. There's the project and there's the company. Yep. Help us just kind of understand, you know, definitely a difference. The products, the, the, the mission of the company and how that fits with the project. So the Gruffalo project predates the company and it was started by taco. Um, he, you know, he saw a spot for like needing a much better kind of graphical editing of dashboards and making, making the kind of metrics way more accessible to your average human. >>Um, the final lab started really to focus on the it and, uh, monitoring observability use cases of profanity and, but the project itself is much broader than that. We see a lot of use cases in industrial, in IOT, even in BI as well. But Grafana labs is a company we're focused on the monitoring side of things. We're focused on the observability. So we also offer, we mean, like most companies, we have an enterprise version of. It has a few data sources for commercial vendors. So if you want to, you want to get your data dog or your Splunk into Grafana, then there's a commercial auction for that. But we also offer a hosted observability platform called Grafana clown. And this is where we take the best open source projects, the best tools that we think you need as an engineer to understand your applications and we host them for you and we operate them for you. >>We scale them, we upgrade them, we fix bugs, we sacrifice the clouds predominantly are hosted from atheists, our hosted graphite and our hosted Loki, our log aggregation system, um, all combined and brought together with uh, with the Gruffalo frontend. So yeah, like two products, a bunch of open source projects for final labs, employees, four of the promethium maintainers. And I'm one of the promethium maintainers. Um, we am employee graphite maintainers. Obviously a lot of Gryffindor maintainers, but also Loki. Um, I'm trying to think, like there's just so many open source projects. We, uh, we get involved with that. Really it's about synthesizing, uh, an observability platform out of those. And that's what we offer as a product. So you recently had an announcement that Loki is now GA. can you talk just a little bit about Loki and aggregation and logs and what Loki does? >>Yeah, I'd love to. Yeah. Um, a year ago in Seattle actually we announced the Loki project. Um, it was super early. I mean I just basically been finishing the code on the plane over and we announced it and no one I think could have predicted the response we had. Um, everyone was so keen and so hungry for alternative to traditional log aggregation systems. Um, so it's been a year and we've learned a hell of a lot. We've had so much feedback from the community. We've built a whole team internally around, around Loki. We now offer a hosted version of it and we've been running it in production now for over a year, um, doing some really great scale on it and we think it's ready for other people to do the same. One of the things we hear, especially at shows like this is I really, I really, you know, developers and the grassroots adopters come to us, say, we really love Loki. >>We really love what you're doing with it. Um, but my boss won't let me use it until it goes to be one. And so really yesterday we announced it's Don V. one, we think it's stable. We're not going to change any of the APS on you. We, uh, we would love you to use it and uh, and put it into production. All right. Uh, we'd like to hear a little bit more about the business side of things. So, um, I believe there was some news around funding, uh, uh, you know, how many people you have, how many, you know, can you parse for us, you know, how many customers have the projects versus how many customers have, uh, you know, the company's products. Well, we don't, we don't call them customers of the projects that users, yes, yes, we, uh, but I'm from a company where we have hundreds of customers. >>Um, I don't believe we make our revenue figures public and, uh, so I'm probably not going to dive into them, but I know, I know the CEO stands up at our, our yearly conference and, and discloses, you know, what our revenue the last year was. So I'll refer you to that. Um, the funding announcement, that was about a month ago. We, uh, we raised a great round from Lightspeed, um, 24 million I believe. Um, and we're gonna use that to really invest in the community, really invest in our projects and, and build a bit more of a commercial function. Um, the company is now about 110 people. I think, um, it's growing so quickly. I joined 18 months ago and we were 30 people and so we've almost quadrupled in size in, in the last year and a half. Um, so keeping up is quite a challenge. Uh, the two projects, uh, products I've already touched on a few hundred customers and I think we're, you know, we're really happy with the growth. >>We've been, uh, we've never had any institutional funding before this. The company is about five years old. So we've been growing based on organic revenue and, and, and, and, you know, barely profitable, uh, but reinvesting that into the company and, and it's, yeah, it's going really well. We're also one of the, I mean it's not that unique I guess, but we're remote first. We have a more than 50% of our employees work from home. I work from my basement in London. We have a few tiny like offices, one in Stockholm and one in New York, but, but we're really keen to hire the best people wherever they are. Um, and we invest a lot in travel. Uh, we invest a lot in, um, the, the right tools and getting the whole company together to really make that work. Actually a really fun place to work. What time? >>We're S we're still in the business here and I don't know how much time you've spent at the booth this year, but I don't, can you compare, I mean, we've been talking about the growth of this community and the growth of this conference. Can you compare say this year to last year, the, the people coming up, their maturity, the maturity of their production, et cetera. Are they, are they ready to buy? Are they still kicking? Are they still wondering what this Cooper Cooper need easy things is, you know, where, where is everybody this year and how does that, how has it changed? Yeah, and that's a good question where we're definitely seeing people with a lot more sophisticated questions. The, the, the conversations we're having at the booth are a lot longer than they've been in previous years. The um, you know, in particular people now know what key is. We only announced it a year ago and gonna have a lot of people asking us very detailed questions about what scale they can run it at. >>Um, otherwise, yeah, I think there is starting to be a bit more commercial intent at the conference, some few more buying decisions being made here. It's still predominantly a community oriented conference and I think the, the, I don't want that to go away. Like, that's one of the things that makes it attractive to me. And, and I bring my whole team here and that's one of the things that makes it attractive to them. But there is a little bit more, I'm a little more sales activity going on for sure. Any updates to the, to the tracing and monitoring observability stories of the projects here at CNCF this year since you as you're part of the promethium project? >> Yes. So we actually, we had the promethium conference in Munich two weeks ago and after each committee conference, the maintainers like to get together and kind of plan out the next six months of the project. >>So we started to talk about um, adding support for things like exemplars into Prometheus's. This is where each histogram bucket, you can associate an example trace that goes, that contributed towards that, that history and that latency. And then you can build nice user interfaces around that. So you can very quickly move from a latency graph to example traces that caused that. Um, so that's one of the things we're looking to do in Prometheus. And of course Jaeger graduated just a week ago. I think. Um, we're big users of Jaeger internally at for final amps. And actually on our booth right now, uh, we're showing a demo of how we're integrating, um, visualization of distributed tracing, integral foreigner. So you can, you know, using the same approach we do with metrics where we support multiple backends, we're going to support Yeager, we're going to support Zipkin, we're going to support as many open source tracing projects as we can with the Grafana UI experience and being able to seamlessly kind of switch between different data sources, metrics all the way to logs all the way to traces within one UI. >>And without ever having to copy and paste your query and make mistakes and kind of translate it in your head. Right. >> Tom, give us a little bit, look forward. Uh, you know, a lot of activities as the thing's going to, you know, graduating and pulling things together. So what should your users be looking for kind of over the next six to 12 months? >> That's a great question. Yeah, I think we do a yearly release cycle for foreigners. So the next one we're, we're aiming towards is for seven, like for me to find a seven's going to be all about tracing. So I really want to see the demo we're doing. I want to see that turned into like production ready code support for multiple different data sources, support for things like exemplars, which we're not showing yet. Um, I want to see all of that done in Grafana in the next year and we've also massively been flushing out the logging story. >>I'm with Loki, we've been adding support for uh, extracting metrics from the logs and I really think that's kind of where we're going to drive Loki forward in the future. And that really helps with systems that aren't really exposing metrics like legacy systems where the only kind of output you get from them is the logs. Um, beyond that. Yeah, I mean the welds are kind of oyster. I think I'm really keen to see the development of open telemetry and um, we've just starting to get involved to that project ourselves. Um, I'm really interested to kind of talk to people about what they need out of a tracing system. We, we see people asking for a hosted tracing systems. Um, but, but IMO is very much like pick the best open source ones. I don't think that's, that's emerged yet. I don't think people know which is the best one yet. >>So we're going to get involved in all of them. See which one's a C, which one's a community kind of coalesces around and maybe start offering a hosted version of that. >> You know, our final thing is, uh, you know, what advice do you have for users? Obviously, you know, you like the open source thing, but you know, they're hearing about observability everywhere there are, you know, the, the whole APM market is moving this direction. There's acquisitions as we talked about earlier. Um, there's so many moving pieces and a lot of different viewpoints out there. So just, you know, from a user, how do you know, how will things ma, what makes their lives easier and what advice would you give them? Yeah, no, definitely. I think a lot of vendors will tell you like to pick a, pick a vendor who's going to help you with this journey. >>Like I would say like, pick a vendor you trust who can help you make those decisions. Like find someone impartial who's gonna not make, not try and persuade you to buy their product. So we would, uh, you know, I would encourage you to try things out to dog food and to really like invest in experimentation. There's a lot going on in, uh, in, in the observability world and in the cloud native world. And you've got to, you've got to try it and see what fits. Like we embrace this, uh, composability of the, uh, of the observatory of, of the observability ecosystem. So like, try and find which, which choices work best for you. Like I, uh, whenever, whenever I talk to him, you still have to lick all the cupcakes in 2019. I think. I mean, I would, it depends on your level of kind of maturity, right? >>And sophistication. Like, I think if, uh, if, if this is really important to you, you should go down that approach. You should try them all. If this is not one of your core competencies that may be going with a vendor that helps you is a better approach. But, but I'm, I come from the open source world and, uh, you know, I like to see the, um, the whole ecosystem and all the different players and all the different, new and exciting ways to solve these problems. Um, so I'm, I'm always going to encourage people to have a play and try things out. All right, Tom, final word, Loki. Explain to us, uh, you know, when you're coming up with it, how you ended, uh, are you the God of mischief? Well, so the official line is the Loki is the, um, is the North mythology equivalent of Prometheus's, uh, in Greek mythology and, and lochia logging project is, is, is Prometheus's inspired logging. So we've tried to take the operational model from, from atheists, the query language from, from atheists and, and the kind of a cost efficiency from, from atheists and apply it to logs. Um, but I will admit to being a big fan of the Marvel movies. All right, Tom Willkie. Thank you so much for sharing the updates on, on the labs. Uh, we definitely look forward to hearing updates from you and thank you. All right, for, for John Troyer, I'm Stu Madmen back with more coverage here from San Diego. Thank you for watching. Thank you for watching the cube.

Published Date : Nov 21 2019

SUMMARY :

clock in cloud native con brought to you by red hat, the cloud native computing foundation but, uh, why don't you introduce the company to our audience in a, where you fit in this broad landscape, Alright, so really big, uh, you know, broad topic there. So if you want to bring together data from let's say Datadog how the space is looking at this and how you all feel about observability and what everybody here who's running So we're not actually particularly picky about which pillars you use and which products you use Um, he, you know, he saw a spot for like needing a much better kind of graphical editing the best open source projects, the best tools that we think you need as an engineer to understand your So you recently had an announcement that Loki is now GA. especially at shows like this is I really, I really, you know, developers and the grassroots adopters come to us, We, uh, we would love you to use it and uh, and put it into production. So I'll refer you to that. and, you know, barely profitable, uh, but reinvesting that into the company and, The um, you know, in particular people now know what key observability stories of the projects here at CNCF this year since you as you're part of the promethium project? each committee conference, the maintainers like to get together and kind of plan out the next six months of the project. So you can, you know, And without ever having to copy and paste your query and make mistakes and kind of translate it in your as the thing's going to, you know, graduating and pulling things together. So the next one we're, we're aiming towards is for seven, like for me to really exposing metrics like legacy systems where the only kind of output you get from them is the logs. So we're going to get involved in all of them. So just, you know, from a user, how do you know, how will things ma, what makes their lives easier and So we would, uh, you know, I would encourage you to try things out to dog food and to really like uh, you know, I like to see the, um, the whole ecosystem and all the different players and all the different,

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
John TroyerPERSON

0.99+

Tom WillkiePERSON

0.99+

StockholmLOCATION

0.99+

TomPERSON

0.99+

LondonLOCATION

0.99+

GrafanaORGANIZATION

0.99+

New YorkLOCATION

0.99+

MunichLOCATION

0.99+

San DiegoLOCATION

0.99+

3:00 AMDATE

0.99+

2019DATE

0.99+

Tom WilkiePERSON

0.99+

SeattleLOCATION

0.99+

24 millionQUANTITY

0.99+

30 peopleQUANTITY

0.99+

San Diego, CaliforniaLOCATION

0.99+

last yearDATE

0.99+

PrometheusTITLE

0.99+

two productsQUANTITY

0.99+

Stu MadmenPERSON

0.99+

a year agoDATE

0.99+

Grafana LabsORGANIZATION

0.99+

two weeks agoDATE

0.99+

sevenQUANTITY

0.99+

LightspeedORGANIZATION

0.99+

next yearDATE

0.99+

oneQUANTITY

0.99+

KubeConEVENT

0.99+

yesterdayDATE

0.99+

this yearDATE

0.99+

two projectsQUANTITY

0.98+

more than 50%QUANTITY

0.98+

CloudNativeConEVENT

0.98+

more than 60 different data sourcesQUANTITY

0.98+

a week agoDATE

0.98+

LokiORGANIZATION

0.97+

first timeQUANTITY

0.97+

LokiPERSON

0.97+

a halfQUANTITY

0.97+

12 monthsQUANTITY

0.97+

GruffaloPERSON

0.97+

Cooper CooperORGANIZATION

0.97+

over a yearQUANTITY

0.96+

each committee conferenceQUANTITY

0.96+

18 months agoDATE

0.95+

GALOCATION

0.95+

Lampson GriffonORGANIZATION

0.95+

MarvelORGANIZATION

0.94+

a yearQUANTITY

0.94+

todayDATE

0.94+

each histogramQUANTITY

0.94+

GruffaloORGANIZATION

0.93+

about 110 peopleQUANTITY

0.93+

GreekOTHER

0.92+

TableauTITLE

0.92+

sixQUANTITY

0.92+

ECROORGANIZATION

0.91+

about five years oldQUANTITY

0.9+

single user interfaceQUANTITY

0.89+

firstQUANTITY

0.88+

fourQUANTITY

0.87+

CNCFORGANIZATION

0.87+

CubeConEVENT

0.86+

hundreds of customersQUANTITY

0.85+

JaegerORGANIZATION

0.84+

one UIQUANTITY

0.84+

three pillarsQUANTITY

0.84+

Sheng Liang, Rancher Labs | KubeCon + CloudNativeCon 2019


 

>> Announcer: Live from San Diego, California, it's theCUBE covering KubeCon and CloudNativeCon. Brought to you by RedHat, the CloudNative Computing Foundation, and its ecosystem partners. >> Stu: Welcome back to theCUBE, I'm Stu Miniman. My cohost for three days of coverage is John Troyer. We're here at KubeCon CloudNativeCon in San Diego, over 12,000 in attendance and happy to welcome back a CUBE alumni and veteran of generations of the stacks that we've seen come together and change over the time, Sheng Liang, who is the co-founder and CEO of Rancher Labs. Thanks so much, great to see you. >> Shang: Thank you Stuart, is very glad to be here. >> All right, so you know Kubernetes, flash to the pan nobody's all that excited about it. I mean, we've seen all these things come and go over the years, Sheng. No but seriously, the excitement is palpable. Every year, you know, so many more people, so many more projects, so much more going on. Help set the stage for you, as to what you see and the importance today of kind of CloudNative in general and you know, this ecosystem specifically. >> Yeah you're so right though, Stuart. Community as a whole and Kubernetes has really come a long way. In the early days, Kubernetes was a uh, you know, somewhat of a technical community, lot of Linux people. But not a whole lot of end users. Not a whole lot of Enterprise customers. I walk in today and just the kind of people I've met, I've probably talked to fifty people already who are just really at the beginning of the show and uh there's a very very large number Enterprise customers. And this does feel like Kubernetes has crossed the chasm and headed in to the mainstream Enterprise market. >> Yeah it's interesting you know I've talked to you know plenty of the people here probably if you brought up things like OpenStack and CloudStack they wouldn't even know what we were talking about. The wave of containerization really seemed to spread far and wide. At Rancher you've done some surveys, give us some of the insight. What are you seeing? You've talked to plenty of customers. Give us where we are with the maturity. >> Definitely, definitely. Enterprise Kubernetes adoption is ready for prime time. You know the So what we're really seeing is some of the early challenges a few years ago a lot of people were having problems with just installing Kubernetes. They were literally just making sure to get people educated about container as a concept. Those have been overcome. Now, uh, we're really facing next generation of growth. And people solve these days solve problems like how do I get my new applications onboarding to Kubernetes. How do I really integrate Kubernetes into my multicloud and hybrid-Cloud strategy? And as Enterprise's need to perform computing in places beyond just the data centers and the cloud, we're also seeing tremendous amount of interest in running Kubernetes on the Edge. So those are some of the major findings of our survey. >> John: That's great. So Sheng I'd love for you to kind of elaborate or elaborate for us where Rancher fits into this. Right. Rancher is, you've been around, you've a mature stack of technology and also some new announcements today so I'd kind of love for you to kind of tell us how you fit in to that landscape you just described. >> Absolutely. This is very exciting and very very fast changing industry. So one of the things that Rancher is able to play very well is we're really able to take work with the community, take the latest and greatest open source technology and actually develop open source products on top this and make that technology useful and consumable for Enterprise at large. So the way we see it, to make Kubernetes work we really need to solve problems at three levels. At the lowest level, the industry need at lot of compliant and compatible certified Kubernetes distros and services. So that's table stakes now. Rancher is a leader in providing CNCF certified Kubernetes distro. We actually provide two of them. One of them is called RKE - Rancher Kubernetes Engine. Something we've been doing it for years. It's really one of the easiest to use and most widely deployed Kubernetes distributions. But we don't force our customers to only use our Kubernetes distribution. Rancher customers can use whatever CNCF certified Kubernetes distribution or Kubernetes services they want. So a lot of our customers use RKE(Rancher Kubernetes Engine) but they also use, when they go to the cloud, they use cloud hosted Kubernetes Services like GKE and EKS. There are really a lot of advantages in using those because cloud providers will help you run these Kubernetes clusters for free. And in many cases they even throw in the infrastructure it takes to run the Kubernetes masters and etcd databases for free. If you're in the cloud, there's really no reason not to be using these Kubernetes services. Now there's one area that Rancher ended up innovating at the Kubernetes distros, despite having these data center focus and cloud focus Kubernetes distros and services. And that is one of our, one of the two big announcements today. And that's called K3S. K3S is a great open source project. It's probably one of the most exciting open source projects in the Kubernetes ecosystem today. And what we did with K3S is we took Kubernetes that's been proven in data center and cloud and we brought it everywhere. So with K3S you can run Kubernetes on a Raspberry Pi. You can run Kubernetes in a surveillance camera. You can run Kubernetes in an ATM machine. You know, we have customers trying to run now Kubernetes in a uh, factory floor. So it really helps us realize our vision of Kubernetes as a new Linux and you run it everywhere. >> Well that's great 'cause you talk about that simplicity that we need and if you start talking about Edge deployment, I don't have the people, I don't have the skillset, and a lot times I don't have the gear, uh, to run that. So you know, help connect the dots as to you know, what led Rancher to do the K3S piece of it and you know, what did we take out? Or what's the differences between K8S and the K3S? >> That's a great question, you know. Even the name "K3S" is actually somewhat a wordplay on K8S You know we kind of cut half of 8 away and you're left with 3. It really happened with some of our early traction we sawing some customers. I remember, in retrospect it wasn't really that long ago. It was like middle of last year, we saw a blog coming out of Chick-fil-A and a group of technical enthusiasts were experimenting with actually running uh, Kubernetes in very, in like Intel Nook servers. You know, they were talking about potentially running three of those servers in every one of their stores and at the time they were using RKE and Rancher Kubernetes Engine to do that. And they run into a lot of issues. I mean to be honest if you think about running Kubernetes in the cloud in the database center, uh these servers have a lot of resources and you also have a dedicated operations teams. You have an SRE to manage them, right? But when you really bring it out into branch offices and Edge computing locations, now all of the sudden, number one, these uh, the software now has to take a lot less resource but also you don't really have SREs monitoring them every day anymore. And you, since these, Kubernetes distro really has to be zero touch and it has to run just like a, you know like a embedded window or Linux server. And that's what K3S was able to accomplish, we were able to really take away lot of the baggage that came with having all the drivers that were necessary to run Kubernetes in the cloud and we were also able to dramatically simplify what it takes to actually start Kubernetes and operate it. >> So unsolicited, I was doing an event right before this one and I asked some people what they looking forward to here at KubeCon. And independently, two different people said, "The thing I'm most excited about is K3S." And I think it's because it's the right slice through Kubernetes. I can run it in my lab. I can run it on my laptop. I can on a stack of Raspberry Pis or Nooks, but I could also run it in production if I, you know I can scale it up >> Stu: Yeah. >> John: And in fact they both got a twinkle in their eye and said well what if this is the future of Kubernetes, like you could take this and you could run it, you know? They were very excited about it. >> Absolutely! I mean, you know, I really think, you know, as a company we survive by, and thrive by delivering the kind of innovation that pushes the market forward right? I mean, we, otherwise people are not going to look at Rancher and say you guys are the originators of Kubernetes technology. So we're very happy to be able to come up with technologies like K3S that effectively greatly broadened the addressable market for everyone. Imagine you were a security vendor and before like all you really got to do is solving security problems. Or if you were a monitoring vendor you were able to solve monitoring problems for a data center and in the cloud. Now with K3S you end up getting to solve the same problems on the Edge and in branch offices. So that's why so many people are so excited about it. >> All right so Sheng you said K3S is one of the announcements this week, what's the rest of the news? >> Yeah so K3S, RKE, and all the GKE, AKS, EKS, they're really the fundamental layer of Kubernetes everywhere. Then on top of that one of the biggest piece of innovation that Rancher labs created is the idea of multi-cluster management. A few years ago it was pretty much of a revolutionary concept. Now it's widely understood. Of course an organization is not going to have just one cluster, they're going to have many clusters. So Rancher is the industry leader for doing multi-cluster management. And these clusters could span clouds, could span data centers, now all the way out to branch offices and the Edge. So we're exhibiting Rancher on the show floor. Everyone, most people I've met here, they know Rancher because of that flash of product. Now our second announcement though is yet another level above Rancher, so what we've seen is in order to really Kubernetes to achieve the next level of adoption in the Enterprise we're seeing you know some of the development teams and especially the less skilled dev ops teams, they're kind of struggling with the learning curve of Kubernetes and also some of the associated technologies around service mesh around Knative, around, you know, CICD, so we created a project called Rio, as in Rio de Janeiro the city. And the nice thing about Rio is it packaged together all these Cloud Native technologies and then we created very easy to use, very simple to understand user experience for developers and dev ops teams. So they no longer have to start with the training course on Kubernetes, on Istio, on Knative, on Tekton, just to get productive. They can pretty much get productive on day one. So that Rio project has hit a very important milestone today, we shipped the beta release for it and we're exhibiting it at the booth as well. >> Well that's great. You know, the beta release of Rio, pulling together a lot of these projects. Can you talk about some folks that, early adopters that have been using them or some folks that have been working with the project? >> Sheng: Yeah absolutely. So I talk about some of the early adoption we're seeing for both K3S and Rio. Uh, what we see the, first of all just the market reception of K3S, as you said, has been tremendous. Couple of even mentioned to you guys today in your earlier interviews. And it is primarily coming from customers who want to run Kubernetes in places you probably haven't quite anticipated before, so I kind of give you two examples. One is actually appliance manufacture. So if you think they used to ship appliances, then you can imagine these appliances come with Linux and they would image their appliance with an OS image with their applications. But what's happening is these applications are becoming so sophisticated they're now talking about running the entire data analytics stack and AI software. So it actually takes Kubernetes not necessarily, because it's one server in a situation of appliance. Kubernetes is not really managing a cluster, but it's managing all the application components and microservices. So they ended up bundling up K3S into their appliance. This is one example. Another example is actually an ISV, that's a very interesting use case as well. So uh, they ship a micro service based application software stack and again their software involves a lot of different complicated components. And they decided to replatform their software on Kubernetes. We've all heard a lot of that! But in their case they have to also ship, they don't just run the software themselves, they have to ship the software to the end users. And most of their end users are not familiar with Kubernetes yet, right? And they don't really want to say, to install our software you go provision the Kubernetes cluster and then you operate it from now on. So what they did is they took K3S and bundled into their application as if it were an application server, almost like a modern day WebLogic and WebSphere, then they shipped the whole thing to their customers. So I thought both of these use cases are really interesting. It really elevates the reach of Kubernetes from just being almost like a cloud platform in the old days to now being an application server. And then I'll also quickly talk about Rio. A lot of interest inside Rio is around really dev ops teams who've had, I mean, we did a survey early on and we found out that a lot of our customers they deploy Kubernetes in services. But they end up building a custom experience on top of their Kubernetes deployment, just so that most of their internal users wouldn't have to take a course on Kubernetes to start using it. So they can just tell that this thing that, this is where my source code is and then every thing from that point on will be automated. So now with Rio they wouldn't have to do that anymore. Effectively Rio is the direct source to URL type of, one step process. And they are able to adopt Rio for that purpose. >> So Sheng, I want to go back to when we started this conversation. You said, you know, the ecosystem growing. That not only, you know, so many vendors here, 129 end users, members of the CNCF. The theme we've been talking about is to really, you know, it's ready for production and people are all embracing it. But to get the vast majority of people, simplicity really needs to come front and center, I think. K3S really punctuates that. What else do we need to do as an ecosystem, you know, Rancher is looking to take a leadership position and help drive this, but what else do you want to see from your peers, the community, overall to help drive this to the promise that it could deliver. >> We really see the adoption of Kubernetes is probably going to wing at three, I mean. We see most organizations go through this three step journey. The first step is you got to install and operate Kubernetes. You know, day one, day two. And I think we've got it down. With K3S it becomes so easy. With GKE it becomes one API call or one simple UI interaction. And CNCS has really stepped up and created a great, you know, compliance certification program, right? So we're not seeing the kind of fragmentation that we saw with some of the other technologies. This is fantastic. Then the second step we see is, which a lot of our customers are going through now, is now you have all the Kubernetes clusters coming from different clouds, different infrastructure, potentially on the Edge. You have a management problem. Now you all of the sudden because we made Kubernetes clusters so easy to obtain you can potentially have a sprawl. If you are not careful you might leave them misconfigured. That could expose a security issue. So really it takes Rancher, it takes our ecosystem partners, like Twistlock, like Aqua. CICD partners, like CloudBees, GitLab. Just everyone really needs to come together, make that, solve that management problem. So not only, uh, you build this Kubernetes infrastructure but then you actually going to get a lot of users and they can use the cluster securely and reliably. Then I think the third step, which I think a lot of work still remain is we really want to focus on growing the footprint of workload, of enterprise workload, in the enterprise. So there the work is honestly just getting started. Anywhere from uh, if you walk into any enterprise you know what percentage of their total workload is running on Kubernetes today? I mean outside of Google and Uber, that percentage is probably very small, right? They're probably in the minority, maybe even in single digit percentage. So, we really need to do a lot of work. You know, we need to uh, Rancher created this project called LongHorn and we also work with a lot of our ecosystem partners in persistence storage area like Portworx, StorageOS, OpenEBS. Lot of us really need to come together and solve this problem of running persistent workload. I mean there was also a lot of talk about it at the keynote this morning, I was very encouraged to hear that. That could easily double, triple the amount of workload that could bring, that could be onboarded into Kubernetes and even experiences like Rio, you know? Make it further simpler, more accessible. That is really in the DNA of Rancher. Rancher wouldn't be surviving and thriving without our insight into how to make our technology consumable and widely adopted. So a lot of work we're doing is really to drive the adoption of Kubernetes in the enterprise beyond, you know, the current state and into something I really don't see in the future, Kubernetes wouldn't be as actually widely used as say AWS or vSphere. That would be my bar for success. Hopefully in a few years we can be talking about that. >> All right, that is a high bar Sheng. We look forward to more conversations with you going forward. Congratulations on the announcement. Great buzz on K3S, and yeah, thanks so much for joining us. >> Thank you very much. >> For John Troyer, I'm Stu Miniman, back with lots more coverage here from KubeCon CloudNativeCon 2019 in San Diego, you're watching theCUBE. [Upbeat music]

Published Date : Nov 19 2019

SUMMARY :

Brought to you by RedHat, Thanks so much, great to see you. and you know, this ecosystem specifically. In the early days, Kubernetes was a uh, you know, plenty of the people here probably if you brought up in running Kubernetes on the Edge. to that landscape you just described. So one of the things that Rancher is able to play very well So you know, help connect the dots as to you know, I mean to be honest if you think about running Kubernetes you know I can scale it up like you could take this and you could run it, you know? and before like all you really got to do So they no longer have to start with the training course You know, the beta release of Rio, just the market reception of K3S, as you said, What else do we need to do as an ecosystem, you know, and created a great, you know, with you going forward. back with lots more coverage here from

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
JohnPERSON

0.99+

John TroyerPERSON

0.99+

Stu MinimanPERSON

0.99+

StuartPERSON

0.99+

GoogleORGANIZATION

0.99+

UberORGANIZATION

0.99+

CloudNative Computing FoundationORGANIZATION

0.99+

Rio de JaneiroLOCATION

0.99+

ShangPERSON

0.99+

Rancher LabsORGANIZATION

0.99+

Sheng LiangPERSON

0.99+

129 end usersQUANTITY

0.99+

fifty peopleQUANTITY

0.99+

San Diego, CaliforniaLOCATION

0.99+

RancherORGANIZATION

0.99+

San DiegoLOCATION

0.99+

second stepQUANTITY

0.99+

ShengPERSON

0.99+

bothQUANTITY

0.99+

third stepQUANTITY

0.99+

oneQUANTITY

0.99+

two examplesQUANTITY

0.99+

StuPERSON

0.99+

KubeConEVENT

0.99+

second announcementQUANTITY

0.99+

RedHatORGANIZATION

0.99+

GitLabORGANIZATION

0.99+

KubernetesTITLE

0.99+

CUBEORGANIZATION

0.99+

CNCFORGANIZATION

0.99+

AWSORGANIZATION

0.98+

first stepQUANTITY

0.98+

IntelORGANIZATION

0.98+

three daysQUANTITY

0.98+

todayDATE

0.98+

CloudBeesORGANIZATION

0.98+

threeQUANTITY

0.98+

one serverQUANTITY

0.98+

OneQUANTITY

0.98+

one clusterQUANTITY

0.98+

two different peopleQUANTITY

0.98+

RioORGANIZATION

0.98+

two big announcementsQUANTITY

0.97+

this weekDATE

0.97+

K3STITLE

0.97+

CloudNativeConEVENT

0.97+

one exampleQUANTITY

0.97+

LinuxTITLE

0.96+

WebLogicTITLE

0.96+

WebSphereTITLE

0.96+

over 12,000QUANTITY

0.96+

GKEORGANIZATION

0.96+

K8SCOMMERCIAL_ITEM

0.96+

Jim Walker, Cockroach Labs | ESCAPE/19


 

>> Announcer: From New York, it's theCube. Covering Escape/19. (techno music) >> Yeah, welcome back to theCube's coverage here in New York City for the first ever inaugural multicloud conference called Escape 2019, escape, we're in New York, we're not escaping from New York, we're escaping from the cloud. Jim Walker, Vice President of Product Marketing at Cockroach Labs, the custodian/founders of Cockroach Database. Welcome back, good to see you. >> Congratulations on your new role, new gig. Been there for a while? >> Yeah it's been a while since I've seen you, John, I've jumped out of the data space and into Kubernetes, and so, yeah, I landed at Cockroach Labs about a year ago. And having fun. >> It's interesting, the game is still the same, data is still the same as a value proposition, but software. >> Yeah. >> Data is now code, data is looking, interacting with software, data control planes, data layers, data lakes. All this is an evolution of stuff we were talking about back in the open source days at Hortonworks. The data is in motion, data in flight, data at rest, data is continuing to be critical in automation, security, every single app. >> Yeah, it's at the center of the big battle right now, right, there's this like... I just sense there's a larger battle going on for the platform right now, and the platform is being battled out by these large public cloud providers, and it's who can get compute, who can get actually, you know, people, residents in their cloud. Data has always been the centerpiece of that. Data is gravity, if it was on, before it was on-premise, so the battle was in-house at all these people and now it's like how do we get this stuff to move over. >> Yeah, we were talking before you came on camera, it helps we talk online a lot, and have a lot of connected friends in the cloud native space, but now that Cloud 2.0 has arrived, where it's enterprise hybrid, people are starting to get excited about that, you're seeing the re-platformization or refactoring or whatever word you want to use, a modern enterprise architecture, that has the best of cloud native, has the best of what the enterprise used to do with comput-- like mini-computers, whatnot, now packaged up an operating model. This modernization trend is hitting everything, note, developers, security, this is kind of where you're playing right now. Look what Google's done with Spanner database and where that's all come from in these kinds of large-scale data problems. Modernization's here, what's your take on this? >> Yeah, I know this is modernization, but it's stuff we've been doing for a long time. It's like, you know, I was talking to Steve Mulaney earlier, Steve's brilliant, right, and Steve's talking about 1992 we saw this transition to kind of client server. I've never seen anything like this trans... This transition and this modernization is much bigger than any of the other trends that we've been through. Back when we were talking before it was the Hadoop game, and we were talking modern data architecture, how do we actually transform the way we thought about data from these kind of single stovepipes of data into larger data lakes and this sort of thing. That was the beginning. What we're seeing this time though is a massive transformation up and down the stack of which data is one huge, massive piece of that. And as we know, man, data has gravity and it's at the center of this battle again. >> What's your definition of multicloud? We're at the first ever multicloud conference, what is multicloud? >> You know I get asked this a fair amount, so as I was looking for speakers it was like, "Well, what do you mean, a multicloud conference, what does that even mean?" There's a lot of people, multicloud unbelievers. I think we already live in a multicloud world. I think hybrid cloud is just multicloud. I talked to a lot of people through the CFP process for the conference. I had guys who were running edge computing platforms saying, "Talk to me about this", I'm like, "Well, if you look at it, it's just servers, they're just servers that are everywhere" and actually, how do we actually start to attach all this stuff. It's all multicloud, you know what is the cloud but a bunch of different servers that somebody else owns? You may own them, you may not. The challenge is going to be how do we tie all that together? >> Computer history has proven, if anything, heterogeneous environments, multi-vendor. You can go back and talk about, the comment about the client server, I mean, that was a real threat to the mainframe. Internetworking completely changed the game. At that time PCs were exploding in growth, and multi-vendor was a big buzzword. And that was the reality, you had to compete and service multiple vendors in an environment. >> Yeah, and-- >> Multiple cloud is just multiple vendors. >> John, it's called the multicloud conference, and you know my friend Joseph Jacks, I mean Joseph and I have a lot of conversations about things, you know, and he's brilliant in terms of how he thinks about commercial open source and how these things are, and you know I really played around with changing the name of this to the open and independent cloud conference, because that's really what this is about, it's about how do we have a conversation, in the open, about how we open up the cloud? I just thought, I was a little frustrated with some of the conferences I went to because, I think people are talking about this, but it's not lip service, it's just difficult to talk about it in a broader sense. >> Well, I'm really glad you did this because I've been calling multicloud bullshit on theCube for over a year, Stu and I have debates about this, and you know, putting-- >> I watched. >> Okay, of course, but people who know what I mean know that I believe that multicloud reality of "I have Amazon, I got Azure, I mean, hell, if you upgrade Office 365, you have Azure, so that's another cloud. So yes, people have multiple clouds in their environment, but the foundational work is being done now, you guys are doing it, and that's what I was getting at. There's no multiclouding going on, meaning sense of the seamless workload, what HashiCorp is doing, so this is the foundational, what you guys are getting at, in my mind, at least from my perspective, is a foundational conversation around what is the foundation of multicloud look like. >> And John, there is a technical equation here. I think a lot of people will argue the technical merits of what is multicloud, is it even possible to combine networking and security and all, those are really difficult problems to solve. At Cockroach Labs, to solve the database problem, to solve the data problem, to actually have, you know I could spin up a node at Cockroach on this laptop that's sitting next to you and have that participate in a database that spans multiple clouds, that's awesome. But there's a whole other side of this conversation, John, around what does it mean for my skills in my organization, what does it mean for the financial side of things, the legal, and so I think we're all dealing with a lot of these multicloud concepts, we're just not addressing them yet, and so, it's complex. >> Well, first of all, it's fun too, I mean it's complex, but innovation is complex. But here's the thing, Dave and I were joking around Cloud 2.0 and we picked that term, talking about Cloud 2.0, mainly because I remember during Web 2.0, it was just, everyone was just, "What is Web"..., and to create such a debate, so to goof on Web 2.0 we said Cloud 2.0, but what we mean is that it's changing, right? I'll give you an example, I mean to me Cloud 2.0 or multicloud is having a fully horizontal scalable infrastructure, that on-demand, elastic resource with domain specialty application development that takes advantage of data and machine learning for domain-specific context. And then having an addressable data layer on top of that. That to me is multicloud. >> And being able to service your customers no matter where they are. And unfortunately the public copywriters don't have full coverage across the whole planet so we inherently live in this multicloud world. If you wanted to pull an application today, I'm sorry but the world is your audience, there's no segmenting your app to just New York, right? And so how you actually service customers when they're coming at you from all over the planet. It's another challenge that we have. Fortunately I want to add to your Cloud Two conversation, I'm sorry the Cloud 2.0 conversation, that it is a world of hybrid and multi and multi region and single region and it's the evolution between these different kind of flavors of this situation, I feel is the emerging trend that's happening and we're-- >> Well categories are changing, network management becomes observability, configuration management becomes automation, the old database becomes a different kind of database for you, data protection is cyber protection. There's redefining moments here where white spaces are becoming larger categories. I mean, look at observability, probably going public, getting bought. >> John, look at what Google did over the past, like, 10, 12 years and look at the startups that are now out there that are kind of doing this really innovative stuff. We have LightStep here, you know Cockroach is another great example, what the Upbound team is doing, so people have been through this. From a data point of view we couldn't agree more. I can spin up an instance of RDS, Postgres and it's going to be a single instance, it's going to live in one region and that's going to service one bit of a cloud in one corner of the world. The cloud, and this massive distribution of stuff, it changed, you have to inherently start over when you're building these technologies, and that's why the CNCF has come about, right, is there's a fundamentally different approach-- >> CNCF, I love those guys and we're going to go to do CubeCon, but one of the things that I was talking with hashCode co-founder earlier today, he was talking about workflows. I was talking about workloads, and so I think the conversation is still technical and geeky but if you just abstract out all of the nerd talk and geek talk and say, "What's the workflow and what's the workload?", you go, okay, no other buzzwords should be talked. You've got to go onstage, so you've got to go. Jim Walker, Vice President of Product Marketing, Cockroach Labs, good friend of theCube, and our producer of this show, Mike Harold and the team, Escape/19, first inaugural multicloud conference. Be back with more after this short break. (techno music)

Published Date : Oct 23 2019

SUMMARY :

Announcer: From New York, it's theCube. here in New York City for the first ever your new role, new gig. I've jumped out of the data data is still the same in the open source days at Hortonworks. Yeah, it's at the has the best of what and it's at the center The challenge is going to be I mean, that was a real Multiple cloud is John, it's called the the foundational, what that's sitting next to you and have that But here's the thing, Dave and I were and it's the evolution between these management becomes automation, the old and it's going to be a single instance, and the team, Escape/19,

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
JohnPERSON

0.99+

DavePERSON

0.99+

Jim WalkerPERSON

0.99+

Mike HaroldPERSON

0.99+

StevePERSON

0.99+

JosephPERSON

0.99+

Cockroach LabsORGANIZATION

0.99+

New YorkLOCATION

0.99+

Steve MulaneyPERSON

0.99+

GoogleORGANIZATION

0.99+

Cockroach DatabaseORGANIZATION

0.99+

New York CityLOCATION

0.99+

Office 365TITLE

0.99+

AmazonORGANIZATION

0.99+

CockroachORGANIZATION

0.99+

Cloud 2.0TITLE

0.99+

10QUANTITY

0.99+

todayDATE

0.99+

1992DATE

0.99+

Joseph JacksPERSON

0.98+

one regionQUANTITY

0.98+

CNCFORGANIZATION

0.98+

HashiCorpORGANIZATION

0.98+

Escape 2019EVENT

0.98+

StuPERSON

0.97+

Cloud TwoTITLE

0.97+

12 yearsQUANTITY

0.97+

AzureTITLE

0.97+

firstQUANTITY

0.97+

oneQUANTITY

0.96+

LightStepORGANIZATION

0.95+

one cornerQUANTITY

0.95+

over a yearQUANTITY

0.94+

hashCodeORGANIZATION

0.93+

single instanceQUANTITY

0.93+

HortonworksORGANIZATION

0.89+

single regionQUANTITY

0.89+

PostgresORGANIZATION

0.88+

earlier todayDATE

0.88+

theCubeORGANIZATION

0.87+

multicloudORGANIZATION

0.87+

HadoopTITLE

0.82+

Vice PresidentPERSON

0.81+

about a year agoDATE

0.81+

single appQUANTITY

0.76+

first inauguralQUANTITY

0.71+

Web 2.0TITLE

0.7+

singleQUANTITY

0.66+

KubernetesTITLE

0.65+

19DATE

0.6+

CubeConORGANIZATION

0.57+

VicePERSON

0.54+

of peopleQUANTITY

0.53+

inauguralQUANTITY

0.53+

multicloudEVENT

0.52+

EscapeORGANIZATION

0.51+

multicloudTITLE

0.49+

19EVENT

0.49+

UpboundORGANIZATION

0.48+

EscapeTITLE

0.45+

ESCAPEEVENT

0.44+

Jim Walker, Cockroach Labs | ESCAPE/19


 

>> Announcer: From New York, it's theCube. Covering Escape/19. (techno music) >> Yeah, welcome back to theCube's coverage here in New York City for the first ever inaugural multicloud conference called Escape 2019, escape, we're in New York, we're not escaping from New York, we're escaping from the cloud. Jim Walker, Vice President of Product Marketing at Cockroach Labs, the custodian/founders of Cockroach Database. Welcome back, good to see you. >> Congratulations on your new role, new gig. Been there for a while? >> Yeah it's been a while since I've seen you, John, I've jumped out of the data space and into Kubernetes, and so, yeah, I landed at Cockroach Labs about a year ago. And having fun. >> It's interesting, the game is still the same, data is still the same as a value proposition, but software. >> Yeah. >> Data is now code, data is looking, interacting with software, data control planes, data layers, data lakes. All this is an evolution of stuff we were talking about back in the open source days at Hortonworks. The data is in motion, data in flight, data at rest, data is continuing to be critical in automation, security, every single app. >> Yeah, it's at the center of the big battle right now, right, there's this like... I just sense there's a larger battle going on for the platform right now, and the platform is being battled out by these large public cloud providers, and it's who can get compute, who can get actually, you know, people, residents in their cloud. Data has always been the centerpiece of that. Data is gravity, if it was on, before it was on-premise, so the battle was in-house at all these people and now it's like how do we get this stuff to move over. >> Yeah, we were talking before you came on camera, it helps we talk online a lot, and have a lot of connected friends in the cloud native space, but now that Cloud 2.0 has arrived, where it's enterprise hybrid, people are starting to get excited about that, you're seeing the re-platformization or refactoring or whatever word you want to use, a modern enterprise architecture, that has the best of cloud native, has the best of what the enterprise used to do with comput-- like mini-computers, whatnot, now packaged up an operating model. This modernization trend is hitting everything, note, developers, security, this is kind of where you're playing right now. Look what Google's done with Spanner database and where that's all come from in these kinds of large-scale data problems. Modernization's here, what's your take on this? >> Yeah, I know this is modernization, but it's stuff we've been doing for a long time. It's like, you know, I was talking to Steve Mulaney earlier, Steve's brilliant, right, and Steve's talking about 1992 we saw this transition to kind of client server. I've never seen anything like this trans... This transition and this modernization is much bigger than any of the other trends that we've been through. Back when we were talking before it was the Hadoop game, and we were talking modern data architecture, how do we actually transform the way we thought about data from these kind of single stovepipes of data into larger data lakes and this sort of thing. That was the beginning. What we're seeing this time though is a massive transformation up and down the stack of which data is one huge, massive piece of that. And as we know, man, data has gravity and it's at the center of this battle again. >> What's your definition of multicloud? We're at the first ever multicloud conference, what is multicloud? >> You know I get asked this a fair amount, so as I was looking for speakers it was like, "Well, what do you mean, a multicloud conference, what does that even mean?" There's a lot of people, multicloud unbelievers. I think we already live in a multicloud world. I think hybrid cloud is just multicloud. I talked to a lot of people through the CFP process for the conference. I had guys who were running edge computing platforms saying, "Talk to me about this", I'm like, "Well, if you look at it, it's just servers, they're just servers that are everywhere" and actually, how do we actually start to attach all this stuff. It's all multicloud, you know what is the cloud but a bunch of different servers that somebody else owns? You may own them, you may not. The challenge is going to be how do we tie all that together? >> Computer history has proven, if anything, heterogeneous environments, multi-vendor. You can go back and talk about, the comment about the client server, I mean, that was a real threat to the mainframe. Internetworking completely changed the game. At that time PCs were exploding in growth, and multi-vendor was a big buzzword. And that was the reality, you had to compete and service multiple vendors in an environment. >> Yeah, and-- >> Multiple cloud is just multiple vendors. >> John, it's called the multicloud conference, and you know my friend Joseph Jacks, I mean Joseph and I have a lot of conversations about things, you know, and he's brilliant in terms of how he thinks about commercial open source and how these things are, and you know I really played around with changing the name of this to the open and independent cloud conference, because that's really what this is about, it's about how do we have a conversation, in the open, about how we open up the cloud? I just thought, I was a little frustrated with some of the conferences I went to because, I think people are talking about this, but it's not lip service, it's just difficult to talk about it in a broader sense. >> Well, I'm really glad you did this because I've been calling multicloud bullshit on theCube for over a year, Stu and I have debates about this, and you know, putting-- >> I watched. >> Okay, of course, but people who know what I mean know that I believe that multicloud reality of "I have Amazon, I got Azure, I mean, hell, if you upgrade Office 365, you have Azure, so that's another cloud. So yes, people have multiple clouds in their environment, but the foundational work is being done now, you guys are doing it, and that's what I was getting at. There's no multiclouding going on, meaning sense of the seamless workload, what HashiCorp is doing, so this is the foundational, what you guys are getting at, in my mind, at least from my perspective, is a foundational conversation around what is the foundation of multicloud look like. >> And John, there is a technical equation here. I think a lot of people will argue the technical merits of what is multicloud, is it even possible to combine networking and security and all, those are really difficult problems to solve. At Cockroach Labs, to solve the database problem, to solve the data problem, to actually have, you know I could spin up a node at Cockroach on this laptop that's sitting next to you and have that participate in a database that spans multiple clouds, that's awesome. But there's a whole other side of this conversation, John, around what does it mean for my skills in my organization, what does it mean for the financial side of things, the legal, and so I think we're all dealing with a lot of these multicloud concepts, we're just not addressing them yet, and so, it's complex. >> Well, first of all, it's fun too, I mean it's complex, but innovation is complex. But here's the thing, Dave and I were joking around Cloud 2.0 and we picked that term, talking about Cloud 2.0, mainly because I remember during Web 2.0, it was just, everyone was just, "What is Web"..., and to create such a debate, so to goof on Web 2.0 we said Cloud 2.0, but what we mean is that it's changing, right? I'll give you an example, I mean to me Cloud 2.0 or multicloud is having a fully horizontal scalable infrastructure, that on-demand, elastic resource with domain specialty application development that takes advantage of data and machine learning for domain-specific context. And then having an addressable data layer on top of that. That to me is multicloud. >> And being able to service your customers no matter where they are. And unfortunately the public copywriters don't have full coverage across the whole planet so we inherently live in this multicloud world. If you wanted to pull an application today, I'm sorry but the world is your audience, there's no segmenting your app to just New York, right? And so how you actually service customers when they're coming at you from all over the planet. It's another challenge that we have. Fortunately I want to add to your Cloud Two conversation, I'm sorry the Cloud 2.0 conversation, that it is a world of hybrid and multi and multi region and single region and it's the evolution between these different kind of flavors of this situation, I feel is the emerging trend that's happening and we're-- >> Well categories are changing, network management becomes observability, configuration management becomes automation, the old database becomes a different kind of database for you, data protection is cyber protection. There's redefining moments here where white spaces are becoming larger categories. I mean, look at observability, probably going public, getting bought. >> John, look at what Google did over the past, like, 10, 12 years and look at the startups that are now out there that are kind of doing this really innovative stuff. We have LightStep here, you know Cockroach is another great example, what the Upbound team is doing, so people have been through this. From a data point of view we couldn't agree more. I can spin up an instance of RDS, Postgres and it's going to be a single instance, it's going to live in one region and that's going to service one bit of a cloud in one corner of the world. The cloud, and this massive distribution of stuff, it changed, you have to inherently start over when you're building these technologies, and that's why the CNCF has come about, right, is there's a fundamentally different approach-- >> CNCF, I love those guys and we're going to go to do CubeCon, but one of the things that I was talking with hashCode co-founder earlier today, he was talking about workflows. I was talking about workloads, and so I think the conversation is still technical and geeky but if you just abstract out all of the nerd talk and geek talk and say, "What's the workflow and what's the workload?", you go, okay, no other buzzwords should be talked. You've got to go onstage, so you've got to go. Jim Walker, Vice President of Product Marketing, Cockroach Labs, good friend of theCube, and our producer of this show, Mike Harold and the team, Escape/19, first inaugural multicloud conference. Be back with more after this short break. (techno music)

Published Date : Oct 19 2019

SUMMARY :

Announcer: From New York, it's theCube. here in New York City for the first ever Congratulations on your new role, new gig. I've jumped out of the data space and into Kubernetes, data is still the same in the open source days at Hortonworks. Yeah, it's at the center of the big battle has the best of what the enterprise used to and it's at the center of this battle again. "Well, what do you mean, a multicloud conference, And that was the reality, you had to compete in the open, about how we open up the cloud? the foundational, what you guys are getting at, that's sitting next to you and have that But here's the thing, Dave and I were and it's the evolution between these management becomes automation, the old and it's going to be a single instance, and geek talk and say, "What's the workflow

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
JohnPERSON

0.99+

DavePERSON

0.99+

Jim WalkerPERSON

0.99+

Mike HaroldPERSON

0.99+

StevePERSON

0.99+

JosephPERSON

0.99+

Cockroach LabsORGANIZATION

0.99+

New YorkLOCATION

0.99+

Steve MulaneyPERSON

0.99+

GoogleORGANIZATION

0.99+

Cockroach DatabaseORGANIZATION

0.99+

New York CityLOCATION

0.99+

Office 365TITLE

0.99+

AmazonORGANIZATION

0.99+

CockroachORGANIZATION

0.99+

Cloud 2.0TITLE

0.99+

10QUANTITY

0.99+

todayDATE

0.99+

1992DATE

0.99+

Joseph JacksPERSON

0.98+

one regionQUANTITY

0.98+

CNCFORGANIZATION

0.98+

HashiCorpORGANIZATION

0.98+

Escape 2019EVENT

0.98+

StuPERSON

0.97+

Cloud TwoTITLE

0.97+

12 yearsQUANTITY

0.97+

AzureTITLE

0.97+

firstQUANTITY

0.97+

oneQUANTITY

0.96+

LightStepORGANIZATION

0.95+

one cornerQUANTITY

0.95+

over a yearQUANTITY

0.94+

hashCodeORGANIZATION

0.93+

single instanceQUANTITY

0.93+

HortonworksORGANIZATION

0.89+

single regionQUANTITY

0.89+

PostgresORGANIZATION

0.88+

earlier todayDATE

0.88+

theCubeORGANIZATION

0.87+

multicloudORGANIZATION

0.87+

HadoopTITLE

0.82+

Vice PresidentPERSON

0.81+

about a year agoDATE

0.81+

single appQUANTITY

0.76+

first inauguralQUANTITY

0.71+

Web 2.0TITLE

0.7+

singleQUANTITY

0.66+

KubernetesTITLE

0.65+

19DATE

0.6+

CubeConORGANIZATION

0.57+

VicePERSON

0.54+

of peopleQUANTITY

0.53+

inauguralQUANTITY

0.53+

multicloudEVENT

0.52+

EscapeORGANIZATION

0.51+

multicloudTITLE

0.49+

19EVENT

0.49+

UpboundORGANIZATION

0.48+

EscapeTITLE

0.45+

ESCAPEEVENT

0.44+