Image Title

Search Results for exchange:

Brad Peterson, NASDAQ & Scott Mullins, AWS | AWS re:Invent 2022


 

(soft music) >> Welcome back to Sin City, guys and girls we're glad you're with us. You've been watching theCUBE all week, we know that. This is theCUBE's live coverage of AWS re:Invent 22, from the Venetian Expo Center where there are tens of thousands of people, and this event if you know it, covers the entire strip. There are over 55,000 people here, hundreds of thousands online. Dave, this has been a fantastic show. It is clear everyone's back. We're hearing phenomenal stories from AWS and it's ecosystem. We got a great customer story coming up next, featured on the main stage. >> Yeah, I mean, you know, post pandemic, you start to think about, okay, how are things changing? And one of the things that we heard from Adam Selipsky, was, we're going beyond digital transformation into business transformation. Okay. That can mean a lot of things to a lot of people. I have a sense of what it means. And I think this next interview really talks to business transformation beyond digital transformation, beyond the IT. >> Excellent. We've got two guests. One of them is an alumni, Scott Mullins joins us, GM, AWS Worldwide Financial Services, and Brad Peterson is here, the EVP, CIO and CTO of NASDAQ. Welcome guys. Great to have you. >> Hey guys. >> Hey guys. Thanks for having us. >> Yeah >> Brad, talk a little bit, there was an announcement with NASDAQ and AWS last year, a year ago, about how they're partnering to transform capital markets. It was a highlight of last year. Remind us what you talked about and what's gone on since then. >> Yeah, so, we are very excited. I work with Adena Friedman, she's my boss, CEO of NASDAQ, and she was on stage with Adam for his first Keynote as CEO of AWS. And we made the commitment that we were going to move our markets to the Cloud. And we've been a long time customer of AWS and everyone said, you know the last piece, the last frontier to be moved was the actual matching where all the messages, the quotes get matched together to become confirmed orders. So that was what we committed to less than a year ago. And we said we were going to move one of our options markets. In the US, we have six of them. And options markets are the most challenging, they're the most high volume and high performance. So we said, let's start with something really challenging and prove we can do it together with AWS. So we committed to that. >> And? Results so far? >> So, I can sit here and say that November 7th so we are live, we're in production and the MRX Exchange is called Mercury, so we shorten it for MRX, we like acronyms in technology. And so, we started with a phased launch of symbols, so you kind of allow yourself to make sure you have all the functionality working then you add some volume on it, and we are going to complete the conversion on Monday. So we are all good so far. And I have some results I can share, but maybe Scott, if you want to talk about why we did that together. >> Yeah. >> And what we've done together over many years. >> Right. You know, Brian, I think it's a natural extension of our relationship, right? You know, you look at the 12 year relationship that AWS and NASDAQ have had together, it's just the next step, in the way that we're going to help the industry transform itself. And so not just NASDAQ's business transformation for itself, but really a blueprint and a template for the entire capital markets industry. And so many times people will ask me, who's using Cloud well? Who's doing well in the Cloud? And NASDAQ is an easy example to point to, of somebody who's truly taking advantage of these capabilities because the Cloud isn't a place, it's a set of capabilities. And so, this is a shining example of how to use these capabilities to actually deliver real business benefit, not just to to your organization, but I think the really exciting part is the market technology piece of how you're serving other exchanges. >> So last year before re:Invent, we said, and it's obvious within the tech ecosystem, that technology companies are building on top of the Cloud. We said, the big trend that we see in the 2020s is that, you know, consumers of IT, historically, your customers are going to start taking their stacks, their software, their data, their services and sassifying, putting it on the Cloud and delivering new services to customers. So when we saw Adena on stage last year, we called it by the way, we called it Super Cloud. >> Yeah. >> Okay. Some people liked the term but I love it. And so yeah, Super Cloud. So when we saw Adena on stage, we said that's a great example. We've seen Capital One doing some similar things, we've had some conversations with US West, it's happening, right? So talk about how you actually do that. I mean, because you've got a lot, you've got a big on-premises stay, are you connecting to that? Is it all in the Cloud? Paint a picture of what the architecture looks like? >> Yeah. And there's, so you started with the business transformation, so I like that. >> Yeah. >> And the Super Cloud designation, what we are is, we own and operate exchanges in the United States and in Europe and in Canada. So we have our own markets that we're looking at modernizing. So we look at this, as a modernization of the capital market infrastructure, but we happen to be the leading technology provider for other markets around the world. So you either build your own or you source from us. And we're by far the leading provider. So a lot of our customers said, how about if you go first? It's kind of like Mikey, you know, give it to Mikey, let him try it. >> See if Mikey likes it. >> Yeah. >> Penguin off the iceberg thing. >> Yeah. And so what we did is we said, to make this easy for our customers, so you want to ask your customers, you want to figure out how you can do it so that you don't disrupt their business. So we took the Edge Compute that was announced a few years ago, Amazon Outposts, and we were one of their early customers. So we started immediately to innovate with, jointly innovate with Amazon. And we said, this looks interesting for us. So we extended the region into our Carteret data center in Northern New Jersey, which gave us all the services that we know and love from Amazon. So our technical operations team has the same tools and services but then, we're able to connect because in the markets what we're doing is we need to connect fairly. So we need to ensure that you still have that fairness element. So by bringing it into our building and extending the Edge Compute platform, the AWS Outpost into Carteret, that allowed us to also talk very succinctly with our regulators. It's a familiar territory, it's all buttoned up. And that simplified the conversion conversation with the regulators. It simplified it with our customers. And then it was up to us to then deliver time and performance >> Because you had alternatives. You could have taken a more mature kind of on-prem legacy stack, figured out how to bolt that in, you know, less cloudy. So why did you choose Outposts? I am curious. >> Well, Outposts looked like when it was announced, that it was really about extending territory, so we had our customers in mind, our global customers, and they don't always have an AWS region in country. So a lot of you think about a regulator, they're going to say, well where is this region located? So finally we saw this ability to grow the Cloud geographically. And of course we're in Sweden, so we we work with the AWS region in Stockholm, but not every country has a region yet. >> And we're working as fast as we can. - Yes, you are. >> Building in every single location around the planet. >> You're doing a good job. >> So, we saw it as an investment that Amazon had to grow the geographic footprint and we have customers in many smaller countries that don't have a region today. So maybe talk a little bit about what you guys had in mind and it's a multi-industry trend that the Edge Compute has four or five industries that you can say, this really makes a lot of sense to extend the Cloud. >> And David, you said it earlier, there's a trend of ecosystems that are coming onto the Cloud. This is our opportunity to bring the Cloud to an ecosystem, to an existing ecosystem. And if you think about NASDAQ's data center in Carteret, there's an ecosystem of NASDAQ's clients there that are there to be with NASDAQ. And so, it was actually much easier for us as we worked together over a really a four year period, thinking about this and how to make this technological transition, to actually bring the capabilities to that ecosystem, rather than trying to bring the ecosystem to AWS in one of our public regions. And so, that's been our philosophy with Outpost all along. It's actually extending our capabilities that our customers know and love into any environment that they need to be able to use that in. And so to Brad's point about servicing other markets in different countries around the world, it actually gives us that ability to do that very quickly, very nimbly and very succinctly and successfully. >> Did you guys write a working backwards document for this initiative? >> We did. >> Yeah, we actually did. So to be, this is one of the fully exercised. We have a couple of... So by the way, Scott used to work at NASDAQ and we have a number of people who have gone from NASDAQ data to AWS, and from AWS to NASDAQ. So we have adopted, that's one of the things that we think is an effective way to really clarify what you're trying to accomplish with a project. So I know you're a little bit kidding on that, but we did. >> No, I was close. Because I want to go to the like, where are we in the milestone? And take us through kind of what we can expect going forward now that we've worked backwards. >> Yep, we did. >> We did. And look, I think from a milestone perspective, as you heard Brad say, we're very excited that we've stood up MRX in production. Having worked at NASDAQ myself, when you make a change and when you stand up a market that's always a moment where you're working with your community, with your clients and you've got a market-wide call that you're working and you're wanting to make sure that everything goes smoothly. And so, when that call went smoothly and that transition went smoothly I know you were very happy, and in AWS, we were also very happy as well that we hit that milestone within the timeframe that Adena set. And that was very important I know to you. >> Yeah. >> And for us as well. >> Yeah. And our commitment, so the time base of this one was by the end of 2022. So November 7th, checked. We got that one done. >> That's awesome. >> The other one is we said, we wanted the performance to be as good or better than our current platform that we have. And we were putting a new version of our derivative or options software onto this platform. We had confidence because we already rolled it to one market in the US then we rolled it earlier this year and that was last year. And we rolled it to our nordic derivatives market. And we saw really good customer feedback. So we had confidence in our software was going to run. Now we had to marry that up with the Outpost platform and we said we really want to achieve as good or better performance and we achieved better performance, so that's noticeable by our customers. And that one was the biggest question. I think our customers understand when we set a date, we test them with them. We have our national test facility that they can test in. But really the big question was how is it going to perform? And that was, I think one of the biggest proof points that we're really proud about, jointly together. And it took both, it took both of us to really innovate and get the platform right, and we did a number of iterations. We're never done. >> Right. >> But we have a final result that says it is better. >> Well, congratulations. - Thank you. >> It sounds like you guys have done a tremendous job. What can we expect in 2023? From NASDAQ and AWS? Any little nuggets you can share? >> Well, we just came from the partner, the partner Keynote with Adam and Ruba and we had another colleague on stage, so Nick Ciubotariu, so he is actually someone who brought digital assets and cryptocurrencies onto the Venmo, PayPal platform. He joined NASDAQ about a year ago and we announced that in our marketplace, the Amazon marketplace, we are going to offer digital custody, digital assets custody solution. So that is certainly going to be something we're excited about in 2023. >> I know we got to go, but I love this story because it fits so great at the Super cloud but we've learned so much from Amazon over the years. Two pieces of teams, we talked about working backwards, customer obsession, but this is a story of NASDAQ pointing its internal capabilities externally. We're already on that journey and then, bringing that to the Cloud. Very powerful story. I wonder what's next in this, because we learn a lot and we, it's like the NFL, we copy it. I think about product market fit. You think about scientific, you know, go to market and seeing that applied to the financial services industry and obviously other industries, it's really exciting to see. So congratulations. >> No, thank you. And look, I think it's an example of Invent and Simplify, that's another Amazon principle. And this is, I think a great example of inventing on behalf of an industry and then continually working to simplify the way that the industry works with all of us. >> Last question and we've got only 30 seconds left. Brad, I'm going to direct it to you. If you had the opportunity to take over the NASDAQ sign in Times Square and say a phrase that summarizes what NASDAQ and AWS are doing together, what would it say? >> Oh, and I think I'm going to put that up on Monday. So we're going to close the market together and it's going to say, "Modernizing the capital market's infrastructure together." >> Very cool. >> Excellent. Drop the mic. Guys, this was fantastic. Thank you so much for joining us. We appreciate you joining us on the show, sharing your insights and what NASDAQ and AWS are doing. We're going to have to keep watching this. You're going to have to come back next year. >> All right. >> For our guests and for Dave Vellante, I'm Lisa Martin. You're watching theCUBE, the leader in live enterprise and emerging tech coverage. (soft music)

Published Date : Dec 1 2022

SUMMARY :

and this event if you know it, And one of the things that we heard and Brad Peterson is here, the Thanks for having us. Remind us what you talked about In the US, we have six of them. And so, we started with a And what we've done And NASDAQ is an easy example to point to, that we see in the 2020s So talk about how you actually do that. so you started with the So we have our own markets And that simplified the So why did you choose So a lot of you think about a regulator, as we can. location around the planet. and we have customers in that are there to be with NASDAQ. and we have a number of people now that we've worked backwards. and in AWS, we were so the time base of this one And we rolled it to our But we have a final result - Thank you. What can we expect in So that is certainly going to be something and seeing that applied to the that the industry works with all of us. and say a phrase that summarizes and it's going to say, We're going to have to keep watching this. the leader in live enterprise

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
Dave VellantePERSON

0.99+

DavidPERSON

0.99+

AmazonORGANIZATION

0.99+

NASDAQORGANIZATION

0.99+

Lisa MartinPERSON

0.99+

AWSORGANIZATION

0.99+

BrianPERSON

0.99+

CanadaLOCATION

0.99+

ScottPERSON

0.99+

Nick CiubotariuPERSON

0.99+

EuropeLOCATION

0.99+

Adam SelipskyPERSON

0.99+

BradPERSON

0.99+

sixQUANTITY

0.99+

SwedenLOCATION

0.99+

AWS Worldwide Financial ServicesORGANIZATION

0.99+

MikeyPERSON

0.99+

November 7thDATE

0.99+

MondayDATE

0.99+

Brad PetersonPERSON

0.99+

StockholmLOCATION

0.99+

AdamPERSON

0.99+

USLOCATION

0.99+

12 yearQUANTITY

0.99+

last yearDATE

0.99+

United StatesLOCATION

0.99+

RubaPERSON

0.99+

2023DATE

0.99+

Scott MullinsPERSON

0.99+

OneQUANTITY

0.99+

2020sDATE

0.99+

two guestsQUANTITY

0.99+

bothQUANTITY

0.99+

fourQUANTITY

0.99+

DavePERSON

0.99+

next yearDATE

0.99+

a year agoDATE

0.99+

Two piecesQUANTITY

0.99+

Northern New JerseyLOCATION

0.99+

Adena FriedmanPERSON

0.99+

five industriesQUANTITY

0.99+

Times SquareLOCATION

0.99+

hundreds of thousandsQUANTITY

0.99+

CarteretORGANIZATION

0.99+

Venetian Expo CenterLOCATION

0.99+

over 55,000 peopleQUANTITY

0.98+

Keynote Analysis with theCUBE | AWS re:Invent 2022


 

(bright music) >> Hello, everyone. Welcome back to live coverage day two or day one, day two for theCUBE, day one for the event. I'm John Furrier, host of theCUBE. It's the keynote analysis segment. Adam just finished coming off stage. I'm here with Dave Vellante and Zeus Kerravala, with principal analyst at ZK Research, Zeus, it's great to see you. Dave. Guys, the analysis is clear. AWS is going NextGen. You guys had a multi-day analyst sessions in on the pre-briefs. We heard the keynote, it's out there. Adam's getting his sea legs, so to speak, a lot of metaphors around ocean. >> Yeah. >> Space. He's got these thematic exploration as he chunked his keynote out into sections. Zeus, a lot of networking in there in terms of some of the price performance, specialized instances around compute, this end-to-end data services. Dave, you were all over this data aspect going into the keynote and obviously, we had visibility into this business transformation theme. What's your analysis? Zeus, we'll start with you. What's your take on what Amazon web service is doing this year and the keynote? What's your analysis? >> Well, I think, there was a few key themes here. The first one is I do think we're seeing better integration across the AWS portfolio. Historically, AWS makes a lot of stuff and it's not always been easy to use say, Aurora and Redshift together, although most customers buy them together. So, they announce the integration of that. It's a lot tighter now. It's almost like it could be one product, but I know they like to keep the product development separately. Also, I think, we're seeing a real legitimization of AWS in a bunch of areas where people said it wasn't possible before. Last year, Nasdaq said they're running in the cloud. The Options Exchange today announced that they're going to be moving to the cloud. Contact centers running the cloud for a lot of real time voice. And so, things that we looked at before and said those will never move to the cloud have now moved to the cloud. And I think, my third takeaway is just AWS is changing and they're now getting into areas to allow customers to do things they couldn't do before. So, if you look at what they're doing in the area of AI, a lot of their AI and ML services before were prediction. And I'm not saying you need an AI, ML to do prediction, was certainly a lot more accurate, but now they're getting into generative data. So, being able to create data where data didn't exist before and that's a whole new use case for 'em. So, AWS, I think, is actually for all the might and power they've had, it's actually stepping up and becoming a much different company now. >> Yeah, I had wrote that post. I had a one-on-one day, got used of the transcript with Adam Selipsky. He went down that route of hey, we going to change NextGen. Oh, that's my word. AWS Classic my word. The AWS Classic, the old school cloud, which a bunch of Lego blocks, and you got this new NextGen cloud with the ecosystems emerging. So, clearly, it's Amazon shifting. >> Yeah. >> But Dave, your breaking analysis teed out the keynote. You went into the whole cost recovery. We heard Adam talk about macro at the beginning of his keynote. He talked about economic impact, sustainability, big macro issues. >> Yeah. >> And then, he went into data and spent most of the time on the keynote on data. Tools, integration, governance, insights. You're all over that. You had that, almost your breaking analysis almost matched the keynote, >> Yeah. >> thematically, macro, cost savings right-sizing with the cloud. And last night, I was talking to some of the marketplace people, we think that the marketplace might be the center where people start managing their cost better. This could have an impact on the ecosystem if they're not in in the marketplace. So, again, so much is going on. >> What's your analogy? >> Yeah, there's so much to unpack, a couple things. One is we get so much insight from theCUBE community plus your sit down 101 with Adam Selipsky allowed us to gather some nuggets, and really, I think, predict pretty accurately. But the number one question I get, if I could hit the escape key a bit, is what's going to be different in the Adam Selipsky era that was different from the Jassy era. Jassy was all about the primitives. The best cloud. And Selipsky's got to double down on that. So, he's got to keep that going. Plus, he's got to do that end-to-end integration and he's got to do the deeper business integration, up the stack, if you will. And so, when you're thinking about the keynote and the spirit of keynote analysis, we definitely heard, hey, more primitives, more database features, more Graviton, the network stuff, the HPC, Graviton for HPC. So, okay, check on that. We heard some better end-to-end integration between the elimination of ETL between Aurora and Redshift. Zeus and I were sitting next to each other. Okay, it's about time. >> Yeah. >> Okay, finally we got that. So, that's good. Check. And then, they called it this thing, the Amazon data zones, which was basically extending Redshift data sharing within your organization. So, you can now do that. Now, I don't know if it works across regions. >> Well, they mentioned APIs and they have the data zone. >> Yep. And so, I don't know if it works across regions, but the interesting thing there is he specifically mentioned integration with Snowflake and Tableau. And so, that gets me to your point, at the end of the day, in order for Amazon, and this is why they win, to succeed, they've got to have this ecosystem really cranking. And that's something that is just the secret sauce of the business model. >> Yeah. And it's their integration into that ecosystem. I think, it's an interesting trend that I've seen for customers where everybody wanted best of breed, everybody wanted disaggregated, and their customers are having trouble now putting those building blocks together. And then, nobody created more building blocks than AWS. And so, I think, under Adam, what we're seeing is much more concerted effort to make it easier for customers to consume those building blocks in an easy way. And the AWS execs >> Yeah. >> I talked to yesterday all committed to that. It's easy, easy, easy. And I think that's why. (Dave laughing) Yeah, there's no question they've had a lead in cloud for a long time. But if they're going to keep that, that needs to be upfront. >> Well, you're close to this, how easy is it? >> Yeah. >> But we're going to have Adrian Cockcroft (Dave laughing) on at the end of the day today, go into one analysis. Now, that- >> Well, less difficult. >> How's that? (indistinct) (group laughing) >> There you go. >> Adrian retired from Amazon. He's a CUBE analyst retiree, but he had a good point. You can buy the bag of Lego blocks if you want primitives >> Yeah. >> or you can buy the toy that's glued together. And it works, but it breaks. And you can't really manage it, and you buy a new one. So, his metaphor was, okay, if the primitives allow you to construct a durable solutions, a lot harder relative to rolling your own, not like that, but also the simplest out-of-the box capability is what people want. They want solutions. We call Adam the solutions CEO. So, I think, you're going to start to see this purpose built specialized services allow the ecosystem to build those toys, so that the customers can have an out-of-the box experience while having the option for the AWS Classic, which is if you want durability, you want to tune it, you want to manage it, that's the way to go for the hardcore. Now, can be foundational, but I just see the solutions things being very much like an out-of-the-box. Okay, throw away, >> Yeah. >> buy a new toy. >> More and more, I'm saying less customers want to be that hardcore assembler of building blocks. And obviously, the really big companies do, but that line is moving >> Yeah. >> and more companies, I think, just want to run their business and they want those prebuilt solutions. >> We had to cut out of the keynote early. But I didn't hear a lot about... The example that they often use is Amazon Connect, the call center solution. >> Yeah. >> I didn't hear a lot to that in the keynote. Maybe it's happening right now, but look, at the end of the day, suites always win. The best of breed does well, (John laughing) takes off, generate a couple billion, Snowflake will grow, they'll get to 10 billion. But you look at Oracle, suites work. (laughs) >> Yeah. >> What I found interesting about the keynote is that he had this thematic exploration themes. First one was space that was like connect the dot, the nebula, different (mumbles) lens, >> Ocean. >> ask the right questions. (Dave laughing) >> Ocean was security which bears more, >> Yeah. >> a lot more needed to manage that oxygen going deep. Are you snorkeling? Are you scuba diving? Barely interesting amount of work. >> In Antarctica. >> Antarctica was the performance around how you handle tough conditions and you've got to get that performance. >> Dave: We're laughing, but it was good. >> But the day, the Ocean Day- >> Those are very poetic. >> I tweeted you, Dave, (Dave laughing) because I sit on theCUBE in 2011. I hate hail. (Dave laughing) It's the worst term ever. It's the day the ocean's more dynamic. It's a lot more flowing. Maybe 10 years too soon, Dave. But he announces the ocean theme and then says we have a Security Lake. So, like lake, ocean, little fun on words- >> I actually think the Security Lake is pretty meaningful, because we were listening to talk, coming over here talking about it, where I think, if you look at a lot of the existing solutions, security solutions there, I describe 'em as a collection of data ponds that you can view through one map, but they're not really connected. And the amount of data that AWS holds now, arguably more than any other company, if they're not going to provide the Security Lake, who is? >> Well, but staying >> Yeah. >> on security for a second. To me, the big difference between Azure and Amazon is the ecosystem. So, CrowdStrike, Okta, Zscaler, name it, CyberArk, Rapid7, they're all part of this ecosystem. Whereas Microsoft competes with all of those guys. >> Yes. Yeah. >> So it's a lot more white space than the Amazon ecosystem. >> Well, I want to get you guys to take on, so in your reaction, because I think, my vision of what what's happening here is that I think that whole data portion's going to be data as code. And I think, the ecosystem harvests the data play. If you look at AWS' key announcements here, Security Lake, price performance, they're going to optimize for those kinds of services. Look at security, okay, Security Lake, GuardDuty, EKS, that's a Docker. Docker has security problems. They're going inside the container and looking at threat detection inside containers with Kubernetes as the runtime. That's a little nuance point, but that's pretty significant, Dave. And they're now getting into, we're talking in the weeds on the security piece, adding that to their large scale security footprint. Security is going to be one of those things where if you're not on the inside of their security play, you're probably going to be on the outside. And of course, the price performance is going to be the killer. The networking piece surprise me. Their continuing to innovate on the network. What does that mean for Cisco? So many questions. >> We had Ajay Patel on yesterday for VMware. He's an awesome middleware guy. And I was asking about serverless and architectures. And he said, "Look, basically, serverless' great for stateless, but if you want to run state, you got to have control over the run time." But the point he made was that people used to think of running containers with straight VMs versus Fargate or Knative, if you choose, or serverless. They used to think of those as different architectures. And his point was they're all coming together. And it's now you're architecting and calling, which service you need. And that's how people are thinking about future architectures, which I think, makes a lot of sense. >> If you are running managed Kubernetes, which everyone's doing, 'cause no one's really building it in-house themselves. >> No. >> They're running it as managed service, skills gaps and a variety of other reasons. This EKS protection is very interesting. They're managing inside and outside the container, which means that gives 'em visibility on both sides, under the hood and inside the application layer. So, very nuanced point, Zeus. What's your reaction to this? And obviously, the networking piece, I'd love to get your thought. >> Well, security, obviously, it's becoming a... It's less about signatures and more of an analytics. And so, things happen inside the container and outside the container. And so, their ability to look on both sides of that allows you to happen threats in time, but then also predict threats that could happen when you spin the container up. And the difficulty with the containers is they are ephemeral. It's not like a VM where it's a persistent workload that you can do analysis on. You need to know what's going on with the container almost before it spins up. >> Yeah. >> And that's a much different task. So, I do think the amount of work they're doing with the containers gives them that entry into that and I think, it's a good offering for them. On the network side, they provide a lot of basic connectivity. I do think there's a role still for the Ciscos and the Aristas and companies like that to provide a layer of enhanced network services that connects multicloud. 'Cause AWS is never going to do that. But they've certainly, they're as legitimate network vendor as there is today. >> We had NetApp on yesterday. They were talking about latency in their- >> I'll tell you this, the analyst session, Steven Armstrong said, "You are going to hear us talk about multicloud." Yes. We're not going to necessarily lead with it. >> Without a mention. >> Yeah. >> But you said it before, never say never with Amazon. >> Yeah. >> We talk about supercloud and you're like, Dave, ultimately, the cloud guys are going to get into supercloud. They have to. >> Look, they will do multicloud. I predict that they will do multicloud. I'll tell you why. Just like in networking- >> Well, customers are asking for it. >> Well, one, they have the, not by design, but by defaulter and multiple clouds are in their environment. They got to deal with that. I think, the supercloud and sky cloud visions, there will be common services. Remember networking back in the old days when Cisco broke in as a startup. There was no real shortest path, first thinking. Policy came in after you connected all the routers together. So, right now, it's going to be best of breed, low latency, high performance. But I think, there's going to be a need in the future saying, hey, I want to run my compute on the slower lower cost compute. They already got segmentation by their announcements today. So, I think, you're going to see policy-based AI coming in where developers can look at common services across clouds and saying, I want to lock in an SLA on latency and compute services. It won't be super fast compared to say, on AWS, with the next Graviton 10 or whatever comes out. >> Yeah. >> So, I think, you're going to start to see that come in. >> Actually, I'm glad you brought Graviton up too, because the work they're doing in Silicon, actually I think, is... 'Cause I think, the one thing AWS now understands is some things are best optimized in Silicon, some at software layers, some in cloud. And they're doing work on all those layers. And Graviton to me is- >> John: Is a home run. >> Yeah. >> Well- >> Dave, they've got more instances, it's going to be... They already have Gravitons that's slower than the other versions. So, what they going to do, sunset them? >> They don't deprecate anything ever. So, (John laughing) Amazon paid $350 million. People believe that it's a number for Annapurna, which is like one of the best acquisitions in history. (group laughing) And it's given them, it's put them on an arm curve for Silicon that is blowing away Intel. Intel's finally going to get Sapphire Rapids out in January. Meanwhile, Amazon just keeps spinning out new Gravitons and Trainiums. >> Yeah. >> And so, they are on a price performance curve. And like you say, no developer ever wants to run on slower hardware, ever. >> Today, if there's a common need for multicloud, they might say, hey, I got the trade off latency and performance on common services if that's what gets me there. >> Sure. >> If there's maybe a business case to do that. >> Well, that's what they're- >> Which by the way, I want to.... Selipsky had strong quote I thought was, "If you're looking to tighten your belt, the cloud is the place >> Yeah. >> to do it." I thought >> I tweeted that. >> that was very strong. >> Yeah. >> Yeah. >> And I think, he's right. And then, the other point I want to make on that is, I think, I don't have any data on this, but I believe believe just based on some of the discussions I've had that most of Amazon's revenue is on demand. Paid by the drink. Those on demand customers are at risk, 'cause they can go somewhere else. So, they're trying to get you into optimized pricing, whether it's reserved instances or one year or three-year subscriptions. And so, they're working really hard at doing that. >> My prediction on that is that's a great point you brought up. My prediction is that the cost belt tightening is going to come in the marketplace, is going to be a major factor as companies want to get their belts tighten. How they going to do that, Dave? They're going to go in the marketplace saying, hey, I already overpaid a three-year commitment. Can I get some cohesively in there? Can I get some of this or that and the other thing? >> Yep. >> You're going to start to see the vendors and the ecosystem. If they're not in the marketplace, that's where I think, the customers will go. There are other choices to either cut their supplier base or renegotiate. I think, it's going to happen in the marketplace. Let's watch. I think, we're going to watch that grow. >> I actually think the optimization services that AWS has to help customers lower spend is a secret sauce for them that they... Customers tell me all the time, AWS comes in, they'll bring their costs down and they wind up spending more with them. >> Dave: Yeah. >> And the other cloud providers don't do that. And that has been almost a silver bullet for them to get customers to stay with them. >> Okay. And this is always the way. You drop the price of storage, you drop the price of memory, you drop the price of compute, people buy more. And in the question, long term is okay. And does AWS get commoditized? Is that where they're going? Or do they continue to thrive up the stack? John, you're always asking people about the bumper sticker. >> Hold on. (John drowns out Dave) Before we get the bumper sticker, I want to get into what we missed, what they missed on the keynote. >> Yeah, there are some blind spots. >> I think- >> That's good call. >> Let's go around the horn and think what did they miss? I'll start, I think, they missed the developer productivity angle. Supply chain software was not talked about at all. We see that at all the other conferences. I thought that could have been weaved in. >> Dave: You mean security in the supply chain? >> Just overall developer productivity has been one of the most constant themes I've seen at events. Who are building the apps? Who are the builders? What are they actually doing? Maybe Werner will bring that up on his last day, but I didn't hear Adam talk about it all, developer productivity. What's your take in this? >> Yeah, I think, on the security side, they announced security data lake. I think, the other cloud providers do a better job of providing insights on how they do security. With AWS, it's almost a black hole. And I know there's a careful line they walk between what they do, what their partners do. But I do think they could be a little clearer on how they operate, much like Azure and GCP. They announce a lot of stuff on how their operations works and things like that. >> I think, platform across cloud is definitely a blind spot for these guys. >> Yeah. >> I think, look at- >> But none of the cloud providers have embraced that, right? >> It's true. >> Yeah. >> Maybe Google a little bit >> Yeah. >> and Microsoft a little bit. Certainly, AWS hasn't at this point in time, but I think, they perceive the likes of Mongo and Snowflake and Databricks, and others as ISVs and they're not. They're platform players that are building across clouds. They're leveraging, they're building superclouds. So, I think that's an opportunity for the ecosystem. And very curious to see how Amazon plays there down the stream. So, John, what do you think is the bumper sticker? We're only in day one and a half here. What do you think so far the bumper sticker is for re:Invent 2022? >> Well, to me, the day one is about infrastructure performance with the whole what's in the data center? What's at the chip level? Today was about data, specialized services, and security. I think that was the key theme here. And then, that's going to sequence into how they're going to reorganize their ecosystem. They have a new leader, Ruba Borno, who's going to be leading the charge. They've integrated all their bespoke fragmented partner network pieces into one leadership. That's going to be really important to hear that. And then, finally, Werner for developers and event-based services, micro services. What that world's going on, because that's where the developers are. And ultimately, they build the app. So, you got infrastructure, data, specialized services, and security. Machine learning with Swami is going to be huge. And again, how do developers code it all up is going to be key. And is it the bag of Legos or the glued toy? (Dave chuckles) So, what do you want? Out-of-the-box or you want to build your own? >> And that's the bottom line is connecting those dots. All they got to be is good enough. I think, Zeus, to your point, >> Yep. >> if they're just good enough, less complicated, the will keep people on the base. >> Yeah. I think, the bumper stickers, the more you buy, the more you're saving. (John laughing) Because from an operational perspective, they are trying to bring down the complexity level. And with their optimization services and the way their credit model works, I do think they're trending down that path. >> And my bumper sticker's ecosystem, ecosystem, ecosystem. This company has 100,000 partners and that is a business model secret weapon. >> All right, there it is. The keynote announced. More analysis coming up. We're going to have the leader of (indistinct) coming up next, here on to break down their perspective, you got theCUBE's analyst perspective here. Thanks for watching. Day two, more live coverage for the next two more days, so stay with us. I'm John Furrier with Dave Vellante and Zeus Kerravala here on theCUBE. Be right back. (bright music)

Published Date : Nov 29 2022

SUMMARY :

in on the pre-briefs. going into the keynote is actually for all the The AWS Classic, the old school cloud, at the beginning of his keynote. and spent most of the time This could have an impact on the ecosystem and the spirit of keynote analysis, And then, they called it this and they have the data zone. And so, that gets me to your And the AWS execs But if they're going to keep on at the end of the day You can buy the bag of Lego blocks allow the ecosystem to build those toys, And obviously, the and more companies, I think, the call center solution. but look, at the end of about the keynote ask the right questions. a lot more needed to around how you handle tough conditions But he announces the ocean theme And the amount of data that AWS holds now, and Amazon is the ecosystem. space than the Amazon ecosystem. And of course, the price performance But the point he made If you are running managed Kubernetes, And obviously, the networking piece, And the difficulty and the Aristas and companies like that We had NetApp on yesterday. the analyst session, But you said it before, the cloud guys are going I predict that they will do on the slower lower cost compute. to start to see that come in. And Graviton to me is- that's slower than the other versions. Intel's finally going to get And like you say, got the trade off latency business case to do that. the cloud is the place to do it." on some of the discussions I've had and the other thing? I think, it's going to happen Customers tell me all the time, And the other cloud And in the question, long term is okay. I want to get into what we missed, We see that at all the other conferences. Who are building the apps? on the security side, I think, platform across is the bumper sticker? And is it the bag of Legos And that's the bottom line on the base. stickers, the more you buy, and that is a business for the next two more

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
Adrian CockcroftPERSON

0.99+

Steven ArmstrongPERSON

0.99+

AdamPERSON

0.99+

AWSORGANIZATION

0.99+

Dave VellantePERSON

0.99+

DavePERSON

0.99+

AdrianPERSON

0.99+

AmazonORGANIZATION

0.99+

Adam SelipskyPERSON

0.99+

JohnPERSON

0.99+

CiscoORGANIZATION

0.99+

Ruba BornoPERSON

0.99+

2011DATE

0.99+

John FurrierPERSON

0.99+

one yearQUANTITY

0.99+

AWS'ORGANIZATION

0.99+

ZK ResearchORGANIZATION

0.99+

three-yearQUANTITY

0.99+

AntarcticaLOCATION

0.99+

MicrosoftORGANIZATION

0.99+

Last yearDATE

0.99+

10 billionQUANTITY

0.99+

Zeus KerravalaPERSON

0.99+

JanuaryDATE

0.99+

Ajay PatelPERSON

0.99+

NasdaqORGANIZATION

0.99+

$350 millionQUANTITY

0.99+

CiscosORGANIZATION

0.99+

100,000 partnersQUANTITY

0.99+

yesterdayDATE

0.99+

GoogleORGANIZATION

0.99+

SelipskyPERSON

0.99+

Zeus KerravalaPERSON

0.99+

Options ExchangeORGANIZATION

0.99+

AristasORGANIZATION

0.99+

DatabricksORGANIZATION

0.99+

MongoORGANIZATION

0.99+

TodayDATE

0.99+

todayDATE

0.99+

Rinesh Patel, Snowflake & Jack Berkowitz, ADP | Snowflake Summit 2022


 

(upbeat music) >> Welcome back to theCUBE's continuing coverage of Snowflake Summit 22 live from Caesars Forum in Las Vegas. I'm Lisa Martin with Dave Vellante. We've got a couple of guests joining us now. We're going to be talking about financial services. Rinesh Patel joins us, the Global Head of Financial Services for Snowflake, and Jack Berkowitz, Chief Data Officer at ADP. Guys, welcome to the program. >> Thanks, thanks for having us. >> Thanks for having us. >> Talk to us about what's going on in the financial services industry as a whole. Obviously, we've seen so much change in the last couple of years. What does the data experience look like for internal folks and of course, for those end user consumers and clients? >> So, one of the big things happening inside of the financial services industry is overcoming the COVID wait, right? A lot of banks, a lot of institutions like ours had a lot of stuff on-prem. And then the move to the Cloud allows us to have that flexibility to deal with it. And out of that is also all these new capabilities. So the machine learning revolution has really hit the services industry, right? And so it's affecting how our IT teams or our data teams are building applications. Also really affecting what the end consumers get out of them. And so there's all sorts of consumerization of the experience over the past couple of years much faster than we ever expected it to happen. >> Right, we have these expectations as consumers that bleed into our business lives that I can do transactions. It's going to be on the swipe in terms of checking authenticity, fraud detection, et cetera. And of course we don't want things to go back in terms of how brands are serving us. Talk about some of the things that you guys have put in place with Snowflake in the last couple of years, particularly at ADP. >> Yeah, so one of the big things that we've done, is, one of the things that we provide is compensation data. So we issue a thing called the National Employment Report that informs the world as to what's happening in the U.S. economy in terms of workers. And then we have compensation data on top of that. So the thing that we've been able to do with Snowflake is to lower the time that it takes us to process that and get that information out into the fingertips of people. And so people can use it to see what's changed in terms of with the worker changes, how much people are making. And they can get it very, very quickly. And we're able to do that with Snowflake now. Used to take us weeks, now it's in a matter of moments we can get that updated information out to people. >> Interesting. It helps with the talent war and- >> Helps in the talent war, helps people adjust, even where they're going to put supply chain in reaction to where people are migrating. We can have all of that inside of the Snowflake system and available almost instantaneously. >> You guys announced the Financial Data Cloud last year. What was that like? 'Cause I know we had Frank on early, he clearly was driving the verticalization of Snowflake if you will, which is kind of rare for a relatively new software company but what's that been like? Give us the update on where you're at and biggest vertical, right? >> Absolutely, it's been an exciting 12 months. We're a platform, but the journey and the vision is more. We're trying to bring together a fragmented ecosystem across financial services. The aim is really to bring together key customers, key data providers, key solution providers all across the different Clouds that exist to allow them to collaborate with data in a seamless way. To solve industry problems. To solve industry problems like ESG, to solve industry problems like quantitative research. And we're seeing a massive groundswell of customers coming to Snowflake, looking at the Financial Services Data Cloud now to actually solve business problems, business critical problems. That's really driving a lot of change in terms of how they operate, in terms of how they win customers, mitigate risk and so forth. >> Jack, I think, I feel like the only industry that's sometimes more complicated than security, is data. Maybe not, security's still maybe more fragmented- >> Well really the intersection of the two is a nightmare. >> And so as you look out on this ecosystem, how do you as the chief data officer, how do you and your organization, what process do you use to decide, okay, which of the, like a chef, which of these ingredients am I going to put together for my business. >> It's a great question, right? There's been explosion of companies. We kind of look at it in two ways. One is we want to make sure that the software and the data can interoperate because we don't want to be in the business of writing bridge code. So first thing is, is having the ecosystem so that the things are tested and can work together. The other area is, and it's important to us is understanding the risk profile of that company. We process about 20% of the U.S. payroll, another 25% of the taxes. And so there's a risk to us that we have an imperative to protect. So we're looking at those companies are they financed, what's their management team. What's the sales experience like, that's important to us. And so technology and the experience of the company coming together are super important to us. >> What's your purview as a chief data officer, I mean, a lot of CDOs that I know came out of the back office and it was a compliance or data quality. You come out of industry from a technology company. So you're sort of the modern... You're like the modern CDO. >> Thanks. Thanks. >> Dave: What's your role? >> I appreciate that. >> You know what I'm saying though? >> And for a while it was like, oh yeah, compliance. >> So I actually- >> And then all of a sudden, boom, big deal. >> Yeah, I really have two jobs. So I have that job with data governance but a lot of data security. But I also have a product development unit, a massive business in monetization of data or people analytics or these compensation benchmarks or helping people get mortgages. So providing that information, so that people can get their mortgage, or their bank loans, or all this other type of transactional data. *So it's both sides of that equation is my reading inside. >> You're responsible for building data products? >> That's right. >> Directly. >> That's right. I've got a massive team that builds data products. >> Okay. That's somewhat unique in your... >> I think it's where CDOs need to be. So we build data products. We build, and we assist as a hub to allow other business units to build analytics that help them either optimize their cost or increase their sales. And then we help with all that governance and communication, we don't want to divide it up. There's a continuum to it. >> And you're a peer of the CIO and the CISO? >> Yeah, exactly. They're my peers. I actually talk to them almost every day. So I've got the CIO as a peer. >> It's a team. >> I've got the security as a peer and we get things done together. >> Talk about the alignment with business. We've been talking a lot about alignment with the data folks, the business folks, the technical folks to identify the right solutions, to be able to govern data, to monetize it, to create data products. What does that... You mentioned a couple of your cohorts, but on the business side, who are some of those key folks? >> So we're like any other big, big organization. We have lots of different business units. So we work directly with either the operational team or the heads of those business units to divine analytic missions that they'll actually execute. And at the same time, we actually have a business unit that's all around data monetization. And so I work with them every single day. And so these business units will come together. I think the big thing for us is to define value and measure that value as we go. As long as we're measuring that value as we go, then we can continue to see improvements. And so, like I said, sometimes it's bottom line, sometimes it's top line, but we're involved. Data is actually a substrate of the company. It's not a side thing to the company. >> Yeah, you are. >> ADP. >> Yeah but if they say data first but you really are data first. >> Yeah. I mean, our CEO says- >> Data's your product. >> Data's our middle name. And it literally is. >> Well, so what do you do in the Snowflake financial services data Cloud? Are you monetizing? >> Yeah. >> What's the plan? >> Yeah, so we have clients. So part of our data monetization is actually providing aggregate and anonymized information that helps other clients make business decisions. So they'll take it into their analytics. So, supply chain optimization, where should we actually put the warehouses based on the population shifts? And so we're actually using the file distribution capabilities or the information distribution, no longer files, where we use Snowflake to actually be that data cloud for those clients. So the data just pops up for our other clients. >> I think the industry's existed a lot with the physical movement of data. When you physically move data, you also physically move the data management challenges. Where do you store it? How do you map it? How do you concord it? And ultimately data sharing is taking away that friction that exists. So it's easier to be able to make informed decisions with the data at hand across two counterparties. >> Yeah, and there's a benefit to us 'cause it lowers our friction. We can have a conversation and somebody can be... Obviously the contracts have to be signed, but once they get done, somebody's up and running on it within minutes. And where it used to be, as you were saying, the movement of data and loss of control, we never actually lose control of it. We know where it is. >> Or yeah, contracts signed, now you got to go through this long process of making sure everything's cool, or a lot of times it could slow down the sale. >> That's right. >> Let's see how that's going to... Let's do a little advanced work. Now you're working without a contract. Here, you can say, "Hey, we're in the Snowflake data cloud. It's governed, you're a part of the ecosystem." >> Yeah, and the ecosystem we announced, oh gee, I think it's probably almost a year and a half ago, a relationship with ICE, Intercontinental Exchange, where they're actually taking our information and their information and creating a new data product that they in turn sell. So you get this sort of combination. >> Absolutely. The ability to form partnerships and monetize data with your partners vastly increases as a consequence. >> Talk to us about the adoption of the financial services data cloud in the last what, maybe nine months or so, since it was announced? And also in terms of the its value proposition, how does the ADP use case articulate that? >> So, very much so. So in terms of momentum, we're a global organization, as you mentioned, we are verticalized. So we have increasingly more expertise and expertise experience now within financial services that allows us to really engage and accelerate our momentum with the top banks, with the biggest asset managers by AUM, insurance companies, sovereign wealth funds on Snowflake. And obviously those data providers and solution providers that we engage with. So the momentum's really there. We're really moving very, very fast in a great market because we've got great opportunity with the capabilities that we have. I mean, ADP is just one of many use cases that we're working with and collaborations that we're taking to market. So yeah, the opportunity to monetize data and help our partners monetize the data has vastly increased within this space. >> When you think about... Oh go ahead, please. >> Yeah I was just going to say, and from our perspective, as we were getting into this, Snowflake was with us on the journey. And that's been a big deal. >> So when you think about data privacy, governance, et cetera, and public policy, it seems like you have, obviously you got things going on in Europe, and you got California, you have other states, there's increasing in complexity. You guys probably love that. (Dave laughs) More data warehouses, but where are we at with that whole? >> It's a great question. Privacy is... We hold some of the most critical information about people because that's our job to help people get paid. And we respect that as sort of our prime agenda. Part of it deals with the technology. How do you monitor, how do you see, make sure that you comply with all these regulations, but a lot of it has to do with the basic ethics of why you're doing and what you're doing. So we have a data and AI ethics board that meets and reviews our use cases. Make sure not only are we doing things properly to the regulation, but are these the types of products, are these the types of opportunities that we as a company want to stand behind on behalf of the consumers? Our company's been around 75 years. We talk about ourselves as a national asset. We have a trust relationship. We want to ensure that that trust relationship is never violated. >> Are you in a position where you can influence public policy and create more standards or framework. >> We actually are, right. We issue something every month called the National Employment Report. It actually tells you what's happening in the U.S. economy. We also issue it in some overseas countries like France. Because of that, we work a lot with various groups. And we can help shape, either data policy, we're involved in understanding although we don't necessarily want to be out in the front, but we want to learn about what's happening with federal trade commission, EOC, because at the end of the day we serve people, I always joke ADP, it's my grandfather's ADP. Well, it was actually my grandfather's ADP. (Dave laughs) He was a small businessman, and he used a ADP all those years ago. So we want to be part of that conversation because we want to continue to earn that trust every day. >> Well, plus your observation space is pretty wide. >> And you've got context and perspective on that that you can bring. >> We move somewhere between two, two and a half trillion dollars a year through our systems. And so we understand what's happening in the economy. >> What are some of the, oh sorry. >> Can your National Employment Report combined with a little Snowflake magic tell us what the hell's going to happen with this economy? >> It's really interesting you say that. Yeah, we actually can. >> Okay. (panelists laugh) >> I think when you think about the amount of data that we are working with, the types of partners that we're working with, the opportunities are infinite. They really, really are. >> So it's either a magic eight ball or it's a crystal ball, but you have it. >> We think- >> We've just uncovered that here on theCUBE. >> We think we have great partners. We have great data. We have a set of industry problems out there that we're working, collaboration with the community to be able to solve. >> What are some of the upcoming use cases Rinesh, that excite you, that are coming up in financial services- >> Great question. >> That snowflake is just going to knock out of the park. >> So look, I think there's a set of here and now problems that the industry faces, ESG's a good one. If you think about ESG, it means many different things from business ethics, to diversity, to your carbon footprint and every asset manager has to make sure they have now some form of green strategy that reflects the values of their investors. And every bank is looking to put in place sustainable lending to help their corporate customers transition. That's a big data problem. And so we're very much at the center of helping those organizations support those informed investors and help those corporates transition to a more sustainable landscape. >> Let me give you an example on Snowflake, we launched capabilities about diversity benchmarks. The first time in the industry companies can understand for their industry, their size, their location what their diversity profile looks like and their org chart profile looks like to differentiate or at least to understand are they doing the right things inside the business. The ability for banks to understand that and everything else, it's a big deal. And that was built on Snowflake. >> I think it's massive, especially in the context of the question around regulation 'cause we're seeing more and more disclosure agreements come out where regulators are making sure that there's no greenwashing taking place. So when you have really strong sources of data that are standardized, that allow that investment process to ingest that data, it does allow for a better outcome for investors. >> Real data, I mean, that diversity example they don't have to rely on a survey. >> It's not a survey. >> Anecdotes. >> It's coming right out of the transactional systems and it's updated, whenever those paychecks are run, whether it's weekly, whether it's biweekly or monthly, all that information gets updated and it's available. >> So it sounds like ADP is a facilitator of a lot of companies ESG initiatives, at least in part? >> Well, we partner with companies all the time. We have over 900,000 clients and all of them are... We've never spoken to a client who's not concerned about their people. And that's just good business. And so, yeah we're involved in that and we'll see where it goes over time now. >> I think there's tremendous opportunity if you think about the data that the ADP have in terms of diversity, in terms of gender pay gap. Huge, huge opportunity to incorporate that, as I said into the ESG principles and criteria. >> Good, 'cause that definitely is what needs to be addressed. (Lisa laughs) Guys thank you so much for joining Dave and me on the program, talking about Snowflake ADP, what you're doing together, and the massive potential that you're helping unlock with the value of data. We appreciate your insights and your time. >> Thank you for having us. >> Dave: Thanks guys. >> Thank you so much. >> For our guests, and Dave Vellante, I'm Lisa Martin. You're watching theCUBE, live in Las Vegas at Snowflake Summit 22. Dave and I will be right back with our next guest. (upbeat music)

Published Date : Jun 15 2022

SUMMARY :

the Global Head of Financial in the last couple of years. inside of the financial services industry And of course we don't is, one of the things that we It helps with the talent war and- inside of the Snowflake system You guys announced the We're a platform, but the like the only industry Well really the intersection of the two And so as you look so that the things are I mean, a lot of CDOs that I know Thanks. And for a while it was And then all of a sudden, So I have that job with data governance that builds data products. That's somewhat unique in your... And then we help with all that governance So I've got the CIO I've got the security as a peer Talk about the alignment with business. and measure that value as we go. but you really are data first. I mean, our CEO says- And it literally is. So the data just pops up So it's easier to be able Obviously the contracts have to be signed, could slow down the sale. in the Snowflake data cloud. Yeah, and the ecosystem we announced, and monetize data with your partners and help our partners monetize the data When you think about... as we were getting into this, are we at with that whole? behalf of the consumers? where you can influence public policy the day we serve people, Well, plus your observation that you can bring. happening in the economy. It's really interesting you say that. Okay. about the amount of data or it's a crystal ball, but you have it. that here on theCUBE. We think we have great partners. going to knock out of the park. that the industry faces, ESG's a good one. And that was built on Snowflake. of the question around regulation they don't have to rely on a survey. the transactional systems companies all the time. about the data that the ADP and the massive potential Dave and I will be right

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
Brian GilmorePERSON

0.99+

David BrownPERSON

0.99+

Tim YoakumPERSON

0.99+

Lisa MartinPERSON

0.99+

Dave VolantePERSON

0.99+

Dave VellantePERSON

0.99+

BrianPERSON

0.99+

DavePERSON

0.99+

Tim YokumPERSON

0.99+

StuPERSON

0.99+

Herain OberoiPERSON

0.99+

JohnPERSON

0.99+

Dave ValantePERSON

0.99+

Kamile TaoukPERSON

0.99+

John FourierPERSON

0.99+

Rinesh PatelPERSON

0.99+

Dave VellantePERSON

0.99+

Santana DasguptaPERSON

0.99+

EuropeLOCATION

0.99+

CanadaLOCATION

0.99+

BMWORGANIZATION

0.99+

CiscoORGANIZATION

0.99+

MicrosoftORGANIZATION

0.99+

ICEORGANIZATION

0.99+

AmazonORGANIZATION

0.99+

Jack BerkowitzPERSON

0.99+

AustraliaLOCATION

0.99+

NVIDIAORGANIZATION

0.99+

TelcoORGANIZATION

0.99+

VenkatPERSON

0.99+

MichaelPERSON

0.99+

CamillePERSON

0.99+

Andy JassyPERSON

0.99+

IBMORGANIZATION

0.99+

Venkat KrishnamachariPERSON

0.99+

DellORGANIZATION

0.99+

Don TapscottPERSON

0.99+

thousandsQUANTITY

0.99+

Palo AltoLOCATION

0.99+

Intercontinental ExchangeORGANIZATION

0.99+

Children's Cancer InstituteORGANIZATION

0.99+

Red HatORGANIZATION

0.99+

telcoORGANIZATION

0.99+

Sabrina YanPERSON

0.99+

TimPERSON

0.99+

SabrinaPERSON

0.99+

John FurrierPERSON

0.99+

GoogleORGANIZATION

0.99+

MontyCloudORGANIZATION

0.99+

AWSORGANIZATION

0.99+

LeoPERSON

0.99+

COVID-19OTHER

0.99+

Santa AnaLOCATION

0.99+

UKLOCATION

0.99+

TusharPERSON

0.99+

Las VegasLOCATION

0.99+

ValentePERSON

0.99+

JL ValentePERSON

0.99+

1,000QUANTITY

0.99+

Tom Miller & Ankur Jain, Merkle | AWS re:Invent 2021


 

(gentle music) >> Okay. We're back at AWS re:Invent. You're watching theCUBE's continuous coverage. This is day four. Think it's the first time, at re:Invent, we've done four days. This is our ninth year covering re:Invent. Tom Miller is here. He's the senior vice president of alliances. And he's joined by Ankur Jain, who's the global cloud practice lead at Merkle. Guys, good to see you. Thanks for coming on. >> Good to see you. Thank you. >> Thank you. >> Tom, tell us about Merkel, for those who might not be familiar with you. >> Yeah. So, Merkle is a customer experience management company that is under the dentsu umbrella. Dentsu is a global media agency. We represent one of the pillars, which is customer experience management. And they also have media and creative. And what Merkle does is provide that technology to help bring that creative and media together. >> So you're a tech company? >> Yes. >> Right? Okay. So there's some big tailwinds, changes, trends going on in the market. Obviously, the pandemic, the forced march to digital, there's regulation. What are some of the big waves that you guys are seeing, that you're trying to ride? >> So what we're seeing is, as a start, we've got a lot of existing databases with clients that are on-prem, that we manage today, within a SQL environment or so forth. And they need to move that to a cloud environment. To be more flexible, more agile, provide them with more data, be able to follow that customer experience that they want with their clients, that they're all realizing they need, to be in a digital environment. And so, that's a big push for us working with AWS and helping move our clients into that cloud environment. >> And you're relatively you new to the AWS world, right? Maybe you can talk about that, Ankur. >> Well, actually, as a partner, we may be new. But Merkle has been working with AWS for over five years. >> Dave Vellante: As a customer? >> As a customer. >> Yeah. >> So what we did was, last year, we formalized the relationship with AWS to be an advanced partner now. So we are part of the re:Stack program, basically, which is a pool of very select partners. And Merkel comes in with the specialization of marketing. So, as Tom said, you know, we are part of a dentsu umbrella. Our core focus is on customer experience transformation. And how we do that customer experience transformation is through digital transformation, data transformation. And that's where we see AWS being a very good partner to us, to modernize the solutions that Merkle can take to the market. >> So, I mean, your on-prem databases, there's probably a lot of diversity on-prem. (laughs) A lot of tech... When the cloud, you know, more agility, infinite resources. Do you have a tech stack? Are you more of an integrator? Right tool for the right job? Maybe you could describe your technical philosophy. >> Yeah, I could take that. What Tom just described... So let me give you some perspective on what these databases are. These databases are, essentially, Merkle helping big brands, Fortune 100, Fortune 500 brands to modernize their marketing ecosystem. Especially, MarTech ecosystem. So these databases, they house customer touchpoints, customer data from disparate sources. And they, basically, integrate that data in one central place. And then bolt-on analytics, data science, artificial intelligence, machine learning, on top of it. Helping them with those email campaigns or direct mail campaigns, social campaigns. So that's what these databases are all about. And these databases, currently, sit on-prem, on Merkle's own data center. And we have a huge opportunity to kind of take those databases and modernize them. Give all these AI, ML type of capabilities, advanced analytic capabilities, to our customers by using AWS as the platform to kind of migrate that. >> Dave Vellante: And you do that as a service? >> We do that as a service. >> Yes. >> Yes. >> Strategically, >> Yes. >> you're sort of transforming your business- >> Yes. >> to help your customers transform their business. >> Right. >> Right? Take away, it's classic. I mean, it's happening. This theme of, you know, AWS started with taking away the undifferentiated heavy lifting for infrastructure. Now you're seeing Nasdaq, Goldman Sachs, you guys in the media world, essentially building your own clouds, right? That's the strategy. >> Yes. >> Yes. >> Right? >> Absolutely. >> Superclouds, we call 'em. >> Superclouds, yeah. (Dave laughs) It's about helping our clients understand what is it they're trying to accomplish. And, for the most part, they're trying to understand the customer journey, where that customer is, how they're driving that experience with them, and understanding that experience through the journey. And doing that in the cloud makes it tremendously easier and more economical for 'em. >> Yeah, I was listening to the Snowflake earnings call from last night. And they were talking about, you know, a couple of big verticals, one being media. And all they keep talking about was direct-to-consumer, right? You're hearing that a lot. >> Ankur Jain: Yes. >> Media companies want to interact and build community directly. They don't want to necessarily, I mean, you don't want to go through a third-party anymore, if you don't have to. Technology's enabling that, right? Is that, kind of, the play here? >> Yes. Direct-to-consumer is a huge play. Companies which were traditionally brick-and-mortar-based, or relied on a supply chain of dealers and distributors, are now, basically, transforming themselves to be direct-to-consumer. They want to sell directly to the consumer. Personalization becomes a big theme, especially in D2C type of environment. Because, now, those customers are expecting brands to know what's their like, what's their dislike, which products, which services are they interested in. So that's all kind of advanced analytics, machine learning powered solutions. These are big data problems, that all these brands are kind of trying to solve. That's where Merkle is partnering with AWS, to bring all those technologies, and build those next generation solutions for our customers. >> So what kind of initiatives are you working on with AWS? >> So, there are, like, three, four areas that we are working very closely with AWS. Number one, I would say, think about our marketer's friend. You know, and they have a transformation like direct-to-consumer, omnichannel, e-commerce, these type of capabilities in mind. But they don't know where to start. What tools, what technologies will be part of that ecosystem. So that's where Merkle provides consulting services. To give them a roadmap, give them recommendations on how to structure these big, large strategic initiatives. That's number one, we are doing in partnership with AWS. To reach out to our joint customers and help them transform those ecosystems. Number two, as Tom mentioned, migrations. You know, helping chief data officers, chief technology officers, chief marketing officers modernize their environment, by migrating them to cloud. Number three, Merkle has a solution called Merkury, which is essentially all about customer identity. How do we identify a customer across multiple channels? We are modernizing all that solution, making that available on AWS Marketplace for customers to, actually, easily use that solution. And number four, I would say is, helping them set up data foundation. That's through intelligent marketing data lake. You know, leveraging AWS technologies like Glue, Redshift, and actually modernize their data platforms. And number four is more around clean rooms. Which is, bring on your first-party data, join it with Amazon data, to see how those customers are behaving when they are making a purchase on Amazon.com. Which gives insight to these brands, to reshape their marketing strategy to those customers. So those are, like, four, five focus areas. >> No, it's good. So, I was going to ask you about the data and the data strategy. Like, who owns the data? You're kind of alchemists, that... Your clients have first-party data. >> Ankur Jain: Yes. >> And then you might recommend bringing in other data sources. >> Yes. >> And then you're sort of creating this new cocktail. Who owns the data? >> Well, ultimately, client owns the data, because that's their customer's data. To your point on, we help them enrich that data by bringing in third-party data, which is what we call as... So Merkle has a service called DataSource, which is essentially a collection of data that we acquire about customers. Their likes, their dislikes, their buying power, their interests. So we monetize all that data. And the idea is, to take those data assets and make them available on AWS Data Exchange. So that it becomes very easy for brands to use their first-party data, take this third-party data from Merkle, and then, segment their customers much more intelligently. >> And the CMO is your sort of ideal customer profile? >> Yeah. CMO is our main customer profile. And we'll work with the chief data officer, or we'll work with the chief technology officer. We bridge both sides. We can go technology and marketing, and bring them both together. So you have a CMO who's trying to solve for some type of issue. And you have a chief technology officer who wants to improve their infrastructure. And we know how to bring them together into a conversation and help both parties get what they want. >> And I suppose the chief digital officer fits in there too? >> Tom Miller: Yeah, he fits in there too. >> CGO, chief dig. officer, CMO. Sometimes, they're one in the same. Other times, they're mixed. >> Yep. Yep. >> I've seen CIOs and CDOs together. >> Yes. >> Sure. >> It's all data. >> It's all data. (Dave laughs) >> Yeah. Some of the roles that come into play, as Tom mentioned, and you mentioned, CIO, CTO, chief information officer, chief technology officer, chief data officer, more from the IT side. And then we have the CMOs, chief digital officers, from the marketing side. So the secret sauce that Merkle brings to the table is that we know the language, what IT speaks and what business speaks. So when we talked about the business initiatives, like direct-to-consumer, omnichannel, e-commerce, those are more business-driven initiatives. That's where Merkle comes in, to kind of help them with our expertise over the last 30 years, on how to run these strategic initiatives. And then, at the same time, how do we translate those strategic initiatives into IT transformation? Because it does require a lot of IT transformation to happen underneath. That's where AWS also helps us. So we kind of span across both sides of the horizon. >> So you've got data, you've got tools, you've got software, you've got expertise, that now, you're making that available as a service. Is that right? >> That's right. Yes. >> Yes. >> How far are you into that journey, of saasfying your business? >> Well, the cloud journey started almost, I would say, five to seven years ago at Merkle. >> Yeah. Where you began leveraging the cloud? >> That's right. >> Dave Vellante: And then the light bulb went off and- >> So cloud, again, we use cloud in multiple aspects. From general computing perspective, leveraging, you know, fully managed services that AWS offers. So that's one aspect, which is to bring in data from disparate sources, house it, analyze it, and derive intelligence. The second piece, on the cloud side, is SaaS offering, Software as a Service offerings, like Adobe, Salesforce, and other CDP platforms. So Merkle covers a huge spectrum, when it comes to cloud. >> And you got a combination, you have a consulting business, and also- >> So Merkle has multiple service lines. Consulting business is one of them. Where we can help them on how to approach these transformational initiatives, and give them blueprints and roadmaps and strategy. Then we can also help them understand what the customer strategy should be, so that they can market very intelligently to their end customers. Then we have a technology business, which is all about leveraging cloud and advanced analytics. Then we have a data business, the data assets that I was talking about, that we monetize. We have promotions and loyalty, we have media. So we cover multiple services. >> Dave Vellante: Quite a portfolio. >> Yes. >> You mentioned analytics a couple of times, how do you tie that back to the sales function? I would imagine your clients are increasingly asking for analytics, so they can manage their dashboards and make sure they're above the line. How is that evolving? >> Yeah. So that's a very important line. Because, you know, data is data, right? You bring in the data, but what you do with the data, how you ask questions and how you derive intelligence from it, because that's the actionable part. So, few areas. I'll give you one or two examples on how those analytics kind of come into picture. Let's imagine a brand which is trying to sell a particular product or a particular service to a set of customers. Now, who those set of customers are, you know, where they should target this, who their target customers are, what their demographics are, that's all done through analytics. And what I gave you is a very simple example. There are so many advanced examples, you know, that come into artificial intelligence, machine learning, those type of aspects as well. So analytics definitely play a huge role on how these brands need to sell, and personalize the offerings that they want to offer to the customers. >> Used to be, really, pure art, right? It's really becoming- >> Not any more, it's all data driven companies. (Tom laughs) >> It's "Moneyball." >> Yes. Exactly. (Dave laughs) >> Tom Miller: Exactly. >> There's, maybe, still a little bit of art in there, right? It doesn't hurt to have a little creative flair, still. >> Yes. >> But you got to go with the data. >> And that's where the expertise comes in, right? That's where the experience comes in. And how you take that science and combine it with the art, to present it to a end customer, that's exactly, you know, it's a combination. >> And we also take the time to educate our clients on how we're doing it. So it's not done in a black box, so they can learn and grow themselves. Where they may end up developing their own group to handle it, as opposed to outsourcing with Merkle. >> You got to teach 'em how to fish. Last question. Where do you see this in two to three years? Where do you want to take? >> I think future is cloud, AWS being the market leader. I think AWS has a huge role to play. We are very excited to be partners with AWS, I think it's a match made in heaven. AWS sales in, majority of the sales happen in IT. Our focus is marketing. I think if we can bring both the worlds together, I think that will be a very powerful story for us to tell. >> Yeah, that's good news for AWS. If a little of your DNA could rub off on them, it'd be good. >> Tom Miller: Yeah. >> Guys, thanks so much for coming to theCUBE. >> Thanks, Dave. >> It was great to see you. >> Thank you, Dave. >> Appreciate it. >> All right. Thank you for watching everybody. This is Dave Vellante, for theCUBE. Day four, AWS re:Invent. We're theCUBE, the global leader in high-tech coverage. Be right back. (gentle music)

Published Date : Dec 7 2021

SUMMARY :

Guys, good to see you. Good to see you. be familiar with you. to help bring that creative the forced march to digital, And they need to move that new to the AWS world, right? partner, we may be new. that Merkle can take to the market. When the cloud, you know, more So let me give you some perspective to help your customers This theme of, you know, And doing that in the cloud And they were talking about, you know, if you don't have to. are expecting brands to know on how to structure these big, and the data strategy. And then you might And then you're sort of And the idea is, to take those data assets And you have a chief technology officer CGO, chief dig. Yep. It's all data. And then we have the CMOs, So you've got data, you've got tools, Yes. five to seven years ago Where you began leveraging the cloud? So cloud, again, we use So we cover multiple services. to the sales function? And what I gave you is data driven companies. (Dave laughs) It doesn't hurt to have a But you got to go And how you take that science to outsourcing with Merkle. You got to teach 'em how to fish. I think AWS has a huge role to play. If a little of your DNA could for coming to theCUBE. Thank you

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
TomPERSON

0.99+

AWSORGANIZATION

0.99+

Dave VellantePERSON

0.99+

Tom MillerPERSON

0.99+

DavePERSON

0.99+

Ankur JainPERSON

0.99+

NasdaqORGANIZATION

0.99+

DentsuORGANIZATION

0.99+

MerkleORGANIZATION

0.99+

Goldman SachsORGANIZATION

0.99+

twoQUANTITY

0.99+

AmazonORGANIZATION

0.99+

MerkelPERSON

0.99+

oneQUANTITY

0.99+

last yearDATE

0.99+

second pieceQUANTITY

0.99+

both partiesQUANTITY

0.99+

first timeQUANTITY

0.99+

ninth yearQUANTITY

0.99+

bothQUANTITY

0.99+

threeQUANTITY

0.99+

Amazon.comORGANIZATION

0.99+

both sidesQUANTITY

0.99+

last nightDATE

0.99+

four daysQUANTITY

0.99+

AdobeORGANIZATION

0.98+

over five yearsQUANTITY

0.98+

three yearsQUANTITY

0.98+

dentsuORGANIZATION

0.98+

MerklePERSON

0.98+

one aspectQUANTITY

0.98+

two examplesQUANTITY

0.98+

MarTechORGANIZATION

0.97+

fiveDATE

0.97+

Day fourQUANTITY

0.96+

seven years agoDATE

0.95+

fourQUANTITY

0.95+

MerkuryORGANIZATION

0.95+

Fortune 100ORGANIZATION

0.94+

one central placeQUANTITY

0.93+

pandemicEVENT

0.93+

Lisa Lorenzin, Zscaler | AWS re:Invent 2021


 

>>Welcome to the cubes, continuing coverage of AWS reinvent 2021. I'm your host, Lisa Martin. We are running one of the industry's most important and largest hybrid tech events of the year. This year with AWS and its ecosystem partners. We have two life studios, two remote studios, and over 100 guests. So stick around as we talk about the next 10 years of cloud innovation, I'm very excited to be joined by another Lisa from Zscaler. Lisa Lorenzen is here with me, the field CTO for the Americas. She's here to talk about ZScaler's mission to make doing business and navigating change a simpler, faster, and more productive experience. Lisa, welcome to the program. >>Thank you. It's a pleasure to be here. >>So let's talk about Zscaler in AWS. Talk to me about the partnership, what you guys are doing together. >>Yeah, definitely. Z scaler is a strategic security ISV partner with AWS. So we provide AWS customers with zero trust, secure remote access to AWS, and this can improve their security posture as well as their user experience with AWS. These scaler recently announced that we are the first and only cloud security service to achieve the FedRAMP PI authorization to operate. And that FedRAMP ZPA service is built on AWS gov cloud. ZScaler's also an AWS marketplace seller where our customers can purchase our zero trust exchange services as well as request or high value security assessments. We're excited about that as we're seeing a rapid increase in customer adoption as these scaler via the AWS marketplace, we vetted our software on AWS edge services that support emerging use cases, including 5g, IOT, and OT. So for example, Zscaler runs on wavelength, outposts, snowball and snowcones, and Zscaler has strategic partnerships with leading AWS service providers and system integration partners, including Verizon NTT, BT, Accenture, Deloitte, and many of the leading national and regional AWS consulting partners. >>Great summary there. So you mentioned something I want to get more understanding on this. It sounds like it's a differentiator for CSO scale. You said that you guys recently announced to the first and only cloud security service to achieve FedRAMP high. Uh, ATO built on AWS gov cloud. Talk to me about and what the significance of that is. >>I L five authorization to operate means that we are able to protect federal assets for the department of defense, as well as for the civilian agencies. It just extends the certification of our cloud by the government to ensure that we meet all of the requirements to protect that military side of the house, as well as the civilian side of the house. >>Got it super important there, let's talk about zero trust. It's a super hot topic. We've seen so many changes to the threat landscape during the pandemic. How are some of the ways that Z scaler and AWS are helping customers tackle this together? >>Well, I'd actually like to answer that by telling a little bit of a story. Um, Growmark is one of our Z scaler and AWS success stories when they had to send everyone home to work from home overnight, the quote that we had from is the users just went home and nothing changed. ZPA made work from anywhere, just work, and they were able to maintain complete business continuity. So even though their employers might have had poor internet service at home, or, you know, 80 challenging infrastructure, if you've got kids on your wifi bunch of kids in the neighborhood doing remote school, everyone's working from home, you don't have the reliability or the, maybe the bandwidth capacity that you would when you're sitting in an office. And Zscaler private access is a cloud delivered zero trust solution that leverages dynamic resilient, TLS encrypted tunnels to connect the user to an application rather than putting an end point on a network. >>And the reason that's important is it makes for a much more reliable and resilient service, even in environments that may not have the best connectivity I live out in the county. I really, some days think that there's a hamster on a wheel somewhere in my cable modem network, and I am a consumer of this, right. I connect to Z scaler over Zscaler private access, I'm protected by Zscaler internet access. And so I access our internal applications that are running in AWS as well this way. And it makes a huge difference. Growmark really started with an SAP migration to AWS, and this was long before the pandemic. So they started out looking for that better user experience and the zero trust capability. They were able to ensure that their SAP environment was dark to the internet, even though it was running in the cloud. And that put them in this position to leverage that zero trust service when the pandemic was upon us, >>That ability or that quote that you mentioned, it just worked was absolutely critical for all of us in every industry. And I'm sure a lot of folks who were trying to manage working from home, the spouses from home kids doing, you know, school online also felt like you with the hamster on the wheel, I'm sure their internet access, but being able to have that business continuity was table-stakes especially early on for most organizations. We saw a lot of digital transformation, a lot of acceleration of it in the last 20 months during the pandemic. Talk to me about how Z scaler helps customers from a digital transformation perspective and maybe what some of the things were that you saw in the last 20 months that have accelerated >>Absolutely. Um, another example, there would be Jefferson health, and really, as we saw during the pandemic, as you say, it accelerated a lot of the existing trends of mobility, but also migration to the cloud. And when you move applications to the cloud, honestly, it's a complex environment and maybe the controls and the risk landscape is not as well. Understood. So Z scaler also has another solution, which is our cloud security posture management. And this is really ensuring that your configuration on your environment, that those workloads run in is controlled, understood correctly, coordinated and configured. So as deference and health migrated to the cloud first model, they were able to leverage the scalers workload posture to measure and control that risk. Again, it's environment where the combination of AWS and Z scaler together gives them a flexible, resilient solution that they can be confident is correctly configured and thoroughly locked down. >>And that's critical for businesses in any organization, especially as quickly as how quickly things changed in the last 20 months or so I do wonder how your customer conversations have has changed as I introduced you as the field CTO of the America's proceeds killer. I'm sure you talk with a lot of customers. How has the security posture, um, zero trust? How has that risen up within the organizational chain? Is that something that the board is concerned about? >>My gosh, yes. And zero trust really has gone through the Gartner hype cycle. You've got the introduction, the peak of interest, the trough of despair, and then really rising back into what's actually feasible. Only zero trust has done that on a timeline of over a decade. When the term was first introduced, I was working with firewall VPN enact technology, and frankly, we didn't necessarily have the flexibility, the scalability, or the resilience to offer true zero trust. You can try to do that with network security controls, but when you're really protecting a user connecting to an application, you've got an abstraction layer mismatch. What we're seeing now is the reemergence of zero trust as a priority. And this was greatly accelerated honestly by the cybersecurity executive order that came out a few months ago from the Biden administration, which made zero trust a priority for the federal government and the public sector, but also raised visibility on zero trust for the private sector as well. >>When we're looking at zero trust as a way to perhaps ward off some of these high profile breaches and outages like the colonial pipeline, whole situation that was based on some legacy technology for remote access that was exploited and led to a breach that they had to take their entire infrastructure offline to mitigate. If we can look at more modern delivery mechanisms and more sophisticated controls for zero trust, that helps the board address a number of challenges ranging from obviously risk management, but also agility and cost reduction in an environment where more than ever belts are being tightened. New ways of delivering applications are being considered. But the ability to innovate is more important than ever. >>It is more important than ever the ability to innovate, but it really changing security landscape. I'm glad to hear that you're seeing, uh, this change as a result of the executive order that president Biden put down in the summer. That's good news. It sounds like there's some progress being made there, but we saw, you mentioned colonial pipeline. We saw a lot in the last 20, 22 months or so with ransomware becoming a household word, also becoming something that is a matter of when companies in any industry get hit and versus if it's no longer kind of that choice anymore. So talk to me about some of the threats and some of the stats that Z scaler has seen particularly in the last 20, 22 months. >>Oh gosh. Well, let's see. I'm just going to focus on the last 12 months, cause that's really where we've got some of the best data. We've seen a 500% increase in ransomware delivered over encrypted channels. And what that means is it's really critical to have scalable SSL inspection that can operate at wire speed without impeding the user experience or delay in critical projects, server communications, activities that need to happen without any introduced in any additional latency. So if you think about what that takes the Z scaler internet access solution is protecting users, outbound access in the same way that Zscaler private access protects access to private resources. So we're really seeing more and more organizations seeing that both of these services are necessary to deliver a comprehensive zero trust. You have to protect and control the outbound traffic to make sure that nothing good leaks out, nothing bad sneaks in. >>And at the same time, you have to protect and control the inbound traffic and inbound is, you know, a much broader definition with apps in the data center in the cloud these days. We're also seeing that 30% of malware is delivered through trusted applications like file shares or collaboration tools. So it's no longer enough to only inspect web traffic. Now you have to be able to really inspect all flavors of traffic when you're doing that outbound protection. So another good example where Z scaler and AWS work together here is in Amazon workspaces. And there's a huge trend towards desktop as a service, for example, and organizations are starting to recognize that they need to protect both the user experience and also the connectivity onward in Amazon workspaces, the same way that they would for a traditional end user device. So we see Z scaler running in the Amazon workspaces instances to protect that outbound traffic and control that inbound traffic as well. >>Another big area is the ransomware infections are not the problem. It's the result. So over half of the ransomware infections include data theft or leakage. And that is a double whammy because you get what's called double extortion where not only do you have to pay to unlock your machines, but you have to pay not to have that stolen data exposed to the rest of the world. So it's more important than ever to be able to break that kill chain as early as possible to ensure that the or the server traffic itself isn't exposed to the initial infection vector. If you do happen to get an infection vector that sneaks through, you need to be able to control the lateral movement so that it doesn't spread in your environment. And then if both of those controls fail, you also need the outbound protection such as CASBY and DLP to ensure that even if they get into the environment, they can't exfiltrate any of the data that they find as a result. We're seeing that the largest security risk today is lateral movement inside the corporate network. And that's one of the things that makes these ransomware double extortion situations, such a problem. >>Last question for you. And we've got about a minute left. I'm curious, you said over 50% of ransomware attacks are now double extortion. How do you guys help customers combat that? So >>We really deliver a solution that eliminates a lot of the attack surface and a lot of the risks. We have no inbound listener, unlike a traditional VPN. So the outbound only connections mean you don't have the external attack surface. You can write these granular policy controls to eliminate lateral movement. And because we integrate with customer's existing identity and access management, we can eliminate the credential exposure that can lead to a larger spread in a compromised environment. We also can eliminate the problem of unpatched gateways, which led to things like colonial pipeline or some of the other major breaches we've seen recently. And we can remove that single point of failure. So you can rely on dynamic optimized traffic distribution for all of these secure services. Basically, what we're trying to do is make it simpler and more secure at the same time, >>Simpler and more secure at the same time is what everyone needs regardless of industry. Lisa, thank you for joining me today, talking about Zscaler in AWS, zero trust the threat landscape that you're seeing, and also how's the scaler and AWS together can help customers mitigate those growing risks. We appreciate your insights and your thoughtfulness. >>Thank you >>For Lisa Lorenzen. I'm Lisa Martin. You're watching the cubes coverage of AWS reinvent stick around more great content coming up next.

Published Date : Nov 30 2021

SUMMARY :

We are running one of the industry's most important and largest It's a pleasure to be here. Talk to me about the partnership, what you guys are doing together. So we provide AWS customers with zero trust, secure remote access to AWS, You said that you guys recently announced to the first and only cloud of the requirements to protect that military side of the house, as well as the civilian side of the house. We've seen so many changes to the threat landscape during the pandemic. of kids in the neighborhood doing remote school, everyone's working from home, you don't have the reliability or in this position to leverage that zero trust service when the pandemic was upon us, it in the last 20 months during the pandemic. And when you move applications to the cloud, Is that something that the board is concerned the scalability, or the resilience to offer true zero trust. But the ability to innovate is more important It is more important than ever the ability to innovate, but it really changing security landscape. of these services are necessary to deliver a comprehensive zero trust. And at the same time, you have to protect and control the inbound traffic and inbound is, ensure that the or the server traffic itself isn't I'm curious, you said over 50% of ransomware So the outbound only connections mean you don't have the Lisa, thank you for joining me today, talking about Zscaler in AWS, zero trust the threat landscape more great content coming up next.

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
AWSORGANIZATION

0.99+

Lisa LorenzenPERSON

0.99+

Lisa MartinPERSON

0.99+

DeloitteORGANIZATION

0.99+

Lisa LorenzinPERSON

0.99+

BTORGANIZATION

0.99+

30%QUANTITY

0.99+

500%QUANTITY

0.99+

AccentureORGANIZATION

0.99+

two remote studiosQUANTITY

0.99+

LisaPERSON

0.99+

firstQUANTITY

0.99+

AmazonORGANIZATION

0.99+

two life studiosQUANTITY

0.99+

oneQUANTITY

0.99+

over 100 guestsQUANTITY

0.99+

bothQUANTITY

0.99+

GartnerORGANIZATION

0.99+

over 50%QUANTITY

0.99+

This yearDATE

0.99+

BidenPERSON

0.99+

first modelQUANTITY

0.98+

2021DATE

0.98+

GrowmarkORGANIZATION

0.97+

single pointQUANTITY

0.97+

ZscalerORGANIZATION

0.97+

CASBYORGANIZATION

0.97+

zero trustQUANTITY

0.97+

pandemicEVENT

0.97+

todayDATE

0.97+

over a decadeQUANTITY

0.95+

AmericasLOCATION

0.94+

Verizon NTTORGANIZATION

0.94+

AmericaLOCATION

0.94+

ZscalerTITLE

0.91+

last 12 monthsDATE

0.91+

last 20 monthsDATE

0.9+

IOTTITLE

0.89+

80 challenging infrastructureQUANTITY

0.88+

a minuteQUANTITY

0.86+

last 20DATE

0.83+

ZPATITLE

0.83+

ATOORGANIZATION

0.82+

Z scalerTITLE

0.81+

JeffersonPERSON

0.81+

ZScalerORGANIZATION

0.81+

Mary Roth, Couchbase | Couchbase ConnectONLINE 2021


 

(upbeat music playing) >> Welcome to theCUBE's coverage of Couchbase ConnectONLINE Mary Roth, VP of Engineering Operations with Couchbase is here for Couchbase ConnectONLINE. Mary. Great to see you. Thanks for coming on remotely for this segment. >> Thank you very much. It's great to be here. >> Love the fire in the background, a little fireside chat here, kind of happening, but I want to get into it because, Engineering and Operations with the pandemic has really kind of shown that, engineers and developers have been good, working remotely for a while, but for the most part it's impacted companies in general, across the organizations. How did the Couchbase engineering team adapt to the remote work? >> Great question. And I actually think the Couchbase team responded very well to this new model of working imposed by the pandemic. And I have a unique perspective on the Couchbase journey. I joined in February, 2020 after 20 plus years at IBM, which had embraced a hybrid, in-office remote work model many years earlier. So in my IBM career, I live four minutes away from my research lab in Almaden Valley, but IBM is a global company with headquarters on the East Coast, and so throughout my career, I often found myself on phone calls with people around the globe at 5:00 AM in the morning, I quickly learned and quickly adapted to a hybrid model. I'd go into the office to collaborate and have in-person meetings when needed. But if I was on the phone at 5:00 AM in the morning, I didn't feel the need to get up at 4:30 AM to go in. I just worked from home and I discovered I could be more productive there, doing think time work, and I really only needed the in-person time for collaboration. This hybrid model allowed me to have a great career at IBM and raise my two daughters at the same time. So when I joined Couchbase, I joined a company that was all about being in-person and instead of a four minute commute, it was going to be an hour or more commute for me each way. This was going to be a really big transition for me, but I was excited enough by Couchbase and what it offered, that I decided to give it a try. Well, that was February, 2020. I showed up early in the morning on March 10th, 2020 for an early morning meeting in-person only to learn that I was one of the only few people that didn't get the memo. We were switching to a remote working model. And so over the last year, I have had the ability to watch Couchbase and other companies pivot to make this remote working model possible and not only possible, but effective. And I'm really happy to see the results. A remote work model does have its challenges, that's for sure, but it also has its benefits, better work-life balance and more time to interact with family members during the day and more quiet time just to think. We just did a retrospective on a major product release, Couchbase server 7.0, that we did over the past 18 months. And one of the major insights by the leadership team is that working from home actually made people more effective. I don't think a full remote model is the right approach going forward, but a hybrid model that IBM adopted many years ago and that I was able to participate in for most of my career, I believe is a healthier and more productive approach. >> Well, great story. I love the come back and now you take leverage of all the best practices from the IBM days, but how did they, your team and the Couchbase engineering team react? And were there any best practices or key learnings that you guys pulled out of that? >> The initial reaction was not good. I mean, as I mentioned, it was a culture based on in-person, people had to be in in-person meetings. So it took a while to get used to it, but there was a forcing function, right? We had to work remotely. That was the only option. And so people made it work. I think the advancement of virtual meeting technology really helps a lot. Over earlier days in my career where I had just bad phone connections, that was very difficult. But with the virtual meetings that you have, where you can actually see people and interact, I think is really quite helpful. And probably the key. >> What's the DNA of the company there? I mean, every company's got the DNA, Intel's Moore's Law, and what's the engineering culture at Couchbase like, if you could describe it. >> The engineering culture at Couchbase is very familiar to me. We are at our heart, a database company, and I grew up in the database world, which has a very unique culture based on two values, merit and mentorship. And we also focus on something that I like to call growing the next generation. Now database technology started in the late sixties, early seventies, with a few key players and institutions. These key players were extremely bright and they tackled and solved really hard problems with elegant solutions, long before anybody knew they were going to be necessary. Now, those original key players, people like Jim Gray, Bruce Lindsay, Don Chamberlin, Pat Selinger, David Dewitt, Michael Stonebraker. They just love solving hard problems. And they wanted to share that elegance with a new generation. And so they really focused on growing the next generation of leaders, which became the Mike Carey's and the Mohan's and the Lagerhaus's of the world. And that culture grew over multiple generations with the previous generation cultivating, challenging, and advocating for the next, I was really lucky to grow up in that culture. And I've advanced my career as a result, as being part of it. The reason I joined Couchbase is because I see that culture alive and well here. Our two fundamental values on the engineering side, are merit and mentorship. >> One of the things I want to get your thoughts on, on the database questions. I remember, back in the old glory days, you mentioned some of those luminaries, you know, there wasn't many database geeks out there, there was kind of a small community, now, as databases are everywhere. So you see, there's no one database that has rule in the world, but you starting to see a pattern of database, kinds of things are emerging, more databases than ever before, they are on the internet, they are on the cloud, there are none the edge. It's essentially, we're living in a large distributed computing environment. So now it's cool to be in databases because they're everywhere. (laughing) So, I mean, this is kind of where we are at. What's your reaction to that? >> You're absolutely right. There used to be a few small vendors and a few key technologies and it's grown over the years, but the fundamental problems are the same, data integrity, performance and scalability in the face of distributed systems. Those were all the hard problems that those key leaders solved back in the sixties and seventies. They're not new problems. They're still there. And they did a lot of the fundamental work that you can apply and reapply in different scenarios and situations. >> That's pretty exciting. I love that. I love the different architectures that are emerging and allows for more creativity for application developers. And this becomes like the key thing we're seeing right now, driving the business and a big conversation here at the, at the event is the powering of these modern applications that need low latency. There's no more, not many spinning disks anymore. It's all in RAM, all these kinds of different memory, you got centralization, you got all kinds of new constructs. How do you make sense of it all? How do you talk to customers? What's the main core thing happening right now? If you had to describe it. >> Yeah, it depends on the type of customer you're talking to. We have focused primarily on the enterprise market and in that market, there are really fundamental issues. Information for these enterprises is key. It's their core asset that they have and they understand very well that they need to protect it and make it available more quickly. I started as a DBA at Morgan Stanley, back, right out of college. And at the time I think it was, it probably still is, but at the time it was the best run IT shop that I'd ever seen in my life. The fundamental problems that we had to solve to get information from one stock exchange to another, to get it to the SEC are the same problems that we're solving today. Back then we were working on mainframes and over high-speed Datacom links. Today, it's the same kind of problem. It's just the underlying infrastructure has changed. >> Yeah, the key, there has been a big supporter of women in tech. We've done thousands of interviews and why I got you. I want to ask you if you don't mind, career advice that you give women who are starting out in the field of engineering, computer science. What do you wish you knew when you started your career? And if you could be that person now, what would you say? >> Yeah, well, a lot of things I wish I knew then that I know now, but I think there are two key aspects to a successful career in engineering. I actually got started as a math major and the reason I became a math major is a little convoluted. As a girl, I was told we were bad at math. And so for some reason I decided that I had to major in it. That's actually how I got my start, but I've had a great career. And I think there are really two key aspects. First, is that it is a discipline in which respect is gained through merit. As I had mentioned earlier, engineers are notoriously detail-oriented and most are, perfectionists. They love elegant, well thought-out solutions and give respect when they see one. So understanding this can be a very important advantage if you're always prepared and you always bring your A-game to every debate, every presentation, every conversation, you have build up respect among your team, simply through merit. While that may mean that you need to be prepared to defend every point early on, say, in your graduate career or when you're starting, over time others will learn to trust your judgment and begin to intuitively follow your lead just by reputation. The reverse is also true. If you don't bring your A-game and you don't come prepared to debate, you will quickly lose respect. And that's particularly true if you're a woman. So if you don't know your stuff, don't engage in the debate until you do. >> That's awesome advice. >> That's... >> All right, continue. >> Thank you. So my second piece of advice that I wish I could give my younger self is to understand the roles of leaders and influencers in your career and the importance of choosing and purposely working with each. I like to break it down into three types of influencers, managers, mentors, and advocates. So that first group are the people in your management chain. It's your first line manager, your director, your VP, et cetera. Their role in your career is to help you measure short-term success. And particularly with how that success aligns with their goals and the company's goals. But it's important to understand that they are not your mentors and they may not have a direct interest in your long-term career success. I like to think of them as, say, you're sixth grade math teacher. You know, you getting an A in the class and advancing to seventh grade. They own you for that. But whether you get that basketball scholarship to college or getting to Harvard or become a CEO, they have very little influence over that. So a mentor is someone who does have a shared interest in your long-term success, maybe by your relationship with him or her, or because by helping you shape your career and achieve your own success, you help advance their goals. Whether it be the company success or helping more women achieve leadership positions or getting more kids into college on a basketball scholarship, whatever it is, they have some long-term goal that aligns with helping you with your career. And they give great advice. But that mentor is not enough because they're often outside the sphere of influence in your current position. And while they can offer great advice and coaching, they may not be able to help you directly advance. That's the role of the third type of influencer. Somebody that I call an advocate. An advocate is someone that's in a position to directly influence your advancement and champion you and your capabilities to others. They are in influential positions and others place great value in their opinions. Advocates stay with you throughout your career, and they'll continue to support you and promote you wherever you are and wherever they are, whether that's the same organization or not. They're the ones who, when a leadership position opens up will say, I think Mary's the right person to take on that challenge, or we need to move in a new direction, I think Mary's the right person to lead that effort. Now advocates are the most important people to identify early on and often in your career. And they're often the most overlooked. People early on often pay too much attention and rely on their management chain for advancement. Managers change on a dime, but mentors and advocates are there for you for the long haul. And that's one of the unique things about the database culture. Those set of advocates were just there already because they had focused on building the next generation. So I consider, you know, Mike Carey as my father and Mike Stonebraker as my grandfather, and Jim Gray as my great-grandfather and they're always there to advocate for me. >> That's like a schema and a database. You got to have it all right there, kind of teed up. Beautiful. (laughing) Great advice. >> Exactly. >> Thank you for that. That was really a masterclass. And that's going to be great advice for folks, really trying to figure out how to play the cards they have and the situation, and to double down or move and find other opportunities. So great stuff there. I do have to ask you Mary, thanks for coming on the technical side and the product side. Couchbase Capella was launched in conjunction with the event. What is the bottom line for that as, as an Operations and Engineering, built the products and rolled it out. What's the main top line message for about that product? >> Yeah. Well, we're very excited about the release of Capella and what it brings to the table is that it's a fully managed and automated database cloud offering so that customers can focus on development and building and improving their applications and reducing the time to market without having to worry about the hard problems underneath, and the operational database management efforts that come with it. As I mentioned earlier, I started my career as a DBA and it was one of the most sought after and highly paid positions in IT because operating a database required so much work. So with Capella, what we're seeing is, taking that job away from me. I'm not going to be able to apply for a DBA tomorrow. >> That's great stuff. Well, great. Thanks for coming. I really appreciate it. Congratulations on the company and the public offering this past summer in July and thanks for that great commentary and insight on theCUBE here. Thank you. >> Thank you very much. >> Okay. Mary Roth, VP of Engineering Operations at Couchbase part of Couchbase ConnectONLINE. I'm John Furrier, host of theCUBE. Thanks for watching. (upbeat music playing)

Published Date : Oct 26 2021

SUMMARY :

Great to see you. It's great to be here. but for the most part it's I didn't feel the need to I love the come back And probably the key. I mean, every company's got the DNA, and the Mohan's and the that has rule in the world, in the face of distributed systems. I love the different And at the time I think it I want to ask you if you don't mind, don't engage in the debate until you do. and they'll continue to support you You got to have it all right I do have to ask you Mary, and reducing the time to market and the public offering Mary Roth, VP of Engineering Operations

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
Jim GrayPERSON

0.99+

MaryPERSON

0.99+

Mike CareyPERSON

0.99+

Mike StonebrakerPERSON

0.99+

David DewittPERSON

0.99+

Mary RothPERSON

0.99+

Michael StonebrakerPERSON

0.99+

February, 2020DATE

0.99+

IBMORGANIZATION

0.99+

Bruce LindsayPERSON

0.99+

Pat SelingerPERSON

0.99+

Almaden ValleyLOCATION

0.99+

Don ChamberlinPERSON

0.99+

John FurrierPERSON

0.99+

5:00 AMDATE

0.99+

TodayDATE

0.99+

Morgan StanleyORGANIZATION

0.99+

second pieceQUANTITY

0.99+

4:30 AMDATE

0.99+

FirstQUANTITY

0.99+

late sixtiesDATE

0.99+

CouchbaseORGANIZATION

0.99+

thousandsQUANTITY

0.99+

early seventiesDATE

0.99+

two daughtersQUANTITY

0.99+

last yearDATE

0.99+

two key aspectsQUANTITY

0.98+

tomorrowDATE

0.98+

todayDATE

0.98+

East CoastLOCATION

0.98+

oneQUANTITY

0.98+

eachQUANTITY

0.98+

an hourQUANTITY

0.98+

four minuteQUANTITY

0.98+

four minutesQUANTITY

0.98+

March 10th, 2020DATE

0.97+

SECORGANIZATION

0.97+

first groupQUANTITY

0.97+

seventh gradeQUANTITY

0.97+

each wayQUANTITY

0.96+

one stock exchangeQUANTITY

0.96+

two fundamental valuesQUANTITY

0.96+

20 plus yearsQUANTITY

0.95+

OneQUANTITY

0.95+

CouchbaseTITLE

0.95+

two valuesQUANTITY

0.95+

first lineQUANTITY

0.94+

past summerDATE

0.92+

sixth gradeQUANTITY

0.91+

LagerhausORGANIZATION

0.89+

CapellaORGANIZATION

0.85+

theCUBEORGANIZATION

0.85+

third typeQUANTITY

0.85+

JulyDATE

0.84+

Mohan'sORGANIZATION

0.84+

years earlierDATE

0.82+

Mike Carey'sORGANIZATION

0.82+

DatacomORGANIZATION

0.81+

CapellaPERSON

0.8+

sixtiesDATE

0.8+

IntelORGANIZATION

0.77+

Couchbase ConnectONLINEORGANIZATION

0.76+

past 18 monthsDATE

0.75+

pandemicEVENT

0.74+

2021DATE

0.74+

HarvardLOCATION

0.72+

seventiesDATE

0.72+

Couchbase CapellaORGANIZATION

0.67+

Mary Roth, Couchbase | Couchbase ConnectONLINE 2021


 

>>And welcome to the cubes coverage of Couchbase connect online, Mary Roth, VP of engineering operations with couch basis here for Couchbase connect online. Mary. Great to see you. Thanks for coming on remotely for this segment. >>Thank you very much. It's great to be here. >>Love the fire in the background, a little fireside chat here, kind of happening, but I want to get into shooting, you know, engineering and operations with the pandemic has really kind of shown that, you know, engineers and developers have been good working remotely for a while, but for the most part it's impacted companies in general, across the organizations. How did the Couchbase engineering team adapt to the remote work? >>Uh, great question. Um, and I actually think the Couchbase team responded very well to this new model of working imposed by the pandemic. And I have a unique perspective on the couch space journey. I joined in February, 2020 after 20 plus years at IBM, which had embraced a hybrid in-office rewrote remote work model many years earlier. So in my IBM career, I live four minutes away from my research lab in almond and valley, but IBM is a global company with headquarters on the east coast and SU. So throughout my career, I often found myself on phone calls with people around the globe at 5:00 AM in the morning, I quickly learned and quickly adopted to a hybrid model. I'd go into the office to collaborate and have in-person meetings when needed. But if I was on the phone at >> 5: 00 AM in the morning, um, I didn't feel the need to get up at 4:30 AM to go in. >>I just worked from home and I discovered I could be more productive. They're doing think time work. And I really only needed the in-person time for collaboration. These hybrid model allowed me to have a great career at IBM and raise my two daughters at the same time. So when I joined Couchbase I joined a company that was all about being in-person and instead of a four minute commute, it was going to be an hour or more commute for me each way. This was going to be a really big transition for me, but I was excited enough by couch facing what it offered that I decided to give it a try. Well, that was February, 2020. I showed up early in the morning on March 10th, 2020 for an early morning meeting in person only to learn that I was one of the only few people that didn't get the memo. >>We were switching to a remote remote working model. And so over the last year, I have had the ability to watch cow's face and other companies pivot to make this remote working model possible and not only possible, but effective. And I'm really happy to see the results. Our remote work model does have its challenges that's for sure, but it also has its benefits better work-life balance and more time to interact with family members during the day and more quiet time, just to think we just did a retrospective on a major product release Couchbase server 7.0 that we did over the past 18 months. And one of the major insights by the leadership team is that working from home actually made people more effective. I don't think a full remote model is the right approach going forward, but a hybrid model that IBM adopted many years ago and that I was able to participate in for most of my career, I believe is a healthier and more productive approach. >>Well, great story. I love the, um, the, uh, you come back and now you take leverage all the best practices from the IBM days, but how did the, your team and the Couchbase engineering team react and were there any best practices or key learnings that you guys pulled out of that, >>Uh, the, the initial reaction was not good. I mean, as I mentioned, it was a culture based on in-person people had to be in person in person meetings. So it took a while to get used to it, but the, there was a forcing function, right? We had to work remotely. That was the only option. And so people made it work. I think the advancement of virtual meeting technology really, really helps a lot over earlier days in my career where I had just bad phone connections, that was very difficult. But with the virtual meetings that you have, where you can actually see people and interact, I think is really quite helpful. >>What's the DNA of the culture. What's the DNA. Every company's got the DNA entails Moore's law. Um, and at what's the engineering culture at Couchbase like if you could describe it. >>Uh, the engineering culture at Couchbase is very familiar to me. We are at our heart, a database company, and I grew up in the database world, which has a very unique culture based on two values, merit and mentorship. And we also focus on something that I like to call growing. The next generation. Now database technology started in the late sixties, early seventies with a few key players and institutions. These key players were extremely bright and they tackle it and solve really hard problems with elegant solutions long before anybody knew they were going to be necessary. Now, those original key players, people like Jim gray, Bruce Lindsey, Don Chamberlin, pat Salinger, David Dewitt, Michael Stonebraker. They just love solving hard problems. And they wanted to share that elegance with a new generation. And so they really focused on growing the next generation of leaders, which became the Mike caries and the Mohans and the lower houses of the world. And that culture grew over multiple generations with the previous generation cultivating, challenging and advocating for the next, I was really lucky to grow up in that culture. And I've advanced my career as a result, as being part of it. The reason I joined Couchbase is because I see that culture alive and well, here are two fundamental values on the engineering side, our merit and mentorship. >>One of the things I want to get your thoughts on, on the database questions. I remember, you know, back in the old glory days, you mentioned some of those luminaries, you know, there wasn't many database geeks out there, Zuri kind of small community now is databases are everywhere. So you see there's no one database that's ruling the world, but you starting to see a pattern of database kinds of things, and more emerging, more databases than ever before. They're on the internet, they're on the cloud. There are none the edge it's essentially we're living in a large distributed computing environment. So now it's cool to be in databases cause they're everywhere. So, I mean, this is kind of where we're at. What's your reaction to that? >>Uh, you're absolutely right there. There used to be a, a few small vendors and a few key technologies and it's grown over the years, but the fundamental problems are the same data, integrity, performance and scalability. And in the face of district distributed systems, those were all the hard problems that those key leaders solve back in the sixties and seventies. They're not, they're not new problems. They're still there. And they did a lot of the fundamental work that you can apply and reapply in different scenarios and situations. >>It's pretty exciting. I love that. I love the different architectures that are emerging and allows for more creativity for application developers. And this becomes like the key thing we're seeing right now, driving the business and a big conversation here at the, at the event is the powering, these modern applications that need low latency. There's no more, not many spinning disks anymore. It's all in Ram, all these kinds of different memory, you got decentralization and all kinds of new constructs. How do you make sense of it all? How do you talk to customers? What's the, what's the, what's the main core thing happening right now? If you had to describe it? >>Yeah, it depends on the type of customer you're talking to. Um, we have focused primarily on the enterprise market and in that market, there are really fundamental issues. Information for, for these enterprises is key. It's their core asset that they have and they understand very well that they need to protect it and make it available more quickly. I started as a DBA at Morgan Stanley back, um, right out of college. And at the time I think it was, it probably still is, but at the time it was the best run it shop that I'd ever seen in my life. The fundamental problems that we had to solve to get information from one stock exchange to another, to get it to the sec, um, are the same problems that we're solving today. Back then we were working on mainframes and over high-speed data comm links today, it's the same kind of problem. It's just the underlying infrastructure has changed. >>You know, the key has been a big supporter of women in tech. We've done thousands of interviews on why I got you. I want to ask you, uh, if you don't mind, um, career advice that you give women who are starting out in the field of engineering, computer science, what do you wish you knew when you started your career? And you could be that person now, what would you say? >>Yeah, well, there are a lot of things I wish I knew then, uh, that I know now, but I think there are two key aspects to a successful career in engineering. I actually got started as a math major and the reason I, I became a math major is a little convoluted. Is it as a girl, I was told we were bad at math. And so for some reason I decided that I had to major in it. That's actually how I got my start. Um, but I've had a great career and I think there are really two key aspects first. And is that it is a discipline in which respect is gained through merit. As I had mentioned earlier, engineers are notoriously detail oriented and most of our perfectionist, they love elegant, well thought out solutions and give respect when they see one. So understanding this can be a very important advantage if you're always prepared and you always bring your a game to every debate, every presentation, every conversation you have build up respect among your team, simply through merit. While that may mean that you need to be prepared to defend every point early on say, in your graduate career or when you're starting over time, others will learn to trust your judgment and begin to intuitively follow your lead just by reputation. The reverse is also true. If you don't bring your a game and you don't come prepared to debate, you will quickly lose respect. And that's particularly true if you're a woman. So if you don't know your stuff, don't engage in the debate until you do. That's awesome. >>That's >>Fine. Continue. Thank you. So my second piece of advice that I wish I could give my younger self is to understand the roles of leaders and influencers in your career and the importance of choosing and purposely working with each. I like to break it down into three types of influencers, managers, mentors, and advocates. So that first group are the people in your management chain. It's your first line manager, your director, your VP, et cetera. Their role in your career is to help you measure short-term success. And particularly with how that success aligns with their goals and the company's goals. But it's important to understand that they are not your mentors and they may not have a direct interest in your long-term career success. I like to think of them as say, you're sixth grade math teacher. You know, you're getting an a in the class and advancing to seventh grade. >>They own you for that. Um, but whether you get that basketball scholarship to college or getting to Harvard or become a CEO, they have very little influence over that. So a mentor is someone who does have a shared interest in your longterm success, maybe by your relationship with him or her, or because by helping you shape your career and achieve your own success, you help advance their goals. Whether it be the company success or helping more women achieve, we do put sip positions or getting more kids into college, on a basketball scholarship, whatever it is, they have some long-term goal that aligns with helping you with your career. And they gave great advice. But that mentor is not enough because they're often outside of the sphere of influence in your current position. And while they can offer great advice and coaching, they may not be able to help you directly advance. >>That's the role of the third type of influencer. Somebody that I call an advocate, an advocate is someone that's in a position to directly influence your advancement and champion you and your capabilities to others. They are in influential positions and others place, great value in their opinions. Advocates stay with you throughout your career, and they'll continue to support you and promote you wherever you are and wherever they are, whether that's the same organization or not. They're the ones who, when a leadership position opens up will say, I think Mary's the right person to take on that challenge, or we need to move in a new direction. I think Mary's the right person to lead that effort. Now advocates are the most important people to identify early on and often in your career. And they're often the most overlooked people early on, often pay too much attention and rely on their management chain for advanced managers, change on a dime, but mentors and advocates are there for you for the long haul. And that's one of the unique things about the database culture. Those set of advocates were just there already because they had focused on building the next generation. So I consider, you know, Mike Carey is my father and Mike Stonebraker is my grandfather. And Jim gray is my great-grandfather and they're always there to advocate for me. >>That's like a scheme and a database. You got to have it all white. They're kind of teed up. Beautiful, great advice. >>Thank you for that. That was really a masterclass. And that's going to be great advice for folks really trying to figure out how to play the cards they have a and the situation and to double down or move and find other opportunities. So great stuff there. I do have to ask you Maira, thanks for coming on the technical side and the product side Couchbase Capella was launched, uh, in conjunction with the event. What is, what is the bottom line for that as, as an operations and engineering, you know, built the products and roll it out. What's the main top line message for about that product? >>Yeah, well, we're very excited about the release of Capella and what it brings to the table is that it's a fully managed in an automated database cloud offering so that customers can focus on development and building and improving their applications and reducing the time to market without having to worry about the hard problems underneath and the operational database management efforts that come with it. Uh, as I mentioned earlier, I started my career as a UVA and it was one of the most sought after and highly paid positions in it because operating a database required so much work. So with Capella, what we're seeing is, you know, taking that job away from me, I'm not going to be able to apply for a DBA tomorrow. >>That's great stuff. Well, great. Thanks for coming. I really appreciate congratulations on the company and public offering this past summer in July and thanks for that great commentary and insight on the QPR. Thank you. >>Thank you very much. >>Okay. Mary Ross, VP of engineering operations at Couchbase part of Couchbase connect online. I'm John furry host of the cube. Thanks for watching.

Published Date : Oct 18 2021

SUMMARY :

And welcome to the cubes coverage of Couchbase connect online, Mary Roth, VP of engineering operations with Thank you very much. How did the Couchbase engineering team adapt to the I'd go into the office to collaborate and have in-person meetings when needed. And I really only needed the in-person time for collaboration. And one of the major insights by the leadership I love the, um, the, uh, you come back and now you take leverage all the best practices from the IBM But with the virtual meetings that you have, Um, and at what's the engineering culture at Couchbase like if you could describe it. and the lower houses of the world. One of the things I want to get your thoughts on, on the database questions. And in the face of district distributed I love the different architectures that are emerging and allows for more creativity for And at the time I think it was, computer science, what do you wish you knew when you started your career? So if you don't know your stuff, don't engage in the debate until you do. the people in your management chain. aligns with helping you with your career. Now advocates are the most important people to identify early on and often in your career. You got to have it all white. I do have to ask you Maira, the time to market without having to worry about the hard problems underneath and I really appreciate congratulations on the company and public offering I'm John furry host of the cube.

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
David DewittPERSON

0.99+

Mary RothPERSON

0.99+

Michael StonebrakerPERSON

0.99+

February, 2020DATE

0.99+

Mike StonebrakerPERSON

0.99+

Bruce LindseyPERSON

0.99+

IBMORGANIZATION

0.99+

Don ChamberlinPERSON

0.99+

Jim grayPERSON

0.99+

Mary RossPERSON

0.99+

Mike CareyPERSON

0.99+

MairaPERSON

0.99+

4:30 AMDATE

0.99+

MaryPERSON

0.99+

pat SalingerPERSON

0.99+

Morgan StanleyORGANIZATION

0.99+

CouchbaseORGANIZATION

0.99+

5:00 AMDATE

0.99+

two daughtersQUANTITY

0.99+

5: 00 AMDATE

0.99+

second pieceQUANTITY

0.99+

thousandsQUANTITY

0.99+

MoorePERSON

0.99+

CapellaORGANIZATION

0.99+

late sixtiesDATE

0.99+

JohnPERSON

0.99+

last yearDATE

0.99+

four minuteQUANTITY

0.98+

four minutesQUANTITY

0.98+

an hourQUANTITY

0.98+

two key aspectsQUANTITY

0.98+

oneQUANTITY

0.98+

March 10th, 2020DATE

0.98+

first lineQUANTITY

0.98+

2021DATE

0.98+

tomorrowDATE

0.97+

almondLOCATION

0.97+

two valuesQUANTITY

0.97+

first groupQUANTITY

0.97+

third typeQUANTITY

0.97+

early seventiesDATE

0.97+

two fundamental valuesQUANTITY

0.96+

20 plus yearsQUANTITY

0.96+

seventh gradeQUANTITY

0.96+

OneQUANTITY

0.95+

each wayQUANTITY

0.95+

SULOCATION

0.95+

JulyDATE

0.95+

one stock exchangeQUANTITY

0.95+

todayDATE

0.94+

firstQUANTITY

0.93+

Mike cariesPERSON

0.92+

eachQUANTITY

0.92+

sixth gradeQUANTITY

0.91+

Couchbase connectORGANIZATION

0.9+

sixtiesDATE

0.87+

seventiesDATE

0.84+

past 18 monthsDATE

0.83+

Couchbase server 7.0TITLE

0.83+

ZuriORGANIZATION

0.81+

MohansPERSON

0.75+

interviewsQUANTITY

0.75+

past summerDATE

0.69+

years earlierDATE

0.68+

east coastLOCATION

0.67+

pandemicEVENT

0.66+

HarvardLOCATION

0.63+

many yearsDATE

0.57+

seORGANIZATION

0.55+

manyDATE

0.53+

Richard Hummel, NETSCOUT | CUBE Conversation, July 2021


 

(upbeat music) >> Hey, welcome to this Cube conversation with NetScout. I'm Lisa Martin. Excited to talk to you. Richard Hummel, the manager of threat research for Arbor Networks, the security division of NetScout. Richard, welcome to theCube. >> Thanks for having me, Lisa, it's a pleasure to be here. >> We're going to unpack the sixth NetScout Threat Intelligence Report, which is going to be very interesting. But something I wanted to start with is we know that and yes, you're going to tell us, COVID and the pandemic has had a massive impact on DDoS attacks, ransomware. But before we dig into the report, I'd like to just kind of get some stories from you as we saw last year about this time rapid pivot to work from home, rapid pivot to distance learning. Talk to us about some of the attacks that you saw in particular that literally hit close to home. >> Sure and there's one really good prime example that comes to mind because it impacted a lot of people. There was a lot of media sensation around this but if you go and look, just Google it, Miami Dade County and DDoS, you'll see the first articles that pop up is the entire district school network going down because the students did not want to go to school and launched a DDoS attack. There was something upwards of 190,000 individuals that could no longer connect to the school's platform, whether that's a teacher, a student or parents. And so it had a very significant impact. And when you think about this in terms of the digital world, that impacted very severely, a large number of people and you can't really translate that to what would happen in a physical environment because it just doesn't compute. There's two totally different scenarios to talk about here. >> Amazing that a child can decide, "I don't want to go to school today." And as a result of a pandemic take that out for nearly 200,000 folks. So let's dig into, I said this is the sixth NetScout Threat Intelligence Report. One of the global trends and themes that is seen as evidence in what happened last year is up and to the right. Oftentimes when we're talking about technology, you know, with analyst reports up and to the right is a good thing. Not so in this case. We saw huge increases in threat vectors, more vectors weaponized per attack sophistication, expansion of threats and IOT devices. Walk us through the overall key findings from 2020 that this report discovered. >> Absolutely. And if yo glance at your screen there you'll see the key findings here where we talk about record breaking numbers. And just in 2020, we saw over 10 million attacks, which, I mean, this is a 20% increase over 2019. And what's significant about that number is COVID had a huge impact. In fact, if we go all the way back to the beginning, right around mid March, that's when the pandemic was announced, attacks skyrocketed and they didn't stop. They just kept going up and to the right. And that is true through 2021. So far in the first quarter, typically January, February is the down month that we observe in DDoS attacks. Whether this is, you know, kids going back to school from Christmas break, you have their Christmas routines and e-commerce is slowing down. January, February is typically a slow month. That was not true in 2021. In fact, we hit record numbers on a month by month in both January and February. And so not only do we see 2.9 million attacks in the first quarter of 2021, which, I mean, let's do the math here, right? We've got four quarters, you know, we're on track to hit 12 million attacks potentially, if not more. And then you have this normal where we said 800,000 approximately month over month since the pandemic started, we started 2021 at 950,000 plus. That's up and to the right and it's not slowing down. >> It's not slowing down. It's a trend that it shows, you know, significant impact across every industry. And we're going to talk about that but what are some of the new threat vectors that you saw weaponized in the last year? I mean, you talked about the example of the Miami-Dade school district but what were some of those new vectors that were really weaponized and used to help this up and to the right trend? >> So there's four in particular that we were tracking in 2020 and these nets aren't necessarily new vectors. Typically what happens when an adversary starts using this is there's a proof of concept code out there. In fact, a good example of this would be the RDP over UDP. So, I mean, we're all remotely connected, right? We're doing this over a Zoom call. If I want to connect to my organization I'm going to use some sort of remote capability whether that's a VPN or tunneling in, whatever it might be, right? And so remote desktop is something that everybody's using. And we saw actors start to kind of play around with this in mid 2020. And in right around September, November timeframe we saw a sudden spike. And typically when we see spikes in this kind of activity it's because adversaries are taking proof of concept code, that maybe has been around for a period of time, and they're incorporating those into DDoS for hire services. And so any person that wants to launch a DDoS attack can go into underground forums in marketplaces and they can purchase, maybe it's $10 in Bitcoin, and they can purchase an attack. That leverage is a bunch of different DDoS vectors. And so adversaries have no reason to remove a vector as new ones get discovered. They only have the motivation to add more, right? Because somebody comes into their platform and says, "I want to launch an attack that's going to take out my opponent." It's probably going to look a lot better if there's a lot of attack options in there where I can just go through and start clicking buttons left and right. And so all of a sudden now I've got this complex multi-vector attack that I don't have to pay anything extra for. Adversary already did all the work for me and now I can launch an attack. And so we saw four different vectors that were weaponized in 2020. One of those are notably the Jenkins that you see listed on the screen in the key findings. That one isn't necessarily a DDoS vector. It started out as one, it does amplify, but what happens is Jenkins servers are very vulnerable and when you actually initiate this attack, it tips over the Jenkins server. So it kind of operates as like a DoS event versus DDoS but it still has the same effect of availability, it takes a server offline. And then now just in the first part of 2021 we're tracking multiple other vectors that are starting to be weaponized. And when we see this, we go from a few, you know, incidents or alerts to thousands month over month. And so we're seeing even more vectors added and that's only going to continue to go up into the right. You know that theme that we talked about at the beginning here. >> As more vectors get added, and what did you see last year in terms of industries that may have been more vulnerable? As we talked about the work from home, everyone was dependent, really here we are on Zoom, dependent on Zoom, dependent on Netflix. Streaming media was kind of a lifeline for a lot of us but it also was healthcare and education. Did you see any verticals in particular that really started to see an increase in the exploitation and in the risk? >> Yeah, so let's start, let's separate this into two parts. The last part of the key findings that we had was talking about a group we, or a campaign we call Lazarus Borough Model. So this is a global DDoS extortion campaign. We're going to cover that a little bit more when we talk about kind of extorted events and how that operates but these guys, they started where the money is. And so when they first started targeting industries and this kind of coincides with COVID, so it started several months after the pandemic was announced, they started targeting a financial organizations, commercial banking. They went after stock exchange. Many of you would hear about the New Zealand Stock Exchange that went offline. That's this LBA campaign and these guys taking it off. So they started where the money is. They moved to a financial agation targeting insurance companies. They targeted currency exchange places. And then slowly from there, they started to expand. And in so much as our Arbor Cloud folks actually saw them targeting organizations that are part of vaccine development. And so these guys, they don't care who they hurt. They don't care who they're going after. They're going out there for a payday. And so that's one aspect of the industry targeting that we've seen. The other aspect is you'll see, on the next slide here, we actually saw a bunch of different verticals that we really haven't seen in the top 10 before. In fact, if you actually look at this you'll see the number one, two and three are pretty common for us. We almost always are going to see these kinds of telecommunications, wireless, satellite, broadband, these are always going to be in the top. And the reason for that is because gamers and DDoS attacks associated with gaming is kind of the predominant thing that we see in this landscape. And let's face it, gamers are on broadband operating systems. If you're in Asian communities, often they'll use mobile hotspots. So now you start to have wireless come in there. And so that makes sense seeing them. But what doesn't make sense is this internet publishing and broadcasting and you might say, "Well, what is that?" Well, that's things like Zoom and WebEx and Netflix and these other streaming services. And so we're seeing adversaries going after that because those have become critical to people's way of life. Their entertainment, what they're using to communicate for work and school. So they realized if we can go after this it's going to disrupt something and hopefully we can get some recognition. Maybe we can show this as a demonstration to get more customers on our platform or maybe we can get a payday. In a lot of the DDoS attacks that we see, in fact most of them, are all monetary focused. And so they're looking for a payday. They're going to go after something that's going to likely, you know, send out that payment. And then just walk down the line. You can see COVID through this whole thing. Electronic shopping is number five, right? Everybody turned to e-commerce because we're not going to in-person stores anymore. Electronic computer manufacturing, how many more people have to get computers at home now because they're no longer in a corporate environment? And so you can see how the pandemic has really influenced this industry target. >> Significant influencer and I also wonder too, you know, Zoom became a household name for every generation. You know, we're talking to five generations and maybe the generations that aren't as familiar with computer technology might be even more exploitable because it's easy to click on a phishing email when they don't understand how to look for the link. Let's now unpack the different types of DDoS attacks and what is on the rise. You talked about in the report the triple threat and we often think of that in entertainment. That's a good thing, but again, not here. Explain that triple threat. >> Yeah, so what we're seeing here is we have adversaries out there that are looking to take advantage of every possible angle to be able to get that payment. And everybody knows ransomware is a household name at this point, right? And so ransomware and DDoS have a lot in common because they both attack the availability of network resources, where computers or devices or whatever they might be. And so there's a lot of parallels to draw between the two of these. Now ransomware is a denial of service event, right? You're not going to have tens of thousands of computers hitting a single computer to take it down. You're going to have one exploitation of events. Somebody clicked on a link, there was a brute force attempt that managed to compromise a little boxes, credentials, whatever it might be, ransomware gets put on a system, it encrypts all your files. Well, all of a sudden, you've got this ransom note that says "If you want your files decrypted you're going to send us this amount of human Bitcoin." Well, what adversaries are doing now is they're capitalizing on the access that they already gained. So they already have access to the computer. Well, why not steal all the data first then let's encrypt whatever's there. And so now I can ask for a ransom payment to decrypt the files and I can ask for an extortion to prevent me from posting your data publicly. Maybe there's sensitive corporate information there. Maybe you're a local school system and you have all of your students' data on there. You're a hospital that has sensitive PI on it, whatever it might be, right? So now they're going to extort you to prevent them from posting that publicly. Well, why not add DDoS to this entire picture? Now you're already encrypted, we've already got your files, and I'm going to DDoS your system so you can't even access them if you wanted to. And I'm going to tell you, you have to pay me in order to stop this DDoS attack. And so this is that triple threat and we're seeing multiple different ransomware families. In fact, if you look at one of the slides here, you'll see that there's SunCrypt, there's Ragnar Cryptor, and then Maze did this initially back in September and then more recently, even the DarkSide stuff. I mean, who hasn't heard about DarkSide now with the Colonial Pipeline event, right? So they came out and said, "Hey we didn't intend for this collateral damage but it happened." Well, April 24th, they actually started offering DDoS as part of their tool kits. And so you can see how this has evolved over time. And adversaries are learning from each other and are incorporating this kind of methodology. And here we have triple extortion event. >> It almost seems like triple extortion event as a service with the opportunities, the number of vectors there. And you're right, everyone has heard of the Colonial Pipeline and that's where things like ransomware become a household term, just as much as Zoom and video conferencing and streaming media. Let's talk now about the effects that the threat report saw and uncovered region by region. Were there any regions in particular that were, that really stood out as most impacted? >> So not particularly. So one of the phenomena that we actually saw in the threat report, which, you know, we probably could have talked about it before now but it makes sense to talk about it regionally because we didn't see any one particular region, one particular vertical, a specific organization, specific country, none was more heavily targeted than another. In fact what we saw is organizations that we've never seen targeted before. We've seen industries that have never been targeted before all of a sudden are now getting DDoS attacks because we went from a local on-prem, I don't need to be connected to the internet, I don't need to have my employees remote access. And now all of a sudden you're dependent on the internet which is really, let's face it, that's critical infrastructure these days. And so now you have all of these additional people with a footprint connected to the internet then adversary can figure out and they can poke at it. And so what we saw here is just overall, all industries, all regions saw these upticks. The exception would be in China. We actually, in the Asia Pacific region specifically, but predominantly in China. But that often has to do with visibility rather than a decrease in attacks because they have their own kind of infrastructure in China. Brazil's the same way. They have their own kind of ecosystems. And so often you don't see what happens a lot outside the borders. And so from our perspective, we might see a decrease in attacks but, for all we know, they actually saw an increase in the attacks that is internal to their country against their country. And so across the board, just increases everywhere you look. >> Wow. So let's talk about what organizations can do in light of this. As we are here, we are still doing this program by video conferencing and things are opening up a little bit more, at least in the states anyway, and we're talking about more businesses going back to some degree but there's going to still be some mix, some hybrid of working from home and maybe even distance learning. So what can enterprises do to prepare for this when it happens? Because it sounds to me like with the sophistication, the up and to the right, it's not, if we get attacked, it's when. >> It's when, exactly. And that's just it. I mean, it's no longer something that you can put off. You can't just assume that I've never been DDoS attacked, I'm never going to be DDoS attacked anymore. You really need to consider this as part of your core security platform. I like to talk about defense in depth or a layer defense approach where you want to have a layered approach. So, you know, maybe they target your first layer and they don't get through. Or they do get through and now your second layer has to stop it. Well, if you have no layers or if you have one layer, it's not that hard for an adversary to figure out a way around that. And so preparation is key. Making sure that you have something in place and I'm going to give you an operational example here. One of the things we saw with the LBA campaigns is they actually started doing network of conasense for their targets. And what they would do is they would take the IP addresses belonging to your organization. They would look up the domains associated with that and they would figure out like, "Hey, this is bpn.organization.com or VPN two." And all of a sudden they've found your VPN concentrator and so that's where they're going to focus their attack. So something as simple as changing the way that you name your VPN concentrators might be sufficient to prevent them from hitting that weak link or right sizing the DDoS protection services for your company. Did you need something as big as like OnPrem Solutions? We need hardware. Do you instead want to do a managed service? Or do you want to go and talk to a cloud provider because there's right solutions and right sizes for all types of organizations. And the key here is preparation. In fact, all of the customers that we've worked with for the LBA extortion campaigns, if they were properly prepared they experienced almost no downtime or impact to their business. It's the people like the New Zealand Stock Exchange or their service provider that wasn't prepared to handle the attacks that were sent out them that were crippled. And so preparation is key. The other part is awareness. And that's part of what we do with this threat report because we want to make sure you're aware what adversaries are doing, when new attack vectors are coming out, how they're leveraging these, what industries they're targeting because that's really going to help you to figure out what your posture is, what your risk acceptance is for your organization. And in fact, there's a couple of resources that that we have here on the next slide. And you can go to both both of these. One of them is the threat report. You can view all of the details. And we only scratched the surface here in this Cube interview. So definitely recommend going there but the other one is called Horizon And netscout.com/horizon is a free resource you can register but you can actually see near real-time attacks based on industry and based on region. So if your organization out there and you're figuring, "Well I'm never attacked." Well go look up your industry. Go look up the country where you belong and see is there actually attacks against us? And I think you'll be quite surprised that there's quite a few attacks against you. And so definitely recommend checking these out >> Great resources netscout.com/horizon, netscout.com/threatreport. I do want to ask you one final question. That's in terms of timing. We saw the massive acceleration in digital transformation last year. We've already talked about this a number of times on this program. The dependence that businesses and consumers, like globally in every industry, in every country, have on streaming on communications right now. In terms of timing, though, for an organization to go from being aware to understanding what adversaries are doing, to being prepared, how quickly can an organization get up to speed and help themselves start reducing their risks? >> So I think that with DDoS, as opposed to things like ransomware, the ramp up time for that is much, much faster. There is a finite period of time with DDoS attacks that is actually going to impact you. And so maybe you're a smaller organization and you get DDoS attacked. There's a, probably a pretty high chance that that DDoS attack isn't going to last for multiple days. So maybe it's like an hour, maybe it's two hours, and then you recover. Your network resources are available again. That's not the same for something like ransomware. You get hit with ransomware, unless you pay or you have backups, you have to do the rigorous process of getting all your stuff back online. DDoS is more about as soon as the attack stops, the saturation goes away and you can start to get back online again. So it might not be as like immediate critical that you have to have something but there's also solutions, like a cloud solution, where it's as simple as signing up for the service and having your traffic redirected to their scrubbing center, their detection center. And then you may not have to do anything on-prem yourself, right? It's a matter of going out to an organization, finding a good contract, and then signing up, signing on the dotted line. And so I think that the ramp up time for mitigation services and DDoS protection can be a lot faster than many other security platforms and solutions. >> That's good to know cause with the up and to the right trend that you already said, the first quarter is usually slow. It's obviously not that way as what you've seen in 2021. And we can only expect what way, when we talk to you next year, that the up and to the right trend may continue. So hopefully organizations take advantage of these resources, Richard, that you talked about to be prepared to mediate and protect their you know, their customers, their employees, et cetera. Richard, we thank you for stopping by theCube. Talking to us about the sixth NetScout Threat Intelligence Report. Really interesting information. >> Absolutely; definitely a pleasure to have me here. Lisa, anytime you guys want to do it again, you know where I live? >> Yes. It's one of my favorite topics that you got and I got to point out the last thing, your Guardians of the Galaxy background, one of my favorite movies and it should be noted that on the NetScout website they are considered the Guardians of the Connected World. I just thought that connection was, as Richard told me before we went live, not planned, but I thought that was a great coincidence. Again, Richard, it's been a pleasure talking to you. Thank you for your time. >> Thank you so much. >> Richard Hummel, I'm Lisa Martin. You're watching this Cube conversation. (relaxing music)

Published Date : Jul 15 2021

SUMMARY :

Excited to talk to you. it's a pleasure to be here. that you saw in particular that that comes to mind because One of the global trends and themes And then you have this normal where and to the right trend? And so any person that wants that really started to see an increase In a lot of the DDoS attacks that we see, and maybe the generations that aren't And so there's a lot of parallels to draw effects that the threat report And so now you have all but there's going to still be some mix, and I'm going to give you to understanding what that is actually going to impact you. that the up and to the a pleasure to have me here. and I got to point out the last thing, You're watching this Cube conversation.

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
RichardPERSON

0.99+

Richard HummelPERSON

0.99+

Lisa MartinPERSON

0.99+

two hoursQUANTITY

0.99+

2020DATE

0.99+

ChinaLOCATION

0.99+

$10QUANTITY

0.99+

New Zealand Stock ExchangeORGANIZATION

0.99+

April 24thDATE

0.99+

New Zealand Stock ExchangeORGANIZATION

0.99+

20%QUANTITY

0.99+

SeptemberDATE

0.99+

twoQUANTITY

0.99+

2021DATE

0.99+

July 2021DATE

0.99+

LisaPERSON

0.99+

second layerQUANTITY

0.99+

last yearDATE

0.99+

mid 2020DATE

0.99+

Guardians of the GalaxyTITLE

0.99+

FebruaryDATE

0.99+

NetScoutORGANIZATION

0.99+

first layerQUANTITY

0.99+

JanuaryDATE

0.99+

bpn.organization.comOTHER

0.99+

next yearDATE

0.99+

one layerQUANTITY

0.99+

800,000QUANTITY

0.99+

last yearDATE

0.99+

12 million attacksQUANTITY

0.99+

bothQUANTITY

0.99+

Colonial PipelineEVENT

0.99+

190,000 individualsQUANTITY

0.99+

fourQUANTITY

0.99+

an hourQUANTITY

0.99+

OneQUANTITY

0.99+

netscout.com/horizonOTHER

0.99+

first articlesQUANTITY

0.99+

NetflixORGANIZATION

0.99+

Guardians of the Connected WorldTITLE

0.99+

ZoomORGANIZATION

0.99+

oneQUANTITY

0.99+

one final questionQUANTITY

0.99+

two partsQUANTITY

0.98+

2.9 million attacksQUANTITY

0.98+

over 10 million attacksQUANTITY

0.98+

Arbor NetworksORGANIZATION

0.98+

one aspectQUANTITY

0.98+

pandemicEVENT

0.98+

2019DATE

0.98+

five generationsQUANTITY

0.97+

threeQUANTITY

0.97+

tens of thousandsQUANTITY

0.97+

firstQUANTITY

0.96+

Ragnar CryptorPERSON

0.96+

first quarter of 2021DATE

0.96+

four quartersQUANTITY

0.95+

GoogleORGANIZATION

0.95+

nearly 200,000 folksQUANTITY

0.95+

Jim Richberg, Fortinet | CUBEconversation


 

(upbeat music) >> Welcome to this Cube Conversation. I am Lisa Martin. Jim Richberg joins me next, public sector CISO at Fortinet. Welcome to the program. Great to see you. >> Okay, good to be with you, Lisa. >> Lots of stuff has happened in the last year. I mean that's an epic understatement, right? But one of the things that... We saw this massive shift to work from home, and now we're... I hope I can say coming out of the pandemic, and we're starting to see this hybrid model of kind of work from anywhere. We also saw the massive spike in ransomware last year. Ransomware now being suddenly a household term. There's so much money in it. From a hybrid approach, what are some of the things that you're seeing? >> So, when we talk about hybrid, what we go back to is not going to be the office that we left. Some of us aren't going back at all. Some of us are going back in. We're not going to have assigned desks. Some of the offices are going to be in different places, and the nature of the work that we've been doing has changed. So it definitely means the new normal isn't going to look like the old normal did before March of 2021. So I tell organizations that they really need to think about what that means in terms of how they structure work, how they structured their networks. Because as you said, Lisa, it's going to be work from anywhere. Some of us are going to go back out on the road. We'll be the road warriors again. So you're not going back to a classic network, in an office with CAT5 Cat 5 cables, connecting everybody's desktop. And some of us are even going to get hired who never ever go to the office. So this is a situation where we really have to think through what this means in terms of how we work, the culture we have as a workplace, and unfortunately, it's not just the enterprise and the workforce that have been innovating. The threat actors have gone hybrid. There was a little pause while they started working from home, figuring out what to do, but the reality is they took us to lunch when they figured out exactly what these vulnerabilities in the small office, home office environment were, and how to exploit them. Lisa, you talked about ransomware rising 700% in the latter half of last year. And this is actually indicative of what I think is the biggest problem we have in cyber security. It's not technology. If you're willing to do a rip and replace and put in state of the art technology, there's some really good solutions. Some of that technology, when it starts incorporating artificial intelligence and automation, actually goes a long way to compensate for the workforce and skills gap we all hear about, 3 million people short. That's a true number. But Lisa, the biggest problem in cyber security from my perspective, and I've been doing this for 35 years, is metrics. We can't measure what's going on and say, "If I do this, this is how it affects the network security and this is how it affects the adversary's behavior." And that's exactly what we saw in this pivot to remote telework. It took networking and security working hand in hand to make that pivot. Because I've seen those two as the centerpiece of their organization. In March of last year, when we all went into lockdown, we would've gone and do shutdown if we haven't had the ability to forward deploy that IT to the home environment. And we can measure our success on the IT side. Did we have enough bandwidth? Did we give them the right platforms? Did the latency mean things froze up or not? We couldn't measure cybersecurity as well. We said, "Okay, due diligence says we'll give you a two-factor authentication, and we're going to do a secure connection back to the office. But then they said we were basically treating it as if you were logged on from your cube or your office, and the reality is you weren't. You were logged in from an environment that your organization had very little, if any, visibility or control into what was going on there, and that's how we got exploited. And because we couldn't measure that, it was only in hindsight that we could see exactly how insecure that was for many organizations. We cut corners. We had to do this to get up and running. That's not a good jumping off point for your status quo going into this hybrid environment in the future. >> So it sounds like you said the ransomware... When I spoke with with Derek Manky, I think about last month or so, ransomware were up 700%. I can only imagine what's happening this year, but one of the things I want to get your perspective on, Jim, is, what's top of mind for both public sector and private sector folks? As you're saying from a measurement perspective, There's a challenge there. There's this hybrid model that's amorphous we'll say. What are some of the things that are top of mind for them, and then how are you helping advise them? Because, as you say, the threat actors got to work pretty quick, so there's a race here. >> Well, top of mind for both of course is ransomware. And the ironic thing is ransomware is not a new phenomenon. It's been with us for a long time. It used to affect retail, one computer at a time, and it was 50 or 100 bucks to decrypt your personal computer. What has changed is the rise of cryptocurrency. It's so easy to monetize the ability to cash out with the victim now. There was a time five to 10 years ago where there were basically three places that were essentially the clearinghouses for this kind of stuff. So government could target those through law enforcement, and that meant that you really had the equivalent of the pawnbroker you needed to watch out for who was the fence that people were going to. Now, come on, cryptocurrency is essentially a fiat currency in some countries. So it's going everywhere. The fact that we have commoditized the ability to do it, you're familiar with ransomware as a service. You don't have to be a coder now. You rent the stuff. Sometimes you pay as much as 80% of the profit to the person you're renting it from. You're basically the mule doing the grunt work, but we've made it so that you don't need to know anything about computer science to carry this kind of crime off. And frankly, we've got some safe haven, some geopolitical safe heavens. It's much like spam was 10 years ago where there were a few countries where probably more traffic coming out as email was spammed in legitimate traffic. And we've got some big nation stages that are basically complicit in allowing this to occur, so safe haven. So this is why ransomware has become such a problem for everybody, and then of course you've got supply chain. You look at solar winds, you look at Microsoft Exchange, Office 365 vulnerability. This again is a problem that's been with us for a long time. It's one that tends to be focused primarily on government customers, because this is something where, yeah, you can do it as a criminal activity, but this really tends to be a game that nation states play against nation state terms. But something like SolarWinds was such an epiphany, was so serious that a lot of organizations said, "Oh my goodness, this attacked the root of trust. This fundamentally got into the system from the inside out." It scared people. And the reality is something like that infected far more people than were actively exploited. I've talked to some people in both the public sector at the state level, and in private sector who say, "Yes, my organization was compromised by this, but we weren't affected." So from my perspective, we were collateral damage. We were caught in the crossfire of a war between nation states. Do we want to spend our scarce cyber security resources trying to mitigate that kind of sophisticated threat? No, not when we know we've got ransomware, when we've got these vulnerabilities in the work from anywhere environment. That's where I want to put my next dollars. So it's been a health conversation with some of them as to what's most concerning to them and what they want to prioritize in mitigation. >> So if we look at some of the executive orders, Jim, that have come down, ransomware I said became a household word. I'm pretty sure my mom even knows the term ransomware, the Colonial Pipeline, the meat packing, where we're starting to see, wow, this is not just, as you said earlier in the beginning, isolated incidents or attacks. This is now affecting infrastructure, potentially public health and safety. Talk to me about some of the executive orders. What do you think they're going to do and where should agencies start? This race is going on. Like you said, they've got to be able to prioritize how they defend themselves. >> So two things to keep in mind when you look at an executive order. An executive order is the chief executive telling the executive branch what to do. If you look at the last executive order that President Biden signed on the 12th of May, people became seized with the fact that, "Oh my goodness, it tells the private sector it has to give threat information, it has to give breach information to the federal government, it has to change what it does in supply chain." You go no. It says when the federal government is your customer, when you're selling them a service, you have to do this. But otherwise, you don't do, by an executive order, something... It doesn't have the force of law. It just is the way you tell the executive branch to behave. So use that executive order as a case on point. Very large, very complex executive order that touched a lot of these things, ransomware, supply chain issues. The problem is you put a whole lot of good ideas in one executive order. You put a whole lot of aggressive time frame. Some things had to be done in 30, 45 days, 60 days, which is two weeks from now. It's crazy because one thing an executive order doesn't do is give you more money. The only way a government agency can spend money on this is if it aligned with the program it already had, or it has contingency funds, reserved funds to do it. So the problem is you take an executive order, you cram it full of good ideas, and you have too many good ideas. So the reality is this executive order tells the government to do a lot of things at once, and it has to by law, well, by the president's direction, focus on all this at once. But if I could pick and choose these, I would say start with the section that said focus on modernizing the cybersecurity of the federal government. There's goodness to come out of that. It has zero trust architecture. Federal government did a great idea of articulating what that was, even years before we called it zero trust. Federal government was segmenting its networks. It had need-to-know access. It was doing things. I come from the national security community. That was just the way we worked. We didn't call it anything fancy like zero trust. We didn't trust anybody. That's the way it worked in the spy business. But zero trust architecture, accelerating migration to the cloud, putting in multi-factor authentication and encryption of data at rest and in transit, deploying endpoint detection and response. Those are things in the executive order that if agencies could focus on those and make progress on implementing those, thumbs up, you have appreciably increased security without even touching the harder things that unfortunately are going to distract people like supply chain, and definitions of what critical software is and the cyber safety board. All good things, but the problem is if you try to do everything at once, the reality is you end up making progress on, appreciable progress on nothing. >> Right, which obviously we don't have the time for that. I'm curious getting your point, because one of the challenges with respect, well, threat vectors with respect to cybersecurity is people. With this shift to home, we had people using corporate devices on home networks and random devices, and now we've got this, as we talked about earlier, this hybrid approach coming back. But how much can zero trust help agencies really educate or really help defend form the human error that is often the cause of getting ransomware through email or an attachment. >> So, Lisa, that is exactly... We're handicapped by the name because zero trust sounds like I don't trust you, you're not trustworthy, rather than trust should be based on the transaction. Like if you need to read data to a file, why am I giving the ability to write to the file or, even worse, delete the file? Just give you what you need to get the job done. And this is tech that is your safety net. It's not Big Brother. When you do real-time monitoring as part of dynamic zero trust, it looks at it and says, "Well, Lisa is doing something she doesn't normally do with this application. Did she make a mistake? Did she say reply all on this, which was sending inside data to outside people on the email list? Do I at least want to ask her? Hey, Lisa, did you mean to do that?" So if you can educate people to say this is the organization looking out for you, it's looking over your shoulder as a friend. It's not here to be checking up on you. Language matters, and it's like we call things insider threat, recognizing that far more damage in an organization happens from people making mistakes. It's insider risk that we need to manage. An organization of any appreciable size has bad apples. That's just a law of nature. But when we call it.... I'm dealing with the insider threat. I've been in government. I've been shot at in some of my dicey situations. I want to avoid being attacked. I want to avoid threats. If I'm an organization, I don't want to avoid my insiders. That's my workforce. That's my biggest asset. They bring risk by their behavior. I need to manage that, but that's constructive. Don't make an adversarial by typecasting them all as threats. They're humans. They make mistakes. You can help them avoid some of those mistakes through technology, and zero trust gets into that. >> Got it. And then last question for you. Here we are, July 1st, crazy. Half a year has gone already. What are some of the things that you're expecting that are going to happen the rest of the year? What can organizations... You talked about some of the things they can implement now. Some of the things seems to be sort of like back to basics. But anything that you see on the horizon in the next six to nine months that organizations really need to be focused on? >> So as they put together their posture for operating in the new normal, I said security and IT were successful in getting us where we got in the pivot to remote telework because they worked hand in hand. So find things like that that you can use to demonstrate to your organization that you really are in the middle of the mix. So as we make this pivot to software defined networking. Because again, if we're going back to offices that are different, places with different kinds of infrastructure, we don't want to pull cable. We don't want to do that. Software-defined networking is a good way to do it, and there are different ways to do software-defined networking, some of which are inherently secure. So pick that one. In software-defined networking, the users love the fact that it gives them better latency, better performance on the apps they care about. The front office likes the fact that they get flexibility for continuity of operations, and they save money. This is the example of something that you can pick that allows you to say, "I'm giving you great performance and great security." Cloud is the same way. People understand I think at this point how to operate in a cloud, the challenge comes in saying, "I'm operating in multiple clouds." I need to say I don't really care. I don't really care where the data go or the compute resource is. I just need to connect the user, the device, data, and resources, regardless of location. And that's where this big approach to say, you know, it's about convergence. It's about convergence of IT and security, and really it's about convergence of computing to say, "I don't care if it's edge computing, or cloud computing, or work from home." It's all just computing, and we've got to connect, and we've got to enable that to be secure. That's the priority that if you take that mindset, thinking about the problem going forward, I think will allow CIOs and CISOs to say, "Look, we're making a difference for the organization, performance, cost, and security." >> Performance, cost, and security. It also sounds like a bit of a cultural change there, which is always challenging, but certainly that convergence as you mentioned, we've seen it be successful, and it's something that sounds now more important than ever. Jim, thank you so much for joining me on the program today, sharing all of your insights, some of the things that you're seeing in what organizations can do to protect themselves from this big threat of ransomware that probably isn't going anywhere anytime soon. >> I wouldn't expect it to, but it's been a pleasure talking to you, Lisa, and we'll have to look back and see how accurate we were with this crystal ball. >> Good, yeah. Jim, great to have you on the program. For Jim Richberg, I'm Lisa Martin. You're watching this Cube Conversation. (gentle music)

Published Date : Jul 8 2021

SUMMARY :

Welcome to the program. But one of the things that... and the reality is you weren't. but one of the things I want to get your commoditized the ability to do it, of the executive orders, the executive branch to behave. that is often the cause outside people on the email list? Some of the things seems to be the pivot to remote telework some of the things that you're seeing talking to you, Lisa, Jim, great to have you on the program.

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
Jim RichbergPERSON

0.99+

Lisa MartinPERSON

0.99+

JimPERSON

0.99+

50QUANTITY

0.99+

LisaPERSON

0.99+

Derek MankyPERSON

0.99+

July 1stDATE

0.99+

35 yearsQUANTITY

0.99+

30QUANTITY

0.99+

45 daysQUANTITY

0.99+

100 bucksQUANTITY

0.99+

two-factorQUANTITY

0.99+

last yearDATE

0.99+

MarchDATE

0.99+

60 daysQUANTITY

0.99+

PresidentPERSON

0.99+

700%QUANTITY

0.99+

one computerQUANTITY

0.99+

10 years agoDATE

0.99+

FortinetORGANIZATION

0.99+

bothQUANTITY

0.99+

two thingsQUANTITY

0.99+

one executive orderQUANTITY

0.99+

three placesQUANTITY

0.98+

MicrosoftORGANIZATION

0.98+

pandemicEVENT

0.98+

this yearDATE

0.98+

12th of MayDATE

0.98+

Office 365TITLE

0.98+

zero trustQUANTITY

0.97+

fiveDATE

0.97+

last monthDATE

0.97+

March of 2021DATE

0.97+

twoQUANTITY

0.96+

Half a yearQUANTITY

0.96+

oneQUANTITY

0.96+

80%QUANTITY

0.96+

BidenPERSON

0.96+

todayDATE

0.95+

two weeksQUANTITY

0.94+

CAT5COMMERCIAL_ITEM

0.93+

Colonial PipelineORGANIZATION

0.92+

nine monthsQUANTITY

0.91+

governmentORGANIZATION

0.82+

CubeTITLE

0.81+

Federal governmentORGANIZATION

0.81+

zeroQUANTITY

0.8+

latter half of last yearDATE

0.77+

ExchangeTITLE

0.75+

one thingQUANTITY

0.73+

about, 3 million peopleQUANTITY

0.69+

Cat 5COMMERCIAL_ITEM

0.68+

sixQUANTITY

0.6+

onceQUANTITY

0.49+

SolarWindsORGANIZATION

0.47+

Roberto Giordano, Borsa Italiana | Postgres Vision 2021


 

(upbeat music) >> From around the globe, it's theCUBE! With digital coverage of Postgres Vision 2021, brought to you by EDB. >> Welcome back to Postgres Vision 21, where theCUBE is covering the innovations in open source trends in this new age of application development and how to leverage open source database technologies to create world-class platforms that are cost-effective and also scale. My name is Dave Vellante, and with me is Roberto Giordano, who is the End User Computing, Corporate, and Database Services Manager at Borsa Italiana, the Italian Stock Exchange. Roberto, great to have you. Thanks for coming on. >> Thanks Dave, and thanks to the interview friend for the invitation. >> Okay, and we're going to dig in to the great customer story here. First, Roberto, tell us a little bit more about Borsa Italiana and your role at the organization. >> Absolutely. Well, as you mentioned, Borsa is the Italian Stock Exchange. We used to be part of the London Stock Exchange, but last month we left that group, and we joined another group called Euronext, so we are now part of another group, I would say. And right now within Euronext, Euronext provide the biggest liquidity pool in Europe, just to mention something. And basically we provide the market infrastructure to our customers across Europe and the whole world. So probably if it happens for you to buy a little of, I don't know, Ferrari for instance, probably use our infrastructure. >> So I wonder if you could talk about the key drivers in the exchange business in Italy. I don't know how closely you follow what's going on in the United States, but it's crypto madness, there's the Reddit army driving up stocks that have big short positions, and of course the regulators have to look at that, and there's a big debate going on. Well, I don't know what's it like in Italy, but what are the key drivers that are really informing the priorities for your technology strategy? >> Well, you mentioned, for instance, the stereotypical cases that are a little bit of laterally to the global markets and also to our markets as a it professional running market infrastructure is our first the goal to provide an infrastructure that is reliable and be with the lowest possible latency. So we are very focused on performance and reliability just to mention the two main drivers within our systems. >> Well, and you have end-user computing in your title and we're going to get into the database discussion, but I presumably with with COVID you had to pivot and that that piece of your job was escalated in 2020, I would imagine. And you mentioned latency which is a key factor in obviously in database access but that must've been a big challenge last year. >> Well, it was really a challenge, but basically we move just within a weekend, the wall organization working remotely. And it has been like this since February, 2020. Think about the challenge of moving almost 1000 people that used to come to the office every day to start to work remotely. And as within my team of the end user computing this was really a challenge but it was a good one at the end. We, we, we succeeded and everything work. It's fine from our perspective, no news is is a good news, you know, because normally when something doesn't work, we are on newspapers. So if you didn't heard about us it means that everything worked out just fine. >> Yeah. It's amazing, Roberto. We both in the technology business that you'll be you're a practitioner observer, but I mean if you're in the tech business most companies actually pivoted quite well. You're have always been a digital business, different. I mean, if you're a Ferrari and making cars and you can't get semiconductors, but but most technology companies actually made the transition you know, quite amazingly, let's get into the, the case study a bit of it. I wonder if you could paint a picture of your organization's infrastructure and applications what it looks like and and particularly your database infrastructure what does that look like? >> Well, we are a multi-vendor shop. So we would like to pick the right technology for for the right service. This means that my database services teams currently manage several different technology where possible that plays a big role in, in, in our portfolio. And because we, we, we currently support both the open source, fully open source version of Postgres, but also the EDB distribution in particular we prefer to use EDB distribution where we did specific functionalities that just EDB provide. And we, when we need a first class level of support that EDB in recent year was able to provide to us. >> When you say full functioning, are you talking about things like acid compliance, two phase commits? I mean, all these enterprise capabilities, is that right? Or maybe you could be >> Just too much just to mention one, for instance we recently migrated our wire intrasite availability solution using the ADB fail-over manager. That is an additional component that just it'll be provide. >> Yeah. Okay. So, so par recovery obviously is, is and so that's a solution that you to get from the EDB distro as opposed to having to build it yourself with open source tooling. >> Yeah, correct. Well, basically sterically, we used to rely on OSTP clustering from, from, from that perspective. But over the years we found that even if it's a technology that works fine, it has been around for four decades. And so on. We faced some challenges internally because within my team we don't own also the operative system layers. So we want a solution that was 100% within our control and perimeter. So just few months ago we asked the EDB EDB folks if they can provide something. And after a couple of meetings also with their pre-sales engineers, we found the the right solution for us. So we launched long story short, just a quick proof of concept to a tissue test together, again using the ADB consultancy. And, and then we, beginning of this year, we, we went live with the first mission critical service using this brand new technology, well brand new technology for us. You know, it'd be created a few years ago >> And I do have some follow-up questions but I want to understand what catalyzed the, you know what was the motivation for going with an open source database? I mean, you're, you're a great example because you have your multi-vendor so you have experienced with all of it, the full spectrum. What was it about open source database generally EDB specifically that triggered the, the choice? >> Well thanks for the question. It is, this is one of the, or one of the questions that I always, like. I think what really drove us was the right combination between easy to use, so simplicity and also good value for money. So we like to pick the right database technology for the right kind of service slash budget that the survey says and, and the open source solution for a specific service. It, it, it's, it's our, you know, first, first, first choice. So we are not going to say a company that use just one technology. We like to take the best of breed that the market can offer. In some cases, the open source and Postgres in particular is, is our choice. How involved was >> The line of business in this both the decision and the implementation? Was it kind of invisible to them, or this was really more of a technology decision based on the your interpretation of the requirements I'm interested in who was involved and how you actually got it done? >> Well, I, I think this decision was transplant for, for, for, for the business at the end of the day don't really have that kind of visibility. You know, they just provide requirements in particular in terms of performance and rehabil area, the reliability. And so, so this this is something they are not really involved about. And obviously if they, if we are in opposition to save a little bit of money everybody's at the, even the business >> No. So what did you have to do? So that makes sense to me, I figured that was the case. Who would, who were the stakeholders on your team? I mean, what kind of technical resources did you require an implementation resources? What take us through what the project if you will look like, wh how did you do it? >> Well, it's a combination of database expertise. I got the pleasure to run a team that is paid by very, very senior, very, very skilled database services professional that are able to support more than one more than what the county and also are very open to innovation and changes. Plus obviously we need also the development teams the relevant development teams on board, when you when you run this kind of transformations and it looks like also, they liked the idea to use PostgreSQL for for this specific service I got in mind. So it, it, it was quite, quite easy, not be discussion. You know. >> What was the, what was the elapsed time from from when you said, okay, we're in, you know signed the agreement we're going here you made the decision to actually getting into production. >> Well, as I mentioned, we, we, we were on we're on services and application that are really focused on high availability and performance. So generally speaking, we are not a peak organization. Also we run a business that is highly regulated. So as you know, as you can imagine we are an organization that don't have a lot of appetite for risk, you know, so generally speaking in order to run this kind of transformation is a matter of several months, I will say six nine months to have something delivered in that space. >> Okay. Well, that's, I mean, that's reasonable. I mean, if you could do it inside of a year that's I think quite good especially in the highly regulated industry. And then you mentioned kind of the fail over the high availability Cape Cape capabilities. Were there other specific EDB tools that that you utilize to sort of address the objectives? >> Yeah, absolutely. We were in particular, we used Postgres enterprise, AKA Pam. Okay. And very recently we were involved within ADB about per se specifically developing one functionality that, that that we needed back in the day. I think together with Bart these are the free EDB specific tools that, that we, that that we use right now. >> And, and I'm, I'm interested in, I want to get to the business impact and I know it's early days for you but the real motivation was to save money and simplify. I would actually, I would imagine your developers were happy because they get to use modern tooling and open source. But, but really though if your industry is bottom line, right, I mean that's really what the, the business case was all about. But I wonder if you could add some color there in terms of the business impact that you expect. And then, I mean I don't know how much visibility you have now but anything you can share with us. >> Well, thinking about the EFM implementation that the business impact the, was that in case of a failure or the DBA team that a services team is it is able to provide a solution that is within our 100% within our perimeter. So this means that we are fully accountable for it. So in a nutshell, when you run a service, the less people the less teams you have to involve the more control you can deliver. And in some, again, very critical services that is a great value. >> Okay. So, and, and where do you want to take this? I mean, how do you see w what's your, if you're thinking about your Postgres and, and generally an EDB you know, roadmap, where do you want it to go? >> Well, I stay to, to trends within within the organization, the, the, the, the the first one is about migrating more existing services to open source solution for database is going to be, is going to be prosperous. And other trends that I see within my organization is about designing applications, not really to be, to to use PostgreSQL as the base, as it does a base layer. I think both trends are more or less surroundings at the same state right now. >> Yeah. A lot of the audience members at Postgres vision 21 is just like you they they're managing day-to-day infrastructure. They're there they're expert practitioners. What advice would you give to somebody that is thinking about, you know taking this journey, maybe if you had to do something over again maybe what would you do differently? How can you help your peers here? >> Well, I think in particular, if you are going to say a big organization that runs a highly regulated business in some cases, you are a little bit afraid of open source because there is this, I can say general consideration about the lack of enterprise level support. I would like to say that it is just about the past because they're around bunch of companies like EDB that are we're a hundred percent capable of providing enterprise level of support, even on, on, on even on the open source distribution of Paul's presser. Obviously Dan is you're going to go with their specific distribution. The level of support is going to be even more accurate but as we know, it could be currently is they across say main contributor of the pollsters community. And I think is, is that an insurance for every organization? >> Your advice is don't be afraid. >> Yeah. My advice is done is absolutely, don't be, don't be afraid. And if, if, if I can, if we can mention about also about, you know, the cloud called technologies this is also another, another topic where if possible I would like to suggest to not being afraid EDB as every every I would say organization within the it industry is really pushing for it. And I think for a very, for, for a lot of cases not all of them, but a lot of cases, there is a great value about the design services application to be cloud native or migrating existing application into the cloud. >> Okay. But, but being a highly regulated industry and being a, you know, very much aware of the the narrative around open source, et cetera, you, you must've had just a little piece of your mind saying, okay I have to manage this risk. So there's anything specifically you did with managing the risks that you would advise? Was it, was it or is it really just about good change management? >> I think it was mainly about a good change management when you got, you know the relevant stakeholders that you need on board and we are, everybody's going the same direction. That basically is about executing. >> Excellent. Well, Roberto, I really appreciate your time and your knowledge that you share with the audience. So thanks so much for coming on the cube. >> Thank you, Dave. It was a great pleasure. >> And thank you for watching the cubes continuous coverage of Postgres vision 21. We'll be right back. (upbeat music)

Published Date : Jun 21 2021

SUMMARY :

brought to you by EDB. the Italian Stock Exchange. for the invitation. role at the organization. Europe and the whole world. and of course the regulators the goal to provide an Well, and you have end-user computing So if you didn't heard about us I wonder if you could paint a picture of Postgres, but also the EDB distribution in particular that just it'll be provide. and so that's a solution that you to get the right solution for us. all of it, the full spectrum. breed that the market can offer. at the end of the day No. So what did you have to do? I got the pleasure to signed the agreement we're going here of appetite for risk, you that you utilize to sort that we needed back in the day. impact that you expect. the less teams you have to involve I mean, how do you see w the same state right now. maybe what would you do differently? of the pollsters community. about also about, you know, that you would advise? the relevant stakeholders that you need So thanks so much for coming on the cube. It was a great pleasure. And thank you for watching the cubes

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
RobertoPERSON

0.99+

EuronextORGANIZATION

0.99+

Dave VellantePERSON

0.99+

DavePERSON

0.99+

EuropeLOCATION

0.99+

Borsa ItalianaORGANIZATION

0.99+

ItalyLOCATION

0.99+

FerrariORGANIZATION

0.99+

Roberto GiordanoPERSON

0.99+

100%QUANTITY

0.99+

PaulPERSON

0.99+

February, 2020DATE

0.99+

BorsaORGANIZATION

0.99+

2020DATE

0.99+

United StatesLOCATION

0.99+

oneQUANTITY

0.99+

last yearDATE

0.99+

London Stock ExchangeORGANIZATION

0.99+

RedditORGANIZATION

0.99+

firstQUANTITY

0.99+

FirstQUANTITY

0.99+

last monthDATE

0.99+

PamPERSON

0.99+

DanPERSON

0.99+

bothQUANTITY

0.99+

PostgresORGANIZATION

0.99+

EDBORGANIZATION

0.98+

two main driversQUANTITY

0.98+

six nine monthsQUANTITY

0.98+

few months agoDATE

0.98+

four decadesQUANTITY

0.98+

BartPERSON

0.98+

Italian Stock ExchangeORGANIZATION

0.97+

almost 1000 peopleQUANTITY

0.97+

PostgreSQLTITLE

0.96+

more than oneQUANTITY

0.95+

first classQUANTITY

0.95+

first oneQUANTITY

0.94+

two phaseQUANTITY

0.93+

few years agoDATE

0.9+

Cape CapeLOCATION

0.9+

EDBTITLE

0.88+

Postgres VisionORGANIZATION

0.88+

one technologyQUANTITY

0.88+

this yearDATE

0.88+

a yearQUANTITY

0.87+

one ofQUANTITY

0.84+

first missionQUANTITY

0.81+

hundred percentQUANTITY

0.8+

one functionalityQUANTITY

0.79+

recent yearDATE

0.78+

Postgres vision 21ORGANIZATION

0.75+

questionsQUANTITY

0.74+

theCUBEORGANIZATION

0.71+

2021DATE

0.71+

both trendsQUANTITY

0.7+

first choiceQUANTITY

0.7+

Postgres Vision 21ORGANIZATION

0.69+

ADBTITLE

0.68+

ADBORGANIZATION

0.63+

PostgresTITLE

0.53+

COVIDORGANIZATION

0.51+

Vision 2021EVENT

0.41+

old version - Roberto Giordano, Borsa Italiana | Postgres Vision 2021


 

(upbeat music) >> From around the globe, it's theCUBE! With digital coverage of Postgres Vision 2021, brought to you by EDB. >> Welcome back to Postgres Vision 21, where theCUBE is covering the innovations in open source trends in this new age of application development and how to leverage open source database technologies to create world-class platforms that are cost-effective and also scale. My name is Dave Vellante, and with me is Roberto Giordano, who is the End User Computing, Corporate, and Database Services Manager at Borsa Italiana, the Italian Stock Exchange. Roberto, great to have you. Thanks for coming on. >> Thanks Dave, and thanks to the interview friend for the invitation. >> Okay, and we're going to dig in to the great customer story here. First, Roberto, tell us a little bit more about Borsa Italiana and your role at the organization. >> Absolutely. Well, as you mentioned, Borsa is the Italian Stock Exchange. We used to be part of the London Stock Exchange, but last month we left that group, and we joined another group called Euronext, so we are now part of another group, I would say. And right now within Euronext, Euronext provide the biggest liquidity pool in Europe, just to mention something. And basically we provide the market infrastructure to our customers across Europe and the whole world. So probably if it happens for you to buy a little of, I don't know, Ferrari for instance, probably use our infrastructure. >> So I wonder if you could talk about the key drivers in the exchange business in Italy. I don't know how closely you follow what's going on in the United States, but it's crypto madness, there's the Reddit army driving up stocks that have big short positions, and of course the regulators have to look at that, and there's a big debate going on. Well, I don't know what's it like in Italy, but what are the key drivers that are really informing the priorities for your technology strategy? >> Well, you mentioned, for instance, the stereotypical cases that are a little bit of laterally to the global markets and also to our markets as a it professional running market infrastructure is our first the goal to provide an infrastructure that is reliable and be with the lowest possible latency. So we are very focused on performance and reliability just to mention the two main drivers within our systems. >> Well, and you have end-user computing in your title and we're going to get into the database discussion, but I presumably with with COVID you had to pivot and that that piece of your job was escalated in 2020, I would imagine. And you mentioned latency which is a key factor in obviously in database access but that must've been a big challenge last year. >> Well, it was really a challenge, but basically we move just within a weekend, the wall organization working remotely. And it has been like this since February, 2020. Think about the challenge of moving almost 1000 people that used to come to the office every day to start to work remotely. And as within my team of the end user computing this was really a challenge but it was a good one at the end. We, we, we succeeded and everything work. It's fine from our perspective, no news is is a good news, you know, because normally when something doesn't work, we are on newspapers. So if you didn't heard about us it means that everything worked out just fine. >> Yeah. It's amazing, Roberto. We both in the technology business that you'll be you're a practitioner observer, but I mean if you're in the tech business most companies actually pivoted quite well. You're have always been a digital business, different. I mean, if you're a Ferrari and making cars and you can't get semiconductors, but but most technology companies actually made the transition you know, quite amazingly, let's get into the, the case study a bit of it. I wonder if you could paint a picture of your organization's infrastructure and applications what it looks like and and particularly your database infrastructure what does that look like? >> Well, we are a multi-vendor shop. So we would like to pick the right technology for for the right service. This means that my database services teams currently manage several different technology where possible that plays a big role in, in, in our portfolio. And because we, we, we currently support both the open source, fully open source version of PostgreSQL, but also the EDB distribution in particular we prefer to use DDB distribution where we did specific functionalities that just EDB provide. And we, when we need a first class level of support that ADB in in recent year was able to provide to us. >> When you say full functioning, are you talking about things like acid compliance, two phase commits? I mean, all these enterprise capabilities, is that right? Or maybe you could be >> Just too much just to mention one, for instance we recently migrated our wire intrasite availability solution using the ADB fail-over manager. That is an additional component that just it'll be provide. >> Yeah. Okay. So, so par recovery obviously is, is and so that's a solution that you to get from the EDB distro as opposed to having to build it yourself with open source tooling. >> Yeah, correct. Well, basically sterically, we used to rely on OSTP clustering from, from, from that perspective. But over the years we found that even if it's a technology that works fine, it has been around for four decades. And so on. We faced some challenges internally because within my team we don't own also the operative system layers. So we want a solution that was 100% within our control and perimeter. So just few months ago we asked the EDB EDB folks if they can provide something. And after a couple of meetings also with their pre-sales engineers, we found the the right solution for us. So we launched long story short, just a quick proof of concept to a tissue test together, again using the ADB consultancy. And, and then we, beginning of this year, we, we went live with the first mission critical service using this brand new technology, well brand new technology for us. You know, it'd be created a few years ago >> And I do have some follow-up questions but I want to understand what catalyzed the, you know what was the motivation for going with an open source database? I mean, you're, you're a great example because you have your multi-vendor so you have experienced with all of it, the full spectrum. What was it about open source database generally EDB specifically that triggered the, the choice? >> Well thanks for the question. It is, this is one of the, or one of the questions that I always, like. I think what really drove us was the right combination between easy to use, so simplicity and also good value for money. So we like to pick the right database technology for the right kind of service slash budget that the survey says and, and the open source solution for a specific service. It, it, it's, it's our, you know, first, first, first choice. So we are not going to say a company that use just one technology. We like to take the best of breed that the market can offer. In some cases, the open source and Pasquesi in particular is, is our choice. How involved was >> The line of business in this both the decision and the implementation? Was it kind of invisible to them, or this was really more of a technology decision based on the your interpretation of the requirements I'm interested in who was involved and how you actually got it done? >> Well, I, I think this decision was transplant for, for, for, for the business at the end of the day don't really have that kind of visibility. You know, they just provide requirements in particular in terms of performance and rehabil area, the reliability. And so, so this this is something they are not really involved about. And obviously if they, if we are in opposition to save a little bit of money everybody's at the, even the business >> No. So what did you have to do? So that makes sense to me, I figured that was the case. Who would, who were the stakeholders on your team? I mean, what kind of technical resources did you require an implementation resources? What take us through what the project if you will look like, wh how did you do it? >> Well, it's a combination of database expertise. I got the pleasure to run a team that is paid by very, very senior, very, very skilled database services professional that are able to support more than one more than what the county and also are very open to innovation and changes. Plus obviously we need also the development teams the relevant development teams on board, when you when you run this kind of transformations and it looks like also, they liked the idea to use PostgreSQL for for this specific service I got in mind. So it, it, it was quite, quite easy, not be discussion. You know. >> What was the, what was the elapsed time from from when you said, okay, we're in, you know signed the agreement we're going here you made the decision to actually getting into production. >> Well, as I mentioned, we, we, we were on we're on services and application that are really focused on high availability and performance. So generally speaking, we are not a peak organization. Also we run a business that is highly regulated. So as you know, as you can imagine we are an organization that don't have a lot of appetite for risk, you know, so generally speaking in order to run this kind of transformation is a matter of several months, I will say six nine months to have something delivered in that space. >> Okay. Well, that's, I mean, that's reasonable. I mean, if you could do it inside of a year that's I think quite good especially in the highly regulated industry. And then you mentioned kind of the fail over the high availability Cape Cape capabilities. Were there other specific EDB tools that that you utilize to sort of address the objectives? >> Yeah, absolutely. We were in particular, we used Postgres enterprise, AKA Pam. Okay. And very recently we were involved within ADB about per se specifically developing one functionality that, that that we needed back in the day. I think together with Bart these are the free EDB specific tools that, that we, that that we use right now. >> And, and I'm, I'm interested in, I want to get to the business impact and I know it's early days for you but the real motivation was to save money and simplify. I would actually, I would imagine your developers were happy because they get to use modern tooling and open source. But, but really though if your industry is bottom line, right, I mean that's really what the, the business case was all about. But I wonder if you could add some color there in terms of the business impact that you expect. And then, I mean I don't know how much visibility you have now but anything you can share with us. >> Well, thinking about the EFM implementation that the business impact the, was that in case of a failure or the DBA team that a services team is it is able to provide a solution that is within our 100% within our perimeter. So this means that we are fully accountable for it. So in a nutshell, when you run a service, the less people the less teams you have to involve the more control you can deliver. And in some, again, very critical services that is a great value. >> Okay. So, and, and where do you want to take this? I mean, how do you see w what's your, if you're thinking about your Postgres and, and generally an EDB you know, roadmap, where do you want it to go? >> Well, I stay to, to trends within within the organization, the, the, the, the the first one is about migrating more existing services to open source solution for database is going to be, is going to be prosperous. And other trends that I see within my organization is about designing applications, not really to be, to to use PostgreSQL as the base, as it does a base layer. I think both trends are more or less surroundings at the same state right now. >> Yeah. A lot of the audience members at Postgres vision 21 is just like you they they're managing day-to-day infrastructure. They're there they're expert practitioners. What advice would you give to somebody that is thinking about, you know taking this journey, maybe if you had to do something over again maybe what would you do differently? How can you help your peers here? >> Well, I think in particular, if you are going to say a big organization that runs a highly regulated business in some cases, you are a little bit afraid of open source because there is this, I can say general consideration about the lack of enterprise level support. I would like to say that it is just about the past because they're around bunch of companies like EDB that are we're a hundred percent capable of providing enterprise level of support, even on, on, on even on the open source distribution of Paul's presser. Obviously Dan is you're going to go with their specific distribution. The level of support is going to be even more accurate but as we know, it could be currently is they across say main contributor of the pollsters community. And I think is, is that an insurance for every organization? >> Your advice is don't be afraid. >> Yeah. My advice is done is absolutely, don't be, don't be afraid. And if, if, if I can, if we can mention about also about, you know, the cloud called technologies this is also another, another topic where if possible I would like to suggest to not being afraid EDB as every every I would say organization within the it industry is really pushing for it. And I think for a very, for, for a lot of cases not all of them, but a lot of cases, there is a great value about the design services application to be cloud native or migrating existing application into the cloud. >> Okay. But, but being a highly regulated industry and being a, you know, very much aware of the the narrative around open source, et cetera, you, you must've had just a little piece of your mind saying, okay I have to manage this risk. So there's anything specifically you did with managing the risks that you would advise? Was it, was it or is it really just about good change management? >> I think it was mainly about a good change management when you got, you know the relevant stakeholders that you need on board and we are, everybody's going the same direction. That basically is about executing. >> Excellent. Well, Roberto, I really appreciate your time and your knowledge that you share with the audience. So thanks so much for coming on the cube. >> Thank you, Dave. It was a great pleasure. >> And thank you for watching the cubes continuous coverage of Postgres vision 21. We'll be right back. (upbeat music)

Published Date : May 27 2021

SUMMARY :

brought to you by EDB. the Italian Stock Exchange. for the invitation. role at the organization. Europe and the whole world. and of course the regulators the goal to provide an Well, and you have end-user computing So if you didn't heard about us We both in the technology of PostgreSQL, but also the that just it'll be provide. and so that's a solution that you to get the right solution for us. all of it, the full spectrum. breed that the market can offer. at the end of the day No. So what did you have to do? I got the pleasure to signed the agreement we're going here of appetite for risk, you that you utilize to sort that we needed back in the day. impact that you expect. the less teams you have to involve I mean, how do you see w the same state right now. maybe what would you do differently? of the pollsters community. about also about, you know, that you would advise? the relevant stakeholders that you need So thanks so much for coming on the cube. It was a great pleasure. And thank you for watching the cubes

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
RobertoPERSON

0.99+

EuronextORGANIZATION

0.99+

Dave VellantePERSON

0.99+

DavePERSON

0.99+

EuropeLOCATION

0.99+

Borsa ItalianaORGANIZATION

0.99+

ItalyLOCATION

0.99+

FerrariORGANIZATION

0.99+

Roberto GiordanoPERSON

0.99+

100%QUANTITY

0.99+

February, 2020DATE

0.99+

BorsaORGANIZATION

0.99+

PaulPERSON

0.99+

2020DATE

0.99+

United StatesLOCATION

0.99+

oneQUANTITY

0.99+

last yearDATE

0.99+

firstQUANTITY

0.99+

London Stock ExchangeORGANIZATION

0.99+

RedditORGANIZATION

0.99+

FirstQUANTITY

0.99+

last monthDATE

0.99+

PostgreSQLTITLE

0.99+

PamPERSON

0.99+

bothQUANTITY

0.99+

PostgresORGANIZATION

0.99+

DanPERSON

0.99+

EDBORGANIZATION

0.99+

two main driversQUANTITY

0.98+

four decadesQUANTITY

0.98+

six nine monthsQUANTITY

0.98+

few months agoDATE

0.97+

BartPERSON

0.97+

first oneQUANTITY

0.97+

Italian Stock ExchangeORGANIZATION

0.97+

almost 1000 peopleQUANTITY

0.97+

first classQUANTITY

0.96+

more than oneQUANTITY

0.95+

two phaseQUANTITY

0.94+

this yearDATE

0.89+

few years agoDATE

0.88+

Cape CapeLOCATION

0.87+

both trendsQUANTITY

0.86+

one functionalityQUANTITY

0.86+

first missionQUANTITY

0.85+

a yearQUANTITY

0.83+

hundred percentQUANTITY

0.83+

Postgres VisionORGANIZATION

0.82+

DDBTITLE

0.8+

2021DATE

0.8+

one technologyQUANTITY

0.75+

theCUBEORGANIZATION

0.71+

one of the questionsQUANTITY

0.71+

ADBTITLE

0.71+

Postgres Vision 21ORGANIZATION

0.69+

Postgres vision 21ORGANIZATION

0.68+

ADBORGANIZATION

0.66+

EDBTITLE

0.66+

recent yearDATE

0.65+

COVIDORGANIZATION

0.51+

Vision 2021EVENT

0.41+

2021 002 Richard Hummel V1 FOR SLIDE REVIEW


 

(upbeat music) >> Hey, welcome to this Cube conversation with NetScout. I'm Lisa Martin. Excited to talk to you. Richard Hummel, the manager of threat research for Arbor Networks, the security division of NetScout. Richard, welcome to theCube. >> Thanks for having me, Lisa, it's a pleasure to be here. >> We're going to unpack the sixth NetScout Threat Intelligence Report, which is going to be very interesting. But something I wanted to start with is we know that and yes, you're going to tell us, COVID and the pandemic has had a massive impact on DDoS attacks, ransomware. But before we dig into the report, I'd like to just kind of get some stories from you as we saw last year about this time rapid pivot to work from home, rapid pivot to distance learning. Talk to us about some of the attacks that you saw in particular that literally hit close to home. >> Sure and there's one really good prime example that comes to mind because it impacted a lot of people. There was a lot of media sensation around this but if you go and look, just Google it, Miami Dade County and DDoS, you'll see the first articles that pop up is the entire district school network going down because the students did not want to go to school and launched a DDoS attack. There was something upwards of 190,000 individuals that could no longer connect to the school's platform, whether that's a teacher, a student or parents. And so it had a very significant impact. And when you think about this in terms of the digital world, that impacted very severely, a large number of people and you can't really translate that to what would happen in a physical environment because it just doesn't compute. There's two totally different scenarios to talk about here. >> Amazing that a child can decide, "I don't want to go to school today." And as a result of a pandemic take that out for nearly 200,000 folks. So let's dig into, I said this is the sixth NetScout Threat Intelligence Report. One of the global trends and themes that is seen as evidence in what happened last year is up and to the right. Oftentimes when we're talking about technology, you know, with analyst reports up and to the right is a good thing. Not so in this case. We saw huge increases in threat vectors, more vectors weaponized per attack sophistication, expansion of threats and IOT devices. Walk us through the overall key findings from 2020 that this report discovered. >> Absolutely. And if yo glance at your screen there you'll see the key findings here where we talk about record breaking numbers. And just in 2020, we saw over 10 million attacks, which, I mean, this is a 20% increase over 2019. And what's significant about that number is COVID had a huge impact. In fact, if we go all the way back to the beginning, right around mid March, that's when the pandemic was announced, attacks skyrocketed and they didn't stop. They just kept going up and to the right. And that is true through 2021. So far in the first quarter, typically January, February is the down month that we observe in DDoS attacks. Whether this is, you know, kids going back to school from Christmas break, you have their Christmas routines and e-commerce is slowing down. January, February is typically a slow month. That was not true in 2021. In fact, we hit record numbers on a month by month in both January and February. And so not only do we see 2.9 million attacks in the first quarter of 2021, which, I mean, let's do the math here, right? We've got four quarters, you know, we're on track to hit 12 million attacks potentially, if not more. And then you have this normal where we said 800,000 approximately month over month since the pandemic started, we started 2021 at 950,000 plus. That's up and to the right and it's not slowing down. >> It's not slowing down. It's a trend that it shows, you know, significant impact across every industry. And we're going to talk about that but what are some of the new threat vectors that you saw weaponized in the last year? I mean, you talked about the example of the Miami-Dade school district but what were some of those new vectors that were really weaponized and used to help this up and to the right trend? >> So there's four in particular that we were tracking in 2020 and these nets aren't necessarily new vectors. Typically what happens when an adversary starts using this is there's a proof of concept code out there. In fact, a good example of this would be the RDP over UDP. So, I mean, we're all remotely connected, right? We're doing this over a Zoom call. If I want to connect to my organization I'm going to use some sort of remote capability whether that's a VPN or tunneling in, whatever it might be, right? And so remote desktop is something that everybody's using. And we saw actors start to kind of play around with this in mid 2020. And in right around September, November timeframe we saw a sudden spike. And typically when we see spikes in this kind of activity it's because adversaries are taking proof of concept code, that maybe has been around for a period of time, and they're incorporating those into DDoS for hire services. And so any person that wants to launch a DDoS attack can go into underground forums in marketplaces and they can purchase, maybe it's $10 in Bitcoin, and they can purchase an attack. That leverage is a bunch of different DDoS vectors. And so adversaries have no reason to remove a vector as new ones get discovered. They only have the motivation to add more, right? Because somebody comes into their platform and says, "I want to launch an attack that's going to take out my opponent." It's probably going to look a lot better if there's a lot of attack options in there where I can just go through and start clicking buttons left and right. And so all of a sudden now I've got this complex multi-vector attack that I don't have to pay anything extra for. Adversary already did all the work for me and now I can launch an attack. And so we saw four different vectors that were weaponized in 2020. One of those are notably the Jenkins that you see listed on the screen in the key findings. That one isn't necessarily a DDoS vector. It started out as one, it does amplify, but what happens is Jenkins servers are very vulnerable and when you actually initiate this attack, it tips over the Jenkins server. So it kind of operates as like a DoS event versus DDoS but it still has the same effect of availability, it takes a server offline. And then now just in the first part of 2021 we're tracking multiple other vectors that are starting to be weaponized. And when we see this, we go from a few, you know, incidents or alerts to thousands month over month. And so we're seeing even more vectors added and that's only going to continue to go up into the right. You know that theme that we talked about at the beginning here. >> As more vectors get added, and what did you see last year in terms of industries that may have been more vulnerable? As we talked about the work from home, everyone was dependent, really here we are on Zoom, dependent on Zoom, dependent on Netflix. Streaming media was kind of a lifeline for a lot of us but it also was healthcare and education. Did you see any verticals in particular that really started to see an increase in the exploitation and in the risk? >> Yeah, so let's start, let's separate this into two parts. The last part of the key findings that we had was talking about a group we, or a campaign we call Lazarus Borough Model. So this is a global DDoS extortion campaign. We're going to cover that a little bit more when we talk about kind of extorted events and how that operates but these guys, they started where the money is. And so when they first started targeting industries and this kind of coincides with COVID, so it started several months after the pandemic was announced, they started targeting a financial organizations, commercial banking. They went after stock exchange. Many of you would hear about the New Zealand Stock Exchange that went offline. That's this LBA campaign and these guys taking it off. So they started where the money is. They moved to a financial agation targeting insurance companies. They targeted currency exchange places. And then slowly from there, they started to expand. And in so much as our Arbor Cloud folks actually saw them targeting organizations that are part of vaccine development. And so these guys, they don't care who they hurt. They don't care who they're going after. They're going out there for a payday. And so that's one aspect of the industry targeting that we've seen. The other aspect is you'll see, on the next slide here, we actually saw a bunch of different verticals that we really haven't seen in the top 10 before. In fact, if you actually look at this you'll see the number one, two and three are pretty common for us. We almost always are going to see these kinds of telecommunications, wireless, satellite, broadband, these are always going to be in the top. And the reason for that is because gamers and DDoS attacks associated with gaming is kind of the predominant thing that we see in this landscape. And let's face it, gamers are on broadband operating systems. If you're in Asian communities, often they'll use mobile hotspots. So now you start to have wireless come in there. And so that makes sense seeing them. But what doesn't make sense is this internet publishing and broadcasting and you might say, "Well, what is that?" Well, that's things like Zoom and WebEx and Netflix and these other streaming services. And so we're seeing adversaries going after that because those have become critical to people's way of life. Their entertainment, what they're using to communicate for work and school. So they realized if we can go after this it's going to disrupt something and hopefully we can get some recognition. Maybe we can show this as a demonstration to get more customers on our platform or maybe we can get a payday. In a lot of the DDoS attacks that we see, in fact most of them, are all monetary focused. And so they're looking for a payday. They're going to go after something that's going to likely, you know, send out that payment. And then just walk down the line. You can see COVID through this whole thing. Electronic shopping is number five, right? Everybody turned to e-commerce because we're not going to in-person stores anymore. Electronic computer manufacturing, how many more people have to get computers at home now because they're no longer in a corporate environment? And so you can see how the pandemic has really influenced this industry target. >> Significant influencer and I also wonder too, you know, Zoom became a household name for every generation. You know, we're talking to five generations and maybe the generations that aren't as familiar with computer technology might be even more exploitable because it's easy to click on a phishing email when they don't understand how to look for the link. Let's now unpack the different types of DDoS attacks and what is on the rise. You talked about in the report the triple threat and we often think of that in entertainment. That's a good thing, but again, not here. Explain that triple threat. >> Yeah, so what we're seeing here is we have adversaries out there that are looking to take advantage of every possible angle to be able to get that payment. And everybody knows ransomware is a household name at this point, right? And so ransomware and DDoS have a lot in common because they both attack the availability of network resources, where computers or devices or whatever they might be. And so there's a lot of parallels to draw between the two of these. Now ransomware is a denial of service event, right? You're not going to have tens of thousands of computers hitting a single computer to take it down. You're going to have one exploitation of events. Somebody clicked on a link, there was a brute force attempt that managed to compromise a little boxes, credentials, whatever it might be, ransomware gets put on a system, it encrypts all your files. Well, all of a sudden, you've got this ransom note that says "If you want your files decrypted you're going to send us this amount of human Bitcoin." Well, what adversaries are doing now is they're capitalizing on the access that they already gained. So they already have access to the computer. Well, why not steal all the data first then let's encrypt whatever's there. And so now I can ask for a ransom payment to decrypt the files and I can ask for an extortion to prevent me from posting your data publicly. Maybe there's sensitive corporate information there. Maybe you're a local school system and you have all of your students' data on there. You're a hospital that has sensitive PI on it, whatever it might be, right? So now they're going to extort you to prevent them from posting that publicly. Well, why not add DDoS to this entire picture? Now you're already encrypted, we've already got your files, and I'm going to DDoS your system so you can't even access them if you wanted to. And I'm going to tell you, you have to pay me in order to stop this DDoS attack. And so this is that triple threat and we're seeing multiple different ransomware families. In fact, if you look at one of the slides here, you'll see that there's SunCrypt, there's Ragnar Cryptor, and then Maze did this initially back in September and then more recently, even the DarkSide stuff. I mean, who hasn't heard about DarkSide now with the Colonial Pipeline event, right? So they came out and said, "Hey we didn't intend for this collateral damage but it happened." Well, April 24th, they actually started offering DDoS as part of their tool kits. And so you can see how this has evolved over time. And adversaries are learning from each other and are incorporating this kind of methodology. And here we have triple extortion event. >> It almost seems like triple extortion event as a service with the opportunities, the number of vectors there. And you're right, everyone has heard of the Colonial Pipeline and that's where things like ransomware become a household term, just as much as Zoom and video conferencing and streaming media. Let's talk now about the effects that the threat report saw and uncovered region by region. Were there any regions in particular that were, that really stood out as most impacted? >> So not particularly. So one of the phenomenon that we actually saw in the threat report, which, you know, we probably could have talked about it before now but it makes sense to talk about it regionally because we didn't see any one particular region, one particular vertical, a specific organization, specific country, none was more heavily targeted than another. In fact what we saw is organizations that we've never seen targeted before. We've seen industries that have never been targeted before all of a sudden are now getting DDoS attacks because we went from a local on-prem, I don't need to be connected to the internet, I don't need to have my employees remote access. And now all of a sudden you're dependent on the internet which is really, let's face it, that's critical infrastructure these days. And so now you have all of these additional people with a footprint connected to the internet then adversary can figure out and they can poke it. And so what we saw here is just overall, all industries, all regions saw these upticks. The exception would be in China. We actually, in the Asia Pacific region specifically, but predominantly in China. But that often has to do with visibility rather than a decrease in attacks because they have their own kind of infrastructure in China. Brazil's the same way. They have their own kind of ecosystems. And so often you don't see what happens a lot outside the borders. And so from our perspective, we might see a decrease in attacks but, for all we know, they actually saw an increase in the attacks that is internal to their country against their country. And so across the board, just increases everywhere you look. >> Wow. So let's talk about what organizations can do in light of this. As we are here, we are still doing this program by video conferencing and things are opening up a little bit more, at least in the states anyway, and we're talking about more businesses going back to some degree but there's going to still be some mix, some hybrid of working from home and maybe even distance learning. So what can enterprises do to prepare for this when it happens? Because it sounds to me like with the sophistication, the up and to the right, it's not, if we get attacked, it's when. >> It's when, exactly. And that's just it. I mean, it's no longer something that you can put off. You can't just assume that I've never been DDoS attacked, I'm never going to be DDoS attacked anymore. You really need to consider this as part of your core security platform. I like to talk about defense in depth or a layer defense approach where you want to have a layered approach. So, you know, maybe they target your first layer and they don't get through. Or they do get through and now your second layer has to stop it. Well, if you have no layers or if you have one layer, it's not that hard for an adversary to figure out a way around that. And so preparation is key. Making sure that you have something in place and I'm going to give you an operational example here. One of the things we saw with the LBA campaigns is they actually started doing network of conasense for their targets. And what they would do is they would take the IP addresses belonging to your organization. They would look up the domains associated with that and they would figure out like, "Hey, this is bpn.organization.com or VPN two." And all of a sudden they've found your VPN concentrator and so that's where they're going to focus their attack. So something as simple as changing the way that you name your VPN concentrators might be sufficient to prevent them from hitting that weak link or right sizing the DDoS protection services for your company. Did you need something as big as like OnPrem Solutions? We need hardware. Do you instead want to do a managed service? Or do you want to go and talk to a cloud provider because there's right solutions and right sizes for all types of organizations. And the key here is preparation. In fact, all of the customers that we've worked with for the LBA extortion campaigns, if they were properly prepared they experienced almost no downtime or impact to their business. It's the people like the New Zealand Stock Exchange or their service provider that wasn't prepared to handle the attacks that were sent out them that were crippled. And so preparation is key. The other part is awareness. And that's part of what we do with this threat report because we want to make sure you're aware what adversaries are doing, when new attack vectors are coming out, how they're leveraging these, what industries they're targeting because that's really going to help you to figure out what your posture is, what your risk acceptance is for your organization. And in fact, there's a couple of resources that that we have here on the next slide. And you can go to both both of these. One of them is the threat report. You can view all of the details. And we only scratched the surface here in this Cube interview. So definitely recommend going there but the other one is called Horizon And netscout.com/horizon is a free resource you can register but you can actually see near real-time attacks based on industry and based on region. So if your organization out there and you're figuring, "Well I'm never attacked." Well go look up your industry. Go look up the country where you belong and see is there actually attacks against us? And I think you'll be quite surprised that there's quite a few attacks against you. And so definitely recommend checking these out >> Great resources netscout.com/horizon, netscout.com/threatreport. I do want to ask you one final question. That's in terms of timing. We saw the massive acceleration in digital transformation last year. We've already talked about this a number of times on this program. The dependence that businesses and consumers, like globally in every industry, in every country, have on streaming on communications right now. In terms of timing, though, for an organization to go from being aware to understanding what adversaries are doing, to being prepared, how quickly can an organization get up to speed and help themselves start reducing their risks? >> So I think that with DDoS, as opposed to things like ransomware, the ramp up time for that is much, much faster. There is a finite period of time with DDoS attacks that is actually going to impact you. And so maybe you're a smaller organization and you get DDoS attacked. There's a, probably a pretty high chance that that DDoS attack isn't going to last for multiple days. So maybe it's like an hour, maybe it's two hours, and then you recover. Your network resources are available again. That's not the same for something like ransomware. You get hit with ransomware, unless you pay or you have backups, you have to do the rigorous process of getting all your stuff back online. DDoS is more about as soon as the attack stops, the saturation goes away and you can start to get back online again. So it might not be as like immediate critical that you have to have something but there's also solutions, like a cloud solution, where it's as simple as signing up for the service and having your traffic redirected to their scrubbing center, their detection center. And then you may not have to do anything on-prem yourself, right? It's a matter of going out to an organization, finding a good contract, and then signing up, signing on the dotted line. And so I think that the ramp up time for mitigation services and DDoS protection can be a lot faster than many other security platforms and solutions. >> That's good to know cause with the up and to the right trend that you already said, the first quarter is usually slow. It's obviously not that way as what you've seen in 2021. And we can only expect what way, when we talk to you next year, that the up and to the right trend may continue. So hopefully organizations take advantage of these resources, Richard, that you talked about to be prepared to mediate and protect their you know, their customers, their employees, et cetera. Richard, we thank you for stopping by theCube. Talking to us about the sixth NetScout Threat Intelligence Report. Really interesting information. >> Absolutely; definitely a pleasure to have me here. Lisa, anytime you guys want to do it again, you know where I live? >> Yes. It's one of my favorite topics that you got and I got to point out the last thing, your Guardians of the Galaxy background, one of my favorite movies and it should be noted that on the NetScout website they are considered the Guardians of the Connected World. I just thought that connection was, as Richard told me before we went live, not planned, but I thought that was a great coincidence. Again, Richard, it's been a pleasure talking to you. Thank you for your time. >> Thank you so much. >> Richard Hummel, I'm Lisa Martin. You're watching this Cube conversation. (relaxing music)

Published Date : May 21 2021

SUMMARY :

Excited to talk to you. it's a pleasure to be here. that you saw in particular that that comes to mind because One of the global trends and themes And then you have this normal where and to the right trend? And so any person that wants that really started to see an increase In a lot of the DDoS attacks that we see, and maybe the generations that aren't And so there's a lot of parallels to draw effects that the threat report But that often has to do with visibility but there's going to still be some mix, and I'm going to give you to understanding what that is actually going to impact you. that the up and to the a pleasure to have me here. and I got to point out the last thing, You're watching this Cube conversation.

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
RichardPERSON

0.99+

Richard HummelPERSON

0.99+

Lisa MartinPERSON

0.99+

two hoursQUANTITY

0.99+

2020DATE

0.99+

$10QUANTITY

0.99+

ChinaLOCATION

0.99+

New Zealand Stock ExchangeORGANIZATION

0.99+

April 24thDATE

0.99+

New Zealand Stock ExchangeORGANIZATION

0.99+

20%QUANTITY

0.99+

SeptemberDATE

0.99+

twoQUANTITY

0.99+

2021DATE

0.99+

LisaPERSON

0.99+

second layerQUANTITY

0.99+

last yearDATE

0.99+

mid 2020DATE

0.99+

FebruaryDATE

0.99+

NetScoutORGANIZATION

0.99+

first layerQUANTITY

0.99+

Guardians of the GalaxyTITLE

0.99+

JanuaryDATE

0.99+

bpn.organization.comOTHER

0.99+

next yearDATE

0.99+

one layerQUANTITY

0.99+

800,000QUANTITY

0.99+

last yearDATE

0.99+

12 million attacksQUANTITY

0.99+

bothQUANTITY

0.99+

Colonial PipelineEVENT

0.99+

190,000 individualsQUANTITY

0.99+

fourQUANTITY

0.99+

an hourQUANTITY

0.99+

OneQUANTITY

0.99+

netscout.com/horizonOTHER

0.99+

first articlesQUANTITY

0.99+

NetflixORGANIZATION

0.99+

ZoomORGANIZATION

0.99+

oneQUANTITY

0.99+

Guardians of the Connected WorldTITLE

0.99+

one final questionQUANTITY

0.99+

two partsQUANTITY

0.98+

2.9 million attacksQUANTITY

0.98+

over 10 million attacksQUANTITY

0.98+

Arbor NetworksORGANIZATION

0.98+

one aspectQUANTITY

0.98+

pandemicEVENT

0.98+

2019DATE

0.98+

five generationsQUANTITY

0.97+

threeQUANTITY

0.97+

tens of thousandsQUANTITY

0.97+

firstQUANTITY

0.96+

Ragnar CryptorPERSON

0.96+

first quarter of 2021DATE

0.96+

four quartersQUANTITY

0.95+

GoogleORGANIZATION

0.95+

nearly 200,000 folksQUANTITY

0.95+

Danny Allan, Veeam | VeeamON 2021


 

(upbeat music) >> 2020 was the most unpredictable year of our lives, a forced shutdown of global economies left everyone have the conclusion that the tech industry spending would decline and of course it did, but you'd hardly know it if you watch the stock market and the momentum of several well-positioned companies. Those firms that had products and services that catered to the pivot to work from home, SAS based solutions were focused on business resiliency and cloud saw huge growth. The forced match to digital turned a buzzword into reality overnight, where if you weren't a digital business, you were out of business. And one of the companies participating in that growth trend was Veeam. Veeam virtual is scheduled to take place on May 25th and 26th. And it's one of our favorite physical events and the Cube will be there again as a virtual participant. One of our traditions prior to VeeamON has always been to bring in an executive into the Cube and talk not only about what to expect at the show, but what's happening in the market. And with me is many times Cube alum Danny Allan is the chief technology officer at Veeam. Danny welcome is always great to see you. >> I am delighted to be here again. Disappointed it's virtual, but excited to talk with you. >> Yeah, me too. You know, it's coming. It's getting jabbed but you know, you look at the surprises here. I mean, look at the chip shortage, you know everybody thought, Oh, well stop ordering chips. I mean furniture, et cetera, cars. And it's just kind of crazy. What was your expectation going into the pandemic and what did you actually see looking back? >> Well, it's funny, you never know what's going to happen. And for the first few weeks I would say there's a lot of disruption because all of a sudden you have people who've been going into an office for a long time, working from home and you know, from an R&D perspective at Veeam those people weren't used to working from home. So there's a lot of uncertainty I'll say for the first three or four weeks but what very quickly picked up was the opportunity. I'll say to focus more specifically on delivering things for our customers. And one of the things obviously that just exploded was use of digital technologies like Slack and Microsoft teams. And as you say, Veeam was well positioned to help customers as they move towards this new normal, as they say. >> So what were some of the growth vectors that you guys saw specifically that were helping your customers going to get get through this time? >> Yeah well, people always associate Veeam with knowing data protection for the virtual environment but two things really stood out last year as our emerging markets. One was Office365, and I think that's due to the uptake of Microsoft teams. I mean, if you look at the Microsoft results, you can see that people are doing SaaS. And we were very well positioned to take advantage of that. Help customers move towards collaborating online. So that was a huge growth vector for us. And the second one was cloud. We had more data moving to cloud than ever before in Veeam history. And that continues on into 2021. >> You guys, well, yeah, let's talk more about that set SAS piece of your business. You were very early on in terms of SAS data protection. You kind of had to educate the market. People are like, well, why do I need to back up my SAS doesn't the cloud provider do that? And then you sort of you had to educate, so it was you were early and but it's really paid off. Maybe talk about how that trend has benefited some of your customers. >> Yeah. So if you go back four years, we didn't even have data protection for Office365. And over the last four years, we've emerged into the market leader the largest in protection for Office365. And as you say, it was about education. Early on people knew that they needed to protect exchange when they ran it on premises. And when they first went to the cloud there was this expectation of, Hey Microsoft or my provider will do that for me. And very quickly they realized that's not the case and there's still the same threats. It might not be hardware failure, but certainly misconfiguration or deleted items or ransomware in 2021, sorry, 2020 was massive. And so we do data protection for Exchange, for SharePoint online, for one drive, and most recently for Microsoft teams. And so that data protection obviously helps organizations as they adopt Office365 and SaaS technologies. >> I sent him my last breaking analysis. When you look at the ETR data, Veeam has been really steady. You know, some competitors spike up and come down, others, you know, maybe aren't doing so well or the larger established players don't have as much momentum. It just seems like Veeam even though you cross the billion dollar revenue mark, you've been able to keep that spending momentum up. And I think it's, I would observe it's a function of your ability to identify that the waves and ride those waves and anticipate them. We just talked about SAS, talked about virtualization. You were there cloud, we'll talk about that more as well, plus your execution. It seems like since the acquisition by insight you guys have continued to execute. I wonder if you could help the audience understand how do you think about the phases that Veeam has gone through in its ascendancy and where you're headed? >> Yeah. And so I look at it as three things, it's having the right product, but it's not just enough to have the right product, the right product it's the right timing and it's the right execution. So if you think about where Veeam started, it was all in data protection for vSphere, for the hypervisor. And that was right at the time when VMware was taking off and the modernized data center was being virtualized. And so that helped us grow, I'll say into a $600 million company, but then about four years ago, we see the ascendancy of SaaS and specifically Office365. And so, you know, we weren't first to market but I would argue the timing with the best product, with the right execution has turned that into a massive a very significant contribution to our bottom line. And then actually the third wave through 2020 is the adoption of cloud. We moved last year, 242 petabytes into cloud storage and already in the first quarter of 2021, we've moved to 100 petabytes. So there's this massive adoption or migration of data into the cloud. And Veeam has been positioned with the right product, at the right time, with the right execution, to take advantage of that. >> So I wonder if you could help us quantify that IDC data you know, the IDC did a good job quantifying the market. Maybe you could share with us sort of your position there, maybe some of the growth that we're seeing. Can you add some color to that? >> Yeah. We have some very exciting results from the recent IDC report. So in the second half of 2020, we saw 17.9% year over year growth in our revenue. That was actually triple the closest competitor. And our sequential growth was over 21%. So massive growth and all of that is in the second half of the year, 563 million in revenue. So over a billion dollar company. So these aren't just, you know, 20% growth on small numbers. This is on a very significant number. And we see that continuing forward, we'll be announcing some things I'm sure at VMR coming up in a few weeks here, but that trend continues. And again, it's the right product, right time, with the right execution. >> Cloud continues to roll on. You're seeing, you know, solid weather. If you add them all up the big four 30 plus percent growth you're seeing Azure, even higher growth. You know, AWS is huge, Google growing, Google cloud, probably in the 60 to 70% range. So cloud still hot, it's kind of gone mainstream but there's still feels like there's a long way to go there. What's happening in cloud? You guys, again, leaning in, riding that wave. What can you tell us? >> We are leaning in, you're going to see some things coming up at Veeam related to that. But two things I would say, one is we're in the marketplace of all three of the major hyperscalers. So there's a Veeam backup for AWS, Veeam backup for Azure, and a Veeam backup for GCP. And not only is there products that are purpose-built for those clouds in the marketplace, all three of them have integrations to the core Veeam platform. And so this isn't just standalone products while it is in the marketplace, it's integrated into the full strategy around modern data protection for the organizations. And so I am thrilled about some of the things that we're going to be showing in there but we're leaning in very closely with those. We think we're in early days, like I say maybe first, second year, and it will be the next decade as they truly emerge into their dominant position. But even more than cloud if you asked me what I get excited about looking forward certainly cloud adoption is massive, but Kubernetes, that's what's enabling some of the models of both on-prem and cloud hosted. And we're clearly doing some things there as well. >> So I'm glad you brought that up because I think the first time I ever sort of stumbled into a company that was actually doing data protection for containers was out of a VeeamON event. It was one of your exhibitors. And I was like, Hmm, that's an interesting name. And yeah, of course he ended up buying the company. But so, you know, it's funny, right? Because containers have been around forever. And then when you started to see Kubernetes come to for, containers are really ephemeral they really didn't, you know, they weren't persistent but they didn't have state, but that's changing. I wonder if you could give us your perspective as to how you're thinking about that whole space. >> I truly believe that the third big wave of technology transformation, the first was around physical systems and mainframes and things. And then we went into the virtualized era. I think that the third world is not the cloud. I actually think it is containers. Now why containers? Because as you mentioned, Dave, they're a femoral, they're designed for the world of consumption. Everything else is designed for you, install it. And then you build to the high watermark. The whole thing about containers is that they're a femoral and they're built for the consumption model. The other thing about containers is that they're highly portable. So you can run it on premises with OpenShift but then you can move it to GKE or HKS or EKS or any of the big cloud platforms. So it definitely aligns with organization's desire to modernize and to choose the infrastructure of best choice. Now, at the same time, the reason why they haven't taken off I would argue as quickly as they could have is because they've been really complex, in early days the complexity of containers was very difficult, but the model, the platform or ecosystem is evolving, they are becoming more simple. And what is happening is IT operations teams are now considering the developer, their customer and they're building self-service models for the developers to be more productive. So I think of this as platform apps and certainly backup and security is a part of this but it is moving and we're seeing traction actually faster than it would have predicted in early 2020. >> Yeah. We've been putting forth this vision of a layer that abstracts the complexity of the underlying clouds whether it's on prem, across clouds, eventually the edge and containers are linchpin to enabling that. Let's talk about VeeamON 2021. Show us a little leg, give us a preview. >> So we always come with the excitement and we always come with showing a sneak peek of what's to come. So certainly we're going to celebrate some of the big successes. We brought version 11 to market earlier this year that had security capabilities around ransomware type, continuous data protection it at a whole lot of things. So we're going to celebrate some of the products have already recently launched but we're also going to give a sneak peek of what's coming over 2021. Now, if you ask me what that is, we talk an awful lot about cloud. So you should expect to see things around Veeam backup for AWS and Azure and GCP. You should expect to see things around our Kubernetes data protection with our casting Cape 10 product, you should expect to see evolution of capabilities with our SaaS data protection with Office365. So we're going to give a sneak peek of lots of things to come. And as always, we bring lots of innovation to the market. It's not just another checkbox theme has always said, how can we do it differently? How can we do a better? And then we're going to show that to our customers at VeeamON. >> Well, we're always super excited to participate in the Veeam community. We've always had a lot of fun. They're great events. Yes, it's virtual, but you guys always have an interesting spin on things and make it fun. It's May 25th and 26th. It starts at 9:00 AM Eastern time. You go to Veeam V-E-E-A-M.com and sign up, make sure you do that and check out all the content. The Cube of course will be there. I will be interviewing executives, customers, partners. There's tons of content for practitioners. And, you know, as always you guys got the great demos and always a few surprises. So Danny, really looking forward to that and really appreciate your time and the Cube today. >> Thank you, Dave. >> All right. And thank you for watching. This is Dave Vellante for the Cube. Again, May 25th and 26th 9:00 AM. Eastern time, go to veeam.com and sign up. We'll see you there. (upbeat music)

Published Date : May 18 2021

SUMMARY :

And one of the companies participating but excited to talk with you. I mean, look at the And for the first few weeks And the second one was cloud. And then you sort of you had to educate, And over the last four years, that the waves and ride those and it's the right execution. So I wonder if you could And again, it's the right in the 60 to 70% range. of the major hyperscalers. And then when you started to for the developers to be more productive. of a layer that abstracts the complexity of the big successes. in the Veeam community. And thank you for watching.

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
DavePERSON

0.99+

MicrosoftORGANIZATION

0.99+

Danny AllanPERSON

0.99+

60QUANTITY

0.99+

Dave VellantePERSON

0.99+

DannyPERSON

0.99+

VeeamORGANIZATION

0.99+

17.9%QUANTITY

0.99+

2021DATE

0.99+

last yearDATE

0.99+

20%QUANTITY

0.99+

AWSORGANIZATION

0.99+

100 petabytesQUANTITY

0.99+

563 millionQUANTITY

0.99+

242 petabytesQUANTITY

0.99+

GoogleORGANIZATION

0.99+

May 25thDATE

0.99+

one driveQUANTITY

0.99+

first quarter of 2021DATE

0.99+

26thDATE

0.99+

2020DATE

0.99+

firstQUANTITY

0.99+

70%QUANTITY

0.99+

bothQUANTITY

0.99+

$600 millionQUANTITY

0.99+

oneQUANTITY

0.99+

three thingsQUANTITY

0.99+

OneQUANTITY

0.99+

SASORGANIZATION

0.99+

two thingsQUANTITY

0.98+

early 2020DATE

0.98+

vSphereTITLE

0.98+

four weeksQUANTITY

0.98+

30 plus percentQUANTITY

0.98+

over 21%QUANTITY

0.98+

VeeamPERSON

0.98+

next decadeDATE

0.98+

second oneQUANTITY

0.98+

first timeQUANTITY

0.98+

Office365TITLE

0.98+

first threeQUANTITY

0.98+

threeQUANTITY

0.97+

IDCORGANIZATION

0.97+

SlackORGANIZATION

0.97+

veeam.comOTHER

0.97+

billion dollarQUANTITY

0.96+

todayDATE

0.96+

pandemicEVENT

0.96+

over a billion dollarQUANTITY

0.95+

second half of 2020DATE

0.95+

earlier this yearDATE

0.94+

26th 9:00 AMDATE

0.94+

second yearQUANTITY

0.93+

SharePointTITLE

0.93+

first few weeksQUANTITY

0.92+

about four years agoDATE

0.92+

VMRORGANIZATION

0.92+

KubernetesTITLE

0.92+

four yearsQUANTITY

0.91+

VeeamONORGANIZATION

0.89+

third waveEVENT

0.89+

Ali Siddiqui, BMC Software | AWS re:Invent 2020


 

>>from around the globe. It's the Cube with digital coverage of AWS reinvent 2020 sponsored by Intel, AWS and our community partners. Welcome to the Virtual Cube and our coverage of aws reinvent 2020. I'm Lisa Martin. I'm joined by Ali Siddiqui, the chief product officer of BMC Software. We're gonna be talking about what BMC and A W s are doing together. Ali, it's great to have you on the Cube. Thank >>you, Lisa. Get great to be here and be part off AWS treatment. Exciting times. >>They are exciting times. That is true. No, never a dull moment these days, right? So all he talked to me a little bit. About what? A w what BMC is doing with AWS. Let's dig into what you're doing there on the technology front and unpack the benefits that you're delivering to customers. Great >>questions, Lisa. So at BMC, we really have a close partnership with AWS. It's really about BMC. Placido Blue s better together for our customers. That's what it's really about. We have a global presence, probably the largest, uh, off any window out there in this in our industry with 15 data centers, AWS data centers around the globe. We just announced five more in South Africa. Brazil Latin Um, a P J. A couple of them amia across the globe. Really? The presence is very strong with these, uh, data centers because that lets us offered local presence, Take care of GDP are and we have great certification. That is Aw, sock to fedramp. I'll four Haifa dram. We even got hip certifications as well as a dedicated Canada certifications for our customers. Thanks to our partnership, close partnership with the WS and on all these datas into the cross. In addition, for our customers, really visibility into aws seamless capability toe do multi cloud management is key and with a recent partnership with AWS around specifically AWS >>s >>S m, which gives customers cream multi cloud capabilities around multi cloud management, total visibility seamlessly in AWS and all their services whether it's easy toe s s s three sage maker, whatever services they have, we let them discover on syphilis. Lee give them visibility into that. >>That 360 degree visibility is really key to understand the dependencies right between the software in the services and help customers to optimize their investments in a W s assume correct. >>Exactly. With the AWS s s m and r E I service management integration. We really give deep visibility on the dependency, how they're being used, what services are being impacted and and really, AWS s system is a key, unique technology which we've integrated with them very, very happy with the results are customers are getting from it. >>Can you share some of those results? Operational efficiencies, Cost savings? Yeah, >>Yeah, least another great question. So when I look at the general picture off E I service management in the eye ops, which we run with AWS across all these global dinner senses and specifically with AWS S S M people are able to do customers. And this is like the talkto hyper scale, as we're talking about, as well as large telcos like Ericsson and and some of the leading, uh, industry retail Or or, you know, other customers we have They're getting great value because they're able to do service modeling, automatically use ascend to get true deep visibility seamlessly to do service discovery with for for for all the assets that they run or using our S service management in the eye ops capabilities. It really is the neck shin and it's disrupting the service idea Some traditional service management industry with what we offering now with the service management, AWS s, S M and other AWS Cloud needed capabilities such as sage Maker and AWS, Lex and connect that we leverage in our AI service management ai absolution. We recently announced that as a >>single >>unified platform which allows our customers to go on BMC customers and joined with AWS customers to go on this autonomous digital enterprise journey Uh, this announcement was done by our CEO of BMC. I'm in Say it in BMC Exchange recently, where we basically launched a single lady foundation, a single platform for observe ability, engagement with automation >>for the autonomous digital enterprise. I presume I'd like to understand to, from your perspective, this disruption that you're enabling. How is it helping your customers not just survive this viral disruption that we're all living with but be able thio, get the disability into their software and services, really maximize and optimize their cloud investments so that their business can operate well during these unprecedented times, meet their customer demands, exceed them and meet their customers. Where? There. How is this like an accelerator of that >>great question, Lisa. So when we say autonomous digital enterprise, this is the journey All our customers they're taking on its focus on three trips, agility, customer center, city and action ability. So if you think about our solutions with AWS, really, it's s of its management. AI ops enables these enterprises to go on this autonomous digital enterprise journey where they can offer great engagement to the employees. All CEOs really care about employee engagement. Happy employees make for more revenue for for those enterprises, as well as offer great customer experience for the customers. Uh, using our AI service management and AI ops combined. 80 found in this single platform, which we are calling 80 foundation. >>Yeah, go ahead. Sorry. >>No, go ahead, please. >>I was going to say I always look at the employee experience, and the customer experience is absolutely inextricably linked with the employee experience is hampered. That's bride default. Almost going to impact the customer experience. And right now, I don't know if it's even possible to say both the employee experience and the customer experience are even mawr essential to really get right because now we've got this. You know this big scatter That happened a few months ago with some companies that were completely 100% on site to remote being able, needing to give their employees access to the tools to do their jobs properly so that they can deliver products and services and solutions that customers need. So I always see those two employees. Customer experience is just inextricably linked. >>Absolutely. That's correct, especially in this time, even if the new pandemic these epidemics time, uh, the chief human resource offers. The CEOs are really thick focused on keeping the employees engaged and retaining top talent. And that's where our yes service management any other solution helps them really do. Use our digital assistance chat boards, which are powered by a W X and Lex and AWS connect and and and our integration with, uh, helix control them, which is another service we launched on AWS Helix Control them, which is our South version off a leading SAS product automation product out there, a swell as RP integrations we bring to the table, which really allows them toe take employing, give management to the next level And that's top of mind for all CEOs and being driven by line of business like chief human resource officers. Such >>a great point. Are you? Are you finding that mawr of your conversations with customers are at that sea level as they look to things like AI ops to help find you in their business that it's really that that sea level not concerned but priority to ensure that we're doing everything we can within our infrastructure, wherever where our software and services are to really ensure that we're delivering and exceeding customer expectations? That a very tumultuous time? >>Yes, What we're finding is, uh, really at the CEO level CEO level the sea level. It's about machine learning ai adopting that more than the enterprise and specifically in our capabilities when I say ai ops. So those are around root cause predictive I t. And even using ai NLP for self service for self service is a big part, and we offer key capabilities. We just did an acquisition come around, which lets them do knowledge management self service. So these are specific capabilities, predictability, ai ops and knowledge management. Self service that we offer that really is resonating very well with CEOs who are looking to transform their I T systems and in I t ops and align it with business is much better and really do innovation in this area. So that's what's happening, and it's great to see that we will do that. Exact capabilities that come with R E Foundation. The unified platform forms of ability and lets customers go on this autonomous digital enterprise journey without keeping capabilities. >>Do you see this facilitating the autonomous digital enterprise as as a way to separate the winners and losers of tomorrow as so much of the world has changed and some amount of this is going to be permanent, imagine that's got to be a competitive advantage to customers in any industry. >>We believe enterprises that have the growth mindset and and want to go into the next generation, and that's most of them. Toe, to be honest, are really looking at the ready autonomous digital price framework that we offer and work with our customers on the way to grow revenue to get more customer centric, increase employee engagement. That's what we see happening in the industry, and that's where our capabilities with 80 Foundation as well as Helix. Whether it's Felix Air Service management, he likes a Iot or now recently launched Helix Control them really enable them toe keep their existing, uh, you know, tools as well as keep their existing investments and move the ICTY ops towards the next generation off tooling and as well as increase employee engagement with our leading industry leading digital assistant chat board and and SMS management solution that that's what we see. And that's the journey we're taking with most of our customers and really, the ones with the growth mindset are really being distinguished as the front runs >>talk to me about some validation from the customer's perspective, the industry's perspective. What are you guys hearing about? What you're doing s BMC and with a w s >>so validation from customer that I just talked about great validation. As I said, talk to off the hyper skills users for proactive problem management. Proactive incident management ai ops a same time independent validation from Gardner we are back wear seven years and I don't know in a row So seven years the longest street in Gartner MQ for I t s m and we are a leader in that for seven years the longest run so far by any vendor. We are scoring the top in the top number one position in 12 of the 15 critical capabilities. As you know, Gardner, I d s m eyes really about the critical capability that where most customers look. So that's a big independent validation. Where we score 12 off the way were number one in 12 of the 15 capability. So that was the awesome validation from Gardner and I. D. S M. We also recently E Mei Enterprise Management Associates published a new report on AI Ops and BMT scored the top spot on the charts with Business impact and business alignment. Use cases categories for AI ops. So think about what that means. It's really about your business, right? So So we being the top of the chart for business impact and business alignment for ai ops radar report from Enterprise Management associated with a create independent validation that we can point toe off our solutions and what it is, really, because we partner very closely with our customers. We also got a couple of more awards than we want a lot more, but just to mention two more I break breakthrough, which is a nursery leading third party sources out there for chat boards and e i base chat board solution lamed BMC Helix Chat Board as the best chat board solution out there. Uh, SAS awards another industry analysts from independent from which really, uh really shows the how we're getting third parties and independents to talk about our solutions named BMC SAS per ticket and event management, which is really a proactive problem and proactive incident solution Revolution system as as the best solution out there for ticketing and event management. >>So a lot of accolades. A. Yes. It sounds like a lot of alcohol. A lot of validation. How do customers get How do you get started? So customers looking to come to BMC to really understand get that 3 60 degree visibility. How did they get started? >>Uh, well, they can start with our BMC Discovery, which integrates very tightly with AWS s s M toe. Basically get the full visibility off assets from network to storage toe aws services. Whether there s three. Uh, easy to, uh doesn't matter what services they did. A Kafka service they're using whatever. So the hundreds of services they're using weaken seamlessly do that. So that's one way to do that. Just start with BMC Helix Discovery. Thea Other one is with BMC Knowledge Management on BMC Self Service. That's a quick win for most of our customers. I ai service management, tooling That's the Third Way and I I, off stooling with BMC, Helix Monitor and AI ops that we offer pretty much the best in the industry in those that customers can start So the many areas, and now with BMC, control them. If they want to start with automation, that's a great way to start with BMC control them, which is our SAS solution off industry leading automation product called Controlling. >>And so, for just last question from a go to market perspective, it sounds like direct through BMC Channel partners. What about through a. W. S? >>Yes, absolutely. I mean again, we it's all about BMC and AWS better together we offer cloud native AWS services for our solutions, use them heavily, and I just mentioned whether that S S M or chat boards or any of the above or sage maker for machine learning I and customers can contact the local AWS Rep toe to start learning about BMC and AWS. Better together. >>Excellent. Well, Ali, thank you for coming on the program, talking to us about what BMC is doing to help your customers become that autonomous digital enterprise that we think up tomorrow. They're going to need to be to have that competitive edge. I've enjoyed talking to you >>same year. Thank you so much, Lisa. Really. It's about our customers and partnering with AWS. So very proud of Thank you so much. >>Excellent for Ali Siddiqui. I'm Lisa Martin and you're watching the Cube.

Published Date : Dec 10 2020

SUMMARY :

It's the Cube with digital coverage Exciting times. So all he talked to me a little bit. Thanks to our partnership, close partnership with the WS and on all these datas into the cross. we let them discover on syphilis. between the software in the services and help customers to optimize their investments in a W a key, unique technology which we've integrated with them very, very happy with the results E I service management in the eye ops, which we run with AWS across all these global dinner and joined with AWS customers to go on this autonomous digital enterprise journey not just survive this viral disruption that we're all living with great customer experience for the customers. Yeah, go ahead. the customer experience are even mawr essential to really get right because now we've got this. out there, a swell as RP integrations we bring to the table, which really allows are at that sea level as they look to things like AI ops to help find you in their business and in I t ops and align it with business is much better and really do innovation in this imagine that's got to be a competitive advantage to customers in any industry. And that's the journey we're taking with most of our customers and really, the ones with the growth mindset talk to me about some validation from the customer's perspective, the industry's perspective. the charts with Business impact and business alignment. So customers looking to come in the industry in those that customers can start So the many areas, and now with BMC, And so, for just last question from a go to market perspective, it sounds like direct through BMC of the above or sage maker for machine learning I and customers can contact the I've enjoyed talking to you It's about our customers and partnering with I'm Lisa Martin and you're watching the Cube.

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
Lisa MartinPERSON

0.99+

AWSORGANIZATION

0.99+

Ali SiddiquiPERSON

0.99+

BMCORGANIZATION

0.99+

WSORGANIZATION

0.99+

EricssonORGANIZATION

0.99+

15 data centersQUANTITY

0.99+

12QUANTITY

0.99+

South AfricaLOCATION

0.99+

AliPERSON

0.99+

LisaPERSON

0.99+

seven yearsQUANTITY

0.99+

100%QUANTITY

0.99+

360 degreeQUANTITY

0.99+

two employeesQUANTITY

0.99+

BMC SoftwareORGANIZATION

0.99+

R E FoundationORGANIZATION

0.99+

CanadaLOCATION

0.99+

fiveQUANTITY

0.99+

80 FoundationORGANIZATION

0.99+

bothQUANTITY

0.99+

15QUANTITY

0.99+

GardnerPERSON

0.98+

IntelORGANIZATION

0.98+

threeQUANTITY

0.98+

twoQUANTITY

0.98+

tomorrowDATE

0.97+

single platformQUANTITY

0.97+

LeePERSON

0.97+

Enterprise ManagementORGANIZATION

0.97+

E Mei Enterprise Management AssociatesORGANIZATION

0.97+

awsORGANIZATION

0.97+

singleQUANTITY

0.97+

BrazilLOCATION

0.96+

BMTORGANIZATION

0.95+

ICTYORGANIZATION

0.95+

Third WayQUANTITY

0.94+

GardnerORGANIZATION

0.94+

Gartner MQORGANIZATION

0.93+

one wayQUANTITY

0.93+

single platformQUANTITY

0.93+

80 foundationORGANIZATION

0.93+

MC ChannelORGANIZATION

0.93+

I. D. S M.PERSON

0.9+

Sachin Dhoot, Ellie Mae | AWS re:Invent 2020


 

>> Announcer: From around the globe, it's theCUBE with digital coverage of AWS reInvent 2020 sponsored by Intel, AWS and our community partners. >> Hi, and welcome to theCUBE virtual and our coverage of AWS reInvent 2020. I'm your host Rebecca Knight. Joining me is Sachin Dhoot, he is the vice president for data and platform engineering at Ellie Mae. Thank you so much for coming on theCUBE, Sachin. >> Nice to be here. >> So we are talking today about Ellie Mae's journey towards data monetization. Before we begin though, I want you to give our viewers a little bit, tell our viewers a little bit about yourself and your role at Ellie Mae. >> Sure. So I'm the vice president for data and platform engineering at Ellie Mae. A little bit about Ellie Mae before I talk about myself. So Ellie Mae, which is now part of ICE Mortgage Technology, a division of Intercontinental exchange is the leading cloud based loan origination platform for the mortgage industry. Our technology solutions actually enable lenders to originate more loans, lower origination cost and reduce the time to close. Or when ensuring the highest degree of compliance quality and efficiency. Our mission as we call it here internally is to automate everything 'automatable' for the residential mortgage industry. So that's what we do here. And we take great pride in doing that. >> Everything automatable, I love it. >> Yes. And if you have gone through the mortgage process, you'll see the number of papers you have to sign. And so we are on the journey to automate as much as possible in this. So as part of this, my charter here so I'm the vice president of data and platform engineering. Like I said, I lead and I'm responsible for all AWS based platform and data solutions including our highly secure, scalable data platform and the global, literally. Just to give you a magnitude of how much data we are talking about; so currently Ellie Mae in its platform stores data of nearly 50% of all US for mortgages. So that's the scale which we are talking about and I'm responsible for having the AWS based data platform to support that. >> So in terms of the data monetization journey like most innovations, it starts with a problem. What was the problem that you were trying to solve here? >> Yes, that's a great question. So earlier in our initial design what used to happen is the customers had access to their loan origination system and data in it. And the way they had access to the data was writing some customer SDK applications to actually export our data from their production systems. So this had its own share of challenges. Like for example, if I wrote some inefficient queries to export out the data, since they were acting on the same production database it used to slow down their loan origination system. Plus they did not get access to all of their data. And we had heard it loud and clear from our customers that not only did they need access to the data, but they also wanted us to manage their data. They did not want to get into managing the database or schema changes and all of that. Plus we also had such a rich industry data set. We are talking about 50% of all US home mortgages. So they were also very interested in using that data to get actionable insights about the industry, about their competitive advantages and develop some innovative services on top of it. So those were the challenges which we were trying to solve. >> So what was the original architecture like you're describing what sounds like a very poor experience for Ellie Mae and the lenders themselves. It sounds clunky and cumbersome. And then also leaving a lot on the table because as you said, it was a rich dataset. What was the original architecture? >> So the original architecture was not a cloud-based architecture. We were in our own private data center and every customer had their own database to work with. So, and it wasn't great architecture at that time when the technologies had not evolved. And we had a highly successful product as a result of that but when it came to data it was not a very good experience for them. So why did their loan origination system was working great? The access to the data was not to the extent what we wanted. >> So using best-in-class technologies from AWS tell us a little bit about the new product. >> Yes. So, our journey really started when we heard all of the customer's feedback and the requirements. Then we basically went back to the drawing board. We said, yes, we have a highly successful encompass product in the market, but we also want to solve this problem without affecting their experience with the loan origination system. So that was the challenge which we had taken internally. So what we did was we evaluated quite a bit of cloud providers and technology stacks and the parameters which we had put in that time because of the scale of data was, we needed unlimited scalability and reliability of any provider. We needed a secure data storage including the personally identifiable information protection. So as you can imagine, we deal with loan mortgages, I mean the mortgage and we pretty much have so much of PII data as we call it. Security is on the forefront for us. So we needed a cloud provider which could match up with that expectation. We needed.. >> AWS, was it? >> AWS was definitely it and there were some other parameters which also we were able to check because of that highly scalable and performance data Lake. We needed a big data Lake for this, storage compute separation. We also needed ability to seamlessly import data from any applications internal or external, right? And AWS absolutely gave us all of this. And we did evaluate a lot of cloud vendors and AWS came up on the top. So AWS along with persistent technologies actually helped us with this evaluation and the development of the data platform. >> So tell our viewers a little bit now about data connect and what it is for lenders now. >> Yeah. So what we did was as any cloud technology, we first developed a common platform and then we started building data connect solutions on top of it, right? So we created solutions based on the customer's needs. So one solution which we have is what we call as the data connects future products. In this, they can replicate, customers can replicate their data from the cloud, from their private data Lake into their warehouse, or they can access reports and run analytical queries directly on our warehouse which is again in the cloud. So all the solutions that are available depending on the customer's needs but that is all separate from the loan origination system. So we made sure that we are not impacting that existing business while creating this new solutions in the market. And all of these were built on AWS. >> But you also took things a step further and explored what was possible if you aggregated data from all lenders the resulting being insights. Tell our viewers a little bit about insights and what it allows. >> Absolutely. So that was a very cool product which we came up with. So again, because of the rich data set, which we have, right? We are in the position right now to aggregate the data and come up with actionable insights on top of the data. And so we call this product insights. This is our latest offering from Ellie Mae, again based off AWS and the data platform. So this product gives us information about the industry dreams on how the mortgage industry is going in US. It gives the lenders the ability to compare themselves with their peers and with the industry. So they can actually benchmark themselves and decide whether they are doing great, not great, what do they have to change? And this is all in near real time. So this is not like a month old data and all that. So that's the beauty of this product. >> And what are you hearing from customers? Because as you said, that real-time benchmarking and understanding how they're doing relative to their rivals is a game changer. It is and customers are super excited about it. We just launched this few months back and we are seeing amazing adoption for this product. In fact, just not the adoption side of things, we are also seeing so many new use cases and requirements coming from the customer now that they understand we have such a massive data and this data can scale and it's not impacted their business. They just want to add more and more things to it so that it can solve their problem. So it gives a unique opportunity for us where we can monetize more but we can also help solve lenders problems. >> Right. Helping them solve the challenges that they're facing. Talk a little bit more about the primary benefits of the solution, the unlimited scalability, the fact that it's fully managed, the storage compute separation. Tell our viewers a little bit more about the benefits. So the benefits about the solutions are, the customers or lenders don't have to worry about how it is managed. It is all taken care of. They just how to access it when they need it. It is available on demand. It is available 24/7. In this time, this year has been especially very busy for us where the interest rates have dropped and the loan volume and the loan applications have just gone through the roof. But I'm very proud to say that Ellie Mae stack or, all of the data solutions, and in fact, all of our other products, they are able to scale and they have been able to scale to the record volume this year, all because of how we have designed it using the AWS technology stack. So the customers really benefit. They just need to focus on their business. They don't have to worry about underlying infrastructure or how things are going to scale if their volume is going to go up or not or is there any security issues of that? We take care of all of those things and this is all a self provision just web based access for some of our products. So they don't even have to do a lot of customization to get hold of these products. >> So I want to ask what's next for you. You just referenced the fact that Ellie Mae's incredibly busy with record mortgage applications, of course, companies and people around the globe are still grappling with the COVID-19 pandemic. What are some of the big trends you're seeing and what's next for Ellie Mae in the coming coming year? >> We have a exciting and a very rich roadmap coming up. So as I started this interview, I said, Ellie Mae is now part of ICE mortgage technology, which is a Intercontinental exchange division. So as part of this transition, which happened recently, we also have under our umbrella, two companies called MERS and Simplifile, which actually touch so if you take MERS as an example, it touches close to 80% of US loans for home mortgages. So we have such a unique opportunity now to not only expand our data set, make it more rich, and then come up with more additional use cases which are going to help solve customer's problem and also make them competitive in the market. So we have a lot of good opportunity related to data and I feel a lot confident because of the data platform and the technology stack we to use. We will be able to handle all of those things. >> Sachin, tell our viewers a little bit about the partners that are helping you on this data monetization journey. >> So AWS definitely helped us in the initial parts in evaluating the design and the solution architects came in and worked with us. But along with that, I would definitely want to mention Persistent Technologies. They came up with a lot of good design suggestions on how we should develop the data platform and the solutions on top of it. Those insights product, which I talked about is done along with their help. So I'm very happy with the partnership I have with the Persistent Technologies and AWS. >> Excellent, well, Sachin Dhoot, thank you so much for coming on theCUBE. I really appreciate talking to you >> Same here, nice talking to you. >> Stay tuned for more of theCUBE virtual coverage at AWS reInvent. (upbeat music)

Published Date : Dec 10 2020

SUMMARY :

Announcer: From around the globe, he is the vice president So we are talking today and reduce the time to close. So that's the scale which we are talking So in terms of the And the way they had access for Ellie Mae and the lenders themselves. So the original architecture was not about the new product. in the market, but we also and the development of the data platform. So tell our viewers a little bit now So all the solutions that the resulting being insights. So that's the beauty of this product. In fact, just not the So the customers really benefit. and people around the and the technology stack we to use. about the partners that are helping you and the solutions on top of it. I really appreciate talking to you of theCUBE virtual

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
Rebecca KnightPERSON

0.99+

AWSORGANIZATION

0.99+

Sachin DhootPERSON

0.99+

Ellie MaePERSON

0.99+

SachinPERSON

0.99+

two companiesQUANTITY

0.99+

MERSORGANIZATION

0.99+

SimplifileORGANIZATION

0.99+

Persistent TechnologiesORGANIZATION

0.99+

USLOCATION

0.99+

ICE Mortgage TechnologyORGANIZATION

0.99+

one solutionQUANTITY

0.98+

Intercontinental exchangeORGANIZATION

0.98+

IntelORGANIZATION

0.98+

nearly 50%QUANTITY

0.97+

this yearDATE

0.97+

Ellie MaeORGANIZATION

0.97+

todayDATE

0.97+

a monthQUANTITY

0.97+

about 50%QUANTITY

0.96+

firstQUANTITY

0.95+

COVID-19 pandemicEVENT

0.95+

few months backDATE

0.88+

IntercontinentalORGANIZATION

0.85+

80%QUANTITY

0.83+

reInvent 2020EVENT

0.71+

reInventEVENT

0.69+

ICEORGANIZATION

0.65+

ElliePERSON

0.64+

InventTITLE

0.6+

theCUBETITLE

0.56+

coming yearDATE

0.56+

LakeCOMMERCIAL_ITEM

0.54+

theCUBEORGANIZATION

0.51+

Ellie MaeTITLE

0.51+

2020TITLE

0.47+

2020EVENT

0.4+

MaeORGANIZATION

0.34+

Breaking Down Data Silos | Beyond.2020 Digital


 

>>Yeah, yeah, >>Hello. We're back with Today's the last session in the creating engaging analytics experiences for all track breaking down data silos. A conversation with Snowflake on Western Union Earlier today, we did a few deep dives into the thought spot product with sessions on thoughts about one. Thoughts were everywhere on spot. Take you to close out this track. We're joined by industry leading experts Christian Kleinerman s VP of product at Snowflake and Tom Matzzie, Pharaoh, chief data officer at Western Union, for a thought provoking conversation on data transformation on how to avoid the pitfalls of traditional analytics. They'll be discussing in key challenges faced by organizations, why user engagement matters and looking towards the future of the industry. No Joining Thomas and Christian in conversation is Angela Cooper, vice president of customer success at Thought spot. Thank you all for being here today. We're so excited for what is what this conversation has in store. Handing it over now to Christian to kick things off. >>Hi. So, a few years ago, when when someone asked about Snowflake, the most common answer, it was like, what is snowflake and what do you do? Hopefully in the last couple off months, things have changed and and here I am showing a couple of momentum data points on, uh, where we have accomplished here it Snowflake. So we we have received Ah, a lot of attention and buzz. Recently, we were listed in the New York Stock Exchange And we even though we still think of ourselves as a small start up company, we have crossed the 2000 employees mark. More important, we count with 3 3000 plus amazing customers. And something that we obsess about is the a satisfaction of our customers. We really are working hard. The laboring technology that having a platform for better decisions, better analytics and then the promoters course off 71 depicted here is a testament of that. And last, but certainly not least about snowflake. It's very important that we know that we succeed with our partners. We know that we don't go to market by ourselves. We actually have Ah, fantastic set of partners and of course, thoughts. But it is one of our most important partners. >>Good morning. Good afternoon. Eso Amman Thomas affair on the chief kid officer here at Western Union. It's gonna be a background of a Western union and what we, uh, what we do and how we service our customers. So today we are in over 200 countries and territories worldwide. We have a 550,000 retail Asian network to service all of our customers, uh, needs from what he transfer and picking up in a depositing cash. We also have our digital transformation underway, where we now have educate abilities up and running and over 35 countries with paled options to accounts in over 120 countries. We think about our overall business and how support are over our customers and our services. It really has transformed over the past 12 months with Cove it and it's part of that We have to be able to really accelerate our transformation on a digital front to help to enable in the super those customers going forward. Eso as part of that, You know, a big, big help in a big supporter of that transformation has been snowflake and has been thought spot as part of that transformation. If you go the next to the next slide are our current, uh B I in our illegal tools right to date, uh, have been very useful up until the last one or two years. As data explodes and as as our customer needs transform and as our solutions and our time to act in our time to react in the overall market becomes faster and faster, we need to be able to basically look across our entire company, our entire organization and cross functionally to visit to leverage data leverage our insights to really basically pivot our overall business and our overall model to support our customers and our and to enable those services and products going forward. So as part of that, snowflakes been a huge part of that journey, right, allowing us to consolidate over our 30 plus data stores across the company on able to really leverage that overall data and insights to drive, uh, quick reaction right with the pivot, our business offered to enable new services and improve customer experiences going forward and then being able to use a snowflake and then being put the applications on top of that like thought spot, which allows, uh, users that are both technical and nontechnical to the go in and just, um, ask the question as if the searching on Google or Yahoo or being they can just ask any question they want and then get the results back in real time, made that business call and then really go forward through these is this larger ecosystem as a whole. It's really enabled us to really transform our business and supporter customers going forward. >>Wonderful. Thank you, Tom. Thank you, Christian, for the overview of both snowflake and Western Union. Both have big presence in Denver, which is where Tom and I are tonight. Um, I'm here. I'm the vice president of customer success for Thought spot, and I wanted to ask both of you some questions about the industry and specific things that you're facing within Western Union. So first I was hoping Christian that you could talk to me a little bit about Snowflake has thousands of customers at this point, servicing essentially located data sets. But what are you seeing? Has been the top challenges that businesses air facing and how it snowflake uniquely positioned to help. Yeah, >>so certainly the think the challenges air made. I would say that the macro challenge above everything is how to turn data into a competitive differentiator, their study after study that says companies that embrace data and insights and analytics they are outperforming their competitors. So that would be my macro challenge. Once you go into the next level, maybe I can think of three elements. The first one Tom already perfectly teed up the topic of of silence and the reality For most organizations, data is fragmented across different database systems. Even filed systems in some instances transactional databases, analytical data bases and what customers expect is to have, ah, unified experience like I am dealing with company extra company. Why? And I really don't care if behind the scenes there's 10 different teams or 100 different systems. I just want a unified experience. And the Congress is true. The opportunity to deliver personalized custom experiences is reliant on a single view of the day. The other topic that comes to mind this is the one of data governance, Um, as data becomes more important than a reorganization, understanding the constraints and security and privacy also become critical to not only advanced data capability but do it doing so responsibly and within the norms off regulation and the last one which is something court to tow our vision. We are pioneering the concept of the data cloud and the challenge that that we're addressing there is the problem around access to data, right. You can no longer as an organization think of making decisions just on your own data. But there's lots of data collaboration, data enrichment. Maybe I wanna put my data in context. And that's what we're trying to simplify and democratize access and simplify connecting to the data that improves decisions on all three fronts. Obviously, we're obsessed. That's no bling on on tearing down the silos on delivering a solution that is very focused on data governance. And for sure, the data cloud simplifies access to data. >>Wonderful. Now, I know we we really focused on those data silos is a business challenge. But Tom, going through your digital transformation journey are there specific challenges that you faced with Western Union That thought spot and snowflake have helped you overcome? >>Yeah. So? So first off fully agree what Christian just said, right? Those are absolutely, you know, problems that we faced. And we've had overcome, um, service, any company right being able to the transforming to modernize the cloud. Um, for us, one of the biggest things is being able to not just access our information, but have it in a way that it can be consumed, right? Have it in a way that it could be understood, right? Have it in a way that we can then drive business business decision points and and be able to use that information to either fix a problem that we see or better service our customers or offer a product that we're seeing right now is a miss in the marketplace to service in a underserved community or underserved, um, customer base. Also, from our standpoint, being able toe look, um um, uh and predict in forecast what's going to happen and be able to use that information and use our insights to then be proactive and thio in either, You know, be thoughtful about how do we shift our focus, or how do we then change our strategy to take advantage of that for that forecast in that position that we're seeing into the future? >>Wonderful. I've heard from many customers you could not have predicted what was going to happen to our businesses in the year 2020 with the traditional models and especially with what did you say? 30 plus different data silos. Being able to do that type of prediction across those systems must have been very, very difficult. You also mentioned going through a digital transformation at Western Union. So can you talk to me, Tom? A little bit about kind of present day? And why? Why is it important to enable your frontline knowledge workers with the right data at the right time with the right technology? >>Yeah, so? So you're spot on, by the way. But, uh, no one predicted that that we would have a pandemic that would literally consume the entire globe right And change how consumers, um uh, use and buy services and products, or how economies would either shut down or at the reopening shut down again. And then how different interests to be impacted by this? Right. So, uh, what we learned and what we were able to pivot was being able to do exactly what you just said, right. Being able to understand what's happening the date of the right time, right then being able to with the right technology with the right capabilities, understand? what's happening. I understand. Then what should our pivot be? And how should we then go focus on that pivot to go into go and transform? I think it's e. It's more than just just the front lines. Also, our executives. It's also are back office operations, right, because as you think through this, right as customers were having issues right, go into retail locations that were closed. It end of Q one Earlier, Q two. We obviously had a a large surplus right of phone calls coming into our call centers, asking for help, asking for How can we transact better? Where can we go? Right? How do we handle the operationally? Right? As we had a massive surge onto our digital platform where we were, we had 100% increase year over year in Q one and Q two. How do we make sure that our platform the technology can scale right and still provide the right S L A's and and and and the right, um uh, support to our internal customers as well as our extra customers in the future? Eso so really interesting, though, you know, on on on the front line side, our sales staff, right? And even our front line associates with our agent locations A to retail side, you know, for us, is really around. How do we best support them? So how do we partner with them to understand? You know, when a certain certain governments or certain, uh, regions were going toe lock down, how do we support them to keep them open, right. How do we make them a essential service going forward? How do we enable them? Right, the Wright systems or technology to do things a bit differently than they have in the past to adopt right with the changing times. But, you know, I'll tell you the amount of transformation in the basement we've done this year, I think you know, has a massive and actually on Lee, you know, created a larger wave for us to actually ride into the future as we can, to base to innovate, you know, in partnership with both thought spot and with the snowflake into the future. >>Absolutely. I've seen many, many a industry analyst reports talking about how companies now in 2020 have accelerated that digital transformation movement because of current day. In current time, Christian What are you seeing with the rest of the industry and other global companies about enabling data across the globe at the right time? >>Yeah, so I can't agree more with with with with what? Tom said. And he gave some very, um, compelling and very riel use cases where the timeliness of data and and and and and at the right time concept make a big difference. Right? They aske part of our data marketplace with snowflake with deliver, for example, um, up to date low ladies information on, uh, covert 19 data sets where we're infection spiking. And what were the trends? And the use case was very, very riel. Every single company was trying to make sense of the numbers. Uh, all machine learning models were sort of like, out of whack, because no trends and no patterns may make sense anymore. And it was They need to be able to join my data and my activity with this health data set and make decisions at the right time. Imagine if if the cycle to makes all these decisions waas Ah, monthlong. You would never catch up, right? And he speaks to tow a concept that it that is, um, dear, it wasa snowflake and is the lifetime value data right? The notion of ableto act on a piece of data on an event at the right time and obviously with the slow laden see it's possible, makes a big difference. And and there is no end of example. Stomach gives her all again very compelling ones. Um, there's many others, but if you're running a marketing campaign and would you want to know five minutes later that it's not working out, you're burning your daughters? Or would you want to know the next day? Or if someone is going to give you you have a subscription based business and you're going toe, for example, have a model that predicts the turn of your customer? How useful is if you find out Hey, your customer is gonna turn, but you found out two months later. Once probably you are really toe action and change the outcome. Eyes different and and and this order to manage that I'm talking about days or months are not uncommon. Many organizations today, and that's where the topic of right technology matters. Um, I love asking questions about Do you know, an organization and customers. Do you run data, transformations and ingests at two and three in the morning? And the most common answer is yes. And then you start asking why. And usually the answer is some flavor off technology made me do it and a big part of what we're trying to do, like what we're pioneering is. How about ingesting data, transforming data enriching data when the business needs it at the right time with the right timeliness? Not when the technology had cycles. So they were Scipio available, so the importance can't be overstated. There is value in in in analyzing understanding data on time, and we provide technology and platform to any of this. >>That's such a good point. Christian. We ended up on Lee doing processes and loading in the middle of the night because that's what the technology at that time would allow. You couldn't have the concurrency. You couldn't have, um, data happening all at the same time. And so wonderful point that stuff like enables. I think another piece that's interesting that you guys a hit on is that it's important to have the same user experiencing user interface at the right time. And so what I found talking to customers. And Tom what? You and I have discussed this. When you have 30 different data sets and you have a interface that's different, you have a legacy reports system. Maybe you have excel on top of another. You have thought spot on one. You have your dashboard of choice on another, those different sources in different ways. To view that data, it can all be so disjointed. And the combination of thought spot with snowflake and all the data in one place with a centralized, unified user experience just helps users take advantage off the insights that they need right at that right moment. So kind of finishing up for our last question for today I'm interested to hear about Christian will go back to you quickly about what do you see from snowflakes? Perspective is ahead. Future facing for data and analytics. >>One of the topics you just alluded toe Angela, which is the fact that many data sets are gonna be part of the processes by which we make decisions and that that's where were the experience with thoughts but a single unified search experience for a single unified. Um automatic insects, which is what's para que does That is the future, right? I I don't think that x many years from now on, and I think that that X is a small number. Organizations are going to say I had some business activity. I collected some data. I did some analysis and I have conclusions because it always has to be okay, put it in context or look at industry trends and look at other activity that can help him make more sense about my data. The example of tracking they covert are breaking is ah, timely one. But you can always say go on, put it in context with, I don't know, maybe the GDP of the country or the adoption of a platform and things like that. So I think that's ah big trend on having multiple data sets. Contributing towards better decisions towards better product experience is for better services. And, of course, Snowflake is trying to do its part, is doing its part with vision and simplify answers today and the answer on hot spot simplifying blending the interface so that would be super useful. The other big piece, of course, is, um, Predictive Analytics people Talk machine Learning and AI, which is a little bit to buzz worthy. But it is true that we have the technology to drive predictions and and do a better job of understanding behaviors off what's supposed to happen based on understanding the best and the last one. If if if I'm allowed one. Exco What's ahead for data industry, which sounds obvious, but But we're not all the way. There is both cloud the adoption and moving to the cloud as well as the topic of multi Cloud. Increasingly, I think we we finally shifted conversations from Should I go to the cloud or not? Now it's How fast do I do it? And increasingly what we hear is I may want to take the best of the different clouds and how doe I go in and and and embrace a multi cloud reality without having to learn 100 plus different services and nuances of services on on every car and this work technologies like snowflake and thoughts about that can can support a different multiple deployment are being well received by different customs, nerve fault, >>Tom industry trends, or one thing I know. Western Union is really leading in the digital transformation and in your space, What's next for Western Union? >>Yeah, so just add on Requip Thio Christian before I dive into a Western Union use case just to your point. Christian, I really see a convergence happening between how people today work or or manage their personal life, where the applications, the user experiences and the responses are at your fingertips. Easy to use don't need to learn different tools. It's just all there, right, whether you're an android user or an apple user rights, although your fingertips I ask you the same innovation and transmission happening now on the work side, where I see to your point right a convergence happening where not just that the technology teams but even the business teams. They wanna have that same feature, that same functionality, where all their insights their entire way to interact with the business with the business teams with their data with their systems with their products for their services are at their fingertips right where they can go and they can make a change on an iPad or an iPhone and instant effect. They can go change a rule. They could go and modify Uh uh, an algorithm. They can go and look at expanding their product base, and it's just there. It's instant now. This would take time, right? Because this is going to be a transformational journey right across many different industries, but it's part of that. I really see that type of instant gratification, uh, satisfaction, that type of being able to instantly get those insights. Be able thio to really, you know, do what you do on your personal life in your work life every single day. That trend is absolutely it's actually happening. And it's kind of like tag team that into what we're doing at Western Union is exactly that we are actually transforming how our business teams, uh, in our technology teams are able to interact with our customers, interact with our products, interact with our services, interact with our data and our systems instantly. Right? Perfect example that it's that spot where they could go on typing any question they want. And they instigate an answer like that that that was unheard of a year ago, at least for our business. Right being able to to to go and put in in a new rule and and have it flow through the rules engine and have an instant customer impact that's coming right. Being able to instantly change or configure a new product or service with new fee structure and launch in 15 minutes. That's coming, right? All these new transformations about how do we actually better, uh, leverage our capabilities, our products and our services to meet those customer demands instantly. That's where I see the industry going the next couple of years. >>Wonderful. Um, excited to have both of you on the panel this afternoon. So thank you so much for joining us, Christian and Tom as just a quick wrap up. I, you know, learned quite a bit about industry trends and the problems facing companies today. And from the macro view with snowflake and thousands of customers and thought spots, customers and Western Union. The underlying theme is data unity, right? No more fragmented silos, no more fragmented user experiences, but truly bringing everything together in a governed safe way for users. Toe have trust in the data to have trust in what to answer and what insight is being put in front of them. And all of this pulled together so that businesses can make those better decisions more informed and more personalized. Consumer like experiences for your customers in modern technology stacks. So again, thank you both today for joining us, and we look forward to many more conversations in the future. Thank you >>for having me very happy to be here. >>Thank you so much. >>Thanks. >>Thank you, Angela. And thank you, Tom and Christian for sharing your stories. It was really interesting to hear how the events of this year have prompted Western Union to accelerate their digital transformation with snowflake and thought spot and just reflecting on alot sessions in this track, I love seeing how we're making the search experience even easier and even more consumer like in that first session and then moving on to the second session with our customer Hayes. It was really impressive to see how quickly they'd embedded thought spot into their own MD audit product. And then, of course, we heard about Spot Ike, which is making it easier for everybody to get to the Y faster with automated insights. So I'm afraid that wraps up the sessions in this track. We've come to an end, But remember to join us for the exciting product roadmap session coming right up. And then after that, put your questions to the speakers that you've heard in Track two in I'll meet the Experts Roundtable, creating engaging analytics experiences for all. Now all that remains is for me to say thank you for joining us. We really appreciate you taking the time. I hope it's been interesting and valuable. And if it has, we'd love to pick up with you for a 1 to 1 conversation Bye for now.

Published Date : Dec 10 2020

SUMMARY :

we did a few deep dives into the thought spot product with sessions on thoughts about one. the most common answer, it was like, what is snowflake and what do you do? and as our solutions and our time to act in our time to react and I wanted to ask both of you some questions about the industry and specific things that you're facing And for sure, the data cloud simplifies access to data. that you faced with Western Union That thought spot and snowflake have helped you overcome? to either fix a problem that we see or better service our customers or offer Why is it important to enable your frontline knowledge ride into the future as we can, to base to innovate, you know, in partnership with both thought spot and with data across the globe at the right time? going to give you you have a subscription based business and you're going toe, and loading in the middle of the night because that's what the technology at that time the adoption and moving to the cloud as well as the topic of multi Cloud. in the digital transformation and in your space, What's next for Western Union? Be able thio to really, you know, do what you do on your And from the macro view with snowflake and thousands of customers for me to say thank you for joining us.

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
TomPERSON

0.99+

Angela CooperPERSON

0.99+

AngelaPERSON

0.99+

Tom MatzziePERSON

0.99+

100%QUANTITY

0.99+

ChristianPERSON

0.99+

DenverLOCATION

0.99+

Christian KleinermanPERSON

0.99+

iPhoneCOMMERCIAL_ITEM

0.99+

2020DATE

0.99+

ThomasPERSON

0.99+

Western UnionORGANIZATION

0.99+

iPadCOMMERCIAL_ITEM

0.99+

second sessionQUANTITY

0.99+

GoogleORGANIZATION

0.99+

PharaohPERSON

0.99+

10 different teamsQUANTITY

0.99+

Western UnionORGANIZATION

0.99+

YahooORGANIZATION

0.99+

bothQUANTITY

0.99+

todayDATE

0.99+

first sessionQUANTITY

0.99+

New York Stock ExchangeORGANIZATION

0.99+

15 minutesQUANTITY

0.99+

androidTITLE

0.99+

Western unionORGANIZATION

0.99+

appleORGANIZATION

0.99+

SnowflakeORGANIZATION

0.99+

BothQUANTITY

0.99+

550,000QUANTITY

0.99+

100 different systemsQUANTITY

0.99+

oneQUANTITY

0.99+

2000 employeesQUANTITY

0.98+

CongressORGANIZATION

0.98+

a year agoDATE

0.98+

over 120 countriesQUANTITY

0.98+

1QUANTITY

0.98+

two months laterDATE

0.98+

LeePERSON

0.98+

TodayDATE

0.98+

over 200 countriesQUANTITY

0.98+

tonightDATE

0.98+

71QUANTITY

0.98+

OneQUANTITY

0.98+

Western UnionLOCATION

0.97+

three elementsQUANTITY

0.97+

30 plus data storesQUANTITY

0.96+

five minutes laterDATE

0.96+

firstQUANTITY

0.96+

over 35 countriesQUANTITY

0.96+

next dayDATE

0.96+

30 different data setsQUANTITY

0.95+

ChristianORGANIZATION

0.95+

19 data setsQUANTITY

0.94+

singleQUANTITY

0.94+

twoQUANTITY

0.94+

SnowflakeEVENT

0.94+

30 plus different data silosQUANTITY

0.93+

few years agoDATE

0.92+

this afternoonDATE

0.92+

this yearDATE

0.92+

first oneQUANTITY

0.92+

3 3000 plusQUANTITY

0.91+

Frank Keynote with Disclaimer


 

>>Hi, I'm Frank's Luqman CEO of Snowflake. And welcome to the Snowflake Data Cloud Summit. I'd like to take the next few minutes to introduce you to >>the data cloud on why it matters to the modern enterprise. As an industry, we have struggled to mobilize our data, meaning that has been hard to put data into service of our enterprises. We're not living in a data economy and for most data central how we run our lives, our businesses and our institutions, every single interaction we have now, whether it's in social media, e commerce or any other service, engagement generates critical data. You multiply this out with the number of actors and transactions. The volume is overwhelming, growing in leaps and bounds every day. There was a time when data operations focused mostly on running reports and populating dashboards to inform people in the enterprise of what had happened on what was going on. And we still do a ton of that. But the emphasis is shifting to data driving operations from just data informing people. There is such a thing as the time value off data meaning that the faster data becomes available, the more impactful and valuable it ISS. As data ages, it loses much of its actionable value. Digital transformation is an overused term in our industry, but the snowflake it means the end to end automation of business processes, from selling to transacting to supporting to servicing customers. Digital processes are entirely disinter mediated in terms of people. Involvement in are driven into end by data. Of course, many businesses have both physical and digital processes, and they are >>intertwined. Think of retail, logistics, delivery services and so on. So a data centric operating discipline is no longer optional data operations Air now the beating heart >>of the modern enterprise that requires a massively scalable data platform talented data engineering and data science teams to fully exploit the technology that now is becoming available. Enter snowflake. Chances are that, you know, snowflake as a >>world class execution platform for a diverse set of workloads. Among them data warehousing, data engineering, data, lakes, data, science, data applications and data sharing. Snowflake was architected from scratch for cloud scale computing. No legacy technology was carried forward in the process. Snowflake reimagined many aspects of data management data operations. The result was a cloud data platform with massive scale, blistering performance, superior economics and world class data governance. Snowflake innovated on a number of vectors that wants to deliver this breakthrough. First scale and performance. Snowflake is completely designed for cloud scale computing, both in terms of data volume, computational performance and concurrent workload. Execution snowflake features numerous distinct innovations in this category, but none stands up more than the multi cluster shared stories. Architectural Removing the control plane from the individual cluster led to a dramatically different approach that has yielded tremendous benefits. But our customers love about Snowflake is to spin up new workloads without limitation and provisioned these workloads with his little or as much compute as they see fit. No longer do they fear hidden capacity limits or encroaching on other workloads. Customers can have also scale storage and compute independent of each other, something that was not possible before second utility and elasticity. Not only can snowflake customer spin up much capacity for as long as they deem necessary. Three. Utility model in church, they only get charged for what they consumed by the machine. Second, highly granular measurement of utilization. Ah, lot of the economic impact of snowflake comes from the fact that customers no longer manage capacity. What they do now is focused on consumption. In snowflake is managing the capacity. Performance and economics now go hand in hand because faster is now also cheaper. Snowflake contracts with the public cloud vendors for capacity at considerable scale, which then translates to a good economic value at the retail level is, well, third ease of use and simplicity. Snowflake is a platform that scales from the smallest workloads to the largest data estates in the world. It is unusual in this offer industry to have a platform that controversy the entire spectrum of scale, a database technology snowflake is dramatically simple fire. To compare to previous generations, our founders were bent on making snowflake, a self managing platform that didn't require expert knowledge to run. The role of the Deba has evolved into snowflake world, more focused on data model insights and business value, not tuning and keeping the infrastructure up and running. This has expanded the marketplace to nearly any scale. No job too small or too large. Fourth, multi cloud and Cross Cloud or snowflake was first available on AWS. It now also runs very successfully on mark yourself. Azure and Google Cloud Snowflake is a cloud agnostic platform, meaning that it doesn't know what it's running on. Snowflake completely abstracts the underlying cloud platform. The user doesn't need to see or touch it directly and also does not receive a separate bill from the cloud vendor for capacity consumed by snowflake. Being multi cloud capable customers have a choice and also the flexibility to change over time snowflakes. Relationships with Amazon and Microsoft also allow customers to transact through their marketplaces and burned down their cloud commit with their snowflakes. Spend Snowflake is also capable of replicating across cloud regions and cloud platforms. It's not unusual to see >>the same snowflake data on more than one public cloud at the time. Also, for disaster recovery purposes, it is desirable to have access to snowflake on a completely different public cloud >>platform. Fifth, data Security and privacy, security and privacy are commonly grouped under the moniker of data governance. As a highly managed cloud data platform, snowflake designed and deploys a comprehensive and coherent security model. While privacy requirements are newer and still emerging in many areas, snowflake as a platform is evolving to help customers steer clear from costly violations. Our data sharing model has already enabled many customers to exchange data without surrendering custody of data. Key privacy concerns There's no doubt that the strong governance and compliance framework is critical to extracting you analytical value of data directly following the session. Police Stay tuned to hear from Anita Lynch at Disney Streaming services about how >>to date a cloud enables data governance at Disney. The world beat a >>path to our door snowflake unleashed to move from UN promised data centers to the public cloud platforms, notably AWS, Azure and Google Cloud. Snowflake now has thousands of enterprise customers averaging over 500 million queries >>today across all customer accounts, and it's one of the fastest growing enterprise software companies in a generation. Our recent listing on the New York Stock Exchange was built is the largest software AIPO in history. But the data cloth conversation is bigger. There is another frontier workload. Execution is a huge part of it, but it's not the entire story. There is another elephant in the room, and that is that The world's data is incredibly fragmented in siloed, across clouds of old sorts and data centers all over the place. Basically, data lives in a million places, and it's incredibly hard to analyze data across the silos. Most intelligence analytics and learning models deploy on single data sets because it has been next to impossible to analyze data across sources. Until now, Snowflake Data Cloud is a data platform shared by all snowflake users. If you are on snowflake, you are already plugged into it. It's like being part of a Global Data Federation data orbit, if you will, where all other data can now be part of your scope. Historically, technology limitations led us to build systems and services that siloed the data behind systems, software and network perimeters. To analyze data across silos, we resorted to building special purpose data warehouses force fed by multiple data sources empowered by expensive proprietary hardware. The scale limitations lead to even more silos. The onslaught of the public cloud opened the gateway to unleashing the world's data for access for sharing a monetization. But it didn't happen. Pretty soon they were new silos, different public clouds, regions within the and a huge collection of SAS applications hoarding their data all in their own formats on the East NC ations whole industries exist just to move data from A to B customer behavior precipitated the silo ing of data with what we call a war clothes at a time mentality. Customers focused on the applications in isolation of one another and then deploy data platforms for their workload characteristics and not much else, thereby throwing up new rules between data. Pretty soon, we don't just have our old Silas, but new wants to content with as well. Meanwhile, the promise of data science remains elusive. With all this silo ing and bunkering of data workload performance is necessary but not sufficient to enable the promise of data science. We must think about unfettered data access with ease, zero agency and zero friction. There's no doubt that the needs of data science and data engineering should be leading, not an afterthought. And those needs air centered on accessing and analyzing data across sources. It is now more the norm than the exception that data patterns transcend data sources. Data silos have no meaning to data science. They are just remnants of legacy computing. Architectures doesn't make sense to evaluate strictly on the basis of existing workloads. The world changes, and it changes quickly. So how does the data cloud enabled unfettered data access? It's not just a function of being in the public cloud. Public Cloud is an enabler, no doubt about it. But it introduces new silos recommendation by cloud, platform by cloud region by Data Lake and by data format, it once again triggered technical grandstands and a lot of programming to bring a single analytical perspective to a diversity of data. Data was not analytics ready, not optimized for performance or efficiency and clearly lacking on data governance. Snowflake, address these limitations, thereby combining great execution with great data >>access. But, snowflake, we can have the best of both. So how does it all work when you join Snowflake and have your snowflake account? You don't just >>avail yourself of unlimited stories. And compute resource is along with a world class execution platform. You also plug into the snowflake data cloud, meaning that old snowflake accounts across clouds, regions and geography are part of a single snowflake data universe. That is the data clouds. It is based on our global data sharing architectures. Any snowflake data can be exposed and access by any other snowflake user. It's seamless and frictionless data is generally not copied. Her moves but access in place, subject to the same snowflake governance model. Accessing the data cloth can be a tactical one on one sharing relationship. For example, imagine how retailer would share data with a consumer back. It's good company, but then it easily proliferate from 1 to 1. Too many too many. The data cloud has become a beehive of data supply and demand. It has attracted hundreds of professional data listings to the Snowflake Data Marketplace, which fuels the data cloud with a rich supply of options. For example, our partner Star Schema, listed a very detailed covert 19 incident and fatality data set on the Snowflake Data Marketplace. It became an instant hit with snowflake customers. Scar schema is not raw data. It is also platform optimize, meaning that it was analytics ready for all snowflake accounts. Snowflake users were accessing, joining and overlaying this new data within a short time of it becoming available. That is the power of platform in financial services. It's common to see snowflake users access data from snowflake marketplace listings like fax set and Standard and Poor's on, then messed it up against for example. Salesforce data There are now over 100 suppliers of data listings on the snowflake marketplace That is, in addition to thousands of enterprise and institutional snowflake users with their own data sets. Best part of the snowflake data cloud is this. You don't need to do or buy anything different. If your own snowflake you're already plugged into the data clouds. A whole world data access options awaits you on data silos. Become a thing of the past, enjoy today's presentations. By the end of it, you should have a better sense in a bigger context for your choices of data platforms. Thank you for joining us.

Published Date : Nov 19 2020

SUMMARY :

I'd like to take the next few minutes to introduce you to term in our industry, but the snowflake it means the end to end automation of business processes, So a data centric operating discipline is no longer optional data operations Air now the beating of the modern enterprise that requires a massively scalable data platform talented This has expanded the marketplace to nearly any scale. the same snowflake data on more than one public cloud at the time. no doubt that the strong governance and compliance framework is critical to extracting you analytical value to date a cloud enables data governance at Disney. centers to the public cloud platforms, notably AWS, Azure and Google Cloud. The onslaught of the public cloud opened the gateway to unleashing the world's data you join Snowflake and have your snowflake account? That is the data clouds.

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
Anita LynchPERSON

0.99+

AmazonORGANIZATION

0.99+

MicrosoftORGANIZATION

0.99+

DisneyORGANIZATION

0.99+

New York Stock ExchangeORGANIZATION

0.99+

Global Data FederationORGANIZATION

0.99+

AWSORGANIZATION

0.99+

secondQUANTITY

0.99+

todayDATE

0.99+

19 incidentQUANTITY

0.99+

SecondQUANTITY

0.99+

FourthQUANTITY

0.98+

bothQUANTITY

0.98+

over 500 million queriesQUANTITY

0.98+

Standard and PoorORGANIZATION

0.98+

Snowflake Data Cloud SummitEVENT

0.98+

over 100 suppliersQUANTITY

0.98+

Star SchemaORGANIZATION

0.98+

FifthQUANTITY

0.98+

Data LakeORGANIZATION

0.98+

ThreeQUANTITY

0.97+

SnowflakeORGANIZATION

0.97+

oneQUANTITY

0.97+

1QUANTITY

0.96+

SnowflakeTITLE

0.96+

Frank KeynotePERSON

0.95+

thousands of enterprise customersQUANTITY

0.95+

firstQUANTITY

0.95+

single snowflakeQUANTITY

0.91+

snowflakeTITLE

0.91+

thirdQUANTITY

0.9+

singleQUANTITY

0.9+

more than one public cloudQUANTITY

0.86+

thousands of enterpriseQUANTITY

0.84+

CloudTITLE

0.84+

Snowflake Data CloudTITLE

0.84+

FrankORGANIZATION

0.83+

single dataQUANTITY

0.83+

SalesforceORGANIZATION

0.81+

a million placesQUANTITY

0.8+

hundreds of professional data listingsQUANTITY

0.8+

AzureTITLE

0.78+

snowflake usersQUANTITY

0.78+

zeroQUANTITY

0.77+

zero frictionQUANTITY

0.74+

East NCLOCATION

0.73+

Scar schemaORGANIZATION

0.73+

First scaleQUANTITY

0.71+

Google Cloud SnowflakeTITLE

0.65+

UNORGANIZATION

0.63+

SilasTITLE

0.59+

SpendTITLE

0.51+

GoogleORGANIZATION

0.51+

Public CloudTITLE

0.49+

snowflakeEVENT

0.48+

LuqmanORGANIZATION

0.44+

AIPOORGANIZATION

0.43+

SASTITLE

0.42+

Rajesh Janey, Dell Technologies, Uptal Bakshi & Satish Yadavali, Wipro | Dell Technologies World '20


 

>> Narrator: From around the globe it's theCUBE with digital coverage of Dell Technologies World. Digital experience brought to you by Dell Technologies. >> Welcome back everybody. Jeff Frick here with theCUBE. Welcome back to our ongoing coverage of Dell Technology World. We've been covering Dell Tech World since it started really. It used to just be Dell World and there was EMC World after the merger and this is the all virtual version but we're excited to be here and we've got a great panel coming up. I think you're going to enjoy it. Our first guest is Rajesh Janey. He is the Senior Vice President of Global Alliances for APJ for Dell Technologies. Rajesh, where are you coming in from today? >> I'm speaking to you from Gurgaon, India. >> Awesome. It's the power of the virtual, right? It's not all bad that we don't have to get on planes all the time. >> Absolutely. >> And joining him is Utpal Bakshi. He is the Vice President and Global Vertical Head High Tech for Wipro. Utpal, good to see you. >> Nice to see you. >> And where are you calling us in from? >> I'm from Dallas, Texas. Actually suburb outside of Dallas called South Lake. >> Oh, excellent. Great to see you and again didn't have to get on a plane to do this so not all bad. And also joining us is Satish Yadavalli. He is the Vice President and Global Practice Head, Cloud and Infrastructure Services for Wipro. Satish, where are you joining us from? >> Hi, I'm joining from Bangalore, India. >> Excellent. Welcome. So gentlemen let's just jump into it. Wipro's a huge services firm, does a lot of work with Dell so I wonder Rajesh if you can talk really about the importance of partnerships and the importance of having somebody like Wipro within the Dell ecosystem. >> Absolutely. Thank you for having us on with Wipro. Wipro and we have had a partnership which is over two decades old and we have a multifaceted 360 degree kind of relationship with Wipro. Wipro is a platinum partner and what's more while we bring a lot of technology and products and the depth of product which are relevant to customer's transformation scenarios today, coupled with Wipro's consulting and services and design abilities this becomes an unbeatable power house so to say whereby we can work closely with a customer to help them transform and live in what we are calling the next normal. >> Yeah that's great. Utpal to you there's a lot of interesting trends going on. We've had cloud and big data been going on for a lot but really the talk in social media is what's driving your digital transformation, the CEO, the CIO or COVID and we all know what the answer is. So we've got a lot of new stuff in terms of digital transformation, working from anywhere, workforce transformation. Wonder if you can speak a little bit about how COVID has accelerated some of the priorities that your customers are trying to get done. >> Yeah. I think that's a great point. Wipro has been transforming over the last several years. We were a strong, large scale system integration partner, large IT organization but over the last several years we pivoted hard into the digital transformation world moving into the design side, leading the design, moving to cloud and helping our clients help make that journey and all of that got accelerated with the whole COVID situation. The work from home became all pervasive and the whole virtualization of the workforce really pivoted with some of our key transformational ideas around live workspace and the virtual desk which we've been working very closely with Dell have taken shape. So that has been a big part of our ongoing strategy. Doing the modernization off the network has also accelerated the customer networks and infrastructure was not necessarily set up for enabling these hybrid work environment. A lot of our clients are coming back and saying they want to modernize and actually accelerate. So that has all changed with COVID. Some of it is very positive actually for the business. >> Right. >> From an SI perspective. >> Satish, you've got cloud and infrastructure in your title. Public cloud really changed the game when Amazon kind of came on the scene and now we're seeing this evolution and change over time between a public cloud and hybrid cloud and multi cloud and cloud on cloud. I wonder if you could speak to and then even have an AWS inside of other people's clouds. They're trying to get it out there. The evolution of cloud both as a technology but really more as a way of thinking in terms of rapid deployment of new functionality to support the business and what you're seeing with your customers today. >> So let me share a perspective, right? Enterprises today are looking at options to extract greater value from hybrid cloud investment. It's a brownfield environment today where customers have their existing data centers but the hyperscalers have really come into play now and right cloud is the strategy which most of our customers embrace to address the market demands which are primarily focused on business outcomes today. As Wipro we have invested in developing a holistic extensible platform led approach called Wipro BoundaryLess Enterprise to drive business outcomes to customers. So the BLE construct is all about providing a ready to use plug-and-play platforms making IT easily consumable from multiple stakeholder personas be it admins, be it line of businesses, developers and partners. So basically we have built a holistic solution and our BLE solutions has majorly five building blocks. The first building block would be the BoundaryLess Data Center. The second is the BoundaryLess Container Platform. The third is the BoundaryLess Data Protection Platform. The fourth is the BoundaryLess Cloud Exchange where we get together all the internet connections and define the software defined network part to give access to the workloads across hybrid environments and the BoundaryLess Integration Platform which we call it as BLIP. Basically this is what we have put together to deliver an outcome to the customers powered by BLE. >> So BLE again, you call it the BoundaryLess Enterprise. What's the most important components of BLE? What are the things that most people are missing to actually implement the strategy? >> So if I actually build on you, right? The five building blocks let me elaborate in detail. The first is on the BoundaryLess Data Center. This enables our clients to deliver an infrastructure as a service across data centers and public clouds and enables customers to seamlessly move workloads from Edge to Cloud and manage them in a consistent and efficient model. That's the first building block of our BLE. The second important building block is container, right? We all know today container orchestration is key across hybrid cloud and with micro services and architectures becoming more prominent we see huge search for managing various Kubernetes enrollments with our clients. So our BLCP platform leverages solutions like VMware Tanzu, which is again a Dell company to enable clients manage the multicloud Kubernetes enrollments through a single pane of glass and provide seamless migration and movement of workloads across cloud environments. That's going to be the key in the future with microservices being dominant and every enterprise embracing microservices architectures this becomes very important building block in our overall solution. The third important stuff is BoundaryLess Data Protection. Now that data is all cross in hybrid cloud environment and application actually consume this data it is important to protect the data which is intellectual property and very critical to every business. So with the BLDP platform we ensure that we deliver availability, solidarity, security and reliability of cloud adoption increasingly and rapidly across multicloud platforms. So our solution leverages the DTC of Dell and other existing Dell storages and data production solutions to offer seamless and right cost models which will be very critical for any cloud transformation and schedules as we move forward. The fourth point which I was talking about is BLCE. This is basically a cloud exchange where in a hybrid cloud environment you need to establish connectivities across PaaS and SaaS platforms as well as on-premise networks to provide seamless access to data and the workloads which are in multicloud scenarios. So that's about BLCE. With respect to BLIP it is an integration platform. Today we are in a software defined world and when I talk about providing a single pane of glass solution it is important for us to have an integration platform where I can bring all EPIs together and do northbound and southbound integrations with the architectures of clients and the cloud providers to spin off workloads, to commission, decommission and provide a seamless consumption experience to clients across multiple hyperscalers and on-premise infrastructure. >> Thank you for that summary. I think you hit on all the big trends. I want to go back to you Rajesh 'cause you said that this is a really unique time. You've been in the business for a very long time. You've seen a lot of other transformations and you've seen a lot of big trends. Why is this one different? What makes where we are today such a unique point in time in this IT industry journey? >> Excellent. I think I would say we are in a period of what is called an enforced innovation. While most of the time transformation in IT has been very, very sequential or continuous I think we are seeing an order of shift in the transformation and this whole situation is forcing everyone to accelerate the pace of innovation and transformation. There are two key priorities for every organization in this time. One, build resilient operations and second employee safety. These two parameters have forced the organization to look at their businesses differently, look at their IT infrastructure differently and created a sort of opportunity you can say which is ripe for Wipro's BoundaryLess Enterprise because there are no boundaries. People are working from home. They're no longer in an office confined or boundary. So that's smart. Coming back we are seeing an accelerated innovation. That means our partnership to deliver customer transformation at scale becomes all the more important. Bringing all the good technologies of Dell on one side and combining it Wipro's size, scale and services help us lead in the marketplace for customer transformation. And what's more, we are adding our Dell financial services solutions as Dell Tech on demand to enable all this to be consumed as a service and with flexible payment options which Wipro helps us translate it to customer offerings. >> That's great. Utpal, I want to go to you and get your perspective on how customers, in terms of this boundaryless, how things have changed since March 15th which at least here in the US, I don't know if in India it was on the same date when everything basically got shut down. So it was this light switch moment. Everybody worked from home, no planning, no thought like ready, set, go to now we're six, seven, eight months into this thing and clearly we're it's a marathon not a sprint and even if we go back to some semblance of what was the old normal the new normal is going to be different and everyone is not going to go back to work full time like they did before. So how, from a customer perspective, from a technology implementation perspective and from an initiative and getting this stuff done how has that changed pre-COVID then oh my goodness, it's the light switch moment and now it's, hey, we're in this for the long term. >> Yeah. I think Rajesh did hit upon that a little bit. This is truly that moment where it was a forced innovation. Some of it was happening anyways and it was bound to happen but I think the COVID kind of accelerated all of it. What has impacted is it all started with, okay, how do we enable work from home? And that is when the whole BoundaryLess infrastructure, the virtual desk solutions and all of that started getting impact. I think after that most companies have realized that this is not a short term fix. It is a longterm it's going to be here for staying so they wanted to have a longterm fix so they wanted to come in with innovation but at the same time from a business perspective they've had impact in business so they wanted very creative business models for them to get set with the technology innovation quicker but they didn't want to do it in a traditional way of paying it all upfront and moving it to that. So that is where the creativity in terms of joint innovation which we did with Dell, in flexible payment options, bringing in some kind of an asset lease model and things like that have gained traction. A lot more conversations are around we want to transform help us find a way to make the transformation sooner with maybe less investment upfront and find a way to fund this from the future savings we'll get so that we can be ready for the future without necessarily impacting the bottom line today. All of that has changed, I would say in summary, has accelerated the adoption and the rate of change but it has also led to all of us thinking some creative business models and new approaches to doing business. >> Right, right. Satish back to you. What are the big conflicts that always exist? There's innovation versus security, right? And enabling innovation and giving people more power, more tools, more data to do things at the same time now your tax surface has increased you don't necessarily have everybody locked down on their home infrastructure and they were forced into this. When people are talking about digital transformation, how do they continue to drive forward and how are you helping them on innovation and enabling innovation at the same time as you talked about keeping the data protected and really thinking about business resiliency and continuity in this to increase the tax surface not only because of mobile, but now with the working from home thing? It's increased exponentially. >> Yeah. So I would just take an example of how Wipro handled this pandemic when it hit us and what solutions we get. So let me just give you a perspective. As we all know the current pandemic has disrupted many industries and we were no exception. Basically COVID has brought to the forefront many crucial factors in terms of business continuity process, the quality of employee experience and the automation connected with the employees. So while we enable our employees to connect, collaborate, and communicate with ease from anywhere from any device in a secure way with a consistent user experience powered by Wipro LiVE Workspace platform which actually takes care of delivering a seamless onboarding of user via the Wipro LiVE Workspace platform and consume all the services the way they used to traditionally consume when they were working from office? So this is something which is the power of Wipro LiVe Workspace platform we have implemented to deliver a seamless employee experience access to the workspaces. That's one but also there are some learnings. When we implemented the solutions on the flip side as businesses we must also acknowledge and be cognizant of the fact that employees are trying hard to juggle between frequent interruptions at home and notifications from various applications we receive both on corporate and personal devices. Basically in a nut shell it is difficult to have the culture of corporate to be working from home. Basically that's another big learning. While all of us are adjusting to this new normal we are in constant touch with our employees and trying to improve the overall employee connect and experience. From a solution perspective let me just give you what we actually did. We have close to 175,000 employees across the globe. Suddenly started working from home post lockdown. What does this mean? The traffic pattern suddenly changed the directions which were traditionally moving on a East to West direction started moving North to South. Basically this means a 100% of the workforce in a corporate started coming from the internet to access the corporate infrastructure and then gain access to the customer network. So basically we had to quickly swing in with our solutions and got our engineering teams to re engineer and tweet the infrastructure and security architecture to this new normal. By leveraging our Wipro BLE and video architectures which is powered by Dell VxRail, NSX we were able to spin off and build capacity on on-prem as well as on cloud in less than 24 hours post one got approvals from the client. Lastly we also deployed a back to work IoT solution which helped our employees to get back to work safely. Basically the solution offers various security parameters. Apart from traditional COVID updates it also helps in scanning the employees' temperatures, employee movement within the office premises, bundled with video analytics and enables secure touch less access to the ODCs for employees who are coming back to work. So we are putting all these solutions together and we pretty much seamlessly were able to navigate from the pandemic situation and get our business back to operations in a matter of days. >> 175,000 People. It's really interesting to think about how that network traffic completely changed from inside the firewalls to everything coming from the outside. It's a lot of people to get working from home right away so congratulations on that. As we come to a close Rajesh, I want to come back to you and talk about again, partnership in the age of this rapid acceleration of technology adoption, new technology move. We talked about the work from home. We've talked about cloud. We haven't talked very much about there's this other big thing that's coming down the pike which is 5G and IoT and kind of this entirely new scale of communication that's machine to machine, not person to person and now these connected devices. The amount of traffic continues to go up into the right at an accelerating rate. Tell us a little bit about the meaningfulness of having a partnership like Wipro that you guys can build solutions around new cutting edge technologies and have that real close connection with the customer or with all the supporting services. >> We'd love to. And maybe first I'll give you a perspective on how our employee base started working from home. Some other statistics that they wanted to show maybe add on towards what Satish said. We transitioned 120,000 employees. Twice the normal to work from home within two weeks and every day we are running something like 20,000 meetings and 16 million zoom minutes per day. That's the kind of traffic IT has seen. >> 16 million zoom minutes per day? >> Zoom minutes per day. >> Wow. >> That's the kind of traffic and our VPN traffic user load just tripled. At software or IT we call Dell digital. It was just a smooth and seamless experience. Now coming back, you said rightly. While we have partnered so far to deliver to the solution which are here today and the customers needs which are here today, what are we going to do for the future needs especially ie 5G IoT? We believe as a corporation that Edge is going to be the next wave of innovation. And next way our customers will benefit. Therefore connectivity to Edge via 5G becomes critical. IoT devices and managing the traffic and contain it there itself rather than flowing it back to data center becomes critical. As an example Wipro and Dell technologies are using our hyper converge solutions along with VMware telco and software for a European telco to provide automation and AI to deliver rapid results for the customer. So these are just early parts of it. We are partnering with Wipro to build solutions around 5G as well as telecom related innovation that'll come into the picture. IoT Satish spoke about a simple example of employee attendance. Imagine this is a need which will only accelerate from every organization, multiply it with the automation and AI that needs to be built into machines and feeding all the data back to drive some intelligence and refine the processes, refine the business outcomes. So I think we are working together on many such things and what's important is in all this, when the universe just explodes to devices and millions of devices, security becomes a paramount feature and we are working with Wipro to build what is called an embedded security into each of the solutions that we are designing. Security cannot be an afterthought or a bolt on it's becoming an integral part of the overall solution as we move towards the Edge. >> Yeah, right. And I think as Satish talked about all the distractions and notifications there're a lot of great opportunities for applied AI too to help people know what to do next. It's hard to be context switching all the time, not only on your work, but also the spouses working from home, the kids are doing homeschooling. It's not an optimal environment at all. Gentlemen thank you for your time. Congratulations on your partnership and hope you have a fantastic Dell Tech World. Sorry we can't be in person but this is not too bad. >> Thank you. >> Jeff >> Thank you >> Thank you Utpal, thank you Satish for your partnership. >> All right. Thank you gentlemen. >> Thank you. >> Alright. Stay with us for continuing coverage of Dell Technologies World 2020. I'm Jeff Frick. Thanks for watching. (upbeat music)

Published Date : Oct 22 2020

SUMMARY :

to you by Dell Technologies. and this is the all virtual version I'm speaking to you It's the power of the virtual, right? He is the Vice President I'm from Dallas, Texas. and again didn't have to and the importance of and products and the depth of product and we all know what the answer is. and the virtual desk and cloud on cloud. and the BoundaryLess Integration Platform What are the things that and the workloads which are You've been in the business and with flexible payment options the new normal is going to be different and the rate of change and continuity in this to and be cognizant of the fact that and kind of this entirely Twice the normal to work and AI that needs to and hope you have a Thank you Utpal, thank you Thank you gentlemen. of Dell Technologies World 2020.

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
Rajesh JaneyPERSON

0.99+

USLOCATION

0.99+

Satish YadavalliPERSON

0.99+

IndiaLOCATION

0.99+

JeffPERSON

0.99+

SatishPERSON

0.99+

RajeshPERSON

0.99+

DellORGANIZATION

0.99+

Jeff FrickPERSON

0.99+

Dell TechnologiesORGANIZATION

0.99+

AmazonORGANIZATION

0.99+

WiproORGANIZATION

0.99+

Satish YadavaliPERSON

0.99+

UtpalPERSON

0.99+

TwiceQUANTITY

0.99+

sixQUANTITY

0.99+

Dallas, TexasLOCATION

0.99+

Bangalore, IndiaLOCATION

0.99+

DallasLOCATION

0.99+

100%QUANTITY

0.99+

20,000 meetingsQUANTITY

0.99+

sevenQUANTITY

0.99+

Utpal BakshiPERSON

0.99+

Gurgaon, IndiaLOCATION

0.99+

EdgeORGANIZATION

0.99+

March 15thDATE

0.99+

South LakeLOCATION

0.99+

eachQUANTITY

0.99+

thirdQUANTITY

0.99+

firstQUANTITY

0.99+

fourthQUANTITY

0.99+

todayDATE

0.99+

five building blocksQUANTITY

0.99+

120,000 employeesQUANTITY

0.99+

eight monthsQUANTITY

0.99+

360 degreeQUANTITY

0.99+

TodayDATE

0.99+

first guestQUANTITY

0.99+

secondQUANTITY

0.99+

less than 24 hoursQUANTITY

0.99+

bothQUANTITY

0.98+

fourth pointQUANTITY

0.98+

Dell Technologies WorldORGANIZATION

0.98+

Dell TechORGANIZATION

0.98+

two weeksQUANTITY

0.97+

two keyQUANTITY

0.97+

pandemicEVENT

0.96+

Uptal BakshiPERSON

0.95+

millions of devicesQUANTITY

0.95+

OneQUANTITY

0.94+

John Shirley, Dell Technologies | Dell Technologies World 2020


 

>>from around the globe. It's the Cube with digital coverage of Dell Technologies. World Digital Experience Brought to You by Dell Technologies. Welcome to the Cubes Coverage of Dell Technologies. World 2020. The Digital Experience. I'm Lisa Martin, and I'm pleased to welcome back one of our Cube alumni. John Shirley is with us. The vice president of unstructured storage product management. John. Welcome back to the Cube. >>Thank you for having me. It's great to be back. >>So so much has changed since we last saw you were very socially distant. But talk to me from from a storage and unstructured of data perspective, lot of changes in the year of 2020. >>Yeah, a lot of changes everywhere, but especially in our spaces. While we're seeing just a phenomenal amount of growth with storage. Still, that's continuing. But what we've really seen is things changing pretty pretty rapidly, actually, two new cloud based applications and it almost seems like everything that's happened during the pandemic has kind of been an accelerant to getting to that next level of technology. And so we're really excited to be working with our customers, really guide them in the journey to get into, you know, new cloud based applications, cloud native applications and really just helping them take advantage of all of this on structure data that's being generated. >>Yeah, we've heard about acceleration in so many facets this year and that it's, you know, we're accelerated by, you know, 24 to 36 months. Talk to me about, For example. I was talking Thio, Adele Technologies customer Earth down the other day. And, of course, the massive amount of video that they're generating 24 by seven by 3. 65 from all over the world. The edge, cloud core, So much growth there. How are you seeing customers be able to pivot quickly and adapt to how different things are? >>Yeah, you know, the interesting part two isn't just a collection of data anymore. It's how customers want to treat that data. And what we're seeing over and over again is that we get the video streams coming in. But there's also all of these sensors in the world and so marrying up the video streams with sensor information and keeping that in a repository so that you can do things like, uh, real Time analytics, but also be able to take that same data set and also get the historical view is becoming critically important. And that's the thing that's really changed, is how the data is being used yesterday that keeps coming in. But customers are really, really taking a different view in terms of how they want to go use that data. So we have a lot of tools that we've created over the last year or two that are helping our customers harness and really use that data, something that they just weren't able to do a couple years ago. >>Now we always talk about data as currency or data as gold or data equals trust and the most important factor for any businesses extracting value from that data. I think now, really time is even more important if you think of contact tracing, for example, or the accelerated work going on to develop a vaccine, so much access has to be now because data from yesterday isn't good enough. It's not gonna help solve some of these big use cases. What is she gonna key use cases that you're seeing accelerate in the last few months? >>You just hit it right on the head. So the way we look at it, it kind of two points within the timeline of data. That's the most valuable. And, of course, what you just said. Get the right away in the here. Now that's that's one of the times that is the most valuable toe have that data. But then if we kind of take a look at that data as it ages because it get less important, well, some of it might. But actually the data has a big scale data like data repository and be able to extract value out of that kind of holistically as a big set of data is extremely important as well. And so we we have tools, everything from our streaming data platform that talks about how we can extract value from that data, right as it's coming off the sensor of the videos video streams, we've got our power scale product, which provides very, very high performance storage so that customers 10 stream a bunch of data and get some of that AI and ml off of that data. And then we've got our PCs object storage based product what customers want exabytes of data, and they just want a really long term, robust storage repositories. So we've kind of got all the tools together that really helping our customers extract that value. >>Talk to me about doing a migration. That's always a big challenge, especially as many businesses live in a hybrid or multi cloud world where they've got or using public cloud services on from edge maybe, for example, but in terms of being able to get to the data and run algorithms on it to do a I. How can a customer give me, like a snapshot of a of an example infrastructure that, you see is common with customers that allows them to harness data wherever it is and be able to run a I on wherever it is without having to move it around and pale those charges and, of course, lose precious time? >>Yeah, that's a great question. What we're seeing a lot, too, is customers wanting to take advantage of things like the cloud, the power that compete in the cloud, and, uh, they don't necessarily want to move the data in and out of the cloud. But at the same time, you know, we want to make sure that the customers have the flexibility to choose which cloud that they want to go to. So we have multiple cloud offerings that were given to our customers, specifically the ability to take the data. We host the service for the customer so that it's all in all operated within the Dell EMC, uh, infrastructure team. And then we can map that data data up to the clouds. Whether they want to go to any of the Big three cloud providers, we could map that out. There's no egress fees, and they could go ahead and take advantage of the data very quickly, easily. >>So really, from a flexibility perspective, being able to meet them where they are, >>that's absolutely right. So whether the customers are in the edge or in their in their core or in the cloud will be there to help their needs. >>So this is the first Dell Technologies world that is digital, a lot of opportunity for folks. Thio learn and still be able to have as much engagement as possible. Talk to us about some of the things that you're excited about. The customers are gonna learn in terms of how you're helping them get more value out of the data faster in a time of such massive change. >>Yeah, so we're doing so much within the within the team. So earlier this year we introduced a new product called Power Scale which is taking our industry leading one FS software for scale out file. And we have put that in and really taken advantage of what we have within the Dell family and taking the best server hard work power edge. We've taken on one of one FS software married and together we're really extracting the best value of the data with those platforms. So again, the industry leading scale of file solution marrying that up with the industry leading server solution. And now we've got even though even more robust solution. On top of that, we have, uh, announced our objects scale solution. And so objects Scale is a knob decked store solution that's specifically targeted for customers running kubernetes. We've partnered up with our friends over at VM Ware and we've developed an object store specifically for developers on top of kubernetes environment, so that when customers want to go and start generating new applications with object store on new cloud native app they can really quickly spin up new object, store new buckets and start writing data. It's very simple and easy to use, and then when they want to grow at scale, we've got our PCs object store, too, into that petabytes scale. So it's it's very exciting. >>Can you give us an example of a customer that's that's already doing that That, you see, is really achieving some significant benefits? >>Yeah, yeah, So, uh, probably the one that's the most fun toe watches were working with a company that's doing amusement park rides and really taking a look at all the sensor information so that they can get predictive analytics in terms of the maintenance of the rides, making sure that if there is maintenance that needs to get done, they could get that fixed as quickly as possible so that customers going through those rights a. If, of course, they're going to be safety. Safety is always number one. But being able to make shape, make sure those rides are maintained so that the lines move quickly and they can keep customers going through. And you get us many people enjoying those rises. You can, and that's all coming from our streaming data platform, which is again taking that information. All of that sensors feet, and they need that that real time value that we talked about before to get that real time value. But they also get the historical view so they could see how the maintenance is kind of evolved over time. So that's that's one that's been, ah, lot of fun to work with here over the last couple. >>And hopefully we get to go back to amusement parks and calendar year 2021. Wouldn't that be nice? You mentioned safety and and that Yeah, that kind of makes me think about security. We've seen so much about increases like companies like Zoom, for example, with increased scrutiny on their data security, a more compliance requirements, Um, data protection being even mawr. Important as there was this massive pivot toe work from home seven months ago, and a lot of folks are still there are not going to be there. Tell me a little bit about some of the things that you're doing it to facilitate that this data, this massive increase in unstructured data, is managed securely so that if there's any sort of breach or incident, your customers air in good shape. >>We We have a lot of focus on security within the organization, and that's really across the board. That's really across all of Dell Technologies products. Eso We do a lot of things around encrypted drives to make sure that if the driver ever pulled out of the system, there's no way to go access that data. There's just no way to go do that without the original keys. You can't get those original kids when they're not in the system, so we make sure that we do a lot of hard enough the system at that level. We work very closely with the broader partner and ecosystem community to make sure that we provide things like ransom or protection, uh, isolated. So in case if something does happen a you identified as quickly as you can but be you make sure that you have a good data set, like a good golden copy of that data that you can always go back. Thio, >>you mentioned ransom where it's it's really been on the rise in 2020. I read a stat a couple days ago that every 11 seconds are Ransomware attack occurs when we think about how many new industries are exposed. I saw I read recently that the the New Zealand Stock Exchange was hit a couple of times. Carnival Cruise Line, the Department of veterans of There's a social media with Facebook Tick Toke Instagram on 235 million user profile straight from a unsecured cloud database. So not only is that threat landscape expanding, but we've got more people accessing. Um, you know, corporate networks with maybe personal devices for those phishing emails are probably even getting more sophisticated. >>Yeah, we spend. Like I said, we spend a lot of time. We have a whole security team within the storage group that does nothing but thanks about security and how we can harden the products to make sure they stay secure and robust. And we keep the bad, the bad people away. >>Now that's excellent. Alright, So any predictions what we might see in the next 6 to 9 months, who from Dell Technologies with respect to helping customers who are hopefully have pivoted from this survival mode to now being able to thrive, leverage data extract values from it to identify new revenue streams renew products are new innovation. What do you see on the horizon? >>Yeah, I see just the continued acceleration of the technology. I see Dell Technologies spending a lot of our time focused on solutions so that when we can go into a customer environment, we talk about solutions. We talk about how we can get time to value. So how quickly can we get up the customer up and running with a known good configuration? You know, supportable. It's enterprise grade on. We can have our customers spend time writing code and developing new applications and not worrying about how to go build that infrastructure. So you're gonna see a lot of things. A lot of partnerships across our entire infrastructure team, which internally we call I S G. And we're really working together is one SG team to make sure all of our networking, our storage and our compute and all of the software that goes around that we act as 111 overall family for our customers provide that solution. And we also partner very close with VM ware to provide that software layer. So that again when we go to our customers, uh, and they want to start a new project. We have all of the tools within our portfolio. Uh, we've been around for a very long time. We have very strong focus on both the horizontal, the various workloads that customers were running and also very specific vertical through the industry and teams that just are dedicated on that. So But I think you're going to see a lot more. Is the solution based approaches where we could go into customers? We can provide that solution, and it's up and running in the very, very short amount. All right, >>last question. You said you mentioned you guys have been doing this a long time. I know you've been with Dell for 10 years. What are the three things that you would say if you're in a customer situation and they're looking at Dell and maybe they're looking at HP, for example, or some other competitors? One of the three things that you think really differentiate what Dell Technologies can deliver with respect to extracting value from massive amounts of unstructured data. >>Absolutely. I mean, this is where I get really excited when I'm so proud to be at del, uh, because if I look at all of the advantages that we have that we could bring to our customers. We have just the knowledge. So I think first and foremost when it comes to on structure data, we have been the most prevalent player in the market. And again, if you take a look at different verticals, think about like media and entertainment. We've won an Emmy just because we've been around and we have the technology that's really met the needs. We, um but that's one. We have all of the deep knowledge, and that's really going to give a lot of benefit to our customers to we've got the breath of the portfolio. So not only do we have very specific knowledge in one area where actually cover all of the unstructured portfolio for our customers needs, whether that's file or object or streaming data might even be the data management data management. When we have data I Q. To help our customers understand that data. Our portfolio is really broad, so deep knowledge we have a broad portfolio and then we have the overall Dell Technologies family that that we go forward with. So again, it's not just about the unstructured data. It's everything that goes around that it's the servers. It's that computes all the infrastructure. But it's the software that's also our partners and that whole ecosystem that we built up across the technologies. That's what really makes us strong and really the best person to partner with >>excellent knowledge, bread and a large ecosystem. John, thank you so much for joining us on the Cube today, talking to us about all the exciting things that you're working on. What's to come? We appreciate your time. >>Thank you very much >>for John Shirley. I'm Lisa Martin. You're watching the Cubes Coverage of Dell Technologies World 2020.

Published Date : Oct 22 2020

SUMMARY :

It's the Cube with digital coverage of Dell It's great to be back. So so much has changed since we last saw you were very socially distant. everything that's happened during the pandemic has kind of been an accelerant to getting to that next level And, of course, the massive amount of video that they're generating 24 by seven by 3. the video streams with sensor information and keeping that in a repository so that you can do things like, the most important factor for any businesses extracting value from that data. So the way we look at it, it kind of two points within the for example, but in terms of being able to get to the data and run algorithms on specifically the ability to take the data. So whether the customers are in the edge or in their in their core or in the cloud Talk to us about some of the things that you're excited about. So again, the industry leading scale of file solution marrying that up with the industry All of that sensors feet, and they need that that real time value that we talked about before Tell me a little bit about some of the things that you're doing it to facilitate that this and ecosystem community to make sure that we provide things like ransom or protection, I saw I read recently that the the New Zealand Stock Exchange And we keep the bad, the bad people away. see in the next 6 to 9 months, who from Dell Technologies with respect to helping of the software that goes around that we act as 111 overall family One of the three things that you think really differentiate what Dell Technologies can deliver with We have all of the deep knowledge, and that's really going to give What's to come?

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
Lisa MartinPERSON

0.99+

John ShirleyPERSON

0.99+

DellORGANIZATION

0.99+

Dell TechnologiesORGANIZATION

0.99+

JohnPERSON

0.99+

10 yearsQUANTITY

0.99+

2020DATE

0.99+

New Zealand Stock ExchangeORGANIZATION

0.99+

24QUANTITY

0.99+

Dell TechnologiesORGANIZATION

0.99+

HPORGANIZATION

0.99+

three thingsQUANTITY

0.99+

3. 65QUANTITY

0.99+

36 monthsQUANTITY

0.99+

yesterdayDATE

0.99+

ZoomORGANIZATION

0.99+

OneQUANTITY

0.99+

firstQUANTITY

0.99+

CubeORGANIZATION

0.99+

todayDATE

0.99+

Dell EMCORGANIZATION

0.98+

seven months agoDATE

0.98+

10 streamQUANTITY

0.98+

oneQUANTITY

0.98+

two pointsQUANTITY

0.98+

last yearDATE

0.98+

Carnival Cruise LineORGANIZATION

0.97+

bothQUANTITY

0.97+

VM WareORGANIZATION

0.97+

sevenQUANTITY

0.97+

this yearDATE

0.96+

ThioPERSON

0.96+

pandemicEVENT

0.95+

ThioORGANIZATION

0.95+

earlier this yearDATE

0.95+

couple years agoDATE

0.93+

Adele TechnologiesORGANIZATION

0.93+

235 million userQUANTITY

0.93+

111QUANTITY

0.92+

FacebookORGANIZATION

0.91+

delORGANIZATION

0.89+

one areaQUANTITY

0.89+

InstagramORGANIZATION

0.86+

couple days agoDATE

0.82+

two new cloud based applicationsQUANTITY

0.81+

11 secondsQUANTITY

0.79+

twoQUANTITY

0.76+

coupleQUANTITY

0.76+

part twoQUANTITY

0.74+

last few monthsDATE

0.73+

2021DATE

0.69+

EmmyEVENT

0.68+

threeQUANTITY

0.67+

CubesORGANIZATION

0.67+

Department of veteransORGANIZATION

0.66+

nextDATE

0.65+

WorldEVENT

0.63+

I SORGANIZATION

0.62+

timesQUANTITY

0.62+

World 2020EVENT

0.61+

9QUANTITY

0.59+

monthsDATE

0.55+

BigQUANTITY

0.54+

EarthLOCATION

0.51+

objects ScaleTITLE

0.5+

6QUANTITY

0.48+

EsoORGANIZATION

0.47+

ThereTITLE

0.46+

Caitlin Gordon 10 21 V1


 

>> Announcer: From theCUBE Studios in Palo Alto and Boston, connecting with thought leaders all around the world, this is a CUBE conversation. (soft music) >> Hi, Lisa Martin, with theCUBE here, talking with Caitlin Gordon, the VP of Product Marketing, at Dell technologies. Caitlin how are you? It's great to see you. >> I'm doing very well Lisa, thank you so much for having me. >> Nice to see you back on theCUBE. So lots of stuff going on in the news the last few months or so. A lot of stuff with respect to Cyber Recovery, Cyber Security, but talk to us about what's happening in the Purpose-Built Appliance Backup Appliance market. This market is growing. What's happening there, and talk to me about Dell's leadership role. >> Yeah, we've kind of come full circle. I've been in the data protection space for a while and I would say that, you know now we're looking at this as a $4 billion industry and security and protection has bubbled backup to the top of the list from an IT perspective. And one of the simplest, fastest ways to improve data protection is leveraging Backup Appliances. And there's really two segments within that. There's what I'll refer to as the target appliances and the integrated appliances. And we actually have had leadership in this space, since really the beginning. You know 50 cents of every dollar in this market is spent on Dell equipment. Where we see massive growth is really in that integrated appliance market. And those integrated appliances really simplify the deployment of not only the protection storage, but the protection software. So you can modernize your data protection, get much faster recovery, faster backups, as well as really get a smaller footprint, better efficiency, all in one single solution. And that's really where we've seen a lot of growth in the appliance market recently. >> Yeah. So as that, an integrated appliance market is growing twice as fast as targeted, give us a picture. You mentioned a few things, but kind of dig deeper into why customers are opting more and more for the integrated approach. >> Yeah that comes back to kind of a lot of the trends we see in IT overall. It's simplicity. It's ease of, how can you get to a better solution, a better outcome faster. And when it comes to integrated data protection appliances, it really it takes the guesswork out of it. You know, you have software and hardware, that's optimized to work together. You're really quick and easy to deploy, really simple to manage, 'cause it's all fully integrated and you get to a solution where you can get things like 65 one data reduction, get a very small footprint, get really fast improvements to not only backups, but probably even more importantly to recovery, get instant access to that data. And you really are able to with one purchase, transform all of your data protection. Now there's still a lot of great uses for target appliances as well of better flexibility. But, we've seen this overall you've seen this Lisa, every trend in probably IT and life, right? Simplicity. How can you get a faster, better answer? And integrated appliances really lean into that. It's as similar to what we see in the hyperconverged space, kind of in the primary storage and compute side of things. >> Yeah, I think we all want faster, simpler, better in every walk of life. One of the things this year that, in all of that lack of simplification, the complexity that we're living in that we've seen, is the rise of ransomware. It's not only on the rise, it's getting more personal. We've seen, you know, big companies, Garmin was attacked, one of the Cruise Lines was attacked, The New Zealand Stock Exchange, Facebook and Tik Tok were hacked. So we're starting to see so much more vulnerability and the ability of these hackers to expose more vulnerabilities. Have you seen that impacting your customers saying, "Hey, we need help here because now we have so many employees and devices, scattered." >> Yeah, unfortunately we have. You know, we've been talking about Ransomware Protection, Cyber Resiliency, Cyber Recovery with our customers for quite a number of years. And, now it's not a niche conversation just with financial institutions, it's a conversation with all of our customers. 'Cause either they've felt it or they've seen their competitors feel it and they need to protect themselves. So it has really become a conversation but it's not only our specialty sellers, but all of our sellers are having with our customers. And, it's really about not only being able to protect against them, which is an important part, but also recover from them. And that's really what our PowerProtect Cyber Recovery Solution is all about. And the exciting thing for us is that we actually have recently become the first Cyber Recovery Solution endorsed by Sheltered Harbor. Which really gives you an idea of the level of investment that we've made to provide that secure, automated air gap solution to give our customers that peace of mind. Because unfortunately this is becoming table stakes for any data protection out there today. >> Well, and as more and more, we see every company either becoming a data company or needing to become a data company to not just survive these times, but become successful as time goes on. To a point, it's one thing about protecting the data, but the actual need is to recover it should anything happen. Tell us a little bit more about Sheltered Harbor and what you guys were the first there to receive? Tell me a little bit more about that. >> Yeah, absolutely. Okay a little bit more on overall our solution and Sheltered Harbor is actually a consortium of organizations, primarily financial institutions that have really come together to define the standards, of what we need or Cyber Resiliency for Cyber Recovery. And for us with PowerProtect Cyber Recovery, we've worked closely with that organization, to meet those standards. And with that work and with that actual deploying in with one of our customers, we were able to become the first Cyber Recovery Solution endorsed by Sheltered Harbor to meet their standards there. And what's an important about our solution is that it's both that automated air-gapped solution for the data isolation, which is a part of it. But it's also, we have the CyberSense analytics and forensic tools that give you the ability to discover, to diagnose and to remediate against these attacks. So it gives you both sides of protecting that data air-gapping it, but also being able to intelligently discover and remediate against those attacks, if they do indeed happen. >> As VP of Product Marketing, I'm sure you're with customers often these days virtually. When you're having customer conversations, as you were singing out data protection and being able to recover and remediate, should anything like a ransomware attack happen, that's business critical. That's, you know, lifeline kind of stuff we're talking about. Have you seen the conversations within customer organizations shifts or is this now a board level or a C-level conversation in terms of data protection? >> Yeah, it's interesting. It's become a more frequent conversation. The people involved, are different. It's not just the backup administrators that are involved, it's really about the overall compliance strategy, the CSOs that are involved here. And it's becoming a corporate mandate as it really unfortunately needs to be at this point. So it's coming up more frequently, but also the types of people involved in that conversation have really changed the types of things we're having to talk about and build solutions for. So it's really changed that dynamic for us. And it's been great to really be on the front lines of that with our customers. You know, it started with those financial institutions and now it's really commonplace, to talk about this with everyone. >> So let's talk customers. Give us an example or two of some customers that are leveraging this new technology that are really achieving like the big deduplication ratio that you talked about, but also enabling their business to move forward. >> Yeah. One of my favorite ones for a couple of reasons I'll confess is, World Candy. Actually there are a World Corporation, but to me, they're a candy company. They actually make some chocolate out of Pennsylvania one of my favorites, chocolate covered pretzels. And they're a great example, right? 'Cause they're certainly not an IT specialty organization. They're trying to contract manufactured candy and they want to get things done as efficiently as possible. So they were looking a solution to overall modernize, their overall IT and that came with the combination of an Integrated Data Protection Appliance, as well as VXRail. And by implementing that, they were able to reduce their backup times from running overnight all night, to just two hours. They were able to get dedupe ratios of a 12O to one, 99.2% reduction, which is just incredible. And they were able to reduce their physical server footprint by 60%. So you can just imagine with an organization like this, that needs to run things as efficiently, as simply, as quickly as possible, how transformational that is. And, probably one of the other things that we find out of customers like this is, it's really about finding them a partner that can solve all of their problems in one place. And for data protection that's certainly one of the biggest things for PowerProtect is we now have a one-stop shop appliances software for all your data protection needs, large and small. And my favorite thing is actually our quote from this customer which is, he calls it a perfect partnership and that they have a single hand to high five. And we love to get those high fives from our customer and we really like to be that partner for them and to help them solve these challenges really no matter where their data is or what their challenges are. >> I like that a single can for a virtual high five. Speaking of partners, what's the channel play here? >> Yeah, absolutely. I mean, for us, Dell Technology is overall channel partners are absolutely critical and in the data protection space, probably even more so. So channel partners are a huge part of our go-to-market. And one of the reason that channel partners really like to work with us, with Dell technologies on the data protection side, is because of the breadth of that portfolio. And now with our most recent enhancements on the appliance side, you now have a full PowerProtect portfolio. Target appliances, integrated appliances, physical, virtual, as well as modern data protection software with PowerProtect data manager. And for our partners, and for us, it's so important that they can have one vendor to offer all of these solutions because we know that our customer's challenges are complex, they're diverse, their data sets are diverse and they need to be able to partner with someone, leverage us as a vendor, leverage our partners, leveraging us as a vendor to really give our customers that answer. And that could be very different needs. They have traditional applications, they have new modern applications in Kubernetes and the growth of, and the importance of those types of applications. Our partners don't want and our customers don't want to have to deal with multiple vendors. Multiple vendors actually can increase risk, increase costs. They want to keep that simple, efficient. And that's why partnering with us, with Dell Technologies, why our channel partners really find us to be such a critical vendor to work with on the data protection side. >> So you've shared some impressive stats about what the technology is able to deliver. You gave us the great World Candy company example in terms of the things I heard a big workforce productivity there, they've got big deduplication there. They're able to sounds like reduce their on-prem footprint. From an economic value perspective, help us understand what the economic value of the DP series and even maybe feedback from the analyst community. >> Yeah, we've actually got a recent study which I'd encourage you guys to go read and I will just kind of give you the Cliffs Notes version of it. Which shows you the advantages of leveraging Dell Technologies portfolio for data protection. You can have your cost to protect as low as 1 cent per gigabyte per month, which is impressive. And that's that efficiency that you can get with PowerProtect. It's a reduction in the administration costs for data reduction of 22%, a reduction of 84% in your Cloud resources and services. We all know that people have moved to Public Cloud and probably one of the biggest concerns is the cost of that. By implementing the right data protection solutions, leveraging our in-cloud backup and protection, you can actually significantly reduce that because of the way that we've implemented it. And overall, you can't argue with anything that reduces costs by 98%. So you can reduce your storage resource costs by 98% by leveraging the PowerProtect portfolio. And again, it's a recent ESG study, which you can find on our website and read more about that study and the economic elements that lead into that. But you can just see the dramatic impact that can have, not only are you protecting your most valuable asset of data, but you're doing so in a way that saves the company money, and time and resources. And we all know that's never been more critical than ever. >> Those are very impressive, but compelling stats. Last question, talking about the three waves that we know Dell technologies is writing, we've got VMware, Cloud, Cyber Recovery, give us a flavor of the launch and the news and the new capabilities for this one-stop shop with perspective of what's happening in Cyber Recovery today. >> Yeah, so we've got enhancements on all fronts. So we, let me go in order there. So we've got on the Cloud front our PowerProtect data manager, which we've talked about a lot this year. We continued to really enhance that. Some recent enhancements, the ability to deploy that in Azure and AWS Cloud, to be able to do in-Cloud data protection. On the VMware side as we talked about just recently at VMworld, we've got new integrations with Storage Based Policy Management to really simplify and automate protection for the Vadmins as well as protection administrators. The ability to support, real mission critical applications and VMs, that are something we're working on to be able to more intelligently protect those VMs that have become more challenging to protect in traditional methods as well as integration with protect VCF. And then lastly, I think we've covered a bit today is certainly on that Cyber Recovery, Cyber Resiliency solution. First one to be endorsed by Sheltered Harbor in providing that air gap solution, as well as that ability to discover to remediate from those attacks. And you can kind of get a sense of, where we're really focused on. Those are our big three areas in both our appliance as well as our software portfolio really focused on simplifying that for our customers. >> Well Caitlin, we thank you for joining us as per what theCUBE has seen for many years with Dell Technologies. Lots of innovation, continued innovation. We thank you so much for joining us on theCUBE today. >> Thanks so much for having me. It was great to be here, Lisa. >> Excellent. With Caitlin Gordon, I'm Lisa Martin. You're watching theCUBE. (soft music)

Published Date : Oct 21 2020

SUMMARY :

leaders all around the world, It's great to see you. thank you so much for having me. So lots of stuff going on in the news And one of the simplest, fastest ways for the integrated approach. Yeah that comes back to One of the things this year that, of the level of investment that we've made but the actual need is to recover it And for us with and being able to recover and remediate, And it's been great to ratio that you talked about, and that came with the combination the channel play here? and in the data protection space, of the DP series and even maybe feedback and probably one of the biggest concerns and the news and the new capabilities the ability to deploy that We thank you so much for Thanks so much for having me. (soft music)

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
Caitlin GordonPERSON

0.99+

Lisa MartinPERSON

0.99+

GarminORGANIZATION

0.99+

PennsylvaniaLOCATION

0.99+

FacebookORGANIZATION

0.99+

Sheltered HarborORGANIZATION

0.99+

LisaPERSON

0.99+

22%QUANTITY

0.99+

$4 billionQUANTITY

0.99+

50 centsQUANTITY

0.99+

Palo AltoLOCATION

0.99+

BostonLOCATION

0.99+

CaitlinPERSON

0.99+

DellORGANIZATION

0.99+

Tik TokORGANIZATION

0.99+

60%QUANTITY

0.99+

84%QUANTITY

0.99+

twoQUANTITY

0.99+

two hoursQUANTITY

0.99+

98%QUANTITY

0.99+

OneQUANTITY

0.99+

firstQUANTITY

0.99+

oneQUANTITY

0.99+

twiceQUANTITY

0.99+

theCUBEORGANIZATION

0.99+

both sidesQUANTITY

0.99+

VMworldORGANIZATION

0.99+

todayDATE

0.99+

Dell TechnologiesORGANIZATION

0.99+

bothQUANTITY

0.98+

one placeQUANTITY

0.98+

this yearDATE

0.98+

theCUBE StudiosORGANIZATION

0.98+

AWSORGANIZATION

0.97+

12OQUANTITY

0.97+

First oneQUANTITY

0.97+

World CandyORGANIZATION

0.97+

one thingQUANTITY

0.96+

two segmentsQUANTITY

0.96+

Cruise LinesORGANIZATION

0.95+

New Zealand Stock ExchangeORGANIZATION

0.95+

Dell TechnologyORGANIZATION

0.94+

one vendorQUANTITY

0.94+

Cliffs NotesTITLE

0.94+

singleQUANTITY

0.93+

VMwareORGANIZATION

0.93+

1 cent per gigabyteQUANTITY

0.92+

KubernetesTITLE

0.91+

first CyberQUANTITY

0.88+

three areasQUANTITY

0.87+

World CorporationORGANIZATION

0.86+

Cyber RecoveryTITLE

0.86+

one purchaseQUANTITY

0.85+

CloudTITLE

0.82+

AzureTITLE

0.81+

99.2%QUANTITY

0.81+

three wavesEVENT

0.8+

first CyberQUANTITY

0.8+

PowerProtectTITLE

0.8+

VMwareTITLE

0.78+

lastDATE

0.78+

10OTHER

0.78+

John Roese, Dell Technologies | Dell Technologies World 2020


 

(bright music) >> Announcer: From around the globe, it's theCUBE with digital coverage of Dell Technologies World Digital Experience. Brought to you by Dell Technologies. >> Hello, and welcome back to theCUBE's virtual coverage of Dell Technologies World Digital Experience. I'm John Furrier, your host of theCUBE here for this interview. We're not face to face this year, we're remote because of the pandemic. We've got a great guest, CUBE alumni, John Roese who's the Global Chief Technology Officer at Dell Technologies. John, great to see you. Thank you for remoting in from New Hampshire. Thanks for your time and thanks for coming on. >> Oh, glad to be here. Glad to be here from New Hampshire. The travel is a lot easier this way so-- >> It's been an interesting time. What a year it's been with the pandemic, the good, bad, and the ugly has been playing out. But if you look at the role of technology, the big theme this year at Dell Technologies World is the digital transformation acceleration. Everyone is kind of talking about that, but when you unpack the technology side of it, you're seeing a technology enablement theme that is just unprecedented from an acceleration standpoint. COVID has forced people to look at things that they never had to look at before. Disruption to business models and business systems like working at home. (Furrier laughs) Who would have forecasted that kind of disruption. Workloads changing, workforces working differently with in the mid of things. So an absolute exposure to the core issues and challenges that need to be worked on and double down on. And some cases, projects that might not have been as a priority. So you have all of this going on, customers really trying to double down on the things that are working, the things they need to fix, so they can come out of the pandemic with a growth strategy with modern apps, with cloud and hybrid and multicloud. This has been a huge forcing function. I'd love to get your first reaction to that big wave. >> Yeah, no, no, I think as a technologist, sometimes you can see the future maybe a little clearer than the business people can. Because there's one thing about technology, it either is, or it isn't. Either is code or hardware and real or it's marketing. And we knew the technology evolution was occurring, we knew the multicloud world was real, we knew that machine intelligence was real. And we've been working on this for maybe decades. But prior to COVID, many of these areas were still considered risky or speculative. And people couldn't quite grok exactly why they wanted a machine doing work on their behalf or why they might want an AI to be a participant in their collaboration sessions or why they might want an autonomous vehicle at all. And we were talking about how many people autonomous vehicles that were going to kill as opposed to how many that we're going to help. Then we had COVID. And suddenly we realized that the fragility of our physical world and the need for digital is much higher. And so it's actually opened up an enormous accelerant on people's willingness to embrace new technologies. And so whether it's a predictable acceleration of machine intelligence or autonomous systems, or this realization that the cloud world is actually more than one answer, there's multiple clouds working together. Because if you try to do a digital transformation acceleration, you realize that it's not one problem. It's many, many problems all working together, and then you discover that, hey, some of these can be solved with cloud one and some can be solving with cloud two, and some of them you want to do in your own infrastructure, in a private cloud, and some might belong at the edge. And then suddenly you come to this conclusion that, hey, having strategy has to deal with this system as a system. And so across the board, COVID has been an interesting catalyst to get people to really think practically about the technology available to them and how they might be able to take advantage of it quicker. And that's a mixed blessing for us technologists because they want things sooner, and that means we have to do more engineering. But at the same time, open-minded consumers of technology are very helpful in digital transformations. >> Well, I want to unpack that rethinking with COVID and post COVID. I mean, everything is going to come down to before COVID and after COVID world. I think it's going to be the demarcation that's going to be looked at historically. Before we get into that though, I want to get your thoughts on some of the key pillars of these transformational technologies in play today. Last year at Dell World, when we were physically face to face, we were laying out on theCUBE and in our analysis, the Dell Technologies has got an end to end view. You saw a little bit at VMworld this year, the Project Monterey, is looking much more systematically across the board. You mentioned systems as consequences. The reaction of changes. But lay out for us the key areas, the key pillars of the transformational technologies that customers need to look at now to drive the digital path. >> Yeah, we cast a very wide net. We look at literally thousands of technologies, we organize them and we try to understand and predict which ones are going to matter. And it turns out that over the last couple of years, we figured out there's really six, what I'll call expanding technology areas that are actually probably likely to be necessary for almost any digital transformation. And they aren't exactly what people have been doing historically. So in no particular order, and they may sound obvious, but when you think about your future, it's very likely all six of these are going to touch you. The first is, the obvious one of being able to develop and deliver a multicloud. The cloud journey is by no means done. We are at like the second inning of a nine inning game, maybe even earlier. We have barely created the multiple cloud world, much less the true multicloud world, and then really exploiting and automating has work to be done. But that's a strategic area for us and everybody to navigate forward. In parallel to that, what we realize is that multiple cloud is no longer just present in data centers and public clouds, it's actually existing in the real world. So this idea of edge, the reconstituting of IT out in the real world to deliver the real time behavior necessary to actually serve what we predict will be about 70% of the world's data that will happen outside of data centers. The third is 5G. And that's a very specific technology, and I have a long telco background. I was the CTO of one of the largest telecom companies in the world and I was involved in 2G, 3G and 4G. (Furrier chuckles) 5G is not another G. It is not just faster 4G. It does that, but with things like massive machine type communication with having a million sensorized devices in a kilometer or ultra reliable, low latency communication. The ability to get preferential services to critical streams of data across the infrastructure, mobile edge compute, putting the edge IT out into the cellular environment. And the fact that it's built in the cloud and IT era. So it's programmable, software defined. 5G is going to go from being an outside of the IT discussion to being the fabric inside the IT discussion. And so I will bet that anybody who has people in the real world and that they're trying to deliver a digital experience, will have to take advantage of the capabilities of 5G to do it right. But super strategic important area for Dell and for our industry. Continuing on, we have the data world, the data management world. It's funny, we've been doing data as an industry for a very long time, but the world we were in was the data at rest world, databases, data lakes, traditional applications. And that's great. It still matters, but this new world of data in motion is beginning. And what that means is the data is now moving into pipelines. We're not moving it somewhere and then figuring it out, we're figuring it out as the data flows across this multicloud environment. And that requires an entirely different tool, chain, architecture and infrastructure. But it's incredibly important because it's actually the thing that powers most digital transformation if they're real time. In parallel to that, number five on the list is AI and machine learning. And we have a controversial view on this. We don't view AI as purely a technology. It clearly is a technology, but what we really think customers should think about it as is as a new class of user. Because AIs are actually some of the most aggressive producers and consumers of data and consumers of IT infrastructure. We actually estimate that within the next four or five years, the majority of IT capacity in an enterprise environment will actually be consumed at the behest of the machine learning algorithm or an AI system than a traditional application or person. And all you have to do is do one AI project to understand that I'm correct, because they are just massive demand drivers for your infrastructure, but they have massive return on that demand. They give you things you can't do without them. And then last on the list is this area of security. And to be candid, we have really messed up this area as an industry. We have a security product for every problem, we have proliferation of security technologies. And to make matters worse, we now operate most enterprises on the assumption the bad guys are already inside and we're doing things to prevent them from causing harm. Now, if that's all it is, we really lost this one. So we have an obligation to reverse this trend, to start moving back to embedding the security and the infrastructure with intrinsic security, with zero trust models, with things like SASSY, which is basically creating new models of the edge security paradigm to be more agile and software defined. But most importantly, we have to pull it all together and say, "You know what we're really measuring is the trustworthiness "of the systems we work with, "not the individual components." So this elevation of security to trust is going to be a big journey for all of us. And every one of those six are individual areas, but when you combine them, they actually describe the foundation of a digital transformation. And so it's important for people to be aware of them, it's important for companies like Dell to be very active in all of them, because ultimately what you have today, plus those six properly executed, is the digital transformation outcome that most people are heading towards. >> You just packed it all six pillars into one soundbite. That was awesome. Great insight there. One of the things that's interesting, you mentioned AI. I love that piece around AI being a consumer. They are a consumer of data, they're also a consumer of what used to be handled by either systems or humans. That's interesting. 5G is another one. Pat Gelsinger has said at VMworld that 5G, and when I interviewed him he said 5G is a business app, not a consumer app. Yet, if you look at the recent iPhone announcement by Apple, iPhone 12, and iPhone 12 Pro, 5G is at the center of that announcement. But they're taking it from a different perspective. That's a real world application. They've got the watch, they have new chips in their devices, huge advantage. It's not just bandwidth. And remember the original iPhone launch with 3G if you remember. That made the iPhone. Some are saying if it didn't have the 3G or 2G and 3G, I think it was 3G in the first iPhone. 3G, it would have not been as successful. So again, Apple is endorsing 5G. Gelsinger talks about it as a business app. Double down on that, because I think 5G will highlight some of the COVID issues because people are working at home. They're on the go. They want to do video conferencing. Maybe they want to do this programmable. Unpack the importance of 5G as an enabler and as an IT component. >> Yeah. As I mentioned, 5G isn't just about enhanced mobile broadband which is faster YouTube. It's about much more than that. And because of that combination of technologies, it becomes the connective tissue for almost every digital transformation. So our view by the way, just to give you the Dell official position, we actually view that the 5G or the telecom industry is going through three phases around 5G. The first phase has already happened. It was an early deployment of 5G using traditional technology. It was just 5G as an extension of the 4G environment. That's great, it's out there. There's a phase that we're in right now, which I call the geopolitical phase, where all of a sudden, everybody from companies to countries to industries have realized this is really important. And we have to figure out how to make sure we have a secure source of supply that is based on the best technology. And that has created an interest by people like Dell and VMware and Microsoft, and many other companies to say, "Wait a minute. "This isn't just a telecom thing. "This is, as Pat said a business system. "This is part of the core of all digital." And so that's pulled people like Dell and others more aggressively into the telecom world in this middle phase. But what really is happening is the third phase. And the third phase is a recasting of the architecture of telecom to make it much more like the cloud and IT world. To separate hardware from software, to implemented software defined principles, to putting machine interfaces, to treat it like a cloud and IT system architecturally. And that's where things like OpenRAN, integrated open networks, and these new initiatives are coming into play. All of that from Dell perspective is fantastic because what it says is the telecom world is heading towards companies like us. And so, as you may know, we set up a brand new telecom business at scale up here to our other businesses this year. We already are doing billions of dollars in telecom, but now we believe we should be playing a meaningful tier-one role in this modern telecom ecosystem. It will be a team sport. There's lots of other players we have to work with. But because of the breadth of applications of 5G. And whether it's again, an iPhone with 5G is great to do YouTube, but it's incredibly powerful if you run your business applications on there, and what you want to actually deliver is an immersive augmented experience. So without 5G, it will be very hard to do that. So it becomes a new and improved client. We announced a Latitude 9,000 Series, and we're one of the first to put out a 5G enabled laptop. In certain parts of the world, we're now starting to ship these. Well again, when you have access to millimeter wave and gigabit speed capacity, you can do some really interesting things on that device, more oriented towards what we call collaborative computing which the client device and the adjacent infrastructure have so much bandwidth between them, that they look like one system. And they can share the burden of augmented reality, of data processing, of AI processing all in the real time domain. Carry that a little further, and when we get into the areas like healthcare transformation or educational transformation. What we realize immediately is reach is everything. You want to have a premium broadband experience, and you need a better system to do that. But really the thing that has to happen is not just a Zoom call, but an immersive experience in which a combination of low bandwidth, always on sensors are able to send their data streams back. But also, if you want to have a more immersive experience to really exploit your health situation, being able to do it with holography and other tools, which require a lot more bandwidth is critical. So no matter where you go in a digital transformation in the real world that has real people and things out in the real world involved in it, the digital fabric for connectivity is critical. And you suddenly realize the current architecture's pre-5G aren't sufficient. And so 5G becomes this linchpin to basically make sure that the client and the cloud and the data center all have a framework that they can actually work together without, let's call it a buffering resistance between them called the network. Imagine if the network was an enabler, not an impediment. >> Yeah, I think you're on point here. I think this is really teases out to me the next-gen business transformation, digital transformation because if you think about what you just talked about, connective tissue, linchpin with 5G, data as a driver, multicloud, the six pillars you laid out, and you mentioned systems, connective tissue systems. I mean, you're basically talking tech under the hood like operating system mindset. These systems design are interesting. If you put the pieces together, you can create business value. Not so much speeds and feeds, business value. You mentioned telco cloud. I find that fascinating. I've been saying on theCUBE for years, and I think it's finally playing out. I want to get your reactions of this is, this rise of the specialty cloud. I called it tier-one on the power law kind of the second wave of cloud. Look at Snowflake. They went public. Biggest IPO in the history of the New York Stock Exchange of Wall Street, second to VMware. They built on Amazon. (Furrier laughs) Okay. You have the telco cloud, we have theCUBE cloud, we have the media cloud. So you're seeing businesses looking at the cloud as a business model opportunity, not just buying gear to run something faster, right? So you're getting at something here where it's real benefits are now materializing and are now visible. First of all, do you agree with that? I'm sure you do. I'd love to get your thoughts on that. And if you do, how do companies put this together? Because you need software, you got to have the power source with cloud. What's your reaction to that? >> Absolutely. I think, now obviously there are many clouds. We have some mega clouds out there and then we have lots of other specialty clouds. And by the way, sometimes you remember we view cloud as an operating model, an experience, a way to present an IT service. How it's implemented is less important than what it looks like to the user. Your example of Snowflake. I don't view Snowflake as AWS. I view Snowflake as a storage business. (Furrier chuckles) >> It's a business. >> It's a business cloud. I mean, they could lift it up and move it onto another cloud infrastructure and still be Snowflake. So, as we look forward, we do see more of the consumables that we're going to use and digital transformation appearing as these cloud services. Sometimes they're SaaS cloud, sometimes they're an infrastructure cloud, sometimes they're a private cloud. One of the most interesting ones though that we see that hasn't happened yet is the edge clouds that are going to form. Edge is different. It's in the real time domain, it's distributed. If you do it at scale, it might look like massive amounts of capacity, but it isn't infinite in one place. Public cloud is infinite capacity all in one place. An edge cloud is infinite capacity distributed across 50,000 points of presence at which each of them has a finite amount of capacity. And the other difference though, is that edge clouds tend to live in the real time domain. So 30 millisecond round trip latency. Well, the reason this one's exciting to me is that when you think about what happened at the software and business model innovation, when for instance public clouds and even co-location became more accessible, companies who had this idea that needed a very large capacity of infrastructure that could be consumed as a service suddenly came into existence. Salesforce.com go through the laundry list. But all of those examples were non-real time functions because the clouds they were built on were non-real time clouds if you take them in the end to end, in the system perspective. We know that there are going to be both from the telecom operators and from cloud providers and co-location providers, and even enterprises, a proliferation of infrastructure out in the real time domain called edges. And those are going to be organized and delivered as cloud services. They're going to be pools of flexible elastic capacity. What excites me is suddenly we're going to spawn a level of innovation, where people who had this great idea that they needed to access cloud light capacity, but they ran into the problem that the capacity was too far away from the time domain they needed to operate. And we've already seen some examples of this in AR and VR. Autonomous vehicles require a real time cloud near the car, which doesn't exist yet. When we think about things like smart cities and smart factories, they really need to have that cloud capacity in the time domain that matters if they want to be a real time control system. And so, I don't know exactly what the innovation is going to be, but when you see a new capability show up, in this case, it's inevitable that we're going to see pools of elastic, consumable capacity in the real time environment as edges start to form. It's going to spawn another innovation cycle that could be as big as what happened in the public cloud environment for non-real time. >> Well, I think that's a great point in time series. Databases for one would be one instant innovation. You mentioned data, data management, time is valuable to the latency and this maybe not viable after if you're a car, right? So you pass them. So again, all different concepts. And the one thing that, first of all, I agree with you on this whole cloud thing. A nice edge cloud is going to develop nicely. But the question there is it's going to be software defined, agreed. Security, data, you've got databases, you've got software operated. You mentioned security being broken, and security product for every problem. And you want to bake it in, intrinsic or whatever you call it these days. How do you get the security model? Because you've got access. Do you federate that? How do you build in security at that level? Whether it's a space satellite or a moving vehicle, the edge is the edge. So what's your thoughts on security as you're looking at this mobility, this agility is horizontally scalable distributed system. What's the security paradigm? >> Well the first thing, it has nothing to do with security, but impacts your security outcome in a meaningful way when you talk about the edge. And that is, we have got to stop getting confused that an edge is a single monolithic thing. And we have got to start understanding that an edge is actually a combination of two things. It is a platform that will provide the capacity and a workload that will do the job, the code. And today, what we find is many people are advocating for edges are actually delivering an end to end stack that includes bespoke hardware, its infrastructure, and the workloads and capabilities. If that happens, we end up with 1,000 black boxes that all do one thing, which doesn't make any sense out in the real world. So the minute you shift to what the edge is really going to be, which is a combination of edge platforms and edge workloads, you start your journey towards a better security model. First thing that happens is you can secure and make a high integrity the edge platform. You can make sure that that platform has a hardware to trust, that it operates potentially in a zero trust model, that it has survivability and resiliency, but it doesn't really care what's running on it as much as it has to be stable. Now if you get that one right, now at least you have a stable platform between your public and private environments and the edge. At the workload level though, now you have to think about, well, edge workloads actually should not be bloated. They should not be extremely large scale because there's not enough capacity at the edge. So concepts like SASSY is a good example, which is one of the analyst firms that coined that term. But I like the concept, which is, hey, what if at the edge you're delivering the workload, but the workload is protected by a bunch of cloud-oriented security services that effectively are presented as part of the service chain? So you don't have to have your own firewall built into every workload because you're in an edge architecture, you can use virtual firewalling that's coming to you as a software service, or you can use the SDN, the service chain it into the networking path, and then you can provide deep packet inspection and other services. It all goes back to this idea that, when you deal with the edge, first and foremost, you have to have a reliable stable platform to guarantee a robust foundation. And that is an infrastructure security problem. But then you have to basically deal with the security problems of the workload in a different way than you do it in a data center. In a data center, you have infinite computing. You can put all kinds of appendages on your code, and it's fine because there's just more compute next to you. In the edge, we have to keep the code pure. It has to be an analytics engine or an AI engine for systems control in a factory. And the security services actually have to be a function of the end to end path. More likely delivered as software services slightly upstream. That architectural shift is not something people have figured out yet. But if we get it right, now we actually have a modern, zero trust distributed, software defined, service changeable, dynamic security architecture, which is a much better approach to an intrinsic security than trying to just hard-code the security into the workload and tie it to the platform which never has worked. So we're going to have to have a pretty big rethink to get through this. But for me, it's pretty clear what we have to do. >> Now I'd say that's good observation. Great insight. I'll just double down and ask a followup on that. I get that. I see where you're going with that software defined, software operated service. I love the SASSY concept. We've covered it. But the edge is still purpose-built devices. I mean, we've talked about an iPhone, and you're talking about a watch, you're talking about a space module, whatever it is at the edge on a tower, it could be a radio. I mean, whatever it is, you seem to have purpose-built hardware. You mentioned this root of trust. That'll kind of never kind of go away. You're going to have that. What's your thoughts on that as someone who realizes I got to harden the edge, at least from a hardware standpoint, but I want to be enabled for self-defined. I don't want to have a product be purpose-built and then be obsolete in a year. Because that's again the challenge of supply chain management, building hardware. What's your thoughts on that? >> Yeah. Our edge strategy, we double click a little bit is different than the strategy to build for a data center. We want consistency between them, but there's actually five areas of edge that actually are specific to it. The first is the hardware platform itself. Edge hardware platforms are different than the platforms you put in data centers, whether it be a client or the infrastructure underneath it. And so we're already building hardened devices and devices that are optimized for power and cooling and space constraints in that environment. The second is the runtime on that system is likely to be different. Today we use the V Cloud Foundation where that works very well, but as you get smaller and smaller and further away, you have to miniaturize and reduce the footprint. The control plane, we would like to make that consistent. We are using Tanzu and Dell Technologies Cloud Platform to extend out to the edge. And we think that having a consistent control plan is important, but the way you adapt something like Tanzu from the edge is different because it's in a different place. The fourth is life cycle, which is really about how you secure, how you deploy, how you deal with day two operations. There's no IT person out at the edge, so you're not in a data center. So you have to automate those systems and deal with them in a different way. And then lastly, the way you package an edge solution and deliver it is much different than the way you build a data center. You actually don't want to deal with those four things I just described as individual snowflakes. You want them packaged and delivered as an outcome. And that's why more and more of the edge platform offerings are really cloudlets or they're a platform that you can use to extend your IT capacity without having to think about Kubernetes versus VMs versus other things. It's just part of the infrastructure. So all of that tells us that edge is different enough, that the way you designed for it, the way you implement it, and even the life cycle, it has to take into account that it's not in a data center. The trick is to then turn that into an extended multicloud where the control plane is consistent, or when you push code into production with Kubernetes, you can choose to land that container in a data center or push it out to the edge. So you have both a system consistency goal, but also the specialization of the edge environment. Everything from hardware, to control plane, to lifecycle, that's the reality of how these things have to be built. >> That's a great point. It's a systems architecture, whether you're looking at from the bottoms up component level to top down kind of policy and or software defined. So great insight. I wish we had more time. I'd love to get you back and talk about data. We were talking before you came on camera about data. But quickly before we go, your thoughts on AI and the consequences of AI. AI is a consumer. I love that insight. Totally agree. Certainly it's an application. Technology is kind of horizontal. It can be vertically specialized with data. What's your thoughts on how AI can be better for society and some of the unintended consequences that we manage that. >> Yeah, I'm an optimist. I actually, we've worked with enough AI systems for long enough to see the benefit. Every one of Dell's products today has machine intelligence inside of it. So we can exceed the potential of its hardware and software without it. It's a very powerful tool. And it does things that human beings just simply can't do. I truly believe that it's the catalyst for the next wave of business process functionality, of new innovation. So it's definitely not something to stay away from. That being said, we don't know exactly how it can go wrong. And we know that there are examples where corrupted or bad bias data could influence it and have a bad outcome. And there are an infinite set of problems to go solve with AI, but there are ones that are a little dangerous to go pursue if you're not sure. And so our advice to customers today is, look, you do not need to build The Terminator to get advantage from AI. You can do something much simpler. In fact, in most enterprise context, we believe that the best path is go look at your existing business processes, where there is a decision that's made by a human being, and it's an inefficient decision. And if you can locate those points where a supply chain decision or an engineering decision or a testing decision is done by human beings poorly, and you can use machine intelligence to improve it by five or 10%, you will get a significant material impact on your business if you go after the right processes. At Dell we're doing a ton of AI and machine learning in our supply chain. Why is that important? Well, we happen to have the largest tech supply chain in the world. If we improve it by 1%, it's a gigantic impact on the company. And so our advice to people is you don't have to build man autonomous car. You don't have to build The Terminator. You can apply it much more tactically in spaces that are much safer. Even in the HR examples, we tell our HR people, "Hey, use it for things like performance management "and simplifying the processing of data. "Don't use it to hire a bot." That's a little dangerous right now. Because you might inadvertently introduce racism or sexism into that, and we still have some work to do there. So it's a very large surface area. Go where the safe areas are. It'll keep you busy for the next several years, improving your business in dramatic ways. And as we improve the technology for bias correction and management of AI systems and fault tolerance and simplicity, then go after the hard one. So this is a great one. Go after the easy stuff. You'll get a big benefit and you won't take the risk. >> You get the low hanging fruit learn, iterate through it. I'm glad you guys are using machine learning and AI in the supply chain. Make sure it's secure, big issue. I know you guys were on top of it and have a great operation there. John, great to have you on. John Roese, the Global Chief Technology Officer at Dell Technologies. Great to have you on. Take a minute to close out the last minute here. What's the most important story from Dell Technologies World this year? I know it's virtual. It's not face to face. But beyond that, what's the big takeaway in your mind, if you could share one point, what would it be for the folks watching? >> Yeah, I think the biggest point is something we talked about, which is we are in a period of digital transformation acceleration. COVID is bad, but it woke us up to the possibilities and the need for digital transformation. And so if you were on the fence or if you're moving slowly and now you have an opportunity to move fast. However, moving fast is hard if you try to do it by yourself. And so we've structured Dell, we've the six big areas we're focused on. They only have one purpose, it's to build the modern infrastructure platforms to enable digital transformation to happen faster. And my advice to people is, great. You're moving faster. Pick your partners well. Choose the people that you want to go on the journey with. And we think we're well positioned for that. And you will have much better progress if you take a broad view of the technology ecosystem and you've lightened up the appropriate partnerships with the people that can help you get there. And the outcome is a successful digital leader just is going to handle things like COVID and ease disruption better than a digital laggard. And we now have the data to prove that. So it's all about digital acceleration is the punchline. >> Well great to have you on. Great segment, great insight. And thank you for sharing the six pillars and the conversation. Super relevant on what's going on to create new business value, new opportunities for businesses and society. I'm John Furrier with theCUBE. Thanks for watching. (bright music)

Published Date : Oct 21 2020

SUMMARY :

Brought to you by Dell Technologies. We're not face to face this year, Oh, glad to be here. and challenges that need to be about the technology available to them that customers need to look at now and the infrastructure and iPhone 12 Pro, 5G is at the center But because of the breadth multicloud, the six pillars you laid out, And by the way, We know that there are going to be both And the one thing that, first of all, of the end to end path. I love the SASSY concept. that the way you designed for and some of the unintended And so our advice to John, great to have you on. Choose the people that you want to go Well great to have you on.

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
MicrosoftORGANIZATION

0.99+

DellORGANIZATION

0.99+

Pat GelsingerPERSON

0.99+

John RoesePERSON

0.99+

fiveQUANTITY

0.99+

Dell TechnologiesORGANIZATION

0.99+

PatPERSON

0.99+

John FurrierPERSON

0.99+

JohnPERSON

0.99+

AppleORGANIZATION

0.99+

AmazonORGANIZATION

0.99+

New HampshireLOCATION

0.99+

sixQUANTITY

0.99+

VMwareORGANIZATION

0.99+

Last yearDATE

0.99+

AWSORGANIZATION

0.99+

iPhoneCOMMERCIAL_ITEM

0.99+

50,000 pointsQUANTITY

0.99+

third phaseQUANTITY

0.99+

iPhone 12 ProCOMMERCIAL_ITEM

0.99+

10%QUANTITY

0.99+

1%QUANTITY

0.99+

iPhone 12COMMERCIAL_ITEM

0.99+

YouTubeORGANIZATION

0.99+

one purposeQUANTITY

0.99+

thirdQUANTITY

0.99+

firstQUANTITY

0.99+

New York Stock ExchangeORGANIZATION

0.99+

first phaseQUANTITY

0.99+

30 millisecondQUANTITY

0.99+

one pointQUANTITY

0.99+

eachQUANTITY

0.99+

bothQUANTITY

0.99+

VMworldORGANIZATION

0.99+

one problemQUANTITY

0.99+

two thingsQUANTITY

0.99+

FirstQUANTITY

0.98+

TodayDATE

0.98+

oneQUANTITY

0.98+

one thingQUANTITY

0.98+

thousandsQUANTITY

0.98+

OneQUANTITY

0.98+

this yearDATE

0.98+

SnowflakeTITLE

0.98+

todayDATE

0.98+

one systemQUANTITY

0.98+

singleQUANTITY

0.97+

fourthQUANTITY

0.97+

six pillarsQUANTITY

0.97+

Latitude 9,000 SeriesCOMMERCIAL_ITEM

0.97+

one placeQUANTITY

0.97+

about 70%QUANTITY

0.97+

five areasQUANTITY

0.97+

secondQUANTITY

0.97+

billions of dollarsQUANTITY

0.96+

GelsingerPERSON

0.96+

four thingsQUANTITY

0.96+

first thingQUANTITY

0.96+

CUBEORGANIZATION

0.96+

second inningQUANTITY

0.95+

TanzuORGANIZATION

0.95+

Bong Gumahad and Chris Henson V2


 

>>From around the globe. It's the queue cover >>Space and cyber security >>Symposium 2020 hosted by Cal poly. >>Hello and welcome to the space and cybersecurity symposium 2020 hosted by Cal poly and the cube I'm chilling for a, your host. We have a great session here. Space, cyber security, the department of defense perspective. We have bond Google hall, director of C four ISR directorate office of the undersecretary of defense for acquisition and sustainment for the DOD and Chris Henson, technical director space and weapons, cybersecurity solutions for the national security agency. Gentlemen, thank you for taking the time for this awesome session. Thank you, John. Thank you. So we're gonna talk about the perspective of the DOD relative to space cybersecurity, a lot, going on congestion, contention, freedom, evolution innovation. So Paul, I'd like to have you start with your opening statement on how you see the space cybersecurity perspective, Don, thanks for the intro. Really appreciate it. First, let me give my thanks to Cal poly for a convening, the space and cybersecurity symposium this year, you know, and despite the pandemic, the organization and the content delivery spreading impressive, I really foot stomping. >>What can possibly be done with a number of these virtual platforms? This has been awesome. Thanks for the opportunity. I also want to recognize my colleague, Chris Nissen from NSA was actually assigned to our staff that LSD, but he brings both policy and technical perspective in this whole area. So I think you'll, you'll find his commentary, uh, and positions on things very refreshing or for today's seminar. Now space cyber security is a pretty interesting terminology for us all. Uh, cyber security means protecting against cyber threats and it's really more than just computers here on earth, right? Uh, space is the newest war fighting domain, and cybersecurity's perhaps even more of a challenge in this domain that and others. Uh, I'm sure it'll turn journal Thompson and major journals Shaw discuss the criticality of this new dorm space force. It's the newest military service in the earlier sessions and they're at the risk of repeating what they already addressed. >>Let me start by talking about what space means to DOD and what we're doing directly from my vantage point as part of the acquisition and sustainment arm of the Pentagon. Uh, what I want to share with you today is how the current space strategy ties into the national defense strategy and supports the department's operational objectives. As the director of CFRI SAR. I have come to understand how the integration of CFRI Sarcic. Billy is a powerful asset to enhance the lethality of the joint war fighter. Secretary Lord, our boss, the sec, the undersecretary for acquisition and sustainment is diligent in her pursuit to adapt and modernize acquisition processes, to influence the strategy and to focus our efforts domain are to make our objectives a reality. I think first and foremost, we are building a more lethal force. This joint force will project low Valley and custom contested environments and across all domains through an operationally integrated and resiliency for ISR infrastructure. >>We are also called debating our alliances, deepening interoperability, which is very important in a future fight and collab, collaboratively planning with those partner with us in the fight most significantly for our work in acquisition and sustainment, we continue to optimize the department for greater performance and affordability through reform of the acquisition process. Now space is our newest war fighting domain. And while it is indeed unique, it shares many common traits with the others land, air and sea all are important to the defense of the U S in conflict. No doubt about this. They will be contested and they must be defended. One domain will not win future conflicts in a joint operation in a future fight in the future conflict. They must all succeed. I see three areas being key to a DOD strategic success in space, one, developing our whole of government approach in close partnership with the private sector and our allies to prioritizing our investments in resiliency, innovation, and adaptive operations, and third responding rapidly and effectively to leverage emerging technologies and seize opportunities to advance your strengths, partnerships and alliances. >>Let me emphasize that space is increasingly congested and tested and demanded as essential delete Valley operational effectiveness and the security of our nation. Now the commercialization of space offers a broad set of investments in satellite technology, potential opportunities to leverage those investments and pathways to develop cost efficient space architecture, where the department and the nation. It's funny, there's a new race, a race for space. If you will, between commercial companies buying for dominance of space. Now the joint staff within DOD is currently building an operational construct to employ and engage as a unified force, coordinated across all domains. We call it the joint, all domain command and control. It is the framework that is under development to allow us to conduct integrated operations in the future. The objective of Jesse too is to provide the war fighter access to the decision making information while providing mission assurance of the information and resilience of the underlying terrestrial air in space networks that support them operationally. >>six to maintain seamless integration, adaptation, and employment of our capability. To sense signal connect, transmit, process control, direct, and deliver lethal capabilities against the enemy. We gain a strategic advantage through the integration of these capabilities across all the domains, by providing balance bowel space, awareness, horse protection, and weapons controlled and deployment capabilities. Now successfully any ratings, the systems and capabilities will provide our war fighters overwhelming superiority on the battlefield environment, challenged by near peer adversaries, as well as non state actors in space. The character of its employment is changing, driven by increasing demands, not just by DOD, but by the commercial sector as well. You know, more and more, uh, we see greater use of small satellite systems to address a myriad of emerging questions, ubiquitous communications, awareness, sensor diversity, and many more. Uh, as I said before, the commercial world is pioneering high rate production of small satellites in our efforts to deploy hundreds, if not thousands of nodes space X, Darlene constellation is one example. >>Another one is Amazon's Kiper, uh, Kuyper just received FCC approval to deploy like over 3000 of these different notes. While a number of these companies continue to grow. Some have struggled. They some pointed as one web, uh, nevertheless, the appetite remains strong and DOD is taking advantage of these advances to support our missions. We are currently exploring how to better integrate the DOD activities involving small satellites under the small satellite coordinating activity, scholarly call it. We want to ensure collaboration and interoperability to maximize efficiency in acquisition and operation. When we started this activity on over a year and a half ago, we documented over 70 plus separate small, small sat programs within DOD. And now we've developed a very vibrant community of interest surrounding a small satellites. Now, part of the work we have identified nine focus areas for further development. These are common areas to all systems and by continuing to expand on these, our plan is they enable a standard of practice that can be applied across all of the domains. >>This includes lawn services, ground processing distribution, and of course, a topic of interest to the symposium space security and Chris we'll, we'll talk more about that being the Houston expert, uh, in this area. Uh, one challenge that we can definitely start working on today is workforce development. Cybersecurity's unique as it straddles STEM and security and policy, the trade craft is different. And unfortunately I've seen estimates recently, so suggesting a workforce gap in the next several years, much like the STEM fields, uh, during the next session, I am a part of a panel with precedent, Armstrong, Cal poly, and Steve Jake's the founder of the national security space association to address workforce development. But for this panel, I'll look forward to having further dialogue surrounding space, opera security with Chris and John. Thank you, John >>Bob, thank you for that whole thing, Steven. Yes. Workforce gaps. We need the new skill space is here. Thank you very much. Chris Henson, technical director of space and weapons, cybersecurity solutions for the national security agency. Your statement, >>Thank you for having me. Uh, I'm one of several technical leaders in space at the national security agency. And I'm currently on a joint duty assignment at the office of under secretary of defense for acquisition and sustainment. I work under mr. GUMA hot in the C four ISR area, but almost 63 years ago on the 4th of October, 1957, Sputnik was the first artificial satellite launched by the Soviet union in space. History was made in each of you can continue to write future space history in your careers. And just like in 1957, the U S isn't alone in space to include our close partnerships and longterm activities with organizations like the Japanese space agency, the European space agency, and, uh, the Canadian space agency, just to name a few. And when we tackle cybersecurity per space, we have to address, address the idea that the communications command and control, uh, and those mission datas will transverse networks owned and operated by a variety of partners, not only.go.mil.com.edu, et cetera. We need to have all the partners address the cyber effects of those systems because the risk excepted by one is shared by all and sharing cyber best practices, lessons learned, uh, data vulnerabilities, threat data, mitigation, mitigation procedures, all our valuable takeaways, uh, in expanding this space community, improving overall conditions for healthy environment. So thank you for having me, and I appreciate the opportunity to speak to you and your audience. And I look forward to the discussion questions. Thank you. >>Thank you, Chris. Thank you, Bob. Okay. I mean open innovation, the internet, you see plenty of examples. The theme here is partners, commercial government. It's going to take a lot of people and tech companies and technologies to make space work. So we asked my first question, Bonnie, we'll start with you is what do you see as the DOD his role in addressing cybersecurity in space? Uh, it's real, uh, it's a new frontier. Um, it's not going away. It's only going to get more innovative, more open, more contested. It seems like a lot to do there. So what's your role in addressing cyber security in space? >>I think our role is to be the leader in developing and only is it the strategy, but the, uh, the implementation plan is to ensure a full of cybersecurity. If you look at the national cyber cyber strategy, I think publishing 2018 calls for like-minded countries, industry academia, and civil society. Once you mentioned John, the support technology development, uh, digital safety policy advocacy, and research you here today, and those listening are fulfilling their strategy. When you, when you develop, enable use cyber hygiene products, as examples of capabilities, you're pushing the goal to fruition. When you know, what's on your network patron network backup, you're in encrypt your network, you're hardening and preventing cyber attacks. And we in government academia in the case of Cal poly civil networks and in commercial companies, we all benefit from doing that cyber security. Uh, and I think Chris will, we'll, we'll definitely back me up on this more than passwords encryption or pharma. It's truly a mindset and a culture of enabling missions to succeed in assured in a resilient fashion. >>Chris, you're taking reaction to, to the cybersecurity challenge involved here, >>That's it, it's starting really at the highest level of governments. We have, uh, you know, the, the recent security policy directive five that just came out just a couple of days ago, recognize all the factors of cybersecurity that need to come into play. And probably the most important outcome of that as mr said, is the leadership role and that leadership, uh, blends out very well into partnership. So partnership with industry partnership with academia partnership, with, uh, other people that are exploring space. And those partnerships lend itself very naturally to sharing cybersecurity issues, topics as we come up with best practices as we come up with mitigation strategies. And as we come up with vulnerabilities and share that information, the, uh, we're not going to go alone in space, just like we're probably not going to go alone in many other industries or areas, uh, that the DOD has to be, uh, involved in many spectrums of deploying to space. >>And that deployment involves as Mr. Guzman said, encryption authentication, knowing what's on the network, knowing the, the fabric of that network. And if nothing else, this, uh, this, uh, internet of things and work from home environment that we've, uh, partaken of these last few months has even explored and expanded that notion even more dramatically as we have people dial in from all over the different, uh, locations, well space will be that natural node that, uh, natural, uh, next network and mesh involvement that we'll have to protect and explore on not just from a terrestrial involvement, but all segments of it. Th the comm segment, the space vehicle and the ground portion, >>No bond. We talked about this in our other segment, um, around with the president of Cal poly, but the operating models of the space force and the DOD and getting space. It's a software defined world, right? So cybersecurity is a real big issue. Cause you have an operating model that's requiring software to power, these low hanging satellites. That's just an extension to the network. It's distributed computing, know what this is. If you understand what technology we do in space, it's no different, it's just a different environment. So it's software defined that just lends itself well to hacking. I mean, if I'm a hacker I'm going, Hey, why not just take out a satellite and crash it down or make the GPS do something different? I mean, it's definitely an attack vector. This is a big deal. It's not just like getting credentials that are cashed on a server. You gotta really protect, >>Right? Because in one hand it space will carry not only, uh, uh, you know, for local national security information. Uh, but the, uh, I feel like at the economic wellbeing, the financial state of allowed a lot of countries and institutions, you know, more and more John lb, they'll be using space assets to, uh, uh, to make, uh, make, make all that happen. Right. So, and if you look at the, you talk, you mentioned the attack vectors in space, you know, it's not just the computers in the ground, but if you look at the whole life cycle for satellite systems in space, you know, that the, the, the tasking that you need to do that the command, the controlling of the vehicle, the data that comes down in the ground, even when you launch the, the birds, the satellites, you know, they only need to be protected because they're all somewhat vulnerable to, uh, to hacking, uh, to cyber attacks. Especially as we grow into commercialization space, it's going to be a lot more people out there playing in this world. It's going to be a lot more companies out there. And, you know, it's hard to track, uh, uh, you know, the, the potential of, of, of foreign influences as an example, and therefore the potential of being vulnerable in terms of the cyber threat. >>Gentlemen, I like you guys said to move on to this leadership role, you mentioned that you want to be a leader. I get it. The DOD is department of defense. That's a new frontier to defend war time zone. You mentioned war time opportunity potentially, but how do you guys assist that's term hat to getting done? Because there's public and private space operations happening, um, there's security challenge. What does being a leader mean? And how does the DOD department of defense assist driving the public and private? Do you lead from a project standpoint, you lead from a funding standpoint? Is it architectural? I mean, you're talking about now a new end to end architecture. It's not just cloud it's on premise. It's in devices, it's offloaded with new AI technology and Nicks and devices. It's IOT, it's all, this is all new, this is all new. What does it mean for the DOD to be a leader and how do you assist others to get involved? And what does that mean? >>Yeah, I think, uh, the one hand, you know, DOD used to lead, uh, in terms of, uh, uh, being the only source of funding for a lot of, uh, highly developmental efforts. Uh, we're seeing a different story in space. Again, I keep going back to the commercialization of space. We're seeing a lot more players, right? So in many ways >>Ally's commercial companies are actually legally leading the R and D uh, of a lot of different technologies. So we want to take, we certainly want to take advantage of that. So from a leadership standpoint, I think we, we, Lucia can come in, you know, by partnering a lot more with, with the commercial companies, uh, in 2022, the DOD released the defense, uh, uh, space strategy as an example that highlights the threats, the challenges and opportunities the United States has faced by, by sending a example of how we, how we, uh, how we counter, uh, the threats that are out there, not just the DOD, but, but the disability and the commercial sector as well. Our current conditions are strong, but we want to use four lines of effort to meet our challenges and capitalize on our desire state space, uh, lines of effort include building a comprehensive military badges space, integrating space into a national joint and combined operations. Like I mentioned before, shaping that strategic environment and cooperating with allies, partners, and industry and other U S governmental agencies, departments, and agencies to advance the cost of space to take full advantage of what space can provide us, uh, in DOD, uh, and the nation. Chris has a domain. Now, what's your take on all that? >>That's because again, it's going to take more people, >>More diverse, potentially more security >>Halls. What's your view on it? >>Well, let's, let's look at how innovation and new technologies can help us in these areas. So, uh, and, and mentioned it a couple of topics that you hit on already. One of the areas that we can improve on is certainly in the, uh, the architecture, uh, where we look at a zero trust architecture, one of the NIST standards that's come about where it talks about the authentication, uh, the need to know a granular approach, this idea of being able to protect, not just data, but the resources and how people can get access to those, whether they're coming in through an identification, authentication Prudential, or, uh, other aspects of, uh, the, the idea of not just anybody should be able to have access to data or anybody should have access once they're on the inside of the network. So that zero trust architecture is, is one approach where we can show some leadership and guidance. >>Another area is in, uh, a topic that you touched on as well was in the software area. So some innovations are coming on very rapidly and strong in this artificial intelligence and machine learning. So if we can take this AI and ML and apply it to our software development areas, they can parse so much information very quickly. And, uh, you know, this vast array of code that's going into system nowadays, and then that frees up our human, uh, explicit talent and developers that can then look at other areas and not focus on minor bawling to Beverly fix a vulnerability. Uh, they, they can really use their unique skills and talents to come up with a better process, a better way, and let the artificial intelligence and machine learning, find those common problems, those, those unknown, hidden lines of code that, uh, get put into a software alarm Prairie, and then pull down over and over again from system to system. So I think between, uh, an architecture leadership role and employee innovation are two areas that we can show, uh, some benefits and process improvement to this whole system. >>That's a great point, Chris, and you think about just the architectural computer architecture, you know, S you know, network attached storage is an advantage software defined there. You could have flash all flash arrays for storage. You could have multiple cores on a device and this new architecture, offloads things, and it's a whole new way to gain efficiencies. I mean, you got Intel, you got Nvidia, you've got armed all the processors all built in. Um, so there's definitely been commercial best practices and benefits to a new kind of architecture that takes advantage of these new things. It's just, just efficiencies. Um, but this brings up the whole supply chain conversation. I want to get your thoughts on this, because there is talk about predatory investments and access and tactics to gain supply chain access to space systems, your thoughts. >>Yeah. It's a serious threat and not just for, uh, the U S uh, space. So supply chain, if you will, is the supply chain. And I says, you know, writ large, I think, uh, I think it's a, it's a, it's a threat that's, that's real, we're we're seeing today. I just saw an example recently, uh, involving, uh, our, I think our launch services were, there was a, uh, a foreign, uh, threat that was those trying to get into a true through with predatory investments. Uh, so, uh, it is something that we need to, uh, be aware of it it's happening, uh, and is continuing to happen. Uh, it's an easy way to gain access, to, uh, do our IP. Uh, and, uh, so it's something that we, uh, are serious about in terms of, uh, awareness and, and countering >>Chris, your thoughts. I mean, we've see, I mean, I'm an open source guy. I was seen it when I grew up in the industry in the eighties, open source became a revolution, but with that, it enabled new tactics for, um, state sponsored attacks on it that became a domain in of itself. Um, that's well-documented and people talk about that all the time in cyber. Now you have open innovation with hardware, software connected systems. This is going to bring supply chain nightmare. How do you track it all? Who's got what software and what device, where the chip come from, who made it, this is the potential is everywhere. How do you see the, these tactics, whether it's a VC firm from another country or this, that, and the other thing startup. >>Yeah. So when we see, when we see coal companies being purchased by foreign investors, and, you know, we can get blocked out of those, whether it's in the food industry, or if it's in a microchip, then that microchip could be used in a cell phone or a satellite or an automobile. So all of our industries that have these companies that are being purchased, or a large born investment influx into those, you know, that could be suspect. And we, we have to be very careful with those, uh, and, and do the tracking of those, especially when those, uh, some of those parts of mechanisms are coming from off shore. And then going again, going back to, uh, the space policy directive five, it calls out for better supply chain, resource management, the tracking, the knowing the pedigree and the, the quantitative of ability of knowing where those software libraries came from, where the parts came from and the tracking and delivery of that from an end to end system. >>And typically when we have a really large vendor, they can, they can do that really well. But when we have a subcontractor to a subcontractor, to a subcontractor, their resources may not be such that they can do that. Try tracking in mitigation for counterfeits or fraudulent materials going into our systems. So it's a very difficult challenge, and we want to ensure as best we can that as we ingest those parts, as we ingest those software libraries and technologies into the system, that, uh, before we employ them, we have to do some robust testing. And I don't want to say that the last line of defense, but that certainly is a mechanism for finding out, do the systems perform as they stated, uh, on a test bench or a flat set, whatever the case may be before we actually deploy it. And then we're relying on the output or the data that comes from that, that system that may have some corrupt or suspect parts in it. >>Great point, this federal grant, >>The problem with space systems is kind of, you know, is once you, once you launch the bird or the sunlight, uh, your access to it is, is diminished significantly, right? Unless you, you go up there and take it down. Uh, so, you know, kind of to Chris's point, we need to be able to test all the different parts of insurer that is performing as, as described there ass, I spent as specified, uh, with, with good knowledge that it's, uh, it's, uh, it's trustworthy. Uh, and, uh, so we that all on the ground before we, we take it up to launch it. >>It's funny. You want agility, you want speed and you want security, and you want reliability and risk management all aggressive, and it's a technical problem. It says it's a business model problem. I'd love to get real quick. Before we jump into some of the more workforce and gap issues on the personnel side, have you guys should just take a minute to explain quickly what's the federal view. If you had to kind of summarize the federal view of the DOD and the roll with it wants to take, so all the people out there on the commercial side or students out there who are, you know, wanting to jump in, what is the current modern federal view of space cybersecurity. >>Chris, why don't you take that on I'll follow up. Okay. Uh, I don't know that I can give you the federal view, but I can certainly give you the department of defense. That cybersecurity is extremely important. And as our vendors and our suppliers, uh, take on a very, very large and important role, one area that we're looking at improving on is a cyber certification maturity model, where we, where we look at the vendors and how they implement an employee cyber hygiene. So that guidance in and of itself shows the emphasis of cyber security that when we want to write a contract or a vendor, uh, for, for a purchase, that's going to go into a space system. We'd like to know from a third party audit capability, can that vendor, uh, protect and defend to some extent the amount that that part or piece or software system is going to have a cyber protection already built into it from that vendor, from the ground floor up before it even gets put into a larger system. >>So that shows a level of the CMMC process that we've thought about and, uh, started to employ, uh, beginning in 2021 and will be further built on in, in the out years. How, how important the DOD takes that. And other parts of the government are looking at this, in fact, other nations are looking at the CMMC model. So I think it shows a concern in very many areas, uh, not just in the department of defense that they're going to adopt an approach like this. Uh, so it shows the, the pluses and the benefits of a cybersecurity model that, uh, all can build on boggy reaction. Yeah, I'll just, uh, I'll just add to that, John, you, you, you, you asked earlier about, you know, how do we, uh, track, uh, commercial entities or, or people in the space and cyber security domains? Uh, I can tell you that, uh, at least my view of it, you know, space and cyber security are new, it's exciting, it's challenging a lot technical challenges there. So I think in >>Terms of attracting the right people, personnel to work those areas, uh, I think it's, it's not only intellectually challenging, uh, but it's important for, for the dependency that NASA States, uh, and it's important for, for, for economic security, uh, writ large for, for us as well. So I think, uh, in terms of a workforce and trying to get people interested in, in those domains, uh, I hope that they see the same thing we do in terms of, of the challenges and the opportunities it presents itself in the future. >>Awesome. I love your talk on intro track there falling. You mentioned, uh, the three key areas of DOD sec success, developing a government whole government approach to partnership with the private sector. I think that's critical and the allies prioritizing the right investments on resilience, innovation, adaptive operations, and responding to rapidly to effectively emerging technology. So you can be fast, all think are all things. I all, all those things are relevant. So given that, I want to get your thoughts on the defense space strategy in 2020, the DOD released dispense defense space, strategy, highlighting threats, and challenges and opportunities. How would you summarize those threats and those challenges and opportunities? What are the, what are those things that you're watching in the defense space area? Right. >>Well, I think, I think I saw, as I said before, of course, as well, you know, uh, or, or seeing that a space will be highly contested, uh, because it's a critical element in our, in our war fighting construct, uh, Dwayne, a future conflict, I think we need to, to win space as well. So when you, when you look at our near peer adversaries, there's a lot of efforts, uh, in trying to, to, to take that advantage away from the United States. So, so the threat is real, uh, and I think it's going to continue to evolve and grow. Uh, and the more we use space, both commercial and government, I think you're going to see a lot more when these threads some AFAs itself, uh, in, in forms of cyber, cyber attacks, or even kinetic attacks in some cases as needed. Uh, so yeah, so with the, the, the threat is need growing, uh, space is congested, as we talked about, it will continually be contested in the future as well. So we need to have, uh, like we do now in, in, in all the other domains, a way to defend it. And that's what we're working on with India, with the, how do we pilot with tech, our assets in space, and how do we make sure that the data information that traverses through space assets are trust 40, um, and, uh, and, and, and free of any, uh, uh, interference >>Chris, exciting time. I'm your, if you're in technology, um, this is crossing many lines here, tech society will war time, defense, new areas, new tech. I mean, it's security, it's intoxicating at many levels, because if you think about it, it's not one thing. It's not one thing anymore. It spans a broader spectrum, these opportunities. >>Yeah. And I, and I think that expansion is, is a natural outgrowth from, as our microprocessors and chips and technology continue to shrink smaller and smaller. You know, we, we think of our, our cell phones and our handheld devices and tablets, and so on that have just continued to, uh, get embedded in our everyday society, our everyday way of life. And that's a natural extension when we start applying those to space systems. When we think of smallsats and cube sets and the technology that's, uh, can be repurposed into, uh, a small vehicle and the cost has come down so dramatically that, you know, we, we can afford to get a rapid experiments, rapid, um, exploitations and, and different approaches in space and learn from those and repeat them very quickly and very rapidly. And that applies itself very well to an agile development process, dev sec ops, and this notion of spins and cycles and refreshing and re uh, addressing priorities very quickly so that when we do put a new technology up, that the technology is very lean and cutting edge, and hasn't been years and years in the making, but it's, uh, relevant and new, and the, uh, the cybersecurity and the vulnerabilities of that have to be addressed because of, and allow that DevSecOps process to take place so that we can look at those vulnerabilities and get that new technology and those new, new experiments and demonstrations in space and get lessons learned from them over and over again. >>Well, that brings us to the next big topic I want to spend the remainder of our time on that is workforce this next generation. If I wasn't so old, I would quit my job and I would join medially. It's so much, it's a fun, it's exciting. And it's important. And this is what I think is a key point is that cybersecurity in and of itself has got a big gap of shortage of workers, nevermind, adding space to it. So this is, uh, the intersection of space and cybersecurity. There is a workforce opportunity for this next generation, a young person to person re-skilling, this is a big deal. Bong, you have thoughts on this. It's not just STEM, it's everything. >>Yeah. It's everything, you know, uh, the opportunities would have in space it's significant and tremendous. And I think, uh, if I were young, again, as you pointed out, John, uh, you know, I'm, I'm, I'm lucky that I'm in this domain in this world and I started years ago. Uh, but it continues to be exciting, uh, lots of, lots of opportunities, you know, and when you, when you look at, uh, some of the commercial space, uh, systems that are being, being put up, uh, if you look at, I mentioned Starlink before, and, and, uh, Amazon's Kuyper constellation. These guys are talking about couple of thousand satellites in space to provide ubiquitous communications for internet globally and that sort of thing. Uh, and they're not the only ones that are out there producing capability. Uh, we're seeing a lot more commercial imagery products being developed by bike, by companies, both within the U S and, and, uh, foreign foreign elements as well. So I think it's an exciting time to be in space. Certainly lots of opportunities, there's technical challenges, uh, galore in terms of, you know, not only the overcoming the physics of space, but being able to operate, uh, flexibly, uh, in, uh, get the most you can out of the capabilities we have, uh, uh, operating up as high as being cool. I mean, everyone looks at launch. >>She gets millions of views on live streams, the on demand, reruns get millions and millions of views. Um, it's, there's a lot of things there. Um, so Chris, what specifically could you share are things that people would work on? Um, jobs skills, what are some, what's the aperture, what's it look like if you zoom out and look at all the opportunities from a scale standpoint, what's out there, >>We'll talk to the aperture, but I want to give a shout out to our space force. And I mean, their, their job is to train and equip, uh, future space and, uh, that, that space talent. And I think that's going to be a huge plus up, uh, to have, uh, uh, a space force that's dedicated to training equipping, uh, the, an acquisition and a deployment model that, uh, will benefit not just the other services, but all of our national defense and our, uh, you know, our, our strategic way of, uh, how, how this company, country, employees space, uh, altogether. So having, having a space for us, I think, as a, is a huge, uh, a huge issue. And then to get to that aperture aspect of, of what you're, what you're asking and, you know, that addresses a larger workforce. Uh, we need so many different talents in, in this area. >>Uh, we can, we can have, we can employ a variety of people, uh, from technical writers to people who write, uh, write in developed software to those who, uh, are bending metal and actually, uh, working in a hardware environment. And, uh, those that do planning and launch operations and all of those spectrums and issues of jobs, or are directly related to a workforce that can contribute to, to space. And then once that data gets to the ground and employed out to a user, whether it's a data or we're looking at, uh, from a sensor recent, uh, recent events on, uh, shipping lanes, those types of things. So space has such a wide and diverse swath that the aperture's really wide open, uh, for a variety of backgrounds. And, and those that, uh, really just want to take an opportunity, take a, take a technical degree or a degree that, uh, can apply itself to a tough problem, uh, because they certainly exist in space. And we can, we can use that mindset of problem solving, whether you come at it from a hacker mindset, an ethical, a white hat approach to testing and vulnerability exploration, or somebody who knows how to actually, um, make, uh, operations, uh, safer, better, uh, through space situation awareness. So there's a, there's a huge swath of opportunity for us >>Bon talk about the, um, the cyber security enabled environment, the use cases that are possible when you have cybersecurity in play with space systems, um, which is in and of itself, a huge range of jobs, codings supply chain. We just talked about a bunch of them. There's still more connected use cases that go beyond that, that, that are enabled by it. If you think about it, and this is what the students at Cal poly and every other college and university community college, you name it, or watching videos on YouTube, anyone with a brain can jump in. If they, if they see the future, it's an all net new space force is driving awareness, but there's a whole slew of these new use cases that I call space enabled by cybersecurity systems. Your thoughts. >>Absolutely. I, you know, I was, uh, had planned on attending the, uh, uh, the cyber challenge that's Cal poly had planned in June, of course, a pandemic, uh, uh, took care of that plan. But, but I was intrigued by, by the approach that the Cal poly was taking with, with, uh, middle school and high school kids of, of, of, of exposing him to a problem set here. You have a, a satellite that came down from space, uh, and, uh, part of the challenge was to do Porensic analysis on the debris, uh, the remaining pieces of the sound like to figure out what happened. Uh, it had a, uh, a cybersecurity connotation. It was hacked. It was attacked by, by cyber threat nation, took it down. And the beauty of having these kids kind of play with, with the remaining parts of the satellite figure out what happened. >>So I was pretty exciting. I was really looking forward to participating in that, but again, the pandemic kind of blew that up, but I, I look forward to future events like that to, to get our young people intrigued and interested in, uh, in this new field of space. Now, you know, Chris was talking earlier about opportunities, the opportunity that you talk about, you know, while I would like to have people come to the government, right. To help us out. It's not, it's not just focused on government, right? There's not lots of opportunities in commercial space. I, if you will, uh, for, for a lot of talent to, uh, uh, to have, uh, to participate in. So the challenge is a man's government and the commercial sector, John, >>I mean, you get the hardcore, you know, I want to work for the DOD. I want to work for NSA. I want to work for the government. You clearly got people who want to have that kind of mission, but for the folks out there, Chris and bong that are like, I'll do I qualify it? It's like the black box of the DOD. It's like a secret thing. You got any clearance, you've got to get all these certifications. And you've got to take all kinds of tests and background checks. And, um, is it like that? And will that continue? Cause some people might say, Hey, can I even get involved? What do I do? So I know there's some private partnerships going on with companies out there in the private sector. So this is now a new, you guys seem to be partnering and going outside the comfort zone of the old kind of tactical things. What are some of those opportunities that people could get involved that they might not know about >>PR for NSA, there's a variety of workforce, uh, initiatives that, uh, uh, for anybody from a high school work study can take advantage of to, uh, those that would like have to have internships. And those that are in a traditional academic environment, there's, uh, several NSA schools across the country that have a academic and cyber acts, uh, sites of excellence that participate in projects that are shepherded and mentored by those at NSA that can get those tough problems that don't have maybe a classified or super sensitive, uh, nature that that can be worked in and in an academia environment. So, so those are two or three examples of how somebody can break into, uh, the, uh, an intelligence organization and the, and the other agencies have those, uh, opportunities as well across the intelligence community and the, the partnership between and collaborative collaboration between private industry and the agencies and the department of defense just continue to grow over and over again. And even myself being able to take care advantage of a joint duty assignment between my home organization and the Pentagon just shows another venue of somebody that's in one organization can partner and leverage with another organization as well. So I'm an example of, of that partnering that's going on today. >>So there's some innovation, bong, non traditional pathways to find talent. What are out there? What are new, what are these new nontraditional ways >>I was going to add to what Chris was, was mentioning John? Yeah. Even within view and under the purview of our chief information officer, back in 2013, the deputy surfed dirty defense signed the, uh, what we call the DOD cyberspace workforce strategy, uh, into effect. And that included a program called the cyber information technology exchange program. It's an exchange program in which a, uh, you know, private sector employee and worked for the DOD in cyber security positions, uh, span across multiple mission critical areas. So this is one opportunity to learn, uh, you know, in inside the DOD what's happening as a private sector person, if you will, uh, going back to what we talked about, you know, kinda, uh, opportunities, uh, within the government for, for somebody who might be interested, uh, you know, you don't have to be super smart, Bork and space. Uh, there's a lot of like, like Chris pointed out, there's a lot of different areas that we need to have people down within people to do, uh, to conduct the mission space. So you don't have to be mathematician mathematician. You don't have to be an engineer to succeed in this business. I think there's plenty of opportunities for, for any types of, of talent, any type of academic disciplines that, that, that, that they're out there. >>And I think, you know, Chris is shout out to the space force is really worth calling out again, because I think to me, that's a big deal. It's a huge deal. It's going to change the face of our nation and society. So super, super important. And that's going to rise the tide. I think it's gonna create, uh, some activation, uh, for a younger generation, certainly, and kind of new opportunities, new problems to solve new threats to take on and, and move it on. So really super conversation space in cybersecurity, the department of defense perspective, Von and Chris, thank you for taking the time. I'd love you guys just to close out. We'll start with you bong. And then Chris summarize for the folks watching, whether it's a student at Cal poly or other university or someone in industry and government, what is the department of defense perspective for space cybersecurity? >>Chris, won't go and take that on. I started, thank you. Uh, cyber security applies to much more than just the launch and download of mission data or human led exploration and the planning, testing, and experiments in the lab prior to launch require that cyber protection, just as much as any other space link, ground segment, trust rail network, or user data, and any of that loss of intellectual property or proprietary data is an extremely valuable and important, and really warrants, cybersecurity safeguards in any economic espionage or data exfiltration or denied access to that data I E ransomware or some other, uh, attack that can cripple any business or government endeavor. Uh, no matter how small or large, if it's left in our economic backbone, uh, clearly depends on space and GPS is more than just a direction finding our banking needs that a T and timing from P and T or whether it says systems that protect our shipping and airline industry of whether they can navigate and go through a particular storm or not, uh, even fighting forest fires picked up by a remote sensor. >>All those space-based assets, uh, require protection from spoofing date, uh, data denial or total asset loss. An example would be if a satellite sensitive optics were intentionally pointed at the sun and damaged, or if a command, uh, to avoid collision with another space vehicle was delayed or disrupted or a ground termination command. As we just saw just a few days ago at T minus three seconds prior to liftoff, if those all don't go as planned, uh, those losses are real and can be catastrophic. So the threat to space is pervasive real and genuine, and your active work across all those platforms is a necessary and appreciated. And your work in this area is critical, uh, going forward going forward. Uh, thank you for this opportunity to speak with you and, uh, talking on this important topic. >>Thank you, Chris Henson, goodbye. >>Closing remarks. Yeah. Likewise, John, uh, again, uh, as, as Chris said, thank you for, for the opportunity to discuss this very important, uh, around space, cyber security, as well as addressing, uh, at the end there, we were talking about workforce development and the need to have, uh, people, uh, in the mix for four features. We discussed with you. We need to start that recruiting early, uh, as we're doing to address, uh, the STEM gap today, we need to apply the same thing for cybersecurity. We, we absolutely need smart, innovative people to protect both Iraq. Anomic wellbeings a nation as well as our national defense. So this is the right conversation to have at this time, John and I, again, thank you and our Cal poly hose for, or, uh, having a symposium and, and having this opportunity to have this dialogue. Thank you, >>Gentlemen. Thank you for your time and great insights. We couldn't be there in person. We're here virtual for the space and cybersecurity symposium, 2020, the Cal poly I'm Jennifer with Silicon angle and the cube, your host. Thank you for watching.

Published Date : Oct 1 2020

SUMMARY :

It's the queue cover the space and cybersecurity symposium this year, you know, and despite the pandemic, Uh, space is the newest war fighting what I want to share with you today is how the current space strategy ties into the national defense strategy and effectively to leverage emerging technologies and seize opportunities to advance your assurance of the information and resilience of the underlying terrestrial air in space networks You know, more and more, uh, we see greater use of small satellite systems to address a myriad While a number of these companies continue to grow. and Steve Jake's the founder of the national security space association to address workforce development. We need the new skill space is here. the European space agency, and, uh, the Canadian space agency, So we asked my first question, Bonnie, we'll start with you is what do you see as the DOD his role in addressing the support technology development, uh, digital safety policy advocacy, is the leadership role and that leadership, uh, blends out very well over the different, uh, locations, well space will be that natural models of the space force and the DOD and getting space. uh, uh, you know, for local national security information. to be a leader and how do you assist others to get involved? Yeah, I think, uh, the one hand, you know, Ally's commercial companies are actually legally leading the R and D uh, of a lot of different What's your view on it? So, uh, and, and mentioned it a couple of topics that you hit on already. And, uh, you know, I mean, you got Intel, you got Nvidia, And I says, you know, Now you have open innovation with hardware, delivery of that from an end to end system. into the system, that, uh, before we employ them, Uh, and, uh, so we that all on the ground before we, we take it up to launch it. on the commercial side or students out there who are, you know, wanting to jump in, So that guidance in and of itself shows the emphasis of cyber security that So that shows a level of the CMMC process that we've thought about for the dependency that NASA States, uh, and it's important for, So you can be fast, all think are all things. Uh, and the more we use space, I mean, it's security, it's intoxicating at many levels, because if you think about it, and so on that have just continued to, uh, get embedded in our everyday society, So this is, uh, the intersection of space and cybersecurity. Uh, but it continues to be exciting, uh, lots of, jobs skills, what are some, what's the aperture, what's it look like if you zoom out and look our, uh, you know, our, our strategic way of, uh, how, how this company, can apply itself to a tough problem, uh, because they certainly exist when you have cybersecurity in play with space systems, um, analysis on the debris, uh, the remaining pieces of the sound like to figure Now, you know, Chris was talking earlier about opportunities, the opportunity that you talk about, I mean, you get the hardcore, you know, I want to work for the DOD. industry and the agencies and the department of defense just continue to So there's some innovation, bong, non traditional pathways to find talent. to learn, uh, you know, in inside the DOD what's happening as a private sector And I think, you know, Chris is shout out to the space force is really worth calling out again, because I think to and experiments in the lab prior to launch require that cyber protection, So the threat to space is pervasive real So this is the right conversation to have at this time, John and I, the space and cybersecurity symposium, 2020, the Cal poly I'm Jennifer with Silicon angle and the cube,

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
ChrisPERSON

0.99+

Chris HensonPERSON

0.99+

Chris NissenPERSON

0.99+

JohnPERSON

0.99+

StevenPERSON

0.99+

BonniePERSON

0.99+

BobPERSON

0.99+

GuzmanPERSON

0.99+

2013DATE

0.99+

Steve JakePERSON

0.99+

millionsQUANTITY

0.99+

2020DATE

0.99+

DwaynePERSON

0.99+

FCCORGANIZATION

0.99+

NvidiaORGANIZATION

0.99+

JuneDATE

0.99+

PaulPERSON

0.99+

VonPERSON

0.99+

2022DATE

0.99+

hundredsQUANTITY

0.99+

AmazonORGANIZATION

0.99+

GUMAPERSON

0.99+

DODORGANIZATION

0.99+

2018DATE

0.99+

first questionQUANTITY

0.99+

PentagonORGANIZATION

0.99+

4th of October, 1957DATE

0.99+

twoQUANTITY

0.99+

NSAORGANIZATION

0.99+

1957DATE

0.99+

2021DATE

0.99+

Cal polyORGANIZATION

0.99+

JenniferPERSON

0.99+

LuciaPERSON

0.99+

U SLOCATION

0.99+

todayDATE

0.99+

FirstQUANTITY

0.99+

U SORGANIZATION

0.98+

one exampleQUANTITY

0.98+

bothQUANTITY

0.98+

eachQUANTITY

0.98+

Darlene constellationLOCATION

0.98+

first artificial satelliteQUANTITY

0.98+

one organizationQUANTITY

0.98+

over 3000QUANTITY

0.98+

DonPERSON

0.98+

IntelORGANIZATION

0.98+

StarlinkORGANIZATION

0.98+

one opportunityQUANTITY

0.98+

eightiesDATE

0.98+

firstQUANTITY

0.98+

Armstrong and Guhamad and Jacques V2


 

>>from around the globe. It's the Cube covering >>space and cybersecurity. Symposium 2020 hosted by Cal Poly >>Over On Welcome to this Special virtual conference. The Space and Cybersecurity Symposium 2020 put on by Cal Poly with support from the Cube. I'm John for your host and master of ceremonies. Got a great topic today in this session. Really? The intersection of space and cybersecurity. This topic and this conversation is the cybersecurity workforce development through public and private partnerships. And we've got a great lineup. We have Jeff Armstrong's the president of California Polytechnic State University, also known as Cal Poly Jeffrey. Thanks for jumping on and Bang. Go ahead. The second director of C four s R Division. And he's joining us from the office of the Under Secretary of Defense for the acquisition Sustainment Department of Defense, D O D. And, of course, Steve Jake's executive director, founder, National Security Space Association and managing partner at Bello's. Gentlemen, thank you for joining me for this session. We got an hour conversation. Thanks for coming on. >>Thank you. >>So we got a virtual event here. We've got an hour, have a great conversation and love for you guys do? In opening statement on how you see the development through public and private partnerships around cybersecurity in space, Jeff will start with you. >>Well, thanks very much, John. It's great to be on with all of you. Uh, on behalf Cal Poly Welcome, everyone. Educating the workforce of tomorrow is our mission to Cal Poly. Whether that means traditional undergraduates, master students are increasingly mid career professionals looking toe up, skill or re skill. Our signature pedagogy is learn by doing, which means that our graduates arrive at employers ready Day one with practical skills and experience. We have long thought of ourselves is lucky to be on California's beautiful central Coast. But in recent years, as we have developed closer relationships with Vandenberg Air Force Base, hopefully the future permanent headquarters of the United States Space Command with Vandenberg and other regional partners, we have discovered that our location is even more advantages than we thought. We're just 50 miles away from Vandenberg, a little closer than u C. Santa Barbara, and the base represents the southern border of what we have come to think of as the central coast region. Cal Poly and Vandenberg Air force base have partner to support regional economic development to encourage the development of a commercial spaceport toe advocate for the space Command headquarters coming to Vandenberg and other ventures. These partnerships have been possible because because both parties stand to benefit Vandenberg by securing new streams of revenue, workforce and local supply chain and Cal Poly by helping to grow local jobs for graduates, internship opportunities for students, and research and entrepreneurship opportunities for faculty and staff. Crucially, what's good for Vandenberg Air Force Base and for Cal Poly is also good for the Central Coast and the US, creating new head of household jobs, infrastructure and opportunity. Our goal is that these new jobs bring more diversity and sustainability for the region. This regional economic development has taken on a life of its own, spawning a new nonprofit called Reach, which coordinates development efforts from Vandenberg Air Force Base in the South to camp to Camp Roberts in the North. Another factor that is facilitated our relationship with Vandenberg Air Force Base is that we have some of the same friends. For example, Northrop Grumman has has long been an important defense contractor, an important partner to Cal poly funding scholarships and facilities that have allowed us to stay current with technology in it to attract highly qualified students for whom Cal Poly's costs would otherwise be prohibitive. For almost 20 years north of grimness funded scholarships for Cal Poly students this year, their funding 64 scholarships, some directly in our College of Engineering and most through our Cal Poly Scholars program, Cal Poly Scholars, a support both incoming freshman is transfer students. These air especially important because it allows us to provide additional support and opportunities to a group of students who are mostly first generation, low income and underrepresented and who otherwise might not choose to attend Cal Poly. They also allow us to recruit from partner high schools with large populations of underrepresented minority students, including the Fortune High School in Elk Grove, which we developed a deep and lasting connection. We know that the best work is done by balanced teams that include multiple and diverse perspectives. These scholarships help us achieve that goal, and I'm sure you know Northrop Grumman was recently awarded a very large contract to modernized the U. S. I. C B M Armory with some of the work being done at Vandenberg Air Force Base, thus supporting the local economy and protecting protecting our efforts in space requires partnerships in the digital realm. How Polly is partnered with many private companies, such as AWS. Our partnerships with Amazon Web services has enabled us to train our students with next generation cloud engineering skills, in part through our jointly created digital transformation hub. Another partnership example is among Cal Poly's California Cybersecurity Institute, College of Engineering and the California National Guard. This partnership is focused on preparing a cyber ready workforce by providing faculty and students with a hands on research and learning environment, side by side with military, law enforcement professionals and cyber experts. We also have a long standing partnership with PG and E, most recently focused on workforce development and redevelopment. Many of our graduates do indeed go on to careers in aerospace and defense industry as a rough approximation. More than 4500 Cal Poly graduates list aerospace and defense as their employment sector on linked in, and it's not just our engineers and computer sciences. When I was speaking to our fellow Panelists not too long ago, >>are >>speaking to bang, we learned that Rachel sins, one of our liberal arts arts majors, is working in his office. So shout out to you, Rachel. And then finally, of course, some of our graduates sword extraordinary heights such as Commander Victor Glover, who will be heading to the International space station later this year as I close. All of which is to say that we're deeply committed the workforce, development and redevelopment that we understand the value of public private partnerships and that were eager to find new ways in which to benefit everyone from this further cooperation. So we're committed to the region, the state in the nation and our past efforts in space, cybersecurity and links to our partners at as I indicated, aerospace industry and governmental partners provides a unique position for us to move forward in the interface of space and cybersecurity. Thank you so much, John. >>President, I'm sure thank you very much for the comments and congratulations to Cal Poly for being on the forefront of innovation and really taking a unique progressive. You and wanna tip your hat to you guys over there. Thank you very much for those comments. Appreciate it. Bahng. Department of Defense. Exciting you gotta defend the nation spaces Global. Your opening statement. >>Yes, sir. Thanks, John. Appreciate that day. Thank you, everybody. I'm honored to be this panel along with President Armstrong, Cal Poly in my long longtime friend and colleague Steve Jakes of the National Security Space Association, to discuss a very important topic of cybersecurity workforce development, as President Armstrong alluded to, I'll tell you both of these organizations, Cal Poly and the N S. A have done and continue to do an exceptional job at finding talent, recruiting them in training current and future leaders and technical professionals that we vitally need for our nation's growing space programs. A swell Asare collective National security Earlier today, during Session three high, along with my colleague Chris Hansen discussed space, cyber Security and how the space domain is changing the landscape of future conflicts. I discussed the rapid emergence of commercial space with the proliferations of hundreds, if not thousands, of satellites providing a variety of services, including communications allowing for global Internet connectivity. S one example within the O. D. We continue to look at how we can leverage this opportunity. I'll tell you one of the enabling technologies eyes the use of small satellites, which are inherently cheaper and perhaps more flexible than the traditional bigger systems that we have historically used unemployed for the U. D. Certainly not lost on Me is the fact that Cal Poly Pioneer Cube SATs 2020 some years ago, and they set the standard for the use of these systems today. So they saw the valiant benefit gained way ahead of everybody else, it seems, and Cal Poly's focus on training and education is commendable. I especially impressed by the efforts of another of Steve's I colleague, current CEO Mr Bill Britain, with his high energy push to attract the next generation of innovators. Uh, earlier this year, I had planned on participating in this year's Cyber Innovation Challenge. In June works Cal Poly host California Mill and high school students and challenge them with situations to test their cyber knowledge. I tell you, I wish I had that kind of opportunity when I was a kid. Unfortunately, the pandemic change the plan. Why I truly look forward. Thio feature events such as these Thio participating. Now I want to recognize my good friend Steve Jakes, whom I've known for perhaps too long of a time here over two decades or so, who was in acknowledge space expert and personally, I truly applaud him for having the foresight of years back to form the National Security Space Association to help the entire space enterprise navigate through not only technology but Polly policy issues and challenges and paved the way for operational izing space. Space is our newest horrifying domain. That's not a secret anymore. Uh, and while it is a unique area, it shares a lot of common traits with the other domains such as land, air and sea, obviously all of strategically important to the defense of the United States. In conflict they will need to be. They will all be contested and therefore they all need to be defended. One domain alone will not win future conflicts in a joint operation. We must succeed. All to defending space is critical as critical is defending our other operational domains. Funny space is no longer the sanctuary available only to the government. Increasingly, as I discussed in the previous session, commercial space is taking the lead a lot of different areas, including R and D, A so called new space, so cyber security threat is even more demanding and even more challenging. Three US considers and federal access to and freedom to operate in space vital to advancing security, economic prosperity, prosperity and scientific knowledge of the country. That's making cyberspace an inseparable component. America's financial, social government and political life. We stood up US Space force ah, year ago or so as the newest military service is like the other services. Its mission is to organize, train and equip space forces in order to protect us and allied interest in space and to provide space capabilities to the joint force. Imagine combining that US space force with the U. S. Cyber Command to unify the direction of space and cyberspace operation strengthened U D capabilities and integrate and bolster d o d cyber experience. Now, of course, to enable all of this requires had trained and professional cadre of cyber security experts, combining a good mix of policy as well as high technical skill set much like we're seeing in stem, we need to attract more people to this growing field. Now the D. O. D. Is recognized the importance of the cybersecurity workforce, and we have implemented policies to encourage his growth Back in 2013 the deputy secretary of defense signed the D. O d cyberspace workforce strategy to create a comprehensive, well equipped cyber security team to respond to national security concerns. Now this strategy also created a program that encourages collaboration between the D. O. D and private sector employees. We call this the Cyber Information Technology Exchange program or site up. It's an exchange programs, which is very interesting, in which a private sector employees can naturally work for the D. O. D. In a cyber security position that spans across multiple mission critical areas are important to the d. O. D. A key responsibility of cybersecurity community is military leaders on the related threats and cyber security actions we need to have to defeat these threats. We talk about rapid that position, agile business processes and practices to speed up innovation. Likewise, cybersecurity must keep up with this challenge to cyber security. Needs to be right there with the challenges and changes, and this requires exceptional personnel. We need to attract talent investing the people now to grow a robust cybersecurity, workforce, streets, future. I look forward to the panel discussion, John. Thank you. >>Thank you so much bomb for those comments and you know, new challenges and new opportunities and new possibilities and free freedom Operating space. Critical. Thank you for those comments. Looking forward. Toa chatting further. Steve Jakes, executive director of N. S. S. A Europe opening statement. >>Thank you, John. And echoing bangs thanks to Cal Poly for pulling these this important event together and frankly, for allowing the National Security Space Association be a part of it. Likewise, we on behalf the association delighted and honored Thio be on this panel with President Armstrong along with my friend and colleague Bonneau Glue Mahad Something for you all to know about Bomb. He spent the 1st 20 years of his career in the Air Force doing space programs. He then went into industry for several years and then came back into government to serve. Very few people do that. So bang on behalf of the space community, we thank you for your long life long devotion to service to our nation. We really appreciate that and I also echo a bang shot out to that guy Bill Britain, who has been a long time co conspirator of ours for a long time and you're doing great work there in the cyber program at Cal Poly Bill, keep it up. But professor arms trying to keep a close eye on him. Uh, I would like to offer a little extra context to the great comments made by by President Armstrong and bahng. Uh, in our view, the timing of this conference really could not be any better. Um, we all recently reflected again on that tragic 9 11 surprise attack on our homeland. And it's an appropriate time, we think, to take pause while the percentage of you in the audience here weren't even born or babies then For the most of us, it still feels like yesterday. And moreover, a tragedy like 9 11 has taught us a lot to include to be more vigilant, always keep our collective eyes and ears open to include those quote eyes and ears from space, making sure nothing like this ever happens again. So this conference is a key aspect. Protecting our nation requires we work in a cybersecurity environment at all times. But, you know, the fascinating thing about space systems is we can't see him. No, sir, We see Space launches man there's nothing more invigorating than that. But after launch, they become invisible. So what are they really doing up there? What are they doing to enable our quality of life in the United States and in the world? Well, to illustrate, I'd like to paraphrase elements of an article in Forbes magazine by Bonds and my good friend Chuck Beans. Chuck. It's a space guy, actually had Bonds job a fuse in the Pentagon. He is now chairman and chief strategy officer at York Space Systems, and in his spare time he's chairman of the small satellites. Chuck speaks in words that everyone can understand. So I'd like to give you some of his words out of his article. Uh, they're afraid somewhat. So these are Chuck's words. Let's talk about average Joe and playing Jane. Before heading to the airport for a business trip to New York City, Joe checks the weather forecast informed by Noah's weather satellites to see what pack for the trip. He then calls an uber that space app. Everybody uses it matches riders with drivers via GPS to take into the airport, So Joe has lunch of the airport. Unbeknownst to him, his organic lunch is made with the help of precision farming made possible through optimized irrigation and fertilization, with remote spectral sensing coming from space and GPS on the plane, the pilot navigates around weather, aided by GPS and nose weather satellites. And Joe makes his meeting on time to join his New York colleagues in a video call with a key customer in Singapore made possible by telecommunication satellites. Around to his next meeting, Joe receives notice changing the location of the meeting to another to the other side of town. So he calmly tells Syria to adjust the destination, and his satellite guided Google maps redirects him to the new location. That evening, Joe watches the news broadcast via satellite. The report details a meeting among world leaders discussing the developing crisis in Syria. As it turns out, various forms of quote remotely sensed. Information collected from satellites indicate that yet another band, chemical weapon, may have been used on its own people. Before going to bed, Joe decides to call his parents and congratulate them for their wedding anniversary as they cruise across the Atlantic, made possible again by communications satellites and Joe's parents can enjoy the call without even wondering how it happened the next morning. Back home, Joe's wife, Jane, is involved in a car accident. Her vehicle skids off the road. She's knocked unconscious, but because of her satellite equipped on star system, the crash is detected immediately and first responders show up on the scene. In time, Joe receives the news books. An early trip home sends flowers to his wife as he orders another uber to the airport. Over that 24 hours, Joe and Jane used space system applications for nearly every part of their day. Imagine the consequences if at any point they were somehow denied these services, whether they be by natural causes or a foreign hostility. And each of these satellite applications used in this case were initially developed for military purposes and continue to be, but also have remarkable application on our way of life. Just many people just don't know that. So, ladies and gentlemen, now you know, thanks to chuck beans, well, the United States has a proud heritage being the world's leading space faring nation, dating back to the Eisenhower and Kennedy years. Today we have mature and robust systems operating from space, providing overhead reconnaissance to quote, wash and listen, provide missile warning, communications, positioning, navigation and timing from our GPS system. Much of what you heard in Lieutenant General J. T. Thompson earlier speech. These systems are not only integral to our national security, but also our also to our quality of life is Chuck told us. We simply no longer could live without these systems as a nation and for that matter, as a world. But over the years, adversary like adversaries like China, Russia and other countries have come to realize the value of space systems and are aggressively playing ketchup while also pursuing capabilities that will challenge our systems. As many of you know, in 2000 and seven, China demonstrated it's a set system by actually shooting down is one of its own satellites and has been aggressively developing counter space systems to disrupt hours. So in a heavily congested space environment, our systems are now being contested like never before and will continue to bay well as Bond mentioned, the United States has responded to these changing threats. In addition to adding ways to protect our system, the administration and in Congress recently created the United States Space Force and the operational you United States Space Command, the latter of which you heard President Armstrong and other Californians hope is going to be located. Vandenberg Air Force Base Combined with our intelligence community today, we have focused military and civilian leadership now in space. And that's a very, very good thing. Commence, really. On the industry side, we did create the National Security Space Association devoted solely to supporting the national security Space Enterprise. We're based here in the D C area, but we have arms and legs across the country, and we are loaded with extraordinary talent. In scores of Forman, former government executives, So S s a is joined at the hip with our government customers to serve and to support. We're busy with a multitude of activities underway ranging from a number of thought provoking policy. Papers are recurring space time Webcast supporting Congress's Space Power Caucus and other main serious efforts. Check us out at NSS. A space dot org's One of our strategic priorities in central to today's events is to actively promote and nurture the workforce development. Just like cow calling. We will work with our U. S. Government customers, industry leaders and academia to attract and recruit students to join the space world, whether in government or industry and two assistant mentoring and training as their careers. Progress on that point, we're delighted. Be delighted to be working with Cal Poly as we hopefully will undertake a new pilot program with him very soon. So students stay tuned something I can tell you Space is really cool. While our nation's satellite systems are technical and complex, our nation's government and industry work force is highly diverse, with a combination of engineers, physicists, method and mathematicians, but also with a large non technical expertise as well. Think about how government gets things thes systems designed, manufactured, launching into orbit and operating. They do this via contracts with our aerospace industry, requiring talents across the board from cost estimating cost analysis, budgeting, procurement, legal and many other support. Tasker Integral to the mission. Many thousands of people work in the space workforce tens of billions of dollars every year. This is really cool stuff, no matter what your education background, a great career to be part of. When summary as bang had mentioned Aziz, well, there is a great deal of exciting challenges ahead we will see a new renaissance in space in the years ahead, and in some cases it's already begun. Billionaires like Jeff Bezos, Elon Musk, Sir Richard Richard Branson are in the game, stimulating new ideas in business models, other private investors and start up companies. Space companies are now coming in from all angles. The exponential advancement of technology and microelectronics now allows the potential for a plethora of small SAT systems to possibly replace older satellites the size of a Greyhound bus. It's getting better by the day and central to this conference, cybersecurity is paramount to our nation's critical infrastructure in space. So once again, thanks very much, and I look forward to the further conversation. >>Steve, thank you very much. Space is cool. It's relevant. But it's important, as you pointed out, and you're awesome story about how it impacts our life every day. So I really appreciate that great story. I'm glad you took the time Thio share that you forgot the part about the drone coming over in the crime scene and, you know, mapping it out for you. But that would add that to the story later. Great stuff. My first question is let's get into the conversations because I think this is super important. President Armstrong like you to talk about some of the points that was teased out by Bang and Steve. One in particular is the comment around how military research was important in developing all these capabilities, which is impacting all of our lives. Through that story. It was the military research that has enabled a generation and generation of value for consumers. This is kind of this workforce conversation. There are opportunities now with with research and grants, and this is, ah, funding of innovation that it's highly accelerate. It's happening very quickly. Can you comment on how research and the partnerships to get that funding into the universities is critical? >>Yeah, I really appreciate that And appreciate the comments of my colleagues on it really boils down to me to partnerships, public private partnerships. You mentioned Northrop Grumman, but we have partnerships with Lockie Martin, Boeing, Raytheon Space six JPL, also member of organization called Business Higher Education Forum, which brings together university presidents and CEOs of companies. There's been focused on cybersecurity and data science, and I hope that we can spill into cybersecurity in space but those partnerships in the past have really brought a lot forward at Cal Poly Aziz mentioned we've been involved with Cube set. Uh, we've have some secure work and we want to plan to do more of that in the future. Uh, those partnerships are essential not only for getting the r and d done, but also the students, the faculty, whether masters or undergraduate, can be involved with that work. Uh, they get that real life experience, whether it's on campus or virtually now during Covic or at the location with the partner, whether it may be governmental or our industry. Uh, and then they're even better equipped, uh, to hit the ground running. And of course, we'd love to see even more of our students graduate with clearance so that they could do some of that a secure work as well. So these partnerships are absolutely critical, and it's also in the context of trying to bring the best and the brightest and all demographics of California and the US into this field, uh, to really be successful. So these partnerships are essential, and our goal is to grow them just like I know other colleagues and C. S u and the U C are planning to dio, >>you know, just as my age I've seen I grew up in the eighties, in college and during that systems generation and that the generation before me, they really kind of pioneered the space that spawned the computer revolution. I mean, you look at these key inflection points in our lives. They were really funded through these kinds of real deep research. Bond talk about that because, you know, we're living in an age of cloud. And Bezos was mentioned. Elon Musk. Sir Richard Branson. You got new ideas coming in from the outside. You have an accelerated clock now on terms of the innovation cycles, and so you got to react differently. You guys have programs to go outside >>of >>the Defense Department. How important is this? Because the workforce that air in schools and our folks re skilling are out there and you've been on both sides of the table. So share your thoughts. >>No, thanks, John. Thanks for the opportunity responded. And that's what you hit on the notes back in the eighties, R and D in space especially, was dominated by my government funding. Uh, contracts and so on. But things have changed. As Steve pointed out, A lot of these commercial entities funded by billionaires are coming out of the woodwork funding R and D. So they're taking the lead. So what we can do within the deal, the in government is truly take advantage of the work they've done on. Uh, since they're they're, you know, paving the way to new new approaches and new way of doing things. And I think we can We could certainly learn from that. And leverage off of that saves us money from an R and D standpoint while benefiting from from the product that they deliver, you know, within the O D Talking about workforce development Way have prioritized we have policies now to attract and retain talent. We need I I had the folks do some research and and looks like from a cybersecurity workforce standpoint. A recent study done, I think, last year in 2019 found that the cybersecurity workforce gap in the U. S. Is nearing half a million people, even though it is a growing industry. So the pipeline needs to be strengthened off getting people through, you know, starting young and through college, like assess a professor Armstrong indicated, because we're gonna need them to be in place. Uh, you know, in a period of about maybe a decade or so, Uh, on top of that, of course, is the continuing issue we have with the gap with with stamps students, we can't afford not to have expertise in place to support all the things we're doing within the with the not only deal with the but the commercial side as well. Thank you. >>How's the gap? Get? Get filled. I mean, this is the this is again. You got cybersecurity. I mean, with space. It's a whole another kind of surface area, if you will, in early surface area. But it is. It is an I o t. Device if you think about it. But it does have the same challenges. That's kind of current and and progressive with cybersecurity. Where's the gap Get filled, Steve Or President Armstrong? I mean, how do you solve the problem and address this gap in the workforce? What is some solutions and what approaches do we need to put in place? >>Steve, go ahead. I'll follow up. >>Okay. Thanks. I'll let you correct. May, uh, it's a really good question, and it's the way I would. The way I would approach it is to focus on it holistically and to acknowledge it up front. And it comes with our teaching, etcetera across the board and from from an industry perspective, I mean, we see it. We've gotta have secure systems with everything we do and promoting this and getting students at early ages and mentoring them and throwing internships at them. Eyes is so paramount to the whole the whole cycle, and and that's kind of and it really takes focused attention. And we continue to use the word focus from an NSS, a perspective. We know the challenges that are out there. There are such talented people in the workforce on the government side, but not nearly enough of them. And likewise on industry side. We could use Maura's well, but when you get down to it, you know we can connect dots. You know that the the aspect That's a Professor Armstrong talked about earlier toe where you continue to work partnerships as much as you possibly can. We hope to be a part of that. That network at that ecosystem the will of taking common objectives and working together to kind of make these things happen and to bring the power not just of one or two companies, but our our entire membership to help out >>President >>Trump. Yeah, I would. I would also add it again. It's back to partnerships that I talked about earlier. One of our partners is high schools and schools fortune Margaret Fortune, who worked in a couple of, uh, administrations in California across party lines and education. Their fifth graders all visit Cal Poly and visit our learned by doing lab and you, you've got to get students interested in stem at a early age. We also need the partnerships, the scholarships, the financial aid so the students can graduate with minimal to no debt to really hit the ground running. And that's exacerbated and really stress. Now, with this covert induced recession, California supports higher education at a higher rate than most states in the nation. But that is that has dropped this year or reasons. We all understand, uh, due to Kobe, and so our partnerships, our creativity on making sure that we help those that need the most help financially uh, that's really key, because the gaps air huge eyes. My colleagues indicated, you know, half of half a million jobs and you need to look at the the students that are in the pipeline. We've got to enhance that. Uh, it's the in the placement rates are amazing. Once the students get to a place like Cal Poly or some of our other amazing CSU and UC campuses, uh, placement rates are like 94%. >>Many of our >>engineers, they have jobs lined up a year before they graduate. So it's just gonna take key partnerships working together. Uh, and that continued partnership with government, local, of course, our state of CSU on partners like we have here today, both Stephen Bang So partnerships the thing >>e could add, you know, the collaboration with universities one that we, uh, put a lot of emphasis, and it may not be well known fact, but as an example of national security agencies, uh, National Centers of Academic Excellence in Cyber, the Fast works with over 270 colleges and universities across the United States to educate its 45 future cyber first responders as an example, so that Zatz vibrant and healthy and something that we ought Teoh Teik, banjo >>off. Well, I got the brain trust here on this topic. I want to get your thoughts on this one point. I'd like to define what is a public private partnership because the theme that's coming out of the symposium is the script has been flipped. It's a modern error. Things air accelerated get you got security. So you get all these things kind of happen is a modern approach and you're seeing a digital transformation play out all over the world in business. Andi in the public sector. So >>what is what >>is a modern public private partnership? What does it look like today? Because people are learning differently, Covert has pointed out, which was that we're seeing right now. How people the progressions of knowledge and learning truth. It's all changing. How do you guys view the modern version of public private partnership and some some examples and improve points? Can you can you guys share that? We'll start with the Professor Armstrong. >>Yeah. A zai indicated earlier. We've had on guy could give other examples, but Northup Grumman, uh, they helped us with cyber lab. Many years ago. That is maintained, uh, directly the software, the connection outside its its own unit so that students can learn the hack, they can learn to penetrate defenses, and I know that that has already had some considerations of space. But that's a benefit to both parties. So a good public private partnership has benefits to both entities. Uh, in the common factor for universities with a lot of these partnerships is the is the talent, the talent that is, that is needed, what we've been working on for years of the, you know, that undergraduate or master's or PhD programs. But now it's also spilling into Skilling and re Skilling. As you know, Jobs. Uh, you know, folks were in jobs today that didn't exist two years, three years, five years ago. But it also spills into other aspects that can expand even mawr. We're very fortunate. We have land, there's opportunities. We have one tech part project. We're expanding our tech park. I think we'll see opportunities for that, and it'll it'll be adjusted thio, due to the virtual world that we're all learning more and more about it, which we were in before Cove it. But I also think that that person to person is going to be important. Um, I wanna make sure that I'm driving across the bridge. Or or that that satellites being launched by the engineer that's had at least some in person training, uh, to do that and that experience, especially as a first time freshman coming on a campus, getting that experience expanding and as adult. And we're gonna need those public private partnerships in order to continue to fund those at a level that is at the excellence we need for these stem and engineering fields. >>It's interesting People in technology can work together in these partnerships in a new way. Bank Steve Reaction Thio the modern version of what a public, successful private partnership looks like. >>If I could jump in John, I think, you know, historically, Dodi's has have had, ah, high bar thio, uh, to overcome, if you will, in terms of getting rapid pulling in your company. This is the fault, if you will and not rely heavily in are the usual suspects of vendors and like and I think the deal is done a good job over the last couple of years off trying to reduce the burden on working with us. You know, the Air Force. I think they're pioneering this idea around pitch days where companies come in, do a two hour pitch and immediately notified of a wooden award without having to wait a long time. Thio get feedback on on the quality of the product and so on. So I think we're trying to do our best. Thio strengthen that partnership with companies outside the main group of people that we typically use. >>Steve, any reaction? Comment to add? >>Yeah, I would add a couple of these air. Very excellent thoughts. Uh, it zits about taking a little gamble by coming out of your comfort zone. You know, the world that Bond and Bond lives in and I used to live in in the past has been quite structured. It's really about we know what the threat is. We need to go fix it, will design it says we go make it happen, we'll fly it. Um, life is so much more complicated than that. And so it's it's really to me. I mean, you take you take an example of the pitch days of bond talks about I think I think taking a gamble by attempting to just do a lot of pilot programs, uh, work the trust factor between government folks and the industry folks in academia. Because we are all in this together in a lot of ways, for example. I mean, we just sent the paper to the White House of their requests about, you know, what would we do from a workforce development perspective? And we hope Thio embellish on this over time once the the initiative matures. But we have a piece of it, for example, is the thing we call clear for success getting back Thio Uh, President Armstrong's comments at the collegiate level. You know, high, high, high quality folks are in high demand. So why don't we put together a program they grabbed kids in their their underclass years identifies folks that are interested in doing something like this. Get them scholarships. Um, um, I have a job waiting for them that their contract ID for before they graduate, and when they graduate, they walk with S C I clearance. We believe that could be done so, and that's an example of ways in which the public private partnerships can happen to where you now have a talented kid ready to go on Day one. We think those kind of things can happen. It just gets back down to being focused on specific initiatives, give them giving them a chance and run as many pilot programs as you can like these days. >>That's a great point, E. President. >>I just want to jump in and echo both the bank and Steve's comments. But Steve, that you know your point of, you know, our graduates. We consider them ready Day one. Well, they need to be ready Day one and ready to go secure. We totally support that and and love to follow up offline with you on that. That's that's exciting, uh, and needed very much needed mawr of it. Some of it's happening, but way certainly have been thinking a lot about that and making some plans, >>and that's a great example of good Segway. My next question. This kind of reimagining sees work flows, eyes kind of breaking down the old the old way and bringing in kind of a new way accelerated all kind of new things. There are creative ways to address this workforce issue, and this is the next topic. How can we employ new creative solutions? Because, let's face it, you know, it's not the days of get your engineering degree and and go interview for a job and then get slotted in and get the intern. You know the programs you get you particularly through the system. This is this is multiple disciplines. Cybersecurity points at that. You could be smart and math and have, ah, degree in anthropology and even the best cyber talents on the planet. So this is a new new world. What are some creative approaches that >>you know, we're >>in the workforce >>is quite good, John. One of the things I think that za challenge to us is you know, we got somehow we got me working for with the government, sexy, right? The part of the challenge we have is attracting the right right level of skill sets and personnel. But, you know, we're competing oftentimes with the commercial side, the gaming industry as examples of a big deal. And those are the same talents. We need to support a lot of programs we have in the U. D. So somehow we have to do a better job to Steve's point off, making the work within the U. D within the government something that they would be interested early on. So I tracked him early. I kind of talked about Cal Poly's, uh, challenge program that they were gonna have in June inviting high school kid. We're excited about the whole idea of space and cyber security, and so on those air something. So I think we have to do it. Continue to do what were the course the next several years. >>Awesome. Any other creative approaches that you guys see working or might be on idea, or just a kind of stoked the ideation out their internship. So obviously internships are known, but like there's gotta be new ways. >>I think you can take what Steve was talking about earlier getting students in high school, uh, and aligning them sometimes. Uh, that intern first internship, not just between the freshman sophomore year, but before they inter cal poly per se. And they're they're involved s So I think that's, uh, absolutely key. Getting them involved many other ways. Um, we have an example of of up Skilling a redeveloped work redevelopment here in the Central Coast. PG and e Diablo nuclear plant as going to decommission in around 2020 24. And so we have a ongoing partnership toe work on reposition those employees for for the future. So that's, you know, engineering and beyond. Uh, but think about that just in the manner that you were talking about. So the up skilling and re Skilling uh, on I think that's where you know, we were talking about that Purdue University. Other California universities have been dealing with online programs before cove it and now with co vid uh, so many more faculty or were pushed into that area. There's going to be much more going and talk about workforce development and up Skilling and Re Skilling The amount of training and education of our faculty across the country, uh, in in virtual, uh, and delivery has been huge. So there's always a silver linings in the cloud. >>I want to get your guys thoughts on one final question as we in the in the segment. And we've seen on the commercial side with cloud computing on these highly accelerated environments where you know, SAS business model subscription. That's on the business side. But >>one of The >>things that's clear in this trend is technology, and people work together and technology augments the people components. So I'd love to get your thoughts as we look at the world now we're living in co vid um, Cal Poly. You guys have remote learning Right now. It's a infancy. It's a whole new disruption, if you will, but also an opportunity to enable new ways to collaborate, Right? So if you look at people and technology, can you guys share your view and vision on how communities can be developed? How these digital technologies and people can work together faster to get to the truth or make a discovery higher to build the workforce? These air opportunities? How do you guys view this new digital transformation? >>Well, I think there's there's a huge opportunities and just what we're doing with this symposium. We're filming this on one day, and it's going to stream live, and then the three of us, the four of us, can participate and chat with participants while it's going on. That's amazing. And I appreciate you, John, you bringing that to this this symposium, I think there's more and more that we can do from a Cal poly perspective with our pedagogy. So you know, linked to learn by doing in person will always be important to us. But we see virtual. We see partnerships like this can expand and enhance our ability and minimize the in person time, decrease the time to degree enhanced graduation rate, eliminate opportunity gaps or students that don't have the same advantages. S so I think the technological aspect of this is tremendous. Then on the up Skilling and Re Skilling, where employees air all over, they can be reached virtually then maybe they come to a location or really advanced technology allows them to get hands on virtually, or they come to that location and get it in a hybrid format. Eso I'm I'm very excited about the future and what we can do, and it's gonna be different with every university with every partnership. It's one. Size does not fit all. >>It's so many possibilities. Bond. I could almost imagine a social network that has a verified, you know, secure clearance. I can jump in, have a little cloak of secrecy and collaborate with the d o. D. Possibly in the future. But >>these are the >>kind of kind of crazy ideas that are needed. Are your thoughts on this whole digital transformation cross policy? >>I think technology is gonna be revolutionary here, John. You know, we're focusing lately on what we call digital engineering to quicken the pace off, delivering capability to warfighter. As an example, I think a I machine language all that's gonna have a major play and how we operate in the future. We're embracing five G technologies writing ability Thio zero latency or I o t More automation off the supply chain. That sort of thing, I think, uh, the future ahead of us is is very encouraging. Thing is gonna do a lot for for national defense on certainly the security of the country. >>Steve, your final thoughts. Space systems are systems, and they're connected to other systems that are connected to people. Your thoughts on this digital transformation opportunity >>Such a great question in such a fun, great challenge ahead of us. Um echoing are my colleague's sentiments. I would add to it. You know, a lot of this has I think we should do some focusing on campaigning so that people can feel comfortable to include the Congress to do things a little bit differently. Um, you know, we're not attuned to doing things fast. Uh, but the dramatic You know, the way technology is just going like crazy right now. I think it ties back Thio hoping Thio, convince some of our senior leaders on what I call both sides of the Potomac River that it's worth taking these gamble. We do need to take some of these things very way. And I'm very confident, confident and excited and comfortable. They're just gonna be a great time ahead and all for the better. >>You know, e talk about D. C. Because I'm not a lawyer, and I'm not a political person, but I always say less lawyers, more techies in Congress and Senate. So I was getting job when I say that. Sorry. Presidential. Go ahead. >>Yeah, I know. Just one other point. Uh, and and Steve's alluded to this in bonded as well. I mean, we've got to be less risk averse in these partnerships. That doesn't mean reckless, but we have to be less risk averse. And I would also I have a zoo. You talk about technology. I have to reflect on something that happened in, uh, you both talked a bit about Bill Britton and his impact on Cal Poly and what we're doing. But we were faced a few years ago of replacing a traditional data a data warehouse, data storage data center, and we partner with a W S. And thank goodness we had that in progress on it enhanced our bandwidth on our campus before Cove. It hit on with this partnership with the digital transformation hub. So there is a great example where, uh, we we had that going. That's not something we could have started. Oh, covitz hit. Let's flip that switch. And so we have to be proactive on. We also have thio not be risk averse and do some things differently. Eyes that that is really salvage the experience for for students. Right now, as things are flowing, well, we only have about 12% of our courses in person. Uh, those essential courses, uh, and just grateful for those partnerships that have talked about today. >>Yeah, and it's a shining example of how being agile, continuous operations, these air themes that expand into space and the next workforce needs to be built. Gentlemen, thank you. very much for sharing your insights. I know. Bang, You're gonna go into the defense side of space and your other sessions. Thank you, gentlemen, for your time for great session. Appreciate it. >>Thank you. Thank you. >>Thank you. >>Thank you. Thank you. Thank you all. >>I'm John Furry with the Cube here in Palo Alto, California Covering and hosting with Cal Poly The Space and Cybersecurity Symposium 2020. Thanks for watching.

Published Date : Oct 1 2020

SUMMARY :

It's the Cube space and cybersecurity. We have Jeff Armstrong's the president of California Polytechnic in space, Jeff will start with you. We know that the best work is done by balanced teams that include multiple and diverse perspectives. speaking to bang, we learned that Rachel sins, one of our liberal arts arts majors, on the forefront of innovation and really taking a unique progressive. of the National Security Space Association, to discuss a very important topic of Thank you so much bomb for those comments and you know, new challenges and new opportunities and new possibilities of the space community, we thank you for your long life long devotion to service to the drone coming over in the crime scene and, you know, mapping it out for you. Yeah, I really appreciate that And appreciate the comments of my colleagues on clock now on terms of the innovation cycles, and so you got to react differently. Because the workforce that air in schools and our folks re So the pipeline needs to be strengthened But it does have the same challenges. Steve, go ahead. the aspect That's a Professor Armstrong talked about earlier toe where you continue to work Once the students get to a place like Cal Poly or some of our other amazing Uh, and that continued partnership is the script has been flipped. How people the progressions of knowledge and learning truth. that is needed, what we've been working on for years of the, you know, Thio the modern version of what a public, successful private partnership looks like. This is the fault, if you will and not rely heavily in are the usual suspects for example, is the thing we call clear for success getting back Thio Uh, that and and love to follow up offline with you on that. You know the programs you get you particularly through We need to support a lot of programs we have in the U. D. So somehow we have to do a better idea, or just a kind of stoked the ideation out their internship. in the manner that you were talking about. And we've seen on the commercial side with cloud computing on these highly accelerated environments where you know, So I'd love to get your thoughts as we look at the world now we're living in co vid um, decrease the time to degree enhanced graduation rate, eliminate opportunity you know, secure clearance. kind of kind of crazy ideas that are needed. certainly the security of the country. and they're connected to other systems that are connected to people. that people can feel comfortable to include the Congress to do things a little bit differently. So I Eyes that that is really salvage the experience for Bang, You're gonna go into the defense side of Thank you. Thank you all. I'm John Furry with the Cube here in Palo Alto, California Covering and hosting with Cal

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
ChuckPERSON

0.99+

StevePERSON

0.99+

Steve JakesPERSON

0.99+

JohnPERSON

0.99+

JoePERSON

0.99+

Steve JakePERSON

0.99+

RachelPERSON

0.99+

Cal PolyORGANIZATION

0.99+

National Security Space AssociationORGANIZATION

0.99+

Jeff ArmstrongPERSON

0.99+

Northrop GrummanORGANIZATION

0.99+

PGORGANIZATION

0.99+

Chris HansenPERSON

0.99+

CaliforniaLOCATION

0.99+

AWSORGANIZATION

0.99+

JeffPERSON

0.99+

JanePERSON

0.99+

National Security Space AssociationORGANIZATION

0.99+

Jeff BezosPERSON

0.99+

Chuck BeansPERSON

0.99+

California National GuardORGANIZATION

0.99+

New York CityLOCATION

0.99+

BoeingORGANIZATION

0.99+

National Security Space AssociationORGANIZATION

0.99+

Cal PolyORGANIZATION

0.99+

BondPERSON

0.99+

United States Space ForceORGANIZATION

0.99+

2013DATE

0.99+

SingaporeLOCATION

0.99+

94%QUANTITY

0.99+

TrumpPERSON

0.99+

Richard BransonPERSON

0.99+

California Cybersecurity InstituteORGANIZATION

0.99+

United States Space CommandORGANIZATION

0.99+

JuneDATE

0.99+

ThioPERSON

0.99+

oneQUANTITY

0.99+

CongressORGANIZATION

0.99+

ArmstrongPERSON

0.99+

hundredsQUANTITY

0.99+

United StatesLOCATION

0.99+

N S. AORGANIZATION

0.99+

fourQUANTITY

0.99+

Cal polyORGANIZATION

0.99+

threeQUANTITY

0.99+

Elon MuskPERSON

0.99+

York Space SystemsORGANIZATION

0.99+

National Centers of Academic Excellence in CyberORGANIZATION

0.99+

BezosPERSON

0.99+

Purdue UniversityORGANIZATION

0.99+

OneQUANTITY

0.99+

Bong Gumahad and Chris Henson V1


 

>> Voiceover: From around the globe, it's theCUBE, covering Space and Cybersecurity Symposium 2020 hosted by Cal Poly. >> Hello everyone? Welcome to the Space and Cybersecurity Symposium 2020 hosted by Cal Poly and theCUBE. I'm John Furrier, your host. We have a great session here. Space cybersecurity, the Department of Defense perspective. We have Bong Gumahad, Director of C4ISR, Directorate Office of the Under Secretary of Defense for Acquisition and Sustainment for the DOD. And Chris Henson, Technical Director Space and Weapons, Cybersecurity Solutions for the National Security Agency. Gentlemen, thank you for taking the time for this awesome session. >> Thank you, John. >> Thank you. >> So we're going to talk about the perspective of the DOD relative to space cybersecurity. A lot going on, congestion, contention, freedom, evolution, innovation. So Bong, I'd like to have you start with your opening statement on how you see the space cybersecurity perspective. >> John, thanks for the intro, really appreciate it. First, let me give my thanks to Cal Poly for convening the Space and Cybersecurity Symposium this year. And despite the pandemic, the organization and the content delivery is pretty impressive. I really foot stomping what can possibly be done with a number of these virtual platforms. This has been awesome, thanks for the opportunity. I also want to recognize my colleague, Chris Henson from NSA, who is actually assigned to our staff at the OUSD, but he brings both policy and technical perspective in this whole area. So I think you'll find his commentary and positions on things very refreshing for today's seminar. Now space cybersecurity is a pretty interesting terminology for us all. Cybersecurity means protecting against cyber threats. And it's really more than just computers here on earth. Space is the newest war fighting domain and cybersecurity is perhaps even more of a challenge in this domain than others. I'm sure Lieutenant General Thompson and Major John Shaw discuss the criticality of this new Space Force. It's the newest military service in the earlier sessions and they're at the risk of repeating what they already addressed. Let me start by talking about what space means to DOD and what we're doing directly from my advantage point as part of the Acquisition and Sustainment arm of the Pentagon. Well, what I want to share with you today is how the current space strategy ties into the National Defense strategy and supports the department's operational objectives. As the director of C4ISR, I have come to understand how the integration of C4ISR capability is a powerful asset to enhance the lethality of the joint war fighter. Secretary Lord, our boss, the Under Secretary for Acquisition and Sustainment is diligent in her pursuit to adapt and modernize acquisition processes, to influence the strategy and to focus our efforts to make our objectives a reality. I think first and foremost, we are building a more lethal force. This joint force will project lethality in contested environments and across all domains through an operationally integrated and resiliency 4ISR infrastructure. We are also cultivating our alliances, deepening interoperability, which is very important in a future fight and collaboratively planning with those who partner with us in the fight. Most significantly for our work in acquisition and sustainment, we continue to optimize the department for greater performance and affordability through reform of the acquisition process. Now space is our newest fighting domain. And while it is indeed unique, it shares many common traits with the others, land, air and sea. All are important to the defense of the US. In conflict, no doubt about this, they will be contested and they must be defended. One domain will not win future conflicts and in a joint operation in a future fight and the future conflict they must all succeed. I see three areas being key toward DOD strategic success in space. One, developing our whole of government approach in close partnership with the private sector and our allies. Two, prioritizing our investments in resiliency, innovation and adaptive operations. And third, responding rapidly and effectively to leverage emerging technologies and seize opportunities to advance US strengths, partnerships and alliances. Let me emphasize that space is increasingly congested and tested and demanded as essential to lethality operational effectiveness and the security of our nation. Now the commercialization space offers a broad set of investments in satellite technology, potential opportunities to leverage those investments and pathways to develop cost efficient space architecture, for the department and the nation. It's funny, there's a new race, a race for space, if you will, between commercial companies buying for dominance of space. Now the joint staff within DOD is currently building an operational construct to employ and engage as a unified force coordinated across all domains. We call it the Joint All Domain Command and Control, JADC2. It is the framework that is under development to allow us to conduct integrated operations in the future. The objective of JADC2 is to provide the war fighter access to the decision making information while providing mission assurance of the information and resilience of the underlying terrestrial air in space networks that support them. Operationally, JADC2 seeks to maintain seamless integration, adaptation, and employment of our capability to sense signal, connect, transmit, process control, direct, and deliver lethal capabilities against the enemy. We gain a strategic advantage through the integration of these capabilities across all the domains, by providing balance space awareness, horse protection, and weapons controlled and deployment capabilities. Now successfully any ratings in these systems and capabilities will provide our war fighters overwhelming superiority on the battlefield in an environment challenged by near peer adversaries, as well as non state actors. In space, the character of its employment is changing, driven by increasing demands, not just by DOD, but by the commercial sector as well. You know, more and more we see greater use of small satellite systems to address a myriad of emerging questions, ubiquitous communications, awareness, sensory diversity, and many more. As I said before, the commercial world is pioneering high rate production of small satellites in their efforts to deploy hundreds, if not thousands of nodes. SpaceX Starlink Constellation is one example. Another one is Amazon's Kuiper. Kuiper just received FCC approval to deploy like over 3000 of these different nodes. While a number of these companies continue to grow, some have struggled. Case in point is OneWeb. Nevertheless, the appetite remains strong and DOD is taken advantage of these advances to support our missions. We are currently exploring how to better integrate the DOD activities involving small satellites under the small satellite coordinating activity, scholarly call it. We want to ensure collaboration and interoperability to maximize efficiency in acquisition and operation. When we started this activity on over a year and a half ago, we documented over 70 plus separate small sat programs within DOD. And now we've developed a very vibrant community of interest surrounding our small satellites. Now, part of the work we have identified nine focus areas for further development. These are common areas to all systems and by continuing to expand on these, our plan is to enable a standard of practice that can be applied across all of the domains. This includes lawn services, ground processing distribution, and of course, a topic of interest to the symposium space security and Chris will talk more about that, being that he's the expert in this area. One challenge that we can definitely start working on today is workforce development. Cybersecurity is unique as it straddles STEM and security and policy. The trade craft is different. And unfortunately I've seen estimates recently suggesting a workforce gap in the next several years, much like the STEM fields. During the next session, I am a part of a panel with president Armstrong at Cal Poly, and Steve Jacques, the founder of the National Security Space Association to address workforce development. But for this panel, I'll look forward to having this dialogue surrounding space cybersecurity with Chris and John. Thank you, John. >> Bong, thank you for that opening statement and yes, workforce gaps, we need the new skill space is here. Thank you very much. Chris Henson's Technical Director of Space and Weapons, Cybersecurity Solutions for the National Security Agency. Your opening statement. >> Thank you for having me. I'm one of several technical leaders in space at the National Security Agency. And I'm currently on a joint duty assignment at the office of Under Secretary of Defense for Acquisition and Sustainment. I work under Mr. Gumahad in the C4ISR area. But almost 63 years ago, on the 4th of October, 1957, Sputnik was the first artificial satellite launched by the Soviet Union and space history was made. And each of you can continue to write future space history in your careers. And just like in 1957, the US isn't alone in space to include our close partnerships and longterm activities with organizations like the Japanese Space Agency, the European Space Agency and the Canadian Space Agency, just to name a few. And when we tackle cybersecurity per space, we have to address the idea that the communications command and control and those mission datas will transverse networks owned and operated by a variety of partners, not only .go, .mil, .com, .edu, et cetera. We need to have all the partners address the cyber effects of those systems because the risk accepted by one is shared by all. And sharing cyber best practices, lessons learned, data vulnerabilities, threat data mitigation procedures, all our valuable takeaways in expanding the space community, improving overall conditions for healthy environment. So thank you for having me, and I appreciate the opportunity to speak to you and your audience. And I look forward to the discussion questions, thank you. >> Thank you, Chris, thank you, Bong. Okay, I mean, open innovation, the internet, you see plenty of examples. The theme here is partners, commercial, government. It's going to take a lot of people and tech companies and technologies to make space work. So we asked my first question, Bong, we'll start with you is what do you see as the DOD's role in addressing cybersecurity in space? It's real, it's a new frontier. It's not going away, it's only going to get more innovative, more open, more contested. It seems like a lot to do there. What's your role in addressing cyber security in space? >> I think our role is to be the leader in developing not only is it the strategy, but the implementation plans to ensure a full of cybersecurity. If you look at the National Cyber Strategy, I think published in 2018, calls for like-minded countries, industry academia, and civil society. Once you mentioned John, the support technology development, digital safety policy, advocacy, and research. You here today, and those listening are fulfilling their strategy. When you develop, enable use cyber hygiene products as examples and capabilities, you're pushing the goal to provision. When you know what's on your network, patch network, backup and encrypt your network, you're hardening and preventing cyber attacks. And we in government academia, in the case of Cal Poly, civil networks and in commercial companies, we all benefit from doing that. Cyber security, and I think Chris will definitely back me up on this, more than passwords encryption or firewall. It's truly a mindset and a culture of enabling mission to succeed in assured and in a resilient fashion. >> Chris, you're take and reaction to the cybersecurity challenge involved here. >> It's starting really at the highest level of governments. We have, you know, the recent security policy Directive-5 that just came out just a couple of days ago, recognize all the factors of cybersecurity that need to come into play. And probably the most important outcome of that as Mr. Gumahad said, is the leadership role. And that leadership blends out very well into partnership. So partnership with industry, partnership with academia, partnership with other people that are exploring space. And those partnerships blend itself very naturally to sharing cybersecurity issues, topics, as we come up with best practices, as we come up with mitigation strategies, and as we come up with vulnerabilities and share that information. We're not going to go alone in space, just like we're probably not going to go alone in many other industries or areas. That the DOD has to be involved in many spectrums of deploying to space. And that deployment involves, as Mr. Gumahad said, encryption, authentication, knowing what's on the network, knowing the fabric of that network, and if nothing else, this internet of things and work from home environment that we've partaken of these last few months has even explored and expanded that notion even more dramatically as we have people dial in from all over the different locations. Well, space will be that natural node, that natural next network in measure involvement that we'll have to protect and explore on, not just from a terrestrial involvement, but all segments of it. The calm segment, the space vehicle, and the ground portion. >> You know, Bong, we talked about this in our other segment around with the president of Cal Poly, but the operating models of the Space Force and of the DOD and getting to space. But it's a software defined world, right? So cybersecurity is a real big issue 'cause you have an operating model that's requiring software to power these low hanging satellites. That's just an extension to the network. It's distributed computing, we know what this is. If you understand what technology we do in space, it's no different, it's just a different environment so it's software defined. That just lends itself well to hacking. I mean, if I'm a hacker I'm going, "Hey, why not just take out a satellite and crash it down "or make the GPS do something different?" I mean, it's definitely an attack vector. This is a big deal. It's not just like getting credentials that are cashed on a server, you got to really protect. >> Right, because in one hand it space will carry not only focal national security information, but if you look at the economic wellbeing, the financial state of a lot of countries, institutions, you know, more and more John, they'll be using space assets to make all that happen. So, and if you look at the, you mentioned the attack vectors in space. It's not just the computers in the ground, but if you look at the whole life cycle for satellite systems in space, the tasking that you need to do, the command and controlling of the vehicle, the data that comes down in the ground, even when you launch the birds, the satellites, you know, they all need to be protected because they're all somewhat vulnerable to hacking, to cyber attacks. Especially as we grow into commercialization space, it's going to be a lot more people out there playing in this world. It's going to be a lot more companies out there. And, you know, it's hard to track, the potential of foreign influences as an example, and therefore the potential of being vulnerable in terms of the cyber threat. >> Gentlemen, like you guys said to move on to this leadership role, Bong, you mentioned it. You want to be a leader, I get it, the DOD is Department of Defense, it's a new frontier to defend war time zone, you mentioned war time opportunity potentially. But how do you guys assist that's term hat to getting done? Because there's public and private space operations happening, there's security challenge. What does being a leader mean? And how does the DOD, Department of Defense assist driving the public and private? Do you lead from a project standpoint? Do you lead from a funding standpoint? Is it architectural? I mean, you're talking about now a new end-to-end architecture. It's not just cloud it's on premise, it's in devices, it's offloaded with new AI technology and nix and devices. It's IOT, it's all this and all new. This is all new. What does it mean for the DOD to be a leader and how do you assist others to get involved? And what does that mean? >> Yeah, I think the one hand, you know, DOD used to lead in terms of being the only source of funding for a lot of highly developmental efforts. We're seeing a different story in space. Again, I keep going back to the commercialization of space. We're seeing a lot more players, right? So in many ways allies commercial companies are actually leading the R&D of a lot different technology. So we certainly want to take advantage of that. So from a leadership standpoint, I think leadership can come in, by partnering a lot more with the commercial companies. In 2020, the DOD released the Defense Space Strategy, as an example, that highlights the threats, the challenges and opportunities the United States has faced by setting example of how we counter the threats that are out there, not just the DOD, but the civilian and the commercial sector as well. Our current conditions are strong, but we want to use four lines of effort to meet our challenges and capitalize on our desire to state space. Our lines of effort include building a comprehensive military badges space, integrating space into a national joint and combined operations, like I mentioned before. Shaping that strategic environment and cooperating with allies, partners in industry and other US governmental departments and agencies to advance the cost of space. To take full advantage of what space can provide us in DOD and the nation. >> Chris as a domain now, what's your take on all of this? Because again, it's going to take more people, more diverse, potentially more security hauls. What's your view on this? >> Well, let's look at how innovation and new technologies can help us in these areas. So, and mentioned it a couple of topics that you hit on already. One of the areas that we can improve on is certainly in the architecture. Where we look at a zero trust architecture, one of the NIST standards that's come about. Where it talks about the authentication, the need to know a granular approach, this idea of being able to protect, not just data, but the resources and how people can get access to those, whether they're coming in through an identification, authentication credential, or other aspects of the idea of not just anybody should be able to have access to data or anybody should have access once they're on the inside of the network. So that zero trust architecture is one approach where we can show some leadership and guidance. Another area is in a topic that you touched on as well, was in the software area. So some innovations are coming on very rapidly and strong in this artificial intelligence and machine learning. So if we can take this AI and ML and apply it to our software development areas, they can parse so much information very quickly. And you know, this vast array of software code that's going into system nowadays. And then that frees up our human exquisite talent and developers that can then look at other areas and not focus on minor vulnerability, fix a vulnerability. They can really use their unique skills and talents to come up with a better process, a better way, and let the artificial intelligence and machine learning, find those common problems, those unknown hidden lines of code that get put into a software library and then pull down over and over again from system to system. So I think between an architecture leadership role and employee innovation are two areas that we can show some benefits and process improvement to this whole system. >> That's a great point, Chris, and you think about just the architectural computer architecture network attached storage is an advantage software defined there. You could have flash, all flash arrays for storage. You could have multiple cores on a device. And this new architecture, offloads things, and it's a whole new way to gain efficiencies. I mean, you got Intel, you got Nvidia, you've got armed, all the processors all built in. So there's definitely been commercial best practices and benefits to a new kind of architecture that takes advantage of these new things. It's just efficiencies. But this brings up the whole supply chain conversation. I want to get your thoughts on this because there is talk about predatory investments and access and tactics to gain supply chain access to space systems, your thoughts? >> Yeah, it's a serious threat and not just for the US space supply chain, if you will, is the supply chain you access with large, I think it's a threat that's this real we're seeing today. I just saw an example recently involving, I think our law and services, where there was a foreign threat that was trying to get into a troop through with predatory investments. So it is something that we need to be aware of, it's happening and will continue to happen. It's an easy way to gain access to do our IP. And so it's something that we are serious about in terms of awareness and countering. >> Chris, your thoughts? I mean, I'm an open source guy. We've seen it when I grew up in the industry in the '80s open source became a revolution. But with that, it enabled new tactics for state sponsored attacks and that became a domain in of itself. That's well-documented and people talk about that all the time in cyber. Now you have open innovation with hardware, software connected systems. This is going to bring a supply chain nightmare. How do you track it all? (chuckles) Who's got what software and what device... Where the chip from? Who made it? Just the potential is everywhere. How do you see these tactics? Whether it's a VC firm from another country or this, that, and the other thing, startup, big company-- >> Yeah, so when we see coal companies being purchased by foreign investors, and, you know, we can get blocked out of those, whether it's in the food industry, or if it's in a microchip. Then that microchip could be used in a cell phone or a satellite or an automobile. So all of our are industries that have these companies that are being purchased or a large born investment influx into those, they can be suspect. And we have to be very careful with those and do the tracking of those, especially when those, some of those parts and mechanisms are coming from off shore. And again, going back to the Space Policy Directive-5, it calls out for better supply chain, resource management, the tracking, the knowing the pedigree and the quantitative ability of knowing where those software libraries came from, where the parts came from, and the tracking and delivery of that from an end-to-end system. And typically when we have a really large vendor, they can do that really well. But when we have a subcontractor to a subcontractor, to a subcontractor, their resources may not be such that they can do that tracking in mitigation for counterfeits or fraudulent materials going into our systems. So it's a very difficult challenge, and we want to ensure as best we can that as we ingest those parts, as we ingest those software libraries and technologies into the system, that before we employ them, we have to do some robust testing. And I don't want to say that's the last line of defense, but that certainly is a mechanism for finding out do the systems perform as they stated on a test bench or a flat set, whatever the case may be, before we actually deploy it. And then we're relying on the output or the data that comes from that system that may have some corrupt or suspect parts in it. >> Great point, this federal views-- >> The problem with space systems is kind of, you know, is once you launch the bird or the satellite, your access to it is diminished significantly, right? Unless you go up there and take it down. So, you know, kind of to Chris's point, we need to be able to test all the different parts to ensure that is performing as described there, as specified with good knowledge that it's trustworthy. And so we do that all on the ground before we take it up to launch it. >> It's funny, you want agility, you want speed, and you security, and you want reliability, and risk management. All aggressive, and it's a technical problem, it's a business model problem. Love to get real quick before we jump into some of the more workforce and gap issues on the personnel side, have you guys to just take a minute to explain quickly what's the federal view? If you had to kind of summarize the federal view of the DOD and the role with it wants to take, so all the people out there on the commercial side or students out there who are wanting to jump in, what is the current modern federal view of space cybersecurity? >> Chris, why don't you take that on and I'll follow up. >> Okay, I don't know that I can give you the federal view, but I can certainly give you the Department of Defense that cyber security is extremely important. And as our vendors and our suppliers take on a very, very large and important role, one area that we're looking at improving on is a cyber certification maturity model, where we look at the vendors and how they implement and employee cyber hygiene. So that guidance in and of itself shows the emphasis of cyber security. That when we want to write a contract or a vendor for a purchase that's going to go into a space system, we'd like to know from a third party audit capability, can that vendor protect and defend to some extent the amount that that part or piece or software system is going to have a cyber protection already built into it from that vendor, from the ground floor up, before it even gets put into a larger system. So that shows a level of the CMMC process that we've thought about and started to employ beginning in 2021 and will be further built on in the out years. How important the DOD takes that. And other parts of the government are looking at this. In fact, other nations are looking at the CMMC model. So I think it shows a concern in very many areas, not just in the Department of Defense, that they're going to adopt an approach like this. So it shows the pluses and the benefits of a cybersecurity model that all can build on. >> Bong, your reaction. >> Yeah, I'll just add to that. John, you asked earlier about, you know, how do we track commercial entities or people into the space and cyber security domains? I can tell you that at least my view of it, space and cybersecurity are new. It's exciting, it's challenging, a lot of technical challenges there. So I think in terms of attracting the right people and personnel to work those areas, I think it's not only intellectually challenging, but it's important for the defensing and near States. And it's important for economic security at large for us as well. So I think in terms of a workforce and trying to get people interested in those domains, I hope that they see the same thing we do in terms of the challenges and the opportunities it presents itself in the future. >> Awesome, I loved your talk on intro track there. Bong, you mentioned the three key areas of DOD success, developing a whole government approach to partnership with the private sector. I think that's critical, and the allies. Prioritizing the right investments on resilience, innovation, adaptive operations, and responding to rapidly to effectively emerging technology seem to be fast. I think all those things are relevant. So given that, I want to get your thoughts on the Defense Space Strategy. In 2020, the DOD released dispense Defense Space Strategy, highlighting threats, and challenges and opportunities. How would you summarize those threats and those challenges and opportunities? What are those things that you're watching in the defense space area? >> Right, well, I think as I said before, Chris as well, you know, we're seeing that space will be highly contested because it's a critical element in our war fighting construct. To win our future conflict, I think we need to win space as well. So when you look at our near peer adversaries, there's a lot of efforts in China to take that advantage away from the United States. So the threat is real, and I think it's going to continue to evolve and grow. And the more we use space, for both commercial and government, I think you're going to see a lot more when these threats, some AFAs itself in forms of cyber attacks, or even kinetic attacks in some cases as needed. So, yeah, so the threat is indeed growing, space is congested, as we talked about, it will continually be contested in the future as well. So we need to have, like we do now in all the other domains, a way to defend it. And that's what we're working on within DOD. How do we protect our assets in space, and how do we make sure that the data information that traverses through space assets are trustworthy and free of any interference. >> Chris, exciting time, I'm mean, if you're in technology, this is crossing many lines here, tech, society, war time defense, new areas, new tech. I mean, it's security, it's intoxicating at many levels because if you think about it, it's not one thing. It's not one thing anymore. It spans a broader spectrum, these opportunities. >> Yeah and I think that expansion is a natural outgrowth from, as our microprocessors and chips and technology continue to shrink smaller and smaller. You know, we think of our cell phones and our handheld devices and tablets and so on that have just continued to get embedded in our everyday society, our everyday way of life. And that's a natural extension when we start applying those to space systems, when we think of smallsats and cube sets and the technology that's can be repurposed into a small vehicle, and the cost has come down so dramatically that, you know, we can afford to get rapid experiments, rapid exploitations and different approaches in space and learn from those and repeat them very quickly and very rapidly. And that applies itself very well to an agile development process, DevSecOps, and this notion of spins and cycles and refreshing and re-addressing priorities very quickly so that when we do put a new technology up, that the technology is very lean and cutting edge, and hasn't been years and years in the making, but it's relevant and new. And the cybersecurity and the vulnerabilities of that have to be addressed and allow that DevSecOps process to take place so that we can look at those vulnerabilities and get that new technology and those new experiments and demonstrations in space and get lessons learned from them over and over again. >> Well, that brings us to the next big topic. I want to spend the remainder of our time on, that is workforce, this next generation. If I wasn't so old, I would quit my job and I would join immediately. It's so much fun, it's exciting, and it's important. And this is what I think is a key point is that cybersecurity in and of itself has got a big gap of shortage of workers, nevermind adding space to it. So this is the intersection of space and cybersecurity. There is a workforce opportunity for this next generation, young person to person re-skilling, this is a big deal. Bong, you have thoughts on this? It's not just STEM, it's everything. >> Yeah, it's everything, you know, the opportunities we have in space, it's significant and tremendous. And I think if I were young again, as you pointed out, John, you know, I'm lucky that I'm in this domain in this world and I started years ago, but it continues to be exciting, lots of opportunities, you know. When you look at some of the commercial space systems are being put up, if you look at, I mentioned Starlink before and Amazon's Kuiper Constellation. These guys are talking about couple of thousand satellites in space to provide ubiquitous communications for internet globally, and that sort of thing. And they're not the only ones that are out there producing capability. We're seeing a lot more commercial imagery products being developed by companies, both within the US and foreign elements as well. So I think it's an exciting time to be in space. Certainly lots of opportunities. There's technical challenges galore in terms of not only the overcoming the physics of space, but being able to operate flexibly and get the most you can out of the capabilities we have operating up in space. >> Besides being cool, I mean, everyone looks at launch of space gets millions of views on live streams, the On-Demand reruns get millions and millions of views. There's a lot of things there. So, Chris, what specifically could you share are things that people would work on? Jobs, skills, what's the aperture? What's it look like if you zoom out and look at all the opportunities from a scale standpoint, what's out there? >> I'll talk to the aperture, but I want to give a shout out to our Space Force. And I mean, their job is to train and equip each air space and that space talent. And I think that's going to be a huge plus up to have a Space Force that's dedicated to training, equipping, an acquisition and a deployment model that will benefit not just the other services, but all of our national defense and our strategic way of how this company, country employees space altogether. So having a Space Force, I think, is a huge issue. And then to get to that aperture aspect of what you're asking and that addresses a larger workforce, we need so many different talents in this area. We can employ a variety of people from technical writers, to people who write and develop software to those who bending metal and actually working in a hardware environment. And those that do planning and launch operations and all of those spectrums and issues of jobs, are directly related to a workforce that can contribute to space. And then once that data gets to the ground and employed out to a user, whether it's a weather data, or we're looking at from a sensor, recent events on shipping lanes, those types of things. So space has such a wide and diverse swath that the aperture's really wide open for a variety of backgrounds. And those that really just want to take an opportunity, take a technical degree, or a degree that can apply itself to a tough problem, because they certainly exist in space. And we can use that mindset of problem solving, whether you come at it from a hacker mindset, an ethical, white hat approach to testing and vulnerability exploration. Or somebody who knows how to actually make operations safer, better through space situation awareness. So there's a huge swath of opportunity for us. >> Bong, talk about the cybersecurity enabled environment, the use cases that are possible when you have cybersecurity in play with space systems, which is in and of itself, a huge range of jobs, codings, supply chain, we just talked about a bunch of them. There's still more connected use cases that go beyond that, that are enabled by it, if you think about it. And this is what the students at Cal Poly and every other college and university, community college, you name it, who are watching videos on YouTube. Anyone with a brain can jump in if they see the future. It's all net news. Space Force is driving awareness, but there's a whole slew of these new use cases that I call space enabled by cyber secure systems. Your thoughts? >> Absolutely, I was had planned on attending the Cyber Challenge that's Cal Poly had planned in June. Of course, the pandemic took care of that plan, but I was intrigued by the approach that the Cal Poly was taking with middle school and high school kids of exposing him to a problem set. Here, you have a satellite that came down from space and part of the challenge was to do forensic analysis on the debris, the remaining pieces of the satellite to figure out what happened. It had a cyber cybersecurity connotation. It was hacked, it was attacked by cyber threat nation, took it down. And the beauty of having these kids kind of play with the remaining parts of the satellite, figure out what happened. So it was pretty exciting. I was really looking forward to participating in that, but again, the pandemic kind of blew that up, but I look forward to future events like that, to get our young people intrigued and interested in this new field of space. Now, Chris was talking earlier about opportunities, there're opportunities that you talk about, while I would like to have people come to the government, to help us out, it's not just focused on government. There's lots of opportunities in commercial space, if you will, for a lot of talent to participate in. So the challenge is immense, both government and the commercial sector, John. >> I mean, you get the hardcore, you know, I want to work for the DOD, I want to work for NSA, I want to work for the government. You clearly got people who want to have that kind of mission. But for the folks out there, Chris and Bong that are like, "Do I qualify?" It's like the black box of the DOD, it's like a secret thing, you got to get clearance, you've got to get all these certifications. And you got to take all kinds of tests and background checks. Is it like that, and will that continue? 'Cause some people might say, "Hey, can I even get involved? "What do I do?" So I know there's some private partnerships going on with companies out there in the private sector. So this is now a new, you guys seem to be partnering and going outside the comfort zone of the old kind of tactical things. What are some of those opportunities that people could get involved in that they might not know about? >> For NSA, there's a variety of workforce initiatives that for anybody from a high school work study can take advantage of to those that would like have to have internships. And those that are in a traditional academic environment, there's several NSA schools across the country that have academic and cyber sites of excellence that participate in projects that are shepherded and mentored by those at NSA that can get those tough problems that don't have maybe a classified or super sensitive nature that can be worked in and in an academia environment. So those are two or three examples of how somebody can break into an intelligence organization. And the other agencies have those opportunities as well across the intelligence community. And the partnership between and collaboration between private industry and the agencies and the Department of Defense just continue to grow over and over again. And even myself being able to take advantage of a joint duty assignment between my home organization and the Pentagon, just shows another venue of somebody that's in one organization can partner and leverage with another organization as well. So I'm an example of that partnering that's going on today. >> So there's some innovation. Bong, nontraditional pathways to find talent, what are out there, what are new? What are these new nontraditional ways? >> I was going to add to what Chris was mentioning, John. Even within DOD and under the purview of our chief information officer, back in 2013, the Deputy Secretary Defense signed the, what we call the DOD Cyberspace Workforce Strategy into effect. And that included a program called the Cyber Information Technology Exchange Program. It's an exchange program in which a private sector employee can work for the DOD in cyber security positions span across multiple mission critical areas. So this is one opportunity to learn, inside the DOD what's happening as a private sector person, if you will. Going back to what we talked about, kind of opportunities within the government for somebody who might be interested. You don't have to be super smart, dork in space, there's a lot of, like Chris pointed out, there's a lot of different areas that we need to have people, talented people to conduct the mission in space. So you don't have to be mathematician. You don't have to be an engineer to succeed in this business. I think there's plenty of opportunities for any types of talent, any type of academic disciplines that are out there. >> All right, thank you, and Chris's shout out to the Space Force is really worth calling out again, because I think to me, that's a big deal. It's a huge deal. It's going to change the face of our nation and society. So super, super important. And that's going to rise the tide. I think it's going to create some activation for a younger generation, certainly, and kind of new opportunities, new problems to solve, new threats to take on, and move it on. So really super conversation, space and cybersecurity, the Department of Defense perspective. Bong and Chris, thank you for taking the time. I'd love you guys just to close out. We'll start with you Bong and then Chris. Summarize for the folks watching, whether it's a student at Cal Poly or other university or someone in industry and government, what is the Department of Defense perspective for space cybersecurity? >> Chris, want to go and take that on? >> That's right, thank you. Cybersecurity applies to much more than just the launch and download of mission data or human led exploration. And the planning, testing, and experiments in the lab prior to launch require that cyber protection, just as much as any other space link, ground segment, trust rail network, or user data, and any of that loss of intellectual property or proprietary data is an extremely valuable and important, and really warrants cyber security safeguards. In any economic espionage, your data exfiltration, or denied access to that data, i.e. ransomware or some other attack, that can cripple any business or government endeavor, no matter how small or large, if it's left unprotected. And our economic backbone clearly depends on space. And GPS is more than just a direction finding, banking needs that T and timing from P and T or whether it just systems that protect our shipping and airline industry of whether they can navigate and go through a particular storm or not. Even fighting forest fires picked up by a remote sensor. All those space space assets require protection from spoofing date, data denial, or total asset loss. An example would be if a satellite sensitive optics or intentionally pointed at the sun and damaged, or if a command to avoid collision with another space vehicle was delayed or disrupted or a ground termination command as we just saw just a few days ago at T minus three seconds prior to liftoff, if those all don't go as planned, those losses are real and can be catastrophic. So the threat to space is pervasive, real and genuine, and your active work across all those platforms is necessary and appreciated. And your work in this area is critical going forward. Thank you for this opportunity to speak with you and talking on this important topic. Thank you, Chris Henson. Bong Gumahad, closing remarks? >> Yeah, likewise, John, again, as Chris said, thank you for the opportunity to discuss this very important around space cybersecurity, as well as addressing at the end there, we were talking about workforce development and the need to have people in the mix for future. (indistinct) We discussed, we need to start that recruiting early as we're doing to address the STEM gap today, we need to apply the same thing for cybersecurity. We absolutely need smart and innovative people to protect both our economic wellbeing as a nation, as well as our national defense. So this is the right conversation to have at this time, John. And again, thank you and Cal Poly host for having this symposium and having this opportunity to have this dialogue. Thank you. >> Gentlemen, thank you for your time and great insights. We couldn't be there in person. We're here virtual for the Space and Cybersecurity Symposium 2020, the Cal Poly. I'm John Furrier with SiliconANGLE and theCUBE, your host. Thank you for watching. (soft music)

Published Date : Sep 22 2020

SUMMARY :

the globe, it's theCUBE, Directorate Office of the So Bong, I'd like to have you start and the future conflict the National Security Agency. and the Canadian Space and technologies to make space work. in the case of Cal Poly, to the cybersecurity That the DOD has to be and of the DOD and getting to space. and controlling of the vehicle, the DOD to be a leader of being the only source Because again, it's going to the need to know a granular approach, and benefits to a new kind of architecture and not just for the US space in the industry in the '80s and do the tracking of those, bird or the satellite, and the role with it wants to take, Chris, why don't you take and the benefits of a cybersecurity model and the opportunities and responding to rapidly and I think it's going to because if you think about and the cost has come down so dramatically nevermind adding space to it. and get the most you can out and look at all the opportunities and employed out to a user, Bong, talk about the and part of the challenge and going outside the comfort zone and the agencies and the pathways to find talent, So this is one opportunity to learn, And that's going to rise the tide. So the threat to space is and the need to have people the Space and Cybersecurity

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
ChrisPERSON

0.99+

Chris HensonPERSON

0.99+

JohnPERSON

0.99+

European Space AgencyORGANIZATION

0.99+

National Security AgencyORGANIZATION

0.99+

GumahadPERSON

0.99+

Steve JacquesPERSON

0.99+

Cal PolyORGANIZATION

0.99+

National Security Space AssociationORGANIZATION

0.99+

2013DATE

0.99+

AmazonORGANIZATION

0.99+

2018DATE

0.99+

Canadian Space AgencyORGANIZATION

0.99+

twoQUANTITY

0.99+

FCCORGANIZATION

0.99+

millionsQUANTITY

0.99+

John FurrierPERSON

0.99+

BongPERSON

0.99+

NvidiaORGANIZATION

0.99+

Bong GumahadPERSON

0.99+

DODORGANIZATION

0.99+

2021DATE

0.99+

Department of DefenseORGANIZATION

0.99+

hundredsQUANTITY

0.99+

2020DATE

0.99+

JuneDATE

0.99+

PentagonORGANIZATION

0.99+

1957DATE

0.99+

4th of October, 1957DATE

0.99+

FirstQUANTITY

0.99+

first questionQUANTITY

0.99+

NSAORGANIZATION

0.99+

Armstrong and Guhamad and Jacques V1


 

>> Announcer: From around the globe, it's The Cube, covering Space and Cybersecurity Symposium 2020, hosted by Cal Poly. >> Everyone, welcome to this special virtual conference, the Space and Cybersecurity Symposium 2020 put on by Cal Poly with support from The Cube. I'm John Furey, your host and master of ceremony's got a great topic today, and this session is really the intersection of space and cybersecurity. This topic, and this conversation is a cybersecurity workforce development through public and private partnerships. And we've got a great lineup, we've Jeff Armstrong is the president of California Polytechnic State University, also known as Cal Poly. Jeffrey, thanks for jumping on and Bong Gumahad. The second, Director of C4ISR Division, and he's joining us from the Office of the Under Secretary of Defense for the acquisition and sustainment of Department of Defense, DOD, and of course Steve Jacques is Executive Director, founder National Security Space Association, and managing partner at Velos. Gentlemen, thank you for joining me for this session, we've got an hour of conversation, thanks for coming on. >> Thank you. >> So we've got a virtual event here, we've got an hour to have a great conversation, I'd love for you guys to do an opening statement on how you see the development through public and private partnerships around cybersecurity and space, Jeff, we'll start with you. >> Well, thanks very much, John, it's great to be on with all of you. On behalf of Cal Poly, welcome everyone. Educating the workforce of tomorrow is our mission at Cal Poly, whether that means traditional undergraduates, masters students, or increasingly, mid-career professionals looking to upskill or re-skill. Our signature pedagogy is learn by doing, which means that our graduates arrive at employers, ready day one with practical skills and experience. We have long thought of ourselves as lucky to be on California's beautiful central coast, but in recent years, as we've developed closer relationships with Vandenberg Air Force Base, hopefully the future permanent headquarters of the United States Space Command with Vandenberg and other regional partners, We have discovered that our location is even more advantageous than we thought. We're just 50 miles away from Vandenberg, a little closer than UC Santa Barbara and the base represents the Southern border of what we have come to think of as the central coast region. Cal Poly and Vandenberg Air Force Base have partnered to support regional economic development, to encourage the development of a commercial space port, to advocate for the space command headquarters coming to Vandenberg and other ventures. These partnerships have been possible because both parties stand to benefit. Vandenberg, by securing new streams of revenue, workforce, and local supply chain and Cal Poly by helping to grow local jobs for graduates, internship opportunities for students and research and entrepreneurship opportunities for faculty and staff. Crucially, what's good for Vandenberg Air Force Base and for Cal Poly is also good for the central coast and the U.S., creating new head of household jobs, infrastructure, and opportunity. Our goal is that these new jobs bring more diversity and sustainability for the region. This regional economic development has taken on a life of its own, spawning a new nonprofit called REACH which coordinates development efforts from Vandenberg Air Force Base in the South to Camp Roberts in the North. Another factor that has facilitated our relationship with Vandenberg Air Force Base is that we have some of the same friends. For example, Northrop Grumman has as long been an important defense contractor and an important partner to Cal Poly, funding scholarships in facilities that have allowed us to stay current with technology in it to attract highly qualified students for whom Cal Poly's costs would otherwise be prohibitive. For almost 20 years, Northrop Grumman has funded scholarships for Cal Poly students. This year, they're funding 64 scholarships, some directly in our College of Engineering and most through our Cal Poly Scholars Program. Cal Poly scholars support both incoming freshmen and transfer students. These are especially important, 'cause it allows us to provide additional support and opportunities to a group of students who are mostly first generation, low income and underrepresented, and who otherwise might not choose to attend Cal Poly. They also allow us to recruit from partner high schools with large populations of underrepresented minority students, including the Fortune High School in Elk Grove, which we developed a deep and lasting connection. We know that the best work is done by balanced teams that include multiple and diverse perspectives. These scholarships help us achieve that goal and I'm sure you know Northrop Grumman was recently awarded a very large contract to modernize the U.S. ICBM armory with some of the work being done at Vandenberg Air Force Base, thus supporting the local economy and protecting... Protecting our efforts in space requires partnerships in the digital realm. Cal Poly has partnered with many private companies such as AWS. Our partnerships with Amazon Web Services has enabled us to train our students with next generation cloud engineering skills, in part, through our jointly created digital transformation hub. Another partnership example is among Cal Poly's California Cyber Security Institute College of Engineering and the California National Guard. This partnership is focused on preparing a cyber-ready workforce, by providing faculty and students with a hands on research and learning environment side by side with military law enforcement professionals and cyber experts. We also have a long standing partnership with PG&E most recently focused on workforce development and redevelopment. Many of our graduates do indeed go on to careers in aerospace and defense industry. As a rough approximation, more than 4,500 Cal Poly graduates list aerospace or defense as their employment sector on LinkedIn. And it's not just our engineers in computer sciences. When I was speaking to our fellow panelists not too long ago, speaking to Bong, we learned that Rachel Sims, one of our liberal arts majors is working in his office, so shout out to you, Rachel. And then finally, of course, some of our graduates soar to extraordinary heights, such as Commander Victor Glover, who will be heading to the International Space Station later this year. As I close, all of which is to say that we're deeply committed to workforce development and redevelopment, that we understand the value of public-private partnerships, and that we're eager to find new ways in which to benefit everyone from this further cooperation. So we're committed to the region, the state and the nation, in our past efforts in space, cyber security and links to our partners at, as I indicated, aerospace industry and governmental partners provides a unique position for us to move forward in the interface of space and cyber security. Thank you so much, John. >> President Armstrong, thank you very much for the comments and congratulations to Cal Poly for being on the forefront of innovation and really taking a unique, progressive view and want to tip a hat to you guys over there, thank you very much for those comments, appreciate it. Bong, Department of Defense. Exciting, you've got to defend the nation, space is global, your opening statement. >> Yes, sir, thanks John, appreciate that. Thank you everybody, I'm honored to be in this panel along with Preston Armstrong of Cal Poly and my longtime friend and colleague Steve Jacques of the National Security Space Association to discuss a very important topic of a cybersecurity workforce development as President Armstrong alluded to. I'll tell you, both of these organizations, Cal Poly and the NSSA have done and continue to do an exceptional job at finding talent, recruiting them and training current and future leaders and technical professionals that we vitally need for our nation's growing space programs, as well as our collective national security. Earlier today, during session three, I, along with my colleague, Chris Samson discussed space cyber security and how the space domain is changing the landscape of future conflicts. I discussed the rapid emergence of commercial space with the proliferation of hundreds, if not thousands of satellites, providing a variety of services including communications, allowing for global internet connectivity, as one example. Within DOD, we continued to look at how we can leverage this opportunity. I'll tell you, one of the enabling technologies, is the use of small satellites, which are inherently cheaper and perhaps more flexible than the traditional bigger systems that we have historically used and employed for DOD. Certainly not lost on me is the fact that Cal Poly pioneered CubeSats 28, 27 years ago, and they set a standard for the use of these systems today. So they saw the value and benefit gained way ahead of everybody else it seems. And Cal Poly's focus on training and education is commendable. I'm especially impressed by the efforts of another of Steven's colleague, the current CIO, Mr. Bill Britton, with his high energy push to attract the next generation of innovators. Earlier this year, I had planned on participating in this year's cyber innovation challenge in June, Oops, Cal Poly hosts California middle, and high school students, and challenge them with situations to test their cyber knowledge. I tell you, I wish I had that kind of opportunity when I was a kid, unfortunately, the pandemic changed the plan, but I truly look forward to future events such as these, to participate in. Now, I want to recognize my good friend, Steve Jacques, whom I've known for perhaps too long of a time here, over two decades or so, who was an acknowledged space expert and personally I've truly applaud him for having the foresight a few years back to form the National Security Space Association to help the entire space enterprise navigate through not only technology, but policy issues and challenges and paved the way for operationalizing space. Space, it certainly was fortifying domain, it's not a secret anymore, and while it is a unique area, it shares a lot of common traits with the other domains, such as land, air, and sea, obviously all are strategically important to the defense of the United States. In conflict, they will all be contested and therefore they all need to be defended. One domain alone will not win future conflicts, and in a joint operation, we must succeed in all. So defending space is critical, as critical as to defending our other operational domains. Funny, space is the only sanctuary available only to the government. Increasingly as I discussed in a previous session, commercial space is taking the lead in a lot of different areas, including R&D, the so-called new space. So cybersecurity threat is even more demanding and even more challenging. The U.S. considers and futhered access to and freedom to operate in space, vital to advancing security, economic prosperity and scientific knowledge of the country, thus making cyberspace an inseparable component of America's financial, social government and political life. We stood up US Space Force a year ago or so as the newest military service. Like the other services, its mission is to organize, train and equip space forces in order to protect U.S. and allied interest in space and to provide spacecape builders who joined force. Imagine combining that U.S. Space Force with the U.S. Cyber Command to unify the direction of the space and cyberspace operation, strengthen DOD capabilities and integrate and bolster a DOD cyber experience. Now, of course, to enable all of this requires a trained and professional cadre of cyber security experts, combining a good mix of policy, as well as a high technical skill set. Much like we're seeing in STEM, we need to attract more people to this growing field. Now, the DOD has recognized the importance to the cybersecurity workforce, and we have implemented policies to encourage its growth. Back in 2013, the Deputy Secretary of Defense signed a DOD Cyberspace Workforce Strategy, to create a comprehensive, well-equipped cyber security team to respond to national security concerns. Now, this strategy also created a program that encourages collaboration between the DOD and private sector employees. We call this the Cyber Information Technology Exchange program, or CITE that it's an exchange program, which is very interesting in which a private sector employee can naturally work for the DOD in a cyber security position that spans across multiple mission critical areas, important to the DOD. A key responsibility of the cyber security community is military leaders, unrelated threats, and the cyber security actions we need to have to defeat these threats. We talked about rapid acquisition, agile business processes and practices to speed up innovation, likewise, cyber security must keep up with this challenge. So cyber security needs to be right there with the challenges and changes, and this requires exceptional personnel. We need to attract talent, invest in the people now to grow a robust cybersecurity workforce for the future. I look forward to the panel discussion, John, thank you. >> Thank you so much, Bob for those comments and, you know, new challenges or new opportunities and new possibilities and freedom to operate in space is critical, thank you for those comments, looking forward to chatting further. Steve Jacques, Executive Director of NSSA, you're up, opening statement. >> Thank you, John and echoing Bongs, thanks to Cal Poly for pulling this important event together and frankly, for allowing the National Security Space Association be a part of it. Likewise, on behalf of the association, I'm delighted and honored to be on this panel of President Armstrong, along with my friend and colleague, Bong Gumahad. Something for you all to know about Bong, he spent the first 20 years of his career in the Air Force doing space programs. He then went into industry for several years and then came back into government to serve, very few people do that. So Bong, on behalf of the space community, we thank you for your lifelong devotion to service to our nation, we really appreciate that. And I also echo a Bong shout out to that guy, Bill Britton. who's been a long time co-conspirator of ours for a long time, and you're doing great work there in the cyber program at Cal Poly, Bill, keep it up. But Professor Armstrong, keep a close eye on him. (laughter) I would like to offer a little extra context to the great comments made by President Armstrong and Bong. And in our view, the timing of this conference really could not be any better. We all recently reflected again on that tragic 9/11 surprise attack on our homeland and it's an appropriate time we think to take pause. While a percentage of you in the audience here weren't even born or were babies then, for the most of us, it still feels like yesterday. And moreover, a tragedy like 9/11 has taught us a lot to include, to be more vigilant, always keep our collective eyes and ears open, to include those "eyes and ears from space," making sure nothing like this ever happens again. So this conference is a key aspect, protecting our nation requires we work in a cyber secure environment at all times. But you know, the fascinating thing about space systems is we can't see 'em. Now sure, we see space launches, man, there's nothing more invigorating than that. But after launch they become invisible, so what are they really doing up there? What are they doing to enable our quality of life in the United States and in the world? Well to illustrate, I'd like to paraphrase elements of an article in Forbes magazine, by Bongs and my good friend, Chuck Beames, Chuck is a space guy, actually had Bongs job a few years in the Pentagon. He's now Chairman and Chief Strategy Officer at York Space Systems and in his spare time, he's Chairman of the Small Satellites. Chuck speaks in words that everyone can understand, so I'd like to give you some of his words out of his article, paraphrase somewhat, so these are Chuck's words. "Let's talk about average Joe and plain Jane. "Before heading to the airport for a business trip "to New York city, Joe checks the weather forecast, "informed by NOAA's weather satellites, "to see what to pack for the trip. "He then calls an Uber, that space app everybody uses, "it matches riders with drivers via GPS, "to take him to the airport. "So Joe has launched in the airport, "unbeknownst to him, his organic lunch is made "with the help of precision farming "made possible to optimize the irrigation and fertilization "with remote spectral sensing coming from space and GPS. "On the plane, the pilot navigates around weather, "aided by GPS and NOAA's weather satellites "and Joe makes his meeting on time "to join his New York colleagues in a video call "with a key customer in Singapore, "made possible by telecommunication satellites. "En route to his next meeting, "Joe receives notice changing the location of the meeting "to the other side of town. "So he calmly tells Siri to adjust the destination "and his satellite-guided Google maps redirect him "to the new location. "That evening, Joe watches the news broadcast via satellite, "report details of meeting among world leaders, "discussing the developing crisis in Syria. "As it turns out various forms of "'remotely sensed information' collected from satellites "indicate that yet another banned chemical weapon "may have been used on its own people. "Before going to bed, Joe decides to call his parents "and congratulate them for their wedding anniversary "as they cruise across the Atlantic, "made possible again by communication satellites "and Joe's parents can enjoy the call "without even wondering how it happened. "The next morning back home, "Joe's wife, Jane is involved in a car accident. "Her vehicle skids off the road, she's knocked unconscious, "but because of her satellite equipped OnStar system, "the crash is detected immediately, "and first responders show up on the scene in time. "Joe receives the news, books an early trip home, "sends flowers to his wife "as he orders another Uber to the airport. "Over that 24 hours, "Joe and Jane used space system applications "for nearly every part of their day. "Imagine the consequences if at any point "they were somehow denied these services, "whether they be by natural causes or a foreign hostility. "In each of these satellite applications used in this case, "were initially developed for military purposes "and continued to be, but also have remarkable application "on our way of life, just many people just don't know that." So ladies and gentlemen, now you know, thanks to Chuck Beames. Well, the United States has a proud heritage of being the world's leading space-faring nation. Dating back to the Eisenhower and Kennedy years, today, we have mature and robust systems operating from space, providing overhead reconnaissance to "watch and listen," provide missile warning, communications, positioning, navigation, and timing from our GPS system, much of which you heard in Lieutenant General JT Thomson's earlier speech. These systems are not only integral to our national security, but also to our quality of life. As Chuck told us, we simply no longer can live without these systems as a nation and for that matter, as a world. But over the years, adversaries like China, Russia and other countries have come to realize the value of space systems and are aggressively playing catch up while also pursuing capabilities that will challenge our systems. As many of you know, in 2007, China demonstrated its ASAT system by actually shooting down one of its own satellites and has been aggressively developing counterspace systems to disrupt ours. So in a heavily congested space environment, our systems are now being contested like never before and will continue to be. Well, as a Bong mentioned, the United States have responded to these changing threats. In addition to adding ways to protect our system, the administration and the Congress recently created the United States Space Force and the operational United States Space Command, the latter of which you heard President Armstrong and other Californians hope is going to be located at Vandenberg Air Force Base. Combined with our intelligence community, today we have focused military and civilian leadership now in space, and that's a very, very good thing. Commensurately on the industry side, we did create the National Security Space Association, devoted solely to supporting the National Security Space Enterprise. We're based here in the DC area, but we have arms and legs across the country and we are loaded with extraordinary talent in scores of former government executives. So NSSA is joined at the hip with our government customers to serve and to support. We're busy with a multitude of activities underway, ranging from a number of thought-provoking policy papers, our recurring spacetime webcasts, supporting Congress's space power caucus, and other main serious efforts. Check us out at nssaspace.org. One of our strategic priorities and central to today's events is to actively promote and nurture the workforce development, just like Cal-Poly. We will work with our U.S. government customers, industry leaders, and academia to attract and recruit students to join the space world, whether in government or industry, and to assist in mentoring and training as their careers progress. On that point, we're delighted to be working with Cal Poly as we hopefully will undertake a new pilot program with them very soon. So students stay tuned, something I can tell you, space is really cool. While our nation's satellite systems are technical and complex, our nation's government and industry workforce is highly diverse, with a combination of engineers, physicists and mathematicians, but also with a large non-technical expertise as well. Think about how government gets these systems designed, manufactured, launching into orbit and operating. They do this via contracts with our aerospace industry, requiring talents across the board, from cost estimating, cost analysis, budgeting, procurement, legal, and many other support tasks that are integral to the mission. Many thousands of people work in the space workforce, tens of billions of dollars every year. This is really cool stuff and no matter what your education background, a great career to be part of. In summary, as Bong had mentioned as well, there's a great deal of exciting challenges ahead. We will see a new renaissance in space in the years ahead and in some cases it's already begun. Billionaires like Jeff Bezos, Elon Musk, Sir Richard Branson, are in the game, stimulating new ideas and business models. Other private investors and startup companies, space companies are now coming in from all angles. The exponential advancement of technology and micro electronics now allows a potential for a plethora of small sat systems to possibly replace older satellites, the size of a Greyhound bus. It's getting better by the day and central to this conference, cybersecurity is paramount to our nation's critical infrastructure in space. So once again, thanks very much and I look forward to the further conversation. >> Steve, thank you very much. Space is cool, it's relevant, but it's important as you pointed out in your awesome story about how it impacts our life every day so I really appreciate that great story I'm glad you took the time to share that. You forgot the part about the drone coming over in the crime scene and, you know, mapping it out for you, but we'll add that to the story later, great stuff. My first question is, let's get into the conversations, because I think this is super important. President Armstrong, I'd like you to talk about some of the points that was teased out by Bong and Steve. One in particular is the comment around how military research was important in developing all these capabilities, which is impacting all of our lives through that story. It was the military research that has enabled a generation and generation of value for consumers. This is kind of this workforce conversation, there are opportunities now with research and grants, and this is a funding of innovation that is highly accelerated, it's happening very quickly. Can you comment on how research and the partnerships to get that funding into the universities is critical? >> Yeah, I really appreciate that and appreciate the comments of my colleagues. And it really boils down to me to partnerships, public-private partnerships, you have mentioned Northrop Grumman, but we have partnerships with Lockheed Martin, Boeing, Raytheon, Space X, JPL, also member of an organization called Business Higher Education Forum, which brings together university presidents and CEOs of companies. There's been focused on cybersecurity and data science and I hope that we can spill into cybersecurity and space. But those partnerships in the past have really brought a lot forward. At Cal Poly, as mentioned, we've been involved with CubeSat, we've have some secure work, and we want to plan to do more of that in the future. Those partnerships are essential, not only for getting the R&D done, but also the students, the faculty, whether they're master's or undergraduate can be involved with that work, they get that real life experience, whether it's on campus or virtually now during COVID or at the location with the partner, whether it may be governmental or industry, and then they're even better equipped to hit the ground running. And of course we'd love to see more of our students graduate with clearance so that they could do some of that secure work as well. So these partnerships are absolutely critical and it's also in the context of trying to bring the best and the brightest in all demographics of California and the U.S. into this field, to really be successful. So these partnerships are essential and our goal is to grow them just like I know our other colleagues in the CSU and the UC are planning to do. >> You know, just as my age I've seen, I grew up in the eighties and in college and they're in that system's generation and the generation before me, they really kind of pioneered the space that spawned the computer revolution. I mean, you look at these key inflection points in our lives, they were really funded through these kinds of real deep research. Bong, talk about that because, you know, we're living in an age of cloud and Bezos was mentioned, Elon Musk, Sir Richard Branson, you got new ideas coming in from the outside, you have an accelerated clock now in terms of the innovation cycles and so you got to react differently, you guys have programs to go outside of the defense department, how important is this because the workforce that are in schools and/or folks re-skilling are out there and you've been on both sides of the table, so share your thoughts. >> No, thanks Johnny, thanks for the opportunity to respond to, and that's what, you know, you hit on the nose back in the 80's, R&D and space especially was dominated by government funding, contracts and so on, but things have changed as Steve pointed out, allow these commercial entities funded by billionaires are coming out of the woodwork, funding R&D so they're taking the lead, so what we can do within the DOD in government is truly take advantage of the work they've done. And since they're, you know, paving the way to new approaches and new way of doing things and I think we can certainly learn from that and leverage off of that, saves us money from an R&D standpoint, while benefiting from the product that they deliver. You know, within DOD, talking about workforce development, you know, we have prioritized and we have policies now to attract and retain the talent we need. I had the folks do some research and it looks like from a cybersecurity or workforce standpoint, a recent study done, I think last year in 2019, found that the cyber security workforce gap in U.S. is nearing half a million people, even though it is a growing industry. So the pipeline needs to be strengthened, getting people through, you know, starting young and through college, like Professor Armstrong indicated because we're going to need them to be in place, you know, in a period of about maybe a decade or so. On top of that, of course, is the continuing issue we have with the gap with STEM students. We can't afford not have expertise in place to support all the things we're doing within DoD, not only DoD but the commercial side as well, thank you. >> How's the gap get filled, I mean, this is, again, you've got cybersecurity, I mean, with space it's a whole other kind of surface area if you will, it's not really surface area, but it is an IOT device if you think about it, but it does have the same challenges, that's kind of current and progressive with cybersecurity. Where's the gap get filled, Steve or President Armstrong, I mean, how do you solve the problem and address this gap in the workforce? What are some solutions and what approaches do we need to put in place? >> Steve, go ahead., I'll follow up. >> Okay, thanks, I'll let you correct me. (laughter) It's a really good question, and the way I would approach it is to focus on it holistically and to acknowledge it upfront and it comes with our teaching, et cetera, across the board. And from an industry perspective, I mean, we see it, we've got to have secure systems in everything we do, and promoting this and getting students at early ages and mentoring them and throwing internships at them is so paramount to the whole cycle. And that's kind of, it really takes a focused attention and we continue to use the word focus from an NSSA perspective. We know the challenges that are out there. There are such talented people in the workforce, on the government side, but not nearly enough of them and likewise on the industry side, we could use more as well, but when you get down to it, you know, we can connect dots, you know, the aspects that Professor Armstrong talked about earlier to where you continue to work partnerships as much as you possibly can. We hope to be a part of that network, that ecosystem if you will, of taking common objectives and working together to kind of make these things happen and to bring the power, not just of one or two companies, but of our entire membership thereabout. >> President Armstrong-- >> Yeah, I would also add it again, it's back to the partnerships that I talked about earlier, one of our partners is high schools and schools Fortune, Margaret Fortune, who worked in a couple of administrations in California across party lines and education, their fifth graders all visit Cal Poly, and visit our learned-by-doing lab. And you've got to get students interested in STEM at an early age. We also need the partnerships, the scholarships, the financial aid, so the students can graduate with minimal to no debt to really hit the ground running and that's exacerbated and really stress now with this COVID induced recession. California supports higher education at a higher rate than most states in the nation, but that has brought this year for reasons all understand due to COVID. And so our partnerships, our creativity, and making sure that we help those that need the most help financially, that's really key because the gaps are huge. As my colleagues indicated, you know, half a million jobs and I need you to look at the students that are in the pipeline, we've got to enhance that. And the placement rates are amazing once the students get to a place like Cal Poly or some of our other amazing CSU and UC campuses, placement rates are like 94%. Many of our engineers, they have jobs lined up a year before they graduate. So it's just going to take a key partnerships working together and that continued partnership with government local, of course, our state, the CSU, and partners like we have here today, both Steve and Bong so partnerships is the thing. >> You know, that's a great point-- >> I could add, >> Okay go ahead. >> All right, you know, the collaboration with universities is one that we put on lot of emphasis here, and it may not be well known fact, but just an example of national security, the AUC is a national centers of academic excellence in cyber defense works with over 270 colleges and universities across the United States to educate and certify future cyber first responders as an example. So that's vibrant and healthy and something that we ought to take advantage of. >> Well, I got the brain trust here on this topic. I want to get your thoughts on this one point, 'cause I'd like to define, you know, what is a public-private partnership because the theme that's coming out of the symposium is the script has been flipped, it's a modern era, things are accelerated, you've got security, so you've got all of these things kind of happenning it's a modern approach and you're seeing a digital transformation play out all over the world in business and in the public sector. So what is a modern public-private partnership and what does it look like today because people are learning differently. COVID has pointed out, which is that we're seeing right now, how people, the progressions of knowledge and learning, truth, it's all changing. How do you guys view the modern version of public-private partnership and some examples and some proof points, can you guys share that? We'll start with you, Professor Armstrong. >> Yeah, as I indicated earlier, we've had, and I could give other examples, but Northrop Grumman, they helped us with a cyber lab many years ago that is maintained directly, the software, the connection outside it's its own unit so the students can learn to hack, they can learn to penetrate defenses and I know that that has already had some considerations of space, but that's a benefit to both parties. So a good public-private partnership has benefits to both entities and the common factor for universities with a lot of these partnerships is the talent. The talent that is needed, what we've been working on for years of, you know, the undergraduate or master's or PhD programs, but now it's also spilling into upskilling and reskilling, as jobs, you know, folks who are in jobs today that didn't exist two years, three years, five years ago, but it also spills into other aspects that can expand even more. We're very fortunate we have land, there's opportunities, we have ONE Tech project. We are expanding our tech park, I think we'll see opportunities for that and it'll be adjusted due to the virtual world that we're all learning more and more about it, which we were in before COVID. But I also think that that person to person is going to be important, I want to make sure that I'm driving across a bridge or that satellite's being launched by the engineer that's had at least some in person training to do that in that experience, especially as a first time freshman coming on campus, getting that experience, expanding it as an adult, and we're going to need those public-private partnerships in order to continue to fund those at a level that is at the excellence we need for these STEM and engineering fields. >> It's interesting people and technology can work together and these partnerships are the new way. Bongs too with reaction to the modern version of what a public successful private partnership looks like. >> If I could jump in John, I think, you know, historically DOD's had a high bar to overcome if you will, in terms of getting rapid... pulling in new companies, miss the fall if you will, and not rely heavily on the usual suspects, of vendors and the like, and I think the DOD has done a good job over the last couple of years of trying to reduce that burden and working with us, you know, the Air Force, I think they're pioneering this idea around pitch days, where companies come in, do a two-hour pitch and immediately notified of, you know, of an a award, without having to wait a long time to get feedback on the quality of the product and so on. So I think we're trying to do our best to strengthen that partnership with companies outside of the main group of people that we typically use. >> Steve, any reaction, any comment to add? >> Yeah, I would add a couple and these are very excellent thoughts. It's about taking a little gamble by coming out of your comfort zone, you know, the world that Bong and I, Bong lives in and I used to live in the past, has been quite structured. It's really about, we know what the threat is, we need to go fix it, we'll design as if as we go make it happen, we'll fly it. Life is so much more complicated than that and so it's really, to me, I mean, you take an example of the pitch days of Bong talks about, I think taking a gamble by attempting to just do a lot of pilot programs, work the trust factor between government folks and the industry folks and academia, because we are all in this together in a lot of ways. For example, I mean, we just sent a paper to the white house at their request about, you know, what would we do from a workforce development perspective and we hope to embellish on this over time once the initiative matures, but we have a piece of it for example, is a thing we call "clear for success," getting back to president Armstrong's comments so at a collegiate level, you know, high, high, high quality folks are in high demand. So why don't we put together a program that grabs kids in their underclass years, identifies folks that are interested in doing something like this, get them scholarships, have a job waiting for them that they're contracted for before they graduate, and when they graduate, they walk with an SCI clearance. We believe that can be done, so that's an example of ways in which public-private partnerships can happen to where you now have a talented kid ready to go on day one. We think those kinds of things can happen, it just gets back down to being focused on specific initiatives, giving them a chance and run as many pilot programs as you can, like pitch days. >> That's a great point, it's a good segue. Go ahead, President Armstrong. >> I just want to jump in and echo both the Bong and Steve's comments, but Steve that, you know, your point of, you know our graduates, we consider them ready day one, well they need to be ready day one and ready to go secure. We totally support that and love to follow up offline with you on that. That's exciting and needed, very much needed more of it, some of it's happening, but we certainly have been thinking a lot about that and making some plans. >> And that's a great example, a good segue. My next question is kind of re-imagining these workflows is kind of breaking down the old way and bringing in kind of the new way, accelerate all kinds of new things. There are creative ways to address this workforce issue and this is the next topic, how can we employ new creative solutions because let's face it, you know, it's not the days of get your engineering degree and go interview for a job and then get slotted in and get the intern, you know, the programs and you'd matriculate through the system. This is multiple disciplines, cybersecurity points at that. You could be smart in math and have a degree in anthropology and be one of the best cyber talents on the planet. So this is a new, new world, what are some creative approaches that's going to work for you? >> Alright, good job, one of the things, I think that's a challenge to us is, you know, somehow we got me working for, with the government, sexy right? You know, part of the challenge we have is attracting the right level of skill sets and personnel but, you know, we're competing, oftentimes, with the commercial side, the gaming industry as examples is a big deal. And those are the same talents we need to support a lot of the programs that we have in DOD. So somehow we have do a better job to Steve's point about making the work within DOD, within the government, something that they would be interested early on. So attract them early, you know, I could not talk about Cal Poly's challenge program that they were going to have in June inviting high school kids really excited about the whole idea of space and cyber security and so on. Those are some of the things that I think we have to do and continue to do over the course of the next several years. >> Awesome, any other creative approaches that you guys see working or might be an idea, or just to kind of stoke the ideation out there? Internships, obviously internships are known, but like, there's got to be new ways. >> Alright, I think you can take what Steve was talking about earlier, getting students in high school and aligning them sometimes at first internship, not just between the freshman and sophomore year, but before they enter Cal Poly per se and they're involved. So I think that's absolutely key, getting them involved in many other ways. We have an example of upskilling or work redevelopment here in the central coast, PG&E Diablo nuclear plant that is going to decommission in around 2024. And so we have a ongoing partnership to work and reposition those employees for the future. So that's, you know, engineering and beyond but think about that just in the manner that you were talking about. So the upskilling and reskilling, and I think that's where, you know, we were talking about that Purdue University, other California universities have been dealing with online programs before COVID, and now with COVID so many more Faculty were pushed into that area, there's going to be a much more going and talk about workforce development in upskilling and reskilling, the amount of training and education of our faculty across the country in virtual and delivery has been huge. So there's always a silver linings in the cloud. >> I want to get your guys' thoughts on one final question as we end the segment, and we've seen on the commercial side with cloud computing on these highly accelerated environments where, you know, SAS business model subscription, and that's on the business side, but one of the things that's clear in this trend is technology and people work together and technology augments the people components. So I'd love to get your thoughts as we look at a world now, we're living in COVID, and Cal Poly, you guys have remote learning right now, it's at the infancy, it's a whole new disruption, if you will, but also an opportunity enable new ways to encollaborate, So if you look at people and technology, can you guys share your view and vision on how communities can be developed, how these digital technologies and people can work together faster to get to the truth or make a discovery, hire, develop the workforce, these are opportunities, how do you guys view this new digital transformation? >> Well, I think there's huge opportunities and just what we're doing with this symposium, we're filming this on Monday and it's going to stream live and then the three of us, the four of us can participate and chat with participants while it's going on. That's amazing and I appreciate you, John, you bringing that to this symposium. I think there's more and more that we can do. From a Cal Poly perspective, with our pedagogy so, you know, linked to learn by doing in-person will always be important to us, but we see virtual, we see partnerships like this, can expand and enhance our ability and minimize the in-person time, decrease the time to degree, enhance graduation rate, eliminate opportunity gaps for students that don't have the same advantages. So I think the technological aspect of this is tremendous. Then on the upskilling and reskilling, where employees are all over, they can re be reached virtually, and then maybe they come to a location or really advanced technology allows them to get hands on virtually, or they come to that location and get it in a hybrid format. So I'm very excited about the future and what we can do, and it's going to be different with every university, with every partnership. It's one size does not fit all, There's so many possibilities, Bong, I can almost imagine that social network that has a verified, you know, secure clearance. I can jump in, and have a little cloak of secrecy and collaborate with the DOD possibly in the future. But these are the kind of crazy ideas that are needed, your thoughts on this whole digital transformation cross-pollination. >> I think technology is going to be revolutionary here, John, you know, we're focusing lately on what we call visual engineering to quicken the pace of the delivery capability to warfighter as an example, I think AI, Machine Language, all that's going to have a major play in how we operate in the future. We're embracing 5G technologies, and the ability for zero latency, more IOT, more automation of the supply chain, that sort of thing, I think the future ahead of us is very encouraging, I think it's going to do a lot for national defense, and certainly the security of the country. >> Steve, your final thoughts, space systems are systems, and they're connected to other systems that are connected to people, your thoughts on this digital transformation opportunity. >> Such a great question and such a fun, great challenge ahead of us. Echoing my colleagues sentiments, I would add to it, you know, a lot of this has, I think we should do some focusing on campaigning so that people can feel comfortable to include the Congress to do things a little bit differently. You know, we're not attuned to doing things fast, but the dramatic, you know, the way technology is just going like crazy right now, I think it ties back to, hoping to convince some of our senior leaders and what I call both sides of the Potomac river, that it's worth taking this gamble, we do need to take some of these things you know, in a very proactive way. And I'm very confident and excited and comfortable that this is going to be a great time ahead and all for the better. >> You know, I always think of myself when I talk about DC 'cause I'm not a lawyer and I'm not a political person, but I always say less lawyers, more techies than in Congress and Senate, so (laughter)I always get in trouble when I say that. Sorry, President Armstrong, go ahead. >> Yeah, no, just one other point and Steve's alluded to this and Bong did as well, I mean, we've got to be less risk averse in these partnerships, that doesn't mean reckless, but we have to be less risk averse. And also, as you talk about technology, I have to reflect on something that happened and you both talked a bit about Bill Britton and his impact on Cal Poly and what we're doing. But we were faced a few years ago of replacing traditional data, a data warehouse, data storage, data center and we partnered with AWS and thank goodness, we had that in progress and it enhanced our bandwidth on our campus before COVID hit, and with this partnership with the digital transformation hub, so there's a great example where we had that going. That's not something we could have started, "Oh COVID hit, let's flip that switch." And so we have to be proactive and we also have to not be risk-averse and do some things differently. That has really salvaged the experience for our students right now, as things are flowing well. We only have about 12% of our courses in person, those essential courses and I'm just grateful for those partnerships that I have talked about today. >> And it's a shining example of how being agile, continuous operations, these are themes that expand the space and the next workforce needs to be built. Gentlemen, thank you very much for sharing your insights, I know Bong, you're going to go into the defense side of space in your other sessions. Thank you gentlemen, for your time, for a great session, I appreciate it. >> Thank you. >> Thank you gentlemen. >> Thank you. >> Thank you. >> Thank you, thank you all. I'm John Furey with The Cube here in Palo Alto, California covering and hosting with Cal Poly, the Space and Cybersecurity Symposium 2020, thanks for watching. (bright atmospheric music)

Published Date : Sep 18 2020

SUMMARY :

the globe, it's The Cube, and of course Steve Jacques on how you see the development and the California National Guard. to you guys over there, Cal Poly and the NSSA have and freedom to operate and nurture the workforce in the crime scene and, you and it's also in the context and the generation before me, So the pipeline needs to be strengthened, does have the same challenges, and likewise on the industry side, and I need you to look at the students and something that we in business and in the public sector. so the students can learn to hack, to the modern version miss the fall if you will, and the industry folks and academia, That's a great point, and echo both the Bong and bringing in kind of the new way, and continue to do over the course but like, there's got to be new ways. and I think that's where, you and that's on the business side, and it's going to be different and certainly the security of the country. and they're connected to other systems and all for the better. of myself when I talk about DC and Steve's alluded to and the next workforce needs to be built. the Space and Cybersecurity

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
StevePERSON

0.99+

ChuckPERSON

0.99+

JohnPERSON

0.99+

JoePERSON

0.99+

BobPERSON

0.99+

Chris SamsonPERSON

0.99+

NSSAORGANIZATION

0.99+

Jeff BezosPERSON

0.99+

Cal PolyORGANIZATION

0.99+

BoeingORGANIZATION

0.99+

Steve JacquesPERSON

0.99+

Bill BrittonPERSON

0.99+

AWSORGANIZATION

0.99+

RachelPERSON

0.99+

NOAAORGANIZATION

0.99+

Jeff ArmstrongPERSON

0.99+

Northrop GrummanORGANIZATION

0.99+

PG&EORGANIZATION

0.99+

2007DATE

0.99+

Chuck BeamesPERSON

0.99+

National Security Space AssociationORGANIZATION

0.99+

National Security Space EnterpriseORGANIZATION

0.99+

United States Space CommandORGANIZATION

0.99+

Department of DefenseORGANIZATION

0.99+

CaliforniaLOCATION

0.99+

Lockheed MartinORGANIZATION

0.99+

California National GuardORGANIZATION

0.99+

United States Space ForceORGANIZATION

0.99+

Amazon Web ServicesORGANIZATION

0.99+

Rachel SimsPERSON

0.99+

JPLORGANIZATION

0.99+

StevenPERSON

0.99+

JeffPERSON

0.99+

DODORGANIZATION

0.99+

oneQUANTITY

0.99+

Space XORGANIZATION

0.99+

JeffreyPERSON

0.99+

JanePERSON

0.99+

JohnnyPERSON

0.99+

John FureyPERSON

0.99+

Cal PolyORGANIZATION

0.99+

National Security Space AssociationORGANIZATION

0.99+

ArmstrongPERSON

0.99+

JuneDATE

0.99+

2013DATE

0.99+

SingaporeLOCATION

0.99+

United StatesLOCATION

0.99+

New YorkLOCATION

0.99+

U.S. Space ForceORGANIZATION

0.99+

BongPERSON

0.99+

Elon MuskPERSON

0.99+

SiriTITLE

0.99+